ZyXEL 202H 91-003-194003B 사용자 설명서
제품 코드
91-003-194003B
P-202H Plus v2 User’s Guide
Chapter 24 Enabling the Firewall
232
Table 77 View Firewall Log
FIELD
DESCRIPTION
EXAMPLES
#
This is the index number of the firewall log. 128 entries
are available numbered from 0 to 127. Once they are
all used, the log wraps around and the old logs are lost.
23
Time
This is the time the log was recorded in this format. You
must configure menu 24.10 for real time; otherwise the
clock will start at 2000/01/01 00:00:00 the last time the
ZyXEL Device was reset.
mm:dd:yy: e.g., Jan 1 00
hh:mm:ss: e.g., 00:00:00
hh:mm:ss: e.g., 00:00:00
Packet Information This field lists packet information such as protocol and
src/dest port numbers (TCP, UDP), or protocol, type
and code (ICMP).
From and To IP
addresses
Protocol and port
Protocol and port
numbers
Reason
This field states the reason for the log; i.e., was the rule
matched, did not match or was there an attack. The set
and rule coordinates (<X, Y> where X=1,2; Y=00~10)
follow with a simple explanation. There are two policy
sets; set 1 (X = 1) is for LAN to WAN rules and set 2 (X
= 2) for WAN to LAN rules. Y represents the rule in the
set. You can configure up to 10 rules in any set (Y = 01
to 10). Rule number 00 is the default rule.
not match
<1,01> dest IP
This means this packet
<1,01> dest IP
This means this packet
does not match the
destination IP address in
set 1, rule 1. Other
reasons (instead of dest
IP) are src IP, dest port,
src port and protocol.
This is a log for a DoS attack.
attack
land, ip spoofing, icmp
land, ip spoofing, icmp
echo, icmp vulnerability,
NetBIOS, smtp illegal
command, traceroute,
teardrop or syn flood
Action
This field displays whether the packet was blocked or
forwarded. None means that no action is dictated by
this rule.
block, forward or none
After viewing the firewall log, ENTER “y” to clear the log or “n” to retain it. With either option you will be
returned to Menu 21- Filter and Firewall Setup.