12.07.2015 Views

Symantec™ Security Gateways Reference Guide - Sawmill

Symantec™ Security Gateways Reference Guide - Sawmill

Symantec™ Security Gateways Reference Guide - Sawmill

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

166 Log messagesNotice messages (200-299)218 - Validation failure on responseDescription: There is a validation failure on the response. The response is either too long or contains invalid characters.219 - Cannot parse URLDescription: The uniform resource locator (URL) string specified is illegal.220 - Local Web server can not handle request, loop detectedDescription: The security gateway’s HTTP daemon, is itself, the target of an HTTP request, and is unable find the filespecified in the URL.222 - Connecting to port by means of the HTTP proxy is not allowedDescription: A connection through the HTTP daemon is not allowed.225 - Possible spoofed IP packet droppedDescription: The IP packet is dropped because the packet has not arrived through the expected interface. If a requestoriginates from an outside interface but has an internal address, it is considered spoofed and is dropped.226 - IP packet dropped as this packet should have been received through a tunnel but wasreceived as a plain IP packetDescription: An unencrypted packet was received. But, the tunnel database indicates that this packet should have beenreceived encrypted, so the packet was dropped.226 - IP packet dropped because it is an unsolicited ICMP packetDescription: An ICMP Echo Reply was received without requesting one. A large number of these signify an attack.226 - IP packet dropped because it is an unusual or disallowed ICMP packetDescription: The ICMP message is not one of the allowed types, so it was discarded. Only a subset of the ICMP messagesare permitted, for security reasons.By default, the following messages are allowed up the stack: Destination Unreachable, Source Quench,Time Exceeded, and Parameter Problem.Blocking Destination Unreachable (Type = 3) fragmentation needed (Code = 4) is not advisable as thiswould prevent Path MTU from working properly. Connectivity problems can result when large packets aresilently dropped.Echo Requests are only permitted, if enabled. An Echo Reply is only permitted if there is a correspondingEcho Request.226 - IP packet dropped because it was source routedDescription: The kernel detects that the IP packet was source routed, so the packet is dropped.226 - IP packet dropped because it was received as a broadcast or multicast packetDescription: Generally, if the multicast packet is directed to a unicast Ethernet address, it is dropped. TCP packets tobroadcast addresses are not permitted.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!