Zyxel-communications 802.11g Wireless ADSL2+ 4-port VoIP IAD P-2602HWNL Instrukcja Użytkownika Strona 328

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 442
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 327
P-2602HWNLI User’s Guide
328 Chapter 24 Logs
For type and code details, see Table 138 on page 330.
ppp:LCP Closing The PPP connection’s Link Control Protocol stage is closing.
ppp:IPCP Closing The PPP connection’s Internet Protocol Control Protocol stage is closing.
Table 133 UPnP Logs
LOG MESSAGE DESCRIPTION
UPnP pass through Firewall UPnP packets can pass through the firewall.
Table 134 Content Filtering Logs
LOG MESSAGE DESCRIPTION
%s: block keyword The content of a requested web page matched a user defined keyword.
%s The system forwarded web content.
Table 135 Attack Logs
LOG MESSAGE DESCRIPTION
attack [ TCP | UDP | IGMP
| ESP | GRE | OSPF ]
The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack.
attack ICMP (type:%d,
code:%d)
The firewall detected an ICMP attack.
land [ TCP | UDP | IGMP |
ESP | GRE | OSPF ]
The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land
attack.
land ICMP (type:%d,
code:%d)
The firewall detected an ICMP land attack.
ip spoofing - WAN [ TCP |
UDP | IGMP | ESP | GRE |
OSPF ]
The firewall detected an IP spoofing attack on the WAN port.
ip spoofing - WAN ICMP
(type:%d, code:%d)
The firewall detected an ICMP IP spoofing attack on the WAN port.
icmp echo : ICMP
(type:%d, code:%d)
The firewall detected an ICMP echo attack.
syn flood TCP The firewall detected a TCP syn flood attack.
ports scan TCP The firewall detected a TCP port scan attack.
teardrop TCP The firewall detected a TCP teardrop attack.
teardrop UDP The firewall detected an UDP teardrop attack.
Table 132 PPP Logs (continued)
LOG MESSAGE DESCRIPTION
Przeglądanie stron 327
1 2 ... 323 324 325 326 327 328 329 330 331 332 333 ... 441 442

Komentarze do niniejszej Instrukcji

Brak uwag