Appendix A Log Descriptions
ZyWALL USG 2000 User’s Guide
844
VPN gateway %s was
enabled
%s is the gateway name. An administrator enabled the VPN
gateway.
XAUTH fail! My name:
%s
%s is the my xauth name. This indicates that my name is
invalid.
XAUTH fail! Remote
user: %s
%s is the remote xauth name. This indicates that a remote
user’s name is invalid.
XAUTH succeed! My
name: %s
%s is the my xauth name. This indicates that my name is
valid.
XAUTH succeed! Remote
user: %s
%s is the remote xauth name. This indicate that a remote
user’s name is valid
Dynamic Tunnel
[%s:%s:0x%x:%s] built
successfully
The variables represent the phase 1 name, tunnel name, SPI
and the xauth name (optional). The phase-2 tunnel
negotiation is complete.
Dynamic Tunnel
[%s:%s:0x%x:0x%x:%s]
rekeyed successfully
The variables represent the phase 1 name, tunnel name, old
SPI, new SPI and the xauth name (optional). The tunnel was
rekeyed successfully.
Tunnel
[%s:%s:0x%x:%s] built
successfully
The variables represent the phase 1 name, tunnel name, SPI
and the xauth name (optional). The phase-2 tunnel
negotiation is complete.
Tunnel
[%s:%s:0x%x:0x%x:%s]
rekeyed successfully
The variables represent the phase 1 name, tunnel name, old
SPI, new SPI and the xauth name (optional). The tunnel was
rekeyed successfully.
Tunnel [%s:%s] Phase
1 pre-shared key
mismatch
The variables represent the phase 1 name and tunnel name.
When negotiating phase-1, the pre-shared keys did not
match.
Tunnel [%s:%s]
Recving IKE request
The variables represent the phase 1 name and tunnel name.
The device received an IKE request.
Tunnel [%s:%s]
Sending IKE request
The variables represent the phase 1 name and tunnel name.
The device sent an IKE request.
Tunnel [%s:0x%x] is
disconnected
The variables represent the tunnel name and the SPI of a
tunnel that was disconnected.
Tunnel [%s] rekeyed
successfully
%s is the tunnel name. The tunnel was rekeyed successfully.
Table 278
IPSec Logs
LOG MESSAGE
DESCRIPTION
Corrupt packet,
Inbound transform
operation fail
The device received corrupt IPsec packets and could not
process them.
Encapsulated packet
too big with length
An outgoing packet needed to be transformed but was longer
than 65535.
Get inbound transform
fail
When performing inbound processing for incoming IPSEC
packets and ICMPs related to them, the engine cannot obtain
the transform context.
Table 277
IKE Logs (continued)
LOG MESSAGE
DESCRIPTION
Summary of Contents for ZyXEL ZyWALL USG-1000
Page 2: ......
Page 30: ...30 ...
Page 58: ...Chapter 3 Web Configurator ZyWALL USG 2000 User s Guide 58 ...
Page 84: ...Chapter 4 Wizard Setup ZyWALL USG 2000 User s Guide 84 ...
Page 136: ...Chapter 6 Tutorials ZyWALL USG 2000 User s Guide 136 ...
Page 166: ...Chapter 9 Signature Update ZyWALL USG 2000 User s Guide 166 ...
Page 168: ...168 ...
Page 234: ...Chapter 11 Trunks ZyWALL USG 2000 User s Guide 234 ...
Page 248: ...Chapter 12 Policy and Static Routes ZyWALL USG 2000 User s Guide 248 ...
Page 272: ...Chapter 15 DDNS ZyWALL USG 2000 User s Guide 272 ...
Page 287: ...Chapter 16 Virtual Servers ZyWALL USG 2000 User s Guide 287 ...
Page 288: ...Chapter 16 Virtual Servers ZyWALL USG 2000 User s Guide 288 ...
Page 307: ...307 PART III Firewall Firewall 309 ...
Page 308: ...308 ...
Page 326: ...Chapter 20 Firewall ZyWALL USG 2000 User s Guide 326 ...
Page 328: ...328 ...
Page 370: ...Chapter 21 IPSec VPN ZyWALL USG 2000 User s Guide 370 ...
Page 392: ...Chapter 23 SSL User Screens ZyWALL USG 2000 User s Guide 392 ...
Page 394: ...Chapter 24 SSL User Application Screens ZyWALL USG 2000 User s Guide 394 ...
Page 402: ...Chapter 25 SSL User File Sharing ZyWALL USG 2000 User s Guide 402 ...
Page 412: ...Chapter 27 L2TP VPN ZyWALL USG 2000 User s Guide 412 ...
Page 440: ...Chapter 28 L2TP VPN Example ZyWALL USG 2000 User s Guide 440 ...
Page 441: ...441 PART V Application Patrol Application Patrol 443 ...
Page 442: ...442 ...
Page 470: ...470 ...
Page 531: ...Chapter 32 ADP ZyWALL USG 2000 User s Guide 531 Figure 371 Profiles Protocol Anomaly ...
Page 540: ...Chapter 32 ADP ZyWALL USG 2000 User s Guide 540 ...
Page 566: ...Chapter 33 Content Filtering ZyWALL USG 2000 User s Guide 566 ...
Page 574: ...Chapter 34 Content Filter Reports ZyWALL USG 2000 User s Guide 574 ...
Page 593: ...593 PART VII Device HA Device HA 595 ...
Page 594: ...594 ...
Page 614: ...614 ...
Page 636: ...Chapter 38 Addresses ZyWALL USG 2000 User s Guide 636 ...
Page 660: ...Chapter 41 AAA Server ZyWALL USG 2000 User s Guide 660 ...
Page 686: ...Chapter 43 Certificates ZyWALL USG 2000 User s Guide 686 ...
Page 698: ...Chapter 45 SSL Application ZyWALL USG 2000 User s Guide 698 ...
Page 699: ...699 PART IX System System 701 ...
Page 700: ...700 ...
Page 750: ...750 ...
Page 776: ...Chapter 48 Logs ZyWALL USG 2000 User s Guide 776 ...
Page 794: ...Chapter 49 Reports ZyWALL USG 2000 User s Guide 794 ...
Page 796: ...Chapter 50 Diagnostics ZyWALL USG 2000 User s Guide 796 ...
Page 798: ...Chapter 51 Reboot ZyWALL USG 2000 User s Guide 798 ...
Page 812: ...Chapter 53 Product Specifications ZyWALL USG 2000 User s Guide 812 ...
Page 814: ...814 ...
Page 874: ...Appendix A Log Descriptions ZyWALL USG 2000 User s Guide 874 ...
Page 956: ...Appendix E Open Software Announcements ZyWALL USG 2000 User s Guide 956 ...
Page 960: ...Appendix F Legal Information ZyWALL USG 2000 User s Guide 960 ...