ZyXEL Communications 91-009-073003B Router User Manual


 
Appendix A Log Descriptions
ZyWALL USG 50 User’s Guide
811
VPN gateway %s was
enabled
%s is the gateway name. An administrator enabled the VPN
gateway.
XAUTH fail! My name:
%s
%s is the my xauth name. This indicates that my name is
invalid.
XAUTH fail! Remote
user: %s
%s is the remote xauth name. This indicates that a remote
user’s name is invalid.
XAUTH succeed! My
name: %s
%s is the my xauth name. This indicates that my name is
valid.
XAUTH succeed! Remote
user: %s
%s is the remote xauth name. This indicate that a remote
user’s name is valid
Dynamic Tunnel
[%s:%s:0x%x:%s] built
successfully
The variables represent the phase 1 name, tunnel name, SPI
and the xauth name (optional). The phase-2 tunnel
negotiation is complete.
Dynamic Tunnel
[%s:%s:0x%x:0x%x:%s]
rekeyed successfully
The variables represent the phase 1 name, tunnel name, old
SPI, new SPI and the xauth name (optional). The tunnel was
rekeyed successfully.
Tunnel
[%s:%s:0x%x:%s] built
successfully
The variables represent the phase 1 name, tunnel name, SPI
and the xauth name (optional). The phase-2 tunnel
negotiation is complete.
Tunnel
[%s:%s:0x%x:0x%x:%s]
rekeyed successfully
The variables represent the phase 1 name, tunnel name, old
SPI, new SPI and the xauth name (optional). The tunnel was
rekeyed successfully.
Tunnel [%s:%s] Phase
1 pre-shared key
mismatch
The variables represent the phase 1 name and tunnel name.
When negotiating phase-1, the pre-shared keys did not
match.
Tunnel [%s:%s]
Recving IKE request
The variables represent the phase 1 name and tunnel name.
The device received an IKE request.
Tunnel [%s:%s]
Sending IKE request
The variables represent the phase 1 name and tunnel name.
The device sent an IKE request.
Tunnel [%s:0x%x] is
disconnected
The variables represent the tunnel name and the SPI of a
tunnel that was disconnected.
Tunnel [%s] rekeyed
successfully
%s is the tunnel name. The tunnel was rekeyed successfully.
Table 263 IPSec Logs
LOG MESSAGE DESCRIPTION
Corrupt packet,
Inbound transform
operation fail
The device received corrupt IPsec packets and could not
process them.
Encapsulated packet
too big with length
An outgoing packet needed to be transformed but was longer
than 65535.
Get inbound transform
fail
When performing inbound processing for incoming IPSEC
packets and ICMPs related to them, the engine cannot obtain
the transform context.
Table 262 IKE Logs (continued)
LOG MESSAGE DESCRIPTION