ZyXEL Communications 1000 Network Router User Manual


  Open as PDF
of 1075
 
Appendix A Log Descriptions
ZyWALL USG 1000 User’s Guide
909
Table 266 ADP Logs
LOG MESSAGE DESCRIPTION
from <zone> to <zone>
[type=<type>] <message>
, Action: <action>,
Severity: <severity>
The ZyWALL detected an anomaly in traffic traveling
between the specified zones.
The <type> = {scan-detection(<attack>) | flood-
detection(<attack>) | http-inspection(<attack>) | tcp-
decoder(<attack>)}.
The <message> gives details about the attack, although the
message is dropped if the log is more than 128 characters.
The <action> is what the ZyWALL did with the packet.
The <severity> is the threat level (very low, low, medium,
high, or severe).
Enable ADP succeeded. ADP was turned on.
Disable ADP succeeded. ADP was turned off.
ADP rule <num> has been
deleted.
The specified ADP rule has been deleted.
ADP rule <num> has been
moved to <num>.
The ADP rule with the specified index number (first num)
was moved to the specified index number (second num).
New ADP rule has been
appended.
An ADP rule has been added to the end of the list.
ADP rule <num> has been
inserted.
An ADP rule has been inserted. <num> is the number of the
new rule.
ADP rule <num> has been
modified.
The ADP rule of the specified number has been changed.
ADP profile <name> has
been deleted.
The ADP rule with the specified name has been removed.
ADP profile <name> has
been changed to <name>.
An ADP rule’s name has been changed from first <name> to
the second <name>.
ADP profile <name> has
been created.
An ADP profile with the specified name has been added.
ADP profile <name> has
been modified.
The ADP rule with the specified name has been changed.
Packet payload length
is over the maximum
system handle length
The ZyWALL’s ADP feature detected a packet with a length
over 16000 bytes.
LAND attack packet.
Source IP is the same
as Destination IP.
The ZyWALL’s ADP feature detected traffic with the same IP
address set as both the source and the destination.