Netgear FVX538v1 – ProSafe VPN Firewall Dual WAN with 8-Port 10/100 and 1 Gigabit LAN Port Switch 参照マニュアル
![Netgear](https://files.manualsbrain.com/attachments/cf1ad5de25a3f8d6c88ef0ab489c1b137eebe11f/common/fit/150/50/17742d1e0cdacf24edeb88c30757620088415c5f7699f69b4517262e21e0/brand_logo.jpeg)
ProSafe VPN Firewall 200 FVX538 Reference Manual
C-14
System Logs and Error Messages
v1.0, March 2009
LAN to DMZ Logs
DMZ to WAN Logs
WAN to LAN Logs
DMZ to LAN Logs
Table C-20. Routing Logs: LAN to DMZ
Message
Nov 29 09:44:06 [FVX538] [kernel] LAN2DMZ[ACCEPT] IN=LAN OUT=DMZ
SRC=192.168.10.10 DST=192.168.20.10 PROTO=ICMP TYPE=8 CODE=0
SRC=192.168.10.10 DST=192.168.20.10 PROTO=ICMP TYPE=8 CODE=0
Explanation
• This packet from LAN to DMZ has been allowed by the firewall.
• For other parameters, refer to
• For other parameters, refer to
Recommended Action
None
Table C-21. Routing Logs: DMZ to WAN
Message
Nov 29 09:19:43 [FVX538] [kernel] DMZ2WAN[DROP] IN=DMZ OUT=WAN
SRC=192.168.20.10 DST=72.14.207.99 PROTO=ICMP TYPE=8 CODE=0
SRC=192.168.20.10 DST=72.14.207.99 PROTO=ICMP TYPE=8 CODE=0
Explanation
• This packet from DMZ to WAN has been dropped by the firewall.
• For other parameters, refer to
• For other parameters, refer to
Recommended Action
None
Table C-22. Routing Logs: WAN to LAN
Message
Nov 29 10:05:15 [FVX538] [kernel] WAN2LAN[ACCEPT] IN=WAN OUT=LAN
SRC=192.168.1.214 DST=192.168.10.10 PROTO=ICMP TYPE=8 CODE=0
SRC=192.168.1.214 DST=192.168.10.10 PROTO=ICMP TYPE=8 CODE=0
Explanation
• This packet from LAN to WAN has been allowed by the firewall
• For other parameters, refer to
• For other parameters, refer to
Recommended Action
None
Table C-23. Routing Logs: DMZ to WAN
Message
Nov 29 09:44:06 [FVX538] [kernel] DMZ2LAN[DROP] IN=DMZ OUT=LAN
SRC=192.168.20.10 DST=192.168.10.10 PROTO=ICMP TYPE=8 CODE=0
SRC=192.168.20.10 DST=192.168.10.10 PROTO=ICMP TYPE=8 CODE=0
Explanation
• This packet from DMZ to LAN has been dropped by the firewall.
• For other parameters, refer to
• For other parameters, refer to
Recommended Action
None