Prestige 653HWI Series User’s Guide
Log Descriptions
K-3
Chart K-4 Attack Logs
LOG MESSAGE
DESCRIPTION
attack (Protocol)
The firewall detected an attack. The log may also display the protocol
(for example TCP or UDP).
land Protocol)
The firewall detected a land attack. The log may also display the
protocol (for example TCP or UDP).
icmp echo ICMP
(type:%d, code:%d)
The firewall detected an ICMP echo attack. See the section on ICMP
messages for type and code details.
syn flood TCP
The firewall detected a TCP syn flood attack.
ports scan TCP
The firewall detected a TCP port scan attack.
teardrop (Protocol)
The firewall detected a teardrop attack.
illegal command TCP
The firewall detected a TCP SMTP illegal command attack.
NetBIOS TCP
The firewall detected a TCP NetBIOS attack.
ip spoofing - no
routing entry
(Protocol)
The firewall detected an IP spoofing attack while the Prestige did not
have a default route. The log may also display the protocol (for
example TCP or UDP).
vulnerability ICMP
(type:%d, code:%d)
The firewall detected an ICMP vulnerability attack; see the section on
ICMP messages for type and code details.
traceroute ICMP
(type:%d, code:%d)
The firewall detected an ICMP traceroute attack; see the section on
ICMP messages for type and code details.
Access logs may include the following information:
(Protocol) is the protocol of the packet (for example TCP or UDP) that triggered the log.
(Direction) is the direction in which the packet was traveling (for example LAN to WAN or WAN
to LAN)
(Rule) is the number of the firewall rule that caused the log.
Содержание Prestige 653HWI series
Страница 30: ......
Страница 62: ......
Страница 64: ......
Страница 88: ......
Страница 108: ...Prestige 653HWI Series User s Guide 7 20 WAN Setup Figure 7 10 Traffic Redirect LAN Setup...
Страница 112: ......
Страница 114: ......
Страница 134: ......
Страница 136: ......
Страница 156: ......
Страница 172: ......
Страница 184: ......
Страница 185: ...VPN IPSec V Part V VPN IPSec This part provides information about configuring VPN IPSec for secure communications...
Страница 186: ......
Страница 192: ......
Страница 200: ...Prestige 653HWI Series User s Guide 17 8 VPN Screens Figure 17 3 VPN IKE...
Страница 222: ......
Страница 242: ......
Страница 262: ......
Страница 263: ...Maintenance VIII Part VIII Maintenance This part covers the maintenance screens...
Страница 264: ......
Страница 266: ...Prestige 653HWI Series User s Guide 22 2 Maintenance Figure 22 1 System Status...
Страница 282: ......
Страница 292: ......
Страница 312: ......
Страница 338: ......
Страница 368: ......
Страница 408: ......
Страница 430: ......
Страница 434: ......
Страница 444: ......
Страница 450: ......
Страница 466: ......
Страница 474: ......
Страница 480: ......
Страница 491: ...Prestige 653HWI Series User s Guide Wireless LAN and IEEE 802 11 C 3 Diagram C 2 ESS Provides Campus Wide Coverage...
Страница 492: ......
Страница 497: ...Prestige 653HWI Series User s Guide PPPoE E 3 Diagram E 2 Prestige as a PPPoE Client...
Страница 498: ......
Страница 500: ......
Страница 540: ......
Страница 554: ......