ZyXEL Communications 2WE Network Card User Manual


 
ZyWALL 2 and ZyWALL 2WE
Log Descriptions 73
Chart Q-5 Attack Logs
LOG MESSAGE DESCRIPTION
syn flood TCP
The firewall detected a TCP syn flood attack.
ports scan TCP
The firewall detected a TCP port scan attack.
teardrop TCP
The firewall detected a TCP teardrop attack.
teardrop UDP
The firewall detected an UDP teardrop attack.
teardrop ICMP
(type:%d, code:%d)
The firewall detected an ICMP teardrop attack; see the section on
ICMP messages for type and code details.
illegal command TCP
The firewall detected a TCP illegal command attack.
NetBIOS TCP
The firewall detected a TCP NetBIOS attack.
ip spoofing - no
routing entry TCP
The firewall detected a TCP IP spoofing attack while the ZyWALL did
not have a default route.
ip spoofing - no
routing entry UDP
The firewall detected an UDP IP spoofing attack while the ZyWALL did
not have a default route.
ip spoofing - no
routing entry IGMP
The firewall detected an IGMP IP spoofing attack while the ZyWALL
did not have a default route.
ip spoofing - no
routing entry ESP
The firewall detected an ESP IP spoofing attack while the ZyWALL did
not have a default route.
ip spoofing - no
routing entry GRE
The firewall detected a GRE IP spoofing attack while the ZyWALL did
not have a default route.
ip spoofing - no
routing entry OSPF
The firewall detected an OSPF IP spoofing attack while the ZyWALL
did not have a default route.
ip spoofing - no
routing entry ICMP
(type:%d, code:%d)
The firewall detected an ICMP IP spoofing attack while the ZyWALL
did not have a default route; see the section on ICMP messages for
type and code details.
vulnerability ICMP
(type:%d, code:%d)
The firewall detected an ICMP vulnerability attack; see the section on
ICMP messages for type and code details.
traceroute ICMP
(type:%d, code:%d)
The firewall detected an ICMP traceroute attack; see the section on
ICMP messages for type and code details.