ZyXEL 202H 91-003-194003B 사용자 설명서

제품 코드
91-003-194003B
다운로드
페이지 375
P-202H Plus v2 User’s Guide
Chapter 24 Enabling the Firewall
232
Table 77   View Firewall Log
FIELD
DESCRIPTION
EXAMPLES
#
This is the index number of the firewall log. 128 entries 
are available numbered from 0 to 127. Once they are 
all used, the log wraps around and the old logs are lost.
23
Time
This is the time the log was recorded in this format. You 
must configure menu 24.10 for real time; otherwise the 
clock will start at 2000/01/01 00:00:00 the last time the 
ZyXEL Device was reset.
mm:dd:yy: e.g., Jan 1 00
hh:mm:ss: e.g., 00:00:00
Packet Information This field lists packet information such as protocol and 
src/dest port numbers (TCP, UDP), or protocol, type 
and code (ICMP).
From and To IP 
addresses
Protocol and port 
numbers
Reason
This field states the reason for the log; i.e., was the rule 
matched, did not match or was there an attack. The set 
and rule coordinates (<X, Y> where X=1,2; Y=00~10) 
follow with a simple explanation. There are two policy 
sets; set 1 (X = 1) is for LAN to WAN rules and set 2 (X 
= 2) for WAN to LAN rules. Y represents the rule in the 
set. You can configure up to 10 rules in any set (Y = 01 
to 10). Rule number 00 is the default rule.
not match
<1,01> dest IP
This means this packet 
does not match the 
destination IP address in 
set 1, rule 1. Other 
reasons (instead of dest 
IP) are src IP, dest port, 
src port and protocol.
This is a log for a DoS attack.
attack
land, ip spoofing, icmp 
echo, icmp vulnerability, 
NetBIOS, smtp illegal 
command, traceroute, 
teardrop or syn flood
Action
This field displays whether the packet was blocked or 
forwarded. None means that no action is dictated by 
this rule.
block, forward or none
After viewing the firewall log, ENTER “y” to clear the log or “n” to retain it.  With either option you will be 
returned to Menu 21- Filter and Firewall Setup.