ZyXEL p-2802h-i1 Guia Do Utilizador
![ZyXEL](https://files.manualsbrain.com/attachments/3214a2e9b754be0b3a733d7fd22528bce8dfdece/common/fit/150/50/aafad0ddc2d0e29fd47cd3dd2d9b75f1e404d4f49531d3941fba34789d6b/brand_logo.jpeg)
Chapter 22 Logs
P-2802H(W)(L)-I Series User’s Guide
298
ip spoofing - WAN [ TCP |
UDP | IGMP | ESP | GRE |
OSPF ]
UDP | IGMP | ESP | GRE |
OSPF ]
The firewall detected an IP spoofing attack on the WAN port.
ip spoofing - WAN ICMP
(type:%d, code:%d)
(type:%d, code:%d)
The firewall detected an ICMP IP spoofing attack on the WAN
port.
icmp echo : ICMP
(type:%d, code:%d)
(type:%d, code:%d)
The firewall detected an ICMP echo attack.
syn flood TCP
The firewall detected a TCP syn flood attack.
ports scan TCP
The firewall detected a TCP port scan attack.
teardrop TCP
The firewall detected a TCP teardrop attack.
teardrop UDP
The firewall detected an UDP teardrop attack.
teardrop ICMP (type:%d,
code:%d)
code:%d)
The firewall detected an ICMP teardrop attack.
illegal command TCP
The firewall detected a TCP illegal command attack.
NetBIOS TCP
The firewall detected a TCP NetBIOS attack.
ip spoofing - no routing
entry [ TCP | UDP | IGMP
| ESP | GRE | OSPF ]
entry [ TCP | UDP | IGMP
| ESP | GRE | OSPF ]
The firewall classified a packet with no source routing entry as an
IP spoofing attack.
ip spoofing - no routing
entry ICMP (type:%d,
code:%d)
entry ICMP (type:%d,
code:%d)
The firewall classified an ICMP packet with no source routing
entry as an IP spoofing attack.
vulnerability ICMP
(type:%d, code:%d)
(type:%d, code:%d)
The firewall detected an ICMP vulnerability attack.
traceroute ICMP (type:%d,
code:%d)
code:%d)
The firewall detected an ICMP traceroute attack.
Table 129 802.1X Logs
LOG MESSAGE
DESCRIPTION
Local User Database accepts
user.
user.
A user was authenticated by the local user database.
Local User Database reports user
credential error.
credential error.
A user was not authenticated by the local user database
because of an incorrect user password.
Local User Database does not
find user`s credential.
find user`s credential.
A user was not authenticated by the local user database
because the user is not listed in the local user database.
RADIUS accepts user.
A user was authenticated by the RADIUS Server.
RADIUS rejects user. Pls check
RADIUS Server.
RADIUS Server.
A user was not authenticated by the RADIUS Server.
Please check the RADIUS Server.
Local User Database does not
support authentication method.
support authentication method.
The local user database only supports the EAP-MD5
method. A user tried to use another authentication
method and was not authenticated.
User logout because of session
timeout expired.
timeout expired.
The router logged out a user whose session expired.
User logout because of user
deassociation.
deassociation.
The router logged out a user who ended the session.
Table 128 Attack Logs (continued)
LOG MESSAGE
DESCRIPTION