User`s guide
378 XSR User’s Guide
Firewall and NAT Alarms and Reports Appendix A
Alarms/Events and System Limits
1 - ALERT IP fragment offset plus length exceeds the maximum IP datagram
length
1 - ALERT IP fragment with negative fragmentation offset
1 - ALERT Maximum fragments for a single IP packet reached
1 - ALERT Session pool exhausted
1 - ALERT TCP: Detected portscan. %IP_P2
1 - ALERT TCP: Detected SYN Flood attack. %IP_P2
1 - ALERT TCP: Duplicated session %IP_P2
1 - ALERT TCP: External host already exists %IP_P2
1 - ALERT TearDrop-like attack: invalid fragmentation offset value
1 - ALERT UDP fragmentation attack: constructed payload larger than specified
in UDP header
1 - ALERT UDP fragmentation attack: constructed payload less than specified in
the UDP header
1 - ALERT UDP: Duplicated session %IP_P2
2 - CRIT Init: Error reading ATE SR entries
2 - CRIT Init: Error reading java filter
2 - CRIT Init: Error reading selective IP ranges for ActiveX filtering
2 - CRIT Init: Error reading selective IP ranges for Java filtering
2 - CRIT Init: Error reading translation host entries
2 - CRIT Init: Failed to allocate memory for %d IP ranges for ActiveX Filters
2 - CRIT Init: Failed to allocate memory for %d IP ranges for Java Filters
2 - CRIT Init: Failed to allocate memory for ATEs, entries: %d
2 - CRIT Init: Failed to allocate memory for CLS Commands
2 - CRIT Init: Failed to allocate memory for CLS commands
Table 19 Firewall and NAT Alarms
Severity Report Text