Zyxel-communications P-660HN-TxA Manual de usuario Pagina 218

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 324
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 217
Chapter 20 Logs
P-660HN-TxA User’s Guide
218
NetBIOS TCP The firewall detected a TCP NetBIOS attack.
ip spoofing - no routing
entry [ TCP | UDP | IGMP
| ESP | GRE | OSPF ]
The firewall classified a packet with no source routing
entry as an IP spoofing attack.
ip spoofing - no routing
entry ICMP (type:%d,
code:%d)
The firewall classified an ICMP packet with no source
routing entry as an IP spoofing attack.
vulnerability ICMP
(type:%d, code:%d)
The firewall detected an ICMP vulnerability attack.
traceroute ICMP (type:%d,
code:%d)
The firewall detected an ICMP traceroute attack.
Table 85 802.1X Logs
LOG MESSAGE DESCRIPTION
RADIUS accepts user. A user was authenticated by the RADIUS Server.
RADIUS rejects user. Pls check
RADIUS Server.
A user was not authenticated by the RADIUS
Server. Please check the RADIUS Server.
User logout because of session
timeout expired.
The router logged out a user whose session
expired.
User logout because of user
deassociation.
The router logged out a user who ended the
session.
User logout because of no
authentication response from
user.
The router logged out a user from which there
was no authentication response.
User logout because of idle
timeout expired.
The router logged out a user whose idle timeout
period expired.
User logout because of user
request.
A user logged out.
No response from RADIUS. Pls
check RADIUS Server.
There is no response message from the RADIUS
server, please check the RADIUS server.
Use RADIUS to authenticate user. The RADIUS server is operating as the
authentication server.
No Server to authenticate user. There is no authentication server to authenticate
a user.
Table 86 ACL Setting Notes
PACKET
DIRECTION
DIRECTION DESCRIPTION
(L to W) LAN to WAN ACL set for packets traveling from the LAN to the
WAN.
(W to L) WAN to LAN ACL set for packets traveling from the WAN to the
LAN.
Table 84 Attack Logs (continued)
LOG MESSAGE DESCRIPTION
Vista de pagina 217
1 2 ... 213 214 215 216 217 218 219 220 221 222 223 ... 323 324

Comentarios a estos manuales

Sin comentarios