Appendix A Log Descriptions
ZyWALL USG 300 User’s Guide
977
Could not dial manual
key tunnel "%s"
%s is the tunnel name. The manual key tunnel cannot be
dialed.
DPD response with
invalid ID
When receiving a DPD response with invalid ID ignored.
DPD response with no
active request
When receiving a DPD response with no active query.
IKE Packet Retransmit
When retransmitting the IKE packets.
Phase 1 IKE SA process
done
When Phase 1 negotiation is complete.
Recv Main Mode request
from [%s]
%s is the remote name; When receiving a request to enter
Main mode.
Recv Aggressive Mode
request from [%s]
%s is the remote name; When receiving a request to enter
Aggressive mode.
Recv:[SA][KE][ID][CER
T][CR][HASH][SIG][NON
CE][DEL][VID][ATTR][N
OTFY:%s]
This is a combined message for incoming IKE packets
Send Main Mode request
to [%s]
%s is the remote name. The device sent a request to enter
Main Mode.
Send Aggressive Mode
request to [%s]
%s is the remote name. The device sent a request to enter
Aggressive Mode.
Send:[SA][KE][ID][CER
T][CR][HASH][SIG][NON
CE][DEL][VID][ATTR][N
OTFY:%s]
This is a combined message for outgoing IKE packets.
Start Phase 2: Quick
Mode
Indicates the beginning of phase 2 using quick mode.
The cookie pair is :
0x%08x%08x /
0x%08x%08x
Indicates the initiator/responder cookie pair.
The IPSec tunnel "%s"
is already established
%s is the tunnel name. When dialing a tunnel, the tunnel is
already dialed.
Tunnel [%s] built
successfully
%s is the tunnel name. The phase-2 tunnel negotiation is
complete.
Tunnel [%s] Phase 1
pre-shared key
mismatch
%s is the tunnel name. When negotiating phase-1, the pre-
shared key did not match.
Tunnel [%s] Recving
IKE request
%s is the tunnel name. The device received an IKE request.
Tunnel [%s] Sending
IKE request
%s is the tunnel name. The device sent an IKE request.
Tunnel [%s] IKE
Negotiation is in
process
%s is the tunnel name. When IKE request is already sent but
still attempting to dial a tunnel.
VPN gateway %s was
disabled
%s is the gateway name. An administrator disabled the VPN
gateway.
Table 291
IKE Logs (continued)
LOG MESSAGE
DESCRIPTION
Summary of Contents for Unified Security Gateway ZyWALL 300
Page 2: ......
Page 30: ...Table of Contents ZyWALL USG 300 User s Guide 30 ...
Page 31: ...31 PART I User s Guide ...
Page 32: ...32 ...
Page 38: ...Chapter 1 Introducing the ZyWALL ZyWALL USG 300 User s Guide 38 ...
Page 46: ...Chapter 2 Features and Applications ZyWALL USG 300 User s Guide 46 ...
Page 64: ...Chapter 3 Web Configurator ZyWALL USG 300 User s Guide 64 ...
Page 74: ...Chapter 4 Installation Setup Wizard ZyWALL USG 300 User s Guide 74 ...
Page 116: ...Chapter 6 Configuration Basics ZyWALL USG 300 User s Guide 116 ...
Page 184: ...Chapter 7 Tutorials ZyWALL USG 300 User s Guide 184 ...
Page 221: ...221 PART II Technical Reference ...
Page 222: ...222 ...
Page 288: ...Chapter 11 Registration ZyWALL USG 300 User s Guide 288 ...
Page 378: ...Chapter 14 Trunks ZyWALL USG 300 User s Guide 378 ...
Page 394: ...Chapter 15 Policy and Static Routes ZyWALL USG 300 User s Guide 394 ...
Page 408: ...Chapter 16 Routing Protocols ZyWALL USG 300 User s Guide 408 ...
Page 428: ...Chapter 19 NAT ZyWALL USG 300 User s Guide 428 ...
Page 454: ...Chapter 23 Authentication Policy ZyWALL USG 300 User s Guide 454 ...
Page 472: ...Chapter 24 Firewall ZyWALL USG 300 User s Guide 472 ...
Page 534: ...Chapter 27 SSL User Screens ZyWALL USG 300 User s Guide 534 ...
Page 536: ...Chapter 28 SSL User Application Screens ZyWALL USG 300 User s Guide 536 ...
Page 544: ...Chapter 29 SSL User File Sharing ZyWALL USG 300 User s Guide 544 ...
Page 638: ...Chapter 35 ADP ZyWALL USG 300 User s Guide 638 Figure 448 Profiles Protocol Anomaly ...
Page 682: ...Chapter 37 Content Filter Reports ZyWALL USG 300 User s Guide 682 ...
Page 700: ...Chapter 38 Anti Spam ZyWALL USG 300 User s Guide 700 ...
Page 722: ...Chapter 39 Device HA ZyWALL USG 300 User s Guide 722 ...
Page 738: ...Chapter 40 User Group ZyWALL USG 300 User s Guide 738 ...
Page 744: ...Chapter 41 Addresses ZyWALL USG 300 User s Guide 744 ...
Page 756: ...Chapter 43 Schedules ZyWALL USG 300 User s Guide 756 ...
Page 772: ...Chapter 45 Authentication Method ZyWALL USG 300 User s Guide 772 ...
Page 794: ...Chapter 46 Certificates ZyWALL USG 300 User s Guide 794 ...
Page 806: ...Chapter 48 SSL Application ZyWALL USG 300 User s Guide 806 ...
Page 811: ...Chapter 49 Endpoint Security ZyWALL USG 300 User s Guide 811 ...
Page 866: ...Chapter 50 System ZyWALL USG 300 User s Guide 866 ...
Page 873: ...Chapter 51 Log and Report ZyWALL USG 300 User s Guide 873 ...
Page 886: ...Chapter 51 Log and Report ZyWALL USG 300 User s Guide 886 ...
Page 916: ...Chapter 54 Packet Flow Explore ZyWALL USG 300 User s Guide 916 ...
Page 918: ...Chapter 55 Reboot ZyWALL USG 300 User s Guide 918 ...
Page 920: ...Chapter 56 Shutdown ZyWALL USG 300 User s Guide 920 ...
Page 948: ...Chapter 58 Product Specifications ZyWALL USG 300 User s Guide 948 ...
Page 1014: ...Appendix A Log Descriptions ZyWALL USG 300 User s Guide 1014 ...
Page 1124: ...Appendix F Open Software Announcements ZyWALL USG 300 User s Guide 1124 ...