No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Log Reference

AR120, AR150, AR160, AR200, AR1200, AR2200, AR3200, and AR3600 V200R007

This document supports all the logs of device, including the parameters, meaning, possible causes and solution.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
FW-LOG/4/ATCKDF

FW-LOG/4/ATCKDF

Message

FW-LOG/4/ATCKDF:

AttackType:[type];Receive Interface:[intf]; proto:[proto];from [IP]:[Port];to [IP]:[Port];

begin time:[year/month/day hour:minute:second]; end time: [year/month/day hour:minute:second]; total packets: [pktcount];

Description

The attack packets of the specified type passed through the device and were filtered out by the firewall.

Parameters

Parameter Name Parameter Meaning
[type] Indicates the attack type. The value is a string of characters, for example, IP-sweep attack, and land attack.
[intf] Indicates an attacked interface.
[proto] Indicates the protocol type of attack packets.
from [IP]:[Port];to [IP]:[Port] Indicates the source address and destination address of an attack.
begin time:[year/month/day hour:minute:second]; end time: [year/month/day hour:minute:second] Indicates the begin time and end time of an attack.
[pktcount] Indicates the total number of attack packets.

Possible Causes

If the attack defense log was enabled, the firewall recorded logs about attack packets that were filtered out.

Procedure

  1. Check logs to view the source address, destination address, and type of the attack. If necessary, modify the firewall configuration to improve the ability to filter out attack packets from specified sources on the network and protect the specified network host.
Translation
Download
Updated: 2019-05-29

Document ID: EDOC1000097209

Views: 93292

Downloads: 181

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next