ZyXEL Communications 10~100 Series Network Router User Manual


 
ZyWALL 10~100 Series Internet Security Gateway
13-4 Log Descriptions
Chart 13-5 Attack Logs
LOG MESSAGE DESCRIPTION
syn flood TCP
The firewall detected a TCP syn flood attack.
ports scan TCP
The firewall detected a TCP port scan attack.
teardrop TCP
The firewall detected a TCP teardrop attack.
teardrop UDP
The firewall detected an UDP teardrop attack.
teardrop ICMP
(type:%d, code:%d)
The firewall detected an ICMP teardrop attack; see the section on
ICMP messages for type and code details.
illegal command TCP
The firewall detected a TCP illegal command attack.
NetBIOS TCP
The firewall detected a TCP NetBIOS attack.
ip spoofing - no
routing entry TCP
The firewall detected a TCP IP spoofing attack while the ZyWALL did
not have a default route.
ip spoofing - no
routing entry UDP
The firewall detected an UDP IP spoofing attack while the ZyWALL did
not have a default route.
ip spoofing - no
routing entry IGMP
The firewall detected an IGMP IP spoofing attack while the ZyWALL
did not have a default route.
ip spoofing - no
routing entry ESP
The firewall detected an ESP IP spoofing attack while the ZyWALL did
not have a default route.
ip spoofing - no
routing entry GRE
The firewall detected a GRE IP spoofing attack while the ZyWALL did
not have a default route.
ip spoofing - no
routing entry OSPF
The firewall detected an OSPF IP spoofing attack while the ZyWALL
did not have a default route.
ip spoofing - no
routing entry ICMP
(type:%d, code:%d)
The firewall detected an ICMP IP spoofing attack while the ZyWALL
did not have a default route; see the section on ICMP messages for
type and code details.
vulnerability ICMP
(type:%d, code:%d)
The firewall detected an ICMP vulnerability attack; see the section on
ICMP messages for type and code details.
traceroute ICMP
(type:%d, code:%d)
The firewall detected an ICMP traceroute attack; see the section on
ICMP messages for type and code details.