Netgear SRX5308 Specifications Page 338

  • Download
  • Add to my manuals
  • Print
  • Page
    / 357
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 337
System Logs and Error Messages
338
ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308
WAN to DMZ Logs
Other Event Logs
This section describes the log messages generated by other events such source MAC
filtering, session limiting, and bandwidth limiting. For information about how to select these
logs, see Activate Notification of Events, Alerts, and Syslogs on page 269.
Session Limit Logs
Source MAC Filter Logs
Table 113. Routing Logs: WAN to DMZ
Message Nov 29 09:19:43 [SRX5308] [kernel] WAN2DMZ[ACCEPT] IN=WAN OUT=DMZ
SRC=192.168.1.214 DST=192.168.20.10 PROTO=ICMP TYPE=8 CODE=0
Explanation • This packet from WAN to DMZ has been allowed by the firewall.
• For other settings, see Table 81 on page 322.
Recommended Action None
Table 114. Other Event Logs: Session Limit Logs
Message 2000 Jan 1 06:53:33 [SRX5308] [kernel] SESS_LIMIT[DROP] IN=LAN OUT=WAN
SRC=192.168.11.2 DST=20.0.0.1 PROTO=TCP SPT=50709 DPT=21
Explanation When two FTP sessions are established from the same LAN host at IP address
192.168.11.2 and a session limit (SESS_LIMIT) is set as 1, the FTP packets from
the second session are dropped.
Recommended Action Change the session limit to 2 to prevent packets from being dropped.
Table 115. Other Event Logs: Source MAC Filter Logs
Message 2000 Jan 1 06:40:10 [SRX5308] [kernel] SRC_MAC_MATCH[DROP] SRC MAC =
00:12:3f:34:41:14 IN=LAN OUT=WAN SRC=192.168.11.3 DST=209.85.153.103
PROTO=ICMP TYPE=8 CODE=0
Explanation Because MAC address 00:12:3f:34:41:14 of LAN host with IP address
192.168.11.3 is filtered so that it cannot access the Internet, the packets sent by
this MAC address to the Google server at address 09.85.153.103 are dropped.
Recommended Action Disable source MAC filtering.
Page view 337
1 2 ... 333 334 335 336 337 338 339 340 341 342 343 ... 356 357

Comments to this Manuals

No comments