Table 287 Wireless Logs
LOG MESSAGE DESCRIPTION
WLAN MAC Filter Fail The MAC filter blocked a wireless station from connecting to the
device.
WLAN MAC Filter Success The MAC filter allowed a wireless station to connect to the device.
WLAN STA Association A wireless station associated with the device.
WLAN STA Association List
Full
The maximum number of associated wireless clients has been
reached.
WLAN STA Association Again The SSID and time of association were updated for an wireless
station that was already associated.
ZyWALL 5/35/70 Series User’s Guide
Appendix S Log Descriptions 778
Table 288 IPSec Logs
LOG MESSAGE DESCRIPTION
Discard REPLAY packet The router received and discarded a packet with an incorrect
sequence number.
Inbound packet
authentication failed
The router received a packet that has been altered. A third party may
have altered or tampered with the packet.
Receive IPSec packet,
but no corresponding
tunnel exists
The router dropped an inbound packet for which SPI could not find a
corresponding phase 2 SA.
Rule <%d> idle time out,
disconnect
The router dropped a connection that had outbound traffic and no
inbound traffic for a certain time period. You can use the "ipsec timer
chk_conn" CI command to set the time period. The default value is 2
minutes.
WAN IP changed to <IP> The router dropped all connections with the “MyIP” configured as
“0.0.0.0” when the WAN IP address changed.
Inbound packet
decryption failed
Please check the algorithm configuration.
Cannot find outbound SA
for rule <%d>
A packet matches a rule, but there is no phase 2 SA for outbound
traffic.
Rule [%s] sends an echo
request to peer
The device sent a ping packet to check the specified VPN tunnel's
connectivity.
Rule [%s] receives an
echo reply from peer
The device received a ping response when checking the specified
VPN tunnel's connectivity.