User`s guide

XSR Users Guide 381
Appendix A Firewall and NAT Alarms and Reports
Alarms/Events and System Limits
3 - ERROR Internal error
3 - ERROR IP fragment cache entry purged
3 - ERROR IP header checksum does not match, %IP_P2
3 - ERROR osUnTimeOut() called with a bad index = %d
3 - ERROR Received fragmented Packet without the initial fragment
3 - ERROR TCP header checksum does not match, %IP_P2
3 - ERROR TCP: ACK packet in the TCP three-way handshake sequence was
blocked. %s
3 - ERROR TCP: Detected possible process table attack using sequence number
guessing. %IP_P2
3 - ERROR TCP: Maximum allowed inbound connections exceeded from host
%IP_P2
3 - ERROR TCP: Non-empty ACK packet in TCP three-way handshake sequence
%IP_P2
3 - ERROR TCP: RST packet indicating non-existing service was blocked %IP_P2
3 - ERROR UDP: Detected UDP Flood attack %IP_P2
3 - ERROR UDP: Duplicated external host %IP_P2
3 - ERROR UDP: Maximum allowed inbound connections exceeded from host
%IP_P2
3 - ERROR UDP: new session request %IP_P2
3 - ERROR UDP: Request Entry pool is empty
3 - ERROR Unsupported ICMP packet %IP2_ICMP
4 - WARNING %s session purged %IP_P2
4 - WARNING Bad FTP Entry
4 - WARNING Badly formed FTP PORT command, %IP_P2
4 - WARNING Cannot schedule any more timer events
Table 19 Firewall and NAT Alarms
Severity Report Text