![ZyXEL Communications P-660HN-F1A User Manual Download Page 317](http://html1.mh-extra.com/html/zyxel-communications/p-660hn-f1a/p-660hn-f1a_user-manual_944065317.webp)
Chapter 21 Logs
P-660HN-F1A User’s Guide
317
For type and code details, see
.
Table 106
Attack Logs
LOG MESSAGE
DESCRIPTION
attack [ TCP | UDP | IGMP
| ESP | GRE | OSPF ]
The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF
attack.
attack ICMP (type:%d,
code:%d)
The firewall detected an ICMP attack.
land [ TCP | UDP | IGMP |
ESP | GRE | OSPF ]
The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF
land attack.
land ICMP (type:%d,
code:%d)
The firewall detected an ICMP land attack.
ip spoofing - WAN [ TCP |
UDP | IGMP | ESP | GRE |
OSPF ]
The firewall detected an IP spoofing attack on the WAN
port.
ip spoofing - WAN ICMP
(type:%d, code:%d)
The firewall detected an ICMP IP spoofing attack on the
WAN port.
icmp echo : ICMP
(type:%d, code:%d)
The firewall detected an ICMP echo attack.
syn flood TCP
The firewall detected a TCP syn flood attack.
ports scan TCP
The firewall detected a TCP port scan attack.
teardrop TCP
The firewall detected a TCP teardrop attack.
teardrop UDP
The firewall detected an UDP teardrop attack.
teardrop ICMP (type:%d,
code:%d)
The firewall detected an ICMP teardrop attack.
illegal command TCP
The firewall detected a TCP illegal command attack.
NetBIOS TCP
The firewall detected a TCP NetBIOS attack.
ip spoofing - no routing
entry [ TCP | UDP | IGMP
| ESP | GRE | OSPF ]
The firewall classified a packet with no source routing
entry as an IP spoofing attack.
ip spoofing - no routing
entry ICMP (type:%d,
code:%d)
The firewall classified an ICMP packet with no source
routing entry as an IP spoofing attack.
vulnerability ICMP
(type:%d, code:%d)
The firewall detected an ICMP vulnerability attack.
traceroute ICMP (type:%d,
code:%d)
The firewall detected an ICMP traceroute attack.
Table 107
802.1X Logs
LOG MESSAGE
DESCRIPTION
RADIUS accepts user.
A user was authenticated by the RADIUS Server.
RADIUS rejects user. Pls check
RADIUS Server.
A user was not authenticated by the RADIUS
Server. Please check the RADIUS Server.
User logout because of session
timeout expired.
The router logged out a user whose session
expired.
Summary of Contents for P-660HN-F1A
Page 2: ......
Page 10: ...Contents Overview P 660HN F1A User s Guide 10...
Page 20: ...Table of Contents P 660HN F1A User s Guide 20...
Page 21: ...21 PART I User s Guide...
Page 22: ...22...
Page 36: ...Chapter 2 Introducing the Web Configurator P 660HN F1A User s Guide 36...
Page 44: ...Chapter 3 Status Screens P 660HN F1A User s Guide 44...
Page 84: ...Chapter 4 Tutorials P 660HN F1A User s Guide 84 Physical Port 1 3 exclude port 4 3 Click Apply...
Page 88: ...Chapter 4 Tutorials P 660HN F1A User s Guide 88...
Page 103: ...103 PART II Technical Reference...
Page 104: ...104...
Page 142: ...Chapter 7 LAN Setup P 660HN F1A User s Guide 142...
Page 188: ...Chapter 9 Network Address Translation NAT P 660HN F1A User s Guide 188...
Page 210: ...Chapter 10 Firewalls P 660HN F1A User s Guide 210...
Page 236: ...Chapter 13 Certificates P 660HN F1A User s Guide 236...
Page 240: ...Chapter 14 Static Route P 660HN F1A User s Guide 240...
Page 276: ...Chapter 17 Dynamic DNS Setup P 660HN F1A User s Guide 276...
Page 288: ...Chapter 18 Remote Management P 660HN F1A User s Guide 288...
Page 344: ...Chapter 24 Troubleshooting P 660HN F1A User s Guide 344...
Page 376: ...Appendix A Setting up Your Computer s IP Address P 660HN F1A User s Guide 376...
Page 386: ...Appendix B Pop up Windows JavaScripts and Java Permissions P 660HN F1A User s Guide 386...
Page 396: ...Appendix C IP Addresses and Subnetting P 660HN F1A User s Guide 396...
Page 420: ...Appendix F Legal Information P 660HN F1A User s Guide 420...
Page 430: ...Index P 660HN F1A User s Guide 430...