User`s guide

Chapter 21 Logs Screens
LAN-Cell 2 User’s Guide
382
Successful SSH login Someone has logged on to the router’s SSH server.
SSH login failed Someone has failed to log on to the router’s SSH server.
Successful HTTPS login Someone has logged on to the router's web configurator
interface using HTTPS protocol.
HTTPS login failed Someone has failed to log on to the router's web configurator
interface using HTTPS protocol.
DNS server %s was not
responding to last 32
consecutive queries…
The specified DNS server did not respond to the last 32
consecutive queries.
DDNS update IP:%s (host %d)
successfully
The device updated the IP address of the specified DDNS
host name.
SMTP successfully The device sent an e-mail.
Table 149 System Error Logs
LOG MESSAGE DESCRIPTION
%s exceeds the max.
number of session per
host!
This attempt to create a NAT session exceeds the maximum
number of NAT session table entries allowed to be created per
host.
setNetBIOSFilter: calloc
error
The router failed to allocate memory for the NetBIOS filter
settings.
readNetBIOSFilter: calloc
error
The router failed to allocate memory for the NetBIOS filter
settings.
WAN connection is down. A WAN connection is down. You cannot access the network
through this interface.
Dial Backup starts Dial backup started working.
Dial Backup ends Dial backup stopped working.
DHCP Server cannot assign
the static IP %S (out of
range).
The LAN subnet, LAN alias 1, or LAN alias 2 was changed and
the specified static DHCP IP addresses are no longer valid.
The DHCP static IP %s is
conflict.
The static DHCP IP address conflicts with another host.
SMTP fail (%s) The device failed to send an e-mail (error message included).
SMTP authentication fail
(%s)
The device failed to authenticate with the SMTP server (error
message included).
Table 150 Access Control Logs
LOG MESSAGE DESCRIPTION
Firewall default policy: [ TCP |
UDP | IGMP | ESP | GRE | OSPF ]
<Packet Direction>
Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access
matched the default policy and was blocked or forwarded
according to the default policy’s setting.
Firewall rule [NOT] match:[ TCP
| UDP | IGMP | ESP | GRE | OSPF
] <Packet Direction>, <rule:%d>
Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access
matched (or did not match) a configured firewall rule
(denoted by its number) and was blocked or forwarded
according to the rule.
Table 148 System Maintenance Logs (continued)
LOG MESSAGE DESCRIPTION