Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- No. Date/Time Source Destination
- Priority Category Note
- Message
- 1 2013-11-25 17:25:36
- alert system
- Port 1 is up!
- 2 2013-11-25 17:25:36
- alert system
- Port 3 is up!
- 3 2013-11-25 17:25:44
- info system
- Filesystem was checked
- 4 2013-11-25 17:25:55
- info idp IDP
- Enable IDP engine succeeded.
- 5 2013-11-25 17:25:58
- notice firewall CONFIG CHANGE
- Firewall rules have been flushed.
- 6 2013-11-25 17:25:59
- notice firewall CONFIG CHANGE
- Firewall6 rules have been flushed.
- 7 2013-11-25 17:25:59
- notice firewall CONFIG CHANGE
- Session-limit6 rules have been flushed.
- 8 2013-11-25 17:25:59
- notice firewall CONFIG CHANGE
- Firewall rules have been flushed.
- 9 2013-11-25 17:26:07
- info app-patrol
- Initialize App. Patrol has succeeded.
- 10 2013-11-25 17:26:19
- info port-grouping CONFIG CHANGE
- Port Role lan1 has been changed.
- 11 2013-11-25 17:26:19
- alert policy-route INTERFACE DEAD
- Interface lan2 dead, related policy route rules will be disabled.
- 12 2013-11-25 17:26:19
- alert policy-route INTERFACE DEAD
- Interface ext-wlan dead, related policy route rules will be disabled.
- 13 2013-11-25 17:26:19
- alert policy-route INTERFACE DEAD
- Interface dmz dead, related policy route rules will be disabled.
- 14 2013-11-25 17:26:20
- alert file-manage
- WARNING: #configure terminal account pppoe WAN1_PPPoE_ACCOUNT exit, Please type user.
- 15 2013-11-25 17:26:20
- alert file-manage
- WARNING: #configure terminal account pppoe WAN2_PPPoE_ACCOUNT exit, Please type user.
- 16 2013-11-25 17:26:21
- info policy-route TRUNK ALIVE
- Trunk SYSTEM_DEFAULT_WAN_TRUNK alive, related policy route rules will be re-enabled.
- 17 2013-11-25 17:26:21
- info interface CONFIG CHANGE
- Interface wan1 has been changed.
- 18 2013-11-25 17:26:22
- alert policy-route INTERFACE DEAD
- Interface wan2 dead, related policy route rules will be disabled.
- 19 2013-11-25 17:26:23
- info interface CONFIG CHANGE
- Interface wan2 has been changed.
- 20 2013-11-25 17:26:25
- info interface CONFIG CHANGE
- Interface lan1 has been changed.
- 21 2013-11-25 17:26:29
- info interface CONFIG CHANGE
- Interface lan2 has been changed.
- 22 2013-11-25 17:26:30
- info interface CONFIG DOWN
- Interface lan2 is disabled.
- 23 2013-11-25 17:26:33
- info interface CONFIG CHANGE
- Interface ext-wlan has been changed.
- 24 2013-11-25 17:26:34
- info interface CONFIG DOWN
- Interface ext-wlan is disabled.
- 25 2013-11-25 17:26:36
- info interface CONFIG CHANGE
- Interface dmz has been changed.
- 26 2013-11-25 17:26:37
- info interface CONFIG DOWN
- Interface dmz is disabled.
- 27 2013-11-25 17:26:38
- alert policy-route INTERFACE DEAD
- Interface wlan-1-1 dead, related policy route rules will be disabled.
- 28 2013-11-25 17:26:40
- notice wlan CONFIG CHANGE
- Interface wlan-1-1 has been configured.
- 29 2013-11-25 17:26:43
- info interface CONFIG CHANGE
- Interface wan1_ppp has been changed.
- 30 2013-11-25 17:26:47
- info interface CONFIG CHANGE
- Interface wan2_ppp has been changed.
- 31 2013-11-25 17:26:53
- notice ipsec CONFIG CHANGE
- VPN gateway Default_L2TP_VPN_GW has been disabled.
- 32 2013-11-25 17:26:53
- notice ipsec CONFIG CHANGE
- VPN gateway Vladivostok has been disabled.
- 33 2013-11-25 17:26:53
- notice ipsec CONFIG CHANGE
- VPN gateway NVK has been disabled.
- 34 2013-11-25 17:26:53
- notice ipsec CONFIG CHANGE
- VPN gateway MRNS has been disabled.
- 35 2013-11-25 17:26:53
- notice ipsec CONFIG CHANGE
- VPN gateway DKBR has been disabled.
- 36 2013-11-25 17:26:54
- notice ipsec CONFIG CHANGE
- VPN gateway NSK_Office has been disabled.
- 37 2013-11-25 17:26:54
- notice ipsec CONFIG CHANGE
- VPN gateway NSK_Sklad has been disabled.
- 38 2013-11-25 17:26:54
- notice ipsec CONFIG CHANGE
- VPN connection Default_L2TP_VPN_Connection has been modified.
- 39 2013-11-25 17:26:54
- alert file-manage
- WARNING: #configure terminal crypto map Default_L2TP_VPN_Connection exit, Crypto map local-policy is empty!
- 40 2013-11-25 17:26:55
- notice ipsec CONFIG CHANGE
- VPN connection Test-1 has been modified.
- 41 2013-11-25 17:26:55 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- The cookie pair is : 0x0e1cb90e8721c71d / 0x0000000000000000
- 42 2013-11-25 17:26:55 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- Tunnel [Test-1] Sending IKE request
- 43 2013-11-25 17:26:55 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- The cookie pair is : 0x0e1cb90e8721c71d / 0x0000000000000000
- 44 2013-11-25 17:26:55 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- Send Main Mode request to [176.197.228.226]
- 45 2013-11-25 17:26:55 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- The cookie pair is : 0x0e1cb90e8721c71d / 0x0000000000000000
- 46 2013-11-25 17:26:55 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- Send:[SA][VID][VID][VID][VID][VID][VID][VID][VID]
- 47 2013-11-25 17:26:55
- notice ipsec CONFIG CHANGE
- VPN connection Vlad has been modified.
- 48 2013-11-25 17:26:56
- notice ipsec CONFIG CHANGE
- VPN connection NKV has been modified.
- 49 2013-11-25 17:26:56
- notice ipsec CONFIG CHANGE
- VPN connection MRNS has been modified.
- 50 2013-11-25 17:26:57
- notice ipsec CONFIG CHANGE
- VPN connection DKBR has been modified.
- 51 2013-11-25 17:26:57
- notice ipsec CONFIG CHANGE
- VPN connection NSK_Office has been modified.
- 52 2013-11-25 17:26:57
- notice ipsec CONFIG CHANGE
- VPN connection NSK_Sklad has been modified.
- 53 2013-11-25 17:27:21
- info auth-policy CONFIG CHANGE
- Authentication Policy will be enabled due to http server is enabled.
- 54 2013-11-25 17:27:21
- info auth-policy CONFIG CHANGE
- Authentication Policy will be enabled due to http server is enabled.
- 55 2013-11-25 17:27:24
- info built-in-service Built-in Service
- Set timezone to +07.
- 56 2013-11-25 17:27:28
- notice firewall CONFIG CHANGE
- Firewall rule 1 was modified.
- 57 2013-11-25 17:27:29
- notice firewall CONFIG CHANGE
- Firewall rule 2 was modified.
- 58 2013-11-25 17:27:29
- notice firewall CONFIG CHANGE
- Firewall rule 3 was modified.
- 59 2013-11-25 17:27:29
- notice firewall CONFIG CHANGE
- Firewall rule 4 was modified.
- 60 2013-11-25 17:27:30
- notice firewall CONFIG CHANGE
- Firewall rule 5 was modified.
- 61 2013-11-25 17:27:30
- notice firewall CONFIG CHANGE
- Firewall rule 6 was modified.
- 62 2013-11-25 17:27:30
- notice firewall CONFIG CHANGE
- Firewall rule 7 was modified.
- 63 2013-11-25 17:27:31
- notice firewall CONFIG CHANGE
- Firewall rule 8 was modified.
- 64 2013-11-25 17:27:31
- notice firewall CONFIG CHANGE
- Firewall rule 9 was modified.
- 65 2013-11-25 17:27:31
- notice firewall CONFIG CHANGE
- Firewall rule 10 was modified.
- 66 2013-11-25 17:27:31
- notice firewall CONFIG CHANGE
- Firewall6 rule 1 was modified.
- 67 2013-11-25 17:27:31
- notice firewall CONFIG CHANGE
- Firewall6 rule 2 was modified.
- 68 2013-11-25 17:27:31
- notice firewall CONFIG CHANGE
- Firewall6 rule 3 was modified.
- 69 2013-11-25 17:27:31
- notice firewall CONFIG CHANGE
- Firewall6 rule 4 was modified.
- 70 2013-11-25 17:27:32
- notice firewall CONFIG CHANGE
- Firewall6 rule 5 was modified.
- 71 2013-11-25 17:27:32
- notice firewall CONFIG CHANGE
- Firewall6 rule 6 was modified.
- 72 2013-11-25 17:27:32
- notice firewall CONFIG CHANGE
- Firewall6 rule 7 was modified.
- 73 2013-11-25 17:27:32
- notice firewall CONFIG CHANGE
- Firewall6 rule 8 was modified.
- 74 2013-11-25 17:27:32
- notice firewall CONFIG CHANGE
- Firewall6 rule 9 was modified.
- 75 2013-11-25 17:27:32
- notice firewall CONFIG CHANGE
- Firewall6 rule 10 was modified.
- 76 2013-11-25 17:27:33
- notice firewall CONFIG CHANGE
- Firewall6 rule 11 was modified.
- 77 2013-11-25 17:27:33
- notice firewall CONFIG CHANGE
- Firewall6 rule 12 was modified.
- 78 2013-11-25 17:27:33
- notice firewall CONFIG CHANGE
- Firewall6 rule 13 was modified.
- 79 2013-11-25 17:27:33
- notice firewall CONFIG CHANGE
- Firewall6 rule 14 was modified.
- 80 2013-11-25 17:27:34
- notice firewall CONFIG CHANGE
- Firewall6 rule 15 was modified.
- 81 2013-11-25 17:27:34
- notice firewall CONFIG CHANGE
- Firewall6 rule 16 was modified.
- 82 2013-11-25 17:27:34
- info adp ADP
- Enable ADP succeeded.
- 83 2013-11-25 17:27:35
- info idp IDP
- IDP profile LAN_IDP has been created.
- 84 2013-11-25 17:27:35
- info idp IDP
- IDP profile LAN_IDP has been modified.
- 85 2013-11-25 17:27:35
- info idp IDP
- IDP profile DMZ_IDP has been created.
- 86 2013-11-25 17:27:35
- info idp IDP
- IDP profile DMZ_IDP has been modified.
- 87 2013-11-25 17:27:35
- info adp ADP
- ADP profile ADP_PROFILE has been created.
- 88 2013-11-25 17:27:35
- info adp ADP
- ADP profile ADP_PROFILE has been modified.
- 89 2013-11-25 17:27:35
- info idp IDP
- New IDP rule has been appended.
- 90 2013-11-25 17:27:42
- info idp IDP
- New IDP rule has been appended.
- 91 2013-11-25 17:27:45
- info idp IDP
- New IDP rule has been appended.
- 92 2013-11-25 17:27:48
- info idp IDP
- New IDP rule has been appended.
- 93 2013-11-25 17:27:51
- info adp ADP
- New ADP rule has been appended.
- 94 2013-11-25 17:27:51
- info adp ADP
- New ADP rule has been appended.
- 95 2013-11-25 17:27:51
- info adp ADP
- New ADP rule has been appended.
- 96 2013-11-25 17:27:51
- info adp ADP
- New ADP rule has been appended.
- 97 2013-11-25 17:27:51
- info adp ADP
- New ADP rule has been appended.
- 98 2013-11-25 17:27:51
- info anti-virus Configuration Change
- Anti-Virus rule 1 has been appended.
- 99 2013-11-25 17:27:51
- notice bwm CONFIG CHANGE
- BWM has been deactivated.
- 100 2013-11-25 17:27:52
- notice policy-route CONFIG CHANGE
- Using Policy Route to control Dynamic IPSec has been enabled.
- 101 2013-11-25 17:27:52
- notice policy-route CONFIG CHANGE
- Policy-route rule 1 has been appended.
- 102 2013-11-25 17:27:52
- notice policy-route CONFIG CHANGE
- Policy-route rule 1 has been modified.
- 103 2013-11-25 17:27:52
- notice policy-route CONFIG CHANGE
- Policy-route rule 2 has been appended.
- 104 2013-11-25 17:27:52
- notice policy-route CONFIG CHANGE
- Policy-route rule 2 has been modified.
- 105 2013-11-25 17:27:52
- info app-patrol CONFIG CHANGE
- Default port 25 of service SMTP has been added.
- 106 2013-11-25 17:27:52
- info app-patrol CONFIG CHANGE
- Default port 110 of service POP3 has been added.
- 107 2013-11-25 17:27:52
- info app-patrol CONFIG CHANGE
- Default port 5060 of service SIP has been added.
- 108 2013-11-25 17:27:52
- info app-patrol CONFIG CHANGE
- Default port 3128 of service HTTP has been added.
- 109 2013-11-25 17:27:53
- info app-patrol CONFIG CHANGE
- Default port 80 of service HTTP has been added.
- 110 2013-11-25 17:27:53
- info app-patrol CONFIG CHANGE
- Default port 8080 of service HTTP has been added.
- 111 2013-11-25 17:27:53
- info usb-storage USB Storage
- [zysh] USB Storage failed to set inactivated.
- 112 2013-11-25 17:27:53
- info sessions-limit
- ZyWALL is configured successfully with startup configuration file.
- 113 2013-11-25 17:27:55 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- The cookie pair is : 0x0e1cb90e8721c71d / 0x0000000000000000
- 114 2013-11-25 17:27:55 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- ISAKMP SA [Test_1] is disconnected
- 115 2013-11-25 17:27:56 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- The cookie pair is : 0x6f84336a050b439e / 0x0000000000000000 [count=3]
- 116 2013-11-25 17:27:56 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- Tunnel [Test-1] Sending IKE request
- 117 2013-11-25 17:27:56 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- Send Main Mode request to [176.197.228.226]
- 118 2013-11-25 17:27:56 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- Send:[SA][VID][VID][VID][VID][VID][VID][VID][VID]
- 119 2013-11-25 17:28:26
- alert connectivity-check
- The link status of wan1 interface is inactive.
- 120 2013-11-25 17:28:26
- alert connectivity-check
- The wan1 routing status is set to DEAD by connectivity-check
- 121 2013-11-25 17:28:26
- alert policy-route INTERFACE DEAD
- Interface wan1 dead, related policy route rules will be disabled.
- 122 2013-11-25 17:28:26
- alert policy-route INTERFACE DEAD
- Interface aux dead, related policy route rules will be disabled.
- 123 2013-11-25 17:28:26
- alert policy-route INTERFACE DEAD
- Interface wan1_ppp dead, related policy route rules will be disabled.
- 124 2013-11-25 17:28:26
- alert policy-route INTERFACE DEAD
- Interface wan2_ppp dead, related policy route rules will be disabled.
- 125 2013-11-25 17:28:26
- alert policy-route TRUNK DEAD
- Trunk SYSTEM_DEFAULT_WAN_TRUNK dead, related policy route rules will be disabled.
- 126 2013-11-25 17:28:27
- notice built-in-service DNS
- wan1 ping check is failed. Zone Forwarder removes DNS servers from records.
- 127 2013-11-25 17:28:44 176.197.228.226:500 176.197.228.228:500
- notice firewall ACCESS BLOCK
- Match default rule, DROP
- 128 2013-11-25 17:28:45 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT
- 129 2013-11-25 17:28:45 192.168.94.15 192.168.91.2
- error ipsec ipsec
- SPI:0x0 SEQ:0x0 No rule found, Dropping packet
- 130 2013-11-25 17:28:59 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- The cookie pair is : 0x6f84336a050b439e / 0x0000000000000000
- 131 2013-11-25 17:28:59 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- ISAKMP SA [Test_1] is disconnected
- 132 2013-11-25 17:28:59 176.197.228.226:500 176.197.228.228:500
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=2]
- 133 2013-11-25 17:28:59 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=4]
- 134 2013-11-25 17:28:59 192.168.94.15 192.168.91.2
- error ipsec ipsec
- SPI:0x0 SEQ:0x0 No rule found, Dropping packet [count=4]
- 135 2013-11-25 17:28:59
- info connectivity-check
- The link status of wan1 interface is active.
- 136 2013-11-25 17:28:59
- notice connectivity-check
- The wan1 routing status is set to ACTIVE by connectivity-check
- 137 2013-11-25 17:29:01
- info policy-route INTERFACE ALIVE
- Interface wan1 alive, related policy route rules will be re-enabled.
- 138 2013-11-25 17:29:01
- info policy-route TRUNK ALIVE
- Trunk SYSTEM_DEFAULT_WAN_TRUNK alive, related policy route rules will be re-enabled.
- 139 2013-11-25 17:29:02
- notice built-in-service DNS
- wan1 ping check is successful. Zone Forwarder adds DNS servers in records.
- 140 2013-11-25 17:29:09 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- The cookie pair is : 0xb518291944553734 / 0x0000000000000000 [count=3]
- 141 2013-11-25 17:29:09 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- Tunnel [Test-1] Sending IKE request
- 142 2013-11-25 17:29:09 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- Send Main Mode request to [176.197.228.226]
- 143 2013-11-25 17:29:09 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- Send:[SA][VID][VID][VID][VID][VID][VID][VID][VID] [count=2]
- 144 2013-11-25 17:29:10 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 145 2013-11-25 17:29:10 192.168.94.15 192.168.91.2
- error ipsec ipsec
- SPI:0x0 SEQ:0x0 No rule found, Dropping packet
- 146 2013-11-25 17:29:10 176.197.228.226:500 176.197.228.228:500
- info ike IKE_LOG
- The cookie pair is : 0xc65d5208750bb838 / 0xb518291944553734 [count=4]
- 147 2013-11-25 17:29:10 176.197.228.226:500 176.197.228.228:500
- info ike IKE_LOG
- Recv:[SA][VID][VID][VID][VID] [count=2]
- 148 2013-11-25 17:29:10 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- The cookie pair is : 0xb518291944553734 / 0xc65d5208750bb838 [count=9]
- 149 2013-11-25 17:29:10 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- Send:[KE][NONCE][PRV][PRV] [count=2]
- 150 2013-11-25 17:29:10 176.197.228.226:500 176.197.228.228:500
- info ike IKE_LOG
- Recv:[KE][NONCE][PRV][PRV] [count=2]
- 151 2013-11-25 17:29:11 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- Send:[ID][HASH][NOTIFY:INITIAL_CONTACT]
- 152 2013-11-25 17:29:11 176.197.228.226:500 176.197.228.228:500
- info ike IKE_LOG
- Recv:[ID][HASH][NOTIFY:INITIAL_CONTACT] [count=2]
- 153 2013-11-25 17:29:11 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- Phase 1 IKE SA process done [count=2]
- 154 2013-11-25 17:29:11 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- Send:[HASH][SA][NONCE][ID][ID] [count=2]
- 155 2013-11-25 17:29:11 176.197.228.226:500 176.197.228.228:500
- info ike IKE_LOG
- Recv:[HASH][SA][NONCE][ID][ID] [count=2]
- 156 2013-11-25 17:29:11 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- Send:[HASH]
- 157 2013-11-25 17:29:11 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- [Initiator:176.197.228.228][Responder:176.197.228.226]
- 158 2013-11-25 17:29:11 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- [Policy: ipv4(192.168.94.0-192.168.94.255)-ipv4(192.168.91.0-192.168.91.255)] [count=2]
- 159 2013-11-25 17:29:11 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- [ESP des-cbc|hmac-sha1-96][SPI 0x37a32f89|0xc76dcc09][Lifetime 82080]
- 160 2013-11-25 17:29:11 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- Tunnel [Test_1:Test-1:0xc76dcc09] built successfully
- 161 2013-11-25 17:29:12 176.197.228.226:500 176.197.228.228:500
- info ike IKE_LOG
- The cookie pair is : 0x64b7005de4bcf30a / 0x0000000000000000
- 162 2013-11-25 17:29:12 176.197.228.226:500 176.197.228.228:500
- info ike IKE_LOG
- Recv Main Mode request from [176.197.228.226]
- 163 2013-11-25 17:29:12 176.197.228.226:500 176.197.228.228:500
- info ike IKE_LOG
- The cookie pair is : 0xe25ad59530065a5e / 0x64b7005de4bcf30a [count=5]
- 164 2013-11-25 17:29:12 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- The cookie pair is : 0x64b7005de4bcf30a / 0xe25ad59530065a5e [count=14]
- 165 2013-11-25 17:29:13 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- Send:[ID][HASH]
- 166 2013-11-25 17:29:13 176.197.228.226:500 176.197.228.228:500
- info ike IKE_LOG
- Recv:[HASH]
- 167 2013-11-25 17:29:13 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- [Responder:176.197.228.228][Initiator:176.197.228.226]
- 168 2013-11-25 17:29:13 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- [ESP des-cbc|hmac-sha1-96][SPI 0x4519d751|0x976ba52b][Lifetime 86420]
- 169 2013-11-25 17:29:13 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- Tunnel [Test_1:Test-1:0x976ba52b] rekeyed successfully
- 170 2013-11-25 17:29:13 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- Send:[HASH][DEL] [count=3]
- 171 2013-11-25 17:29:13 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- ISAKMP SA [Test_1] is disconnected
- 172 2013-11-25 17:29:13 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- [COOKIE] Invalid cookie, no sa found
- 173 2013-11-25 17:29:15 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 174 2013-11-25 17:29:25 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 175 2013-11-25 17:29:27 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 176 2013-11-25 17:29:35
- info system System
- NTP update has succeeded. Current time is Mon Nov 25 17:29:35 GMT +07:00 2013.
- 177 2013-11-25 17:29:39 176.197.228.226:500 176.197.228.228:500
- notice firewall ACCESS BLOCK
- Match default rule, DROP
- 178 2013-11-25 17:29:40 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 179 2013-11-25 17:29:40 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 180 2013-11-25 17:29:43 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- The cookie pair is : 0xb518291944553734 / 0xc65d5208750bb838 [count=4]
- 181 2013-11-25 17:29:43 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- Tunnel [Test_1:Test-1:0x37a32f89] is disconnected
- 182 2013-11-25 17:29:43 176.197.228.228:500 176.197.228.226:500
- info ike IKE_LOG
- Send:[HASH][DEL] [count=3]
- 183 2013-11-25 17:29:55 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 184 2013-11-25 17:29:55 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 185 2013-11-25 17:30:10 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 186 2013-11-25 17:30:10 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 187 2013-11-25 17:30:25 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 188 2013-11-25 17:30:25 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 189 2013-11-25 17:30:37 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 190 2013-11-25 17:30:40 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 191 2013-11-25 17:30:50 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 192 2013-11-25 17:30:55 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 193 2013-11-25 17:31:05 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 194 2013-11-25 17:31:10 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 195 2013-11-25 17:31:17 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 196 2013-11-25 17:31:25 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 197 2013-11-25 17:31:30 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 198 2013-11-25 17:31:39 176.197.228.226:500 176.197.228.228:500
- notice firewall ACCESS BLOCK
- Match default rule, DROP
- 199 2013-11-25 17:31:40 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 200 2013-11-25 17:31:45 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=6]
- 201 2013-11-25 17:31:51 70.182.140.148:36686 176.197.228.228:80
- notice firewall ACCESS BLOCK
- Match default rule, DROP
- 202 2013-11-25 17:31:54 176.197.228.226:17627 176.197.228.228:65061
- notice firewall ACCESS BLOCK
- Match default rule, DROP
- 203 2013-11-25 17:31:54 192.168.94.15:65061 192.168.91.185:53406
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, UDP, service others, ACCEPT
- 204 2013-11-25 17:31:55 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 205 2013-11-25 17:32:00 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 206 2013-11-25 17:32:10 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=2]
- 207 2013-11-25 17:32:15 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 208 2013-11-25 17:32:18 192.168.94.15 192.168.94.254
- notice user Account: admin
- Administrator admin from http/https has logged in ZyWALL
- 209 2013-11-25 17:32:20 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 210 2013-11-25 17:32:27 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 211 2013-11-25 17:32:35 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 212 2013-11-25 17:32:40 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 213 2013-11-25 17:32:50 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 214 2013-11-25 17:32:55 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 215 2013-11-25 17:33:05 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 216 2013-11-25 17:33:10 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 217 2013-11-25 17:33:20 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 218 2013-11-25 17:33:25 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 219 2013-11-25 17:33:35 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 220 2013-11-25 17:33:37 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 221 2013-11-25 17:33:50 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 222 2013-11-25 17:33:50 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 223 2013-11-25 17:34:05 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 224 2013-11-25 17:34:05 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 225 2013-11-25 17:34:17 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 226 2013-11-25 17:34:20 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 227 2013-11-25 17:34:30 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 228 2013-11-25 17:34:35 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 229 2013-11-25 17:34:45 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 230 2013-11-25 17:34:50 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 231 2013-11-25 17:35:00 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 232 2013-11-25 17:35:05 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 233 2013-11-25 17:35:15 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 234 2013-11-25 17:35:19 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 235 2013-11-25 17:35:27 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 236 2013-11-25 17:35:34 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 237 2013-11-25 17:35:40 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 238 2013-11-25 17:35:49 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 239 2013-11-25 17:35:54 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 240 2013-11-25 17:36:04 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 241 2013-11-25 17:36:09 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 242 2013-11-25 17:36:19 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 243 2013-11-25 17:36:24 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 244 2013-11-25 17:36:34 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 245 2013-11-25 17:36:37 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 246 2013-11-25 17:36:49 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 247 2013-11-25 17:36:49 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 248 2013-11-25 17:37:04 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 249 2013-11-25 17:37:04 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 250 2013-11-25 17:37:17 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 251 2013-11-25 17:37:19 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 252 2013-11-25 17:37:21
- info daily-report CONFIG CHANGE
- Email Daily Report has been activated.
- 253 2013-11-25 17:37:29 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 254 2013-11-25 17:37:32
- error daily-report
- Failed to send report. Mail From address k3NGuru@gmail.com is inconsistent with SMTP account .
- 255 2013-11-25 17:37:34 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 256 2013-11-25 17:37:44 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 257 2013-11-25 17:37:49 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 258 2013-11-25 17:38:00 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 259 2013-11-25 17:38:04 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 260 2013-11-25 17:38:14 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 261 2013-11-25 17:38:19 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 262 2013-11-25 17:38:28 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 263 2013-11-25 17:38:34 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 264 2013-11-25 17:38:39 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 265 2013-11-25 17:38:49 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 266 2013-11-25 17:38:54 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 267 2013-11-25 17:39:04 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 268 2013-11-25 17:39:09 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 269 2013-11-25 17:39:19 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 270 2013-11-25 17:39:24 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 271 2013-11-25 17:39:34 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 272 2013-11-25 17:39:37 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 273 2013-11-25 17:39:49 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 274 2013-11-25 17:39:49 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 275 2013-11-25 17:40:04 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 276 2013-11-25 17:40:04 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 277 2013-11-25 17:40:19 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 278 2013-11-25 17:40:19 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 279 2013-11-25 17:40:26
- notice system
- Sending event/alert log to mail server has failed.
- 280 2013-11-25 17:40:34 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 281 2013-11-25 17:40:34 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 282 2013-11-25 17:40:47 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=3]
- 283 2013-11-25 17:40:49 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=3]
- 284 2013-11-25 17:40:58 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP [count=4]
- 285 2013-11-25 17:41:04 192.168.94.15 192.168.91.2
- notice firewall ACCESS FORWARD
- priority:1, from LAN1 to IPSec_VPN, ICMP Type:8, service others, ICMP Type:8, ACCEPT [count=2]
- 286 2013-11-25 17:41:09 176.197.228.226 176.197.228.228
- notice firewall ACCESS BLOCK
- Match default rule, DROP
- End of Logs
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement