ZyXEL 2WG Guida Utente
Chapter 27 Logs Screens
ZyWALL 2WG User’s Guide
477
27.2.1 Log Description Example
The following is an example of how a log displays in the command line interpreter and a
description of the sample log. Refer to the
description of the sample log. Refer to the
Section on page 488
for more log message
descriptions and the appendx for details on using the command line interpreter to display logs.
# .time source destination
notes
message
5|06/08/2004 05:58:20 |172.16.4.187:137 |172.16.255.255:137
|ACCESS BLOCK
Firewall default policy: UDP (W to W/ZW)
notes
message
5|06/08/2004 05:58:20 |172.16.4.187:137 |172.16.255.255:137
|ACCESS BLOCK
Firewall default policy: UDP (W to W/ZW)
27.2.2 About the Certificate Not Trusted Log
myZyXEL.com and the update server use certificates signed by VeriSign to identify
themselves. If the ZyWALL does not have a CA certificate signed by VeriSign as a trusted CA,
the ZyWALL will not trust the certificate from myZyXEL.com and the update server. The
ZyWALL will generate a log like "Due to error code(11), cert not trusted: SSL/TLS peer
certif..." for every time it attempt to establish a (HTTPS) connection with myZyXEL.com and
the update server. The V4.00 default configuration file includes a trusted CA certificate signed
by VeriSign. If you upgraded to ZyNOS V4.00 firmware without uploading the V4.00 default
configuration file, you can download a CA certificate signed by VeriSign from
myZyXEL.com and import it into the ZyWALL as a trusted CA. This will stop the ZyWALL
from generating this log every time it attempts to connect with myzyxel.com and the update
server.
Follow the steps below to download the certificate from myZyXEL.com.
themselves. If the ZyWALL does not have a CA certificate signed by VeriSign as a trusted CA,
the ZyWALL will not trust the certificate from myZyXEL.com and the update server. The
ZyWALL will generate a log like "Due to error code(11), cert not trusted: SSL/TLS peer
certif..." for every time it attempt to establish a (HTTPS) connection with myZyXEL.com and
the update server. The V4.00 default configuration file includes a trusted CA certificate signed
by VeriSign. If you upgraded to ZyNOS V4.00 firmware without uploading the V4.00 default
configuration file, you can download a CA certificate signed by VeriSign from
myZyXEL.com and import it into the ZyWALL as a trusted CA. This will stop the ZyWALL
from generating this log every time it attempts to connect with myzyxel.com and the update
server.
Follow the steps below to download the certificate from myZyXEL.com.
1 Go to http://www.myZyXEL.com and log in with your account.
2 Click Download Center and then Certificate Download.
2 Click Download Center and then Certificate Download.
Table 153 Log Description Example
LABEL
DESCRIPTION
#
This is log number five.
time
The log was generated on June 8, 2004 at 5:58 and 20 seconds AM.
source
The log was generated due to a NetBIOS packet sent from IP address 172.16.4.187 port
137.
destination The NetBIOS packet was sent to the 172.16.255.255 subnet port 137. This was a
NetBIOS UDP broadcast packet meant to discover devices on the network.
notes
The ZyWALL blocked the packet.
message
The ZyWALL blocked the packet in accordance with the firewall’s default policy of
blocking sessions that are initiated from the WAN. “UDP” means that this was a User
Datagram Protocol packet. “W to W/ZW” indicates that the packet was traveling from the
WAN to the WAN or the ZyWALL.