Chapter 19 Logs
P-2304R-P1 Series User’s Guide
204
For type and code details, see
DNS resolving failed
The ZyXEL Device cannot get the IP address of the external content
filtering via DNS query.
Creating socket failed
The ZyXEL Device cannot issue a query because TCP/IP socket
creation failed, port:port number.
Connecting to content
filter server fail
The connection to the external content filtering server failed.
License key is invalid
The external content filtering license key is invalid.
Table 100
Attack Logs
LOG MESSAGE
DESCRIPTION
attack [ TCP | UDP | IGMP
| ESP | GRE | OSPF ]
The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack.
attack ICMP (type:%d,
code:%d)
The firewall detected an ICMP attack.
land [ TCP | UDP | IGMP |
ESP | GRE | OSPF ]
The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land
attack.
land ICMP (type:%d,
code:%d)
The firewall detected an ICMP land attack.
ip spoofing - WAN [ TCP |
UDP | IGMP | ESP | GRE |
OSPF ]
The firewall detected an IP spoofing attack on the WAN port.
ip spoofing - WAN ICMP
(type:%d, code:%d)
The firewall detected an ICMP IP spoofing attack on the WAN
port.
icmp echo : ICMP
(type:%d, code:%d)
The firewall detected an ICMP echo attack.
syn flood TCP
The firewall detected a TCP syn flood attack.
ports scan TCP
The firewall detected a TCP port scan attack.
teardrop TCP
The firewall detected a TCP teardrop attack.
teardrop UDP
The firewall detected an UDP teardrop attack.
teardrop ICMP (type:%d,
code:%d)
The firewall detected an ICMP teardrop attack.
illegal command TCP
The firewall detected a TCP illegal command attack.
NetBIOS TCP
The firewall detected a TCP NetBIOS attack.
ip spoofing - no routing
entry [ TCP | UDP | IGMP
| ESP | GRE | OSPF ]
The firewall classified a packet with no source routing entry as an
IP spoofing attack.
ip spoofing - no routing
entry ICMP (type:%d,
code:%d)
The firewall classified an ICMP packet with no source routing
entry as an IP spoofing attack.
vulnerability ICMP
(type:%d, code:%d)
The firewall detected an ICMP vulnerability attack.
traceroute ICMP (type:%d,
code:%d)
The firewall detected an ICMP traceroute attack.
ports scan UDP
The firewall detected a UDP port scan attack.
Table 99
Content Filtering Logs (continued)
LOG MESSAGE
DESCRIPTION
Summary of Contents for P-2304R
Page 2: ......
Page 8: ...Contents Overview P 2304R P1 Series User s Guide 8...
Page 26: ...26...
Page 32: ...Chapter 1 Introducing the ZyXEL Device P 2304R P1 Series User s Guide 32...
Page 40: ...Chapter 2 Introducing the Web Configurator P 2304R P1 Series User s Guide 40...
Page 73: ...73 PART II Network WAN 75 LAN 85 NAT 97...
Page 74: ...74...
Page 105: ...105 PART III VoIP SIP 107 Phone 121 Phone Book 129...
Page 106: ...106...
Page 116: ...Chapter 9 SIP P 2304R P1 Series User s Guide 116 Figure 60 VoIP SIP SIP Settings Advanced...
Page 128: ...Chapter 10 Phone P 2304R P1 Series User s Guide 128...
Page 134: ...Chapter 11 Phone Book P 2304R P1 Series User s Guide 134...
Page 136: ...136...
Page 144: ...Chapter 12 Firewall P 2304R P1 Series User s Guide 144...
Page 148: ...Chapter 13 Content Filter P 2304R P1 Series User s Guide 148...
Page 152: ...Chapter 14 Static Route P 2304R P1 Series User s Guide 152...
Page 174: ...174...
Page 186: ...Chapter 17 UPnP P 2304R P1 Series User s Guide 186...
Page 194: ...Chapter 18 System P 2304R P1 Series User s Guide 194...
Page 208: ...Chapter 19 Logs P 2304R P1 Series User s Guide 208...
Page 220: ...Chapter 21 Troubleshooting P 2304R P1 Series User s Guide 220...
Page 222: ...222...
Page 228: ...Appendix A Product Specifications P 2304R P1 Series User s Guide 228...
Page 258: ...Appendix E SIP Passthrough P 2304R P1 Series User s Guide 258...
Page 290: ...Appendix I Legal Information P 2304R P1 Series User s Guide 290...