
• Echo/Chargen/Quote/Snork protection – a packet has been blocked
due to Echo/Chargen/Quote/Snork protection.
• Firewall internal – from the firewall internal mechanism, event type
is recorded and an accompanying explanation will be added.
• Firewall rules were changed – the rule set has been modified.
• Firewall status changed – the firewall status changed from up to
down or vice versa, as specified in the event type description.
• First packet in connection is not a SYN packet – a packet has been
blocked due to a TCP connection that started without a SYN packet.
• Fragmented packet – a fragment has been rejected.
• Fragmented packet, bad align – a packet has been blocked because,
after defragmentation, the packet was badly aligned.
• Fragmented packet, header too big – a packet has been blocked
because, after defragmentation, the header was too big.
• Fragmented packet, header too small – a packet has been blocked
because, after defragmentation, the header was too small.
• Fragmented packet, no memory – a packet has been blocked
because there is no memory for fragments.
• Fragmented packet, overlapped – a packet has been blocked
because, after defragmentation, there were overlapping fragments.
• Fragmented packet, packet exceeds – a packet has been blocked
because, after defragmentation, the packet exceeded.
106
SECURITY SETTINGS
06 / CONFIGURING
verizon.com/fios | ©2014 Verizon. All Rights Reserved.
Comentarios a estos manuales