ZyXEL Communications ISG50 Network Router User Manual


 
Appendix A Log Descriptions
ISG50 User’s Guide
789
Table 317 ADP Logs
LOG MESSAGE DESCRIPTION
from <zone> to <zone>
[type=<type>] <message>
, Action: <action>,
Severity: <severity>
The ISG50 detected an anomaly in traffic traveling between the
specified zones.
The <type> = {scan-detection(<attack>) | flood-
detection(<attack>) | http-inspection(<attack>) | tcp-
decoder(<attack>)}.
The <message> gives details about the attack, although the
message is dropped if the log is more than 128 characters.
The <action> is what the ISG50 did with the packet.
The <severity> is the threat level (very low, low, medium, high, or
severe).
Enable ADP succeeded.
ADP was turned on.
Disable ADP succeeded.
ADP was turned off.
ADP rule <num> has been
deleted.
The specified ADP rule has been deleted.
ADP rule <num> has been
moved to <num>.
The ADP rule with the specified index number (first num) was
moved to the specified index number (second num).
New ADP rule has been
appended.
An ADP rule has been added to the end of the list.
ADP rule <num> has been
inserted.
An ADP rule has been inserted. <num> is the number of the new
rule.
ADP rule <num> has been
modified.
The ADP rule of the specified number has been changed.
ADP profile <name> has
been deleted.
The ADP rule with the specified name has been removed.
ADP profile <name> has
been changed to <name>.
An ADP rule’s name has been changed from first <name> to the
second <name>.
ADP profile <name> has
been created.
An ADP profile with the specified name has been added.
ADP profile <name> has
been modified.
The ADP rule with the specified name has been changed.
Packet payload length
is over the maximum
system handle length
The ISG50’s ADP feature detected a packet with a length over
16000 bytes.
LAND attack packet.
Source IP is the same
as Destination IP.
The ISG50’s ADP feature detected traffic with the same IP address
set as both the source and the destination.