Operation Manual
SECURITY
LOG
• Default policy – a packet has been accepted/blocked according to
the default policy.
• Defragmentation failed – the fragment has been stored in memory
and blocked until all fragments have arrived and defragmentation
can be performed.
• DHCP request – your Gateway sent a DHCP request (depends on the
distribution).
• DHCP response - your Gateway sent a DHCP response (depends on
the distribution).
• Echo/Chargen/Quote/Snork protection – a packet has been blocked
due to Echo/Chargen/Quote/Snork protection.
• Firewall internal – from the fi rewall internal mechanism, event type
is recorded and an accompanying explanation will be added.
• Firewall rules were changed – the rule set has been modifi ed.
• Firewall status changed – the fi rewall status changed from up to
down or vice versa, as specifi ed in the event type description.
• First packet in connection is not a SYN packet – a packet has been
blocked due to a TCP connection that started without a SYN packet.
• Fragmented packet – a fragment has been rejected.
• Fragmented packet, bad align – a packet has been blocked because,
after defragmentation, the packet was badly aligned.
• Fragmented packet, header too big – a packet has been blocked
because, after defragmentation, the header was too big.
• Fragmented packet, header too small – a packet has been blocked
because, after defragmentation, the header was too small.