User's Manual
Table Of Contents
- Table of Contents
- CHAPTER 1 Introduction
- CHAPTER 2 Device Configuration
- Important Safety Instructions
- Motorola® Gateway Status Indicator Lights
- Battery Installation (optional)
- Battery Door Installation Instructions
- Battery Door Removal Instructions
- Cradle Installation Instructions
- Set up the Motorola Gateway
- Accessing the Web Management Interface
- Device Status page
- Tab Bar
- Help
- Links Bar
- Broadband
- Home Network
- Voice
- Firewall
- Diagnostics
- CHAPTER 3 Basic Troubleshooting
- CHAPTER 4 Command Line Interface
- Overview
- Starting and Ending a CLI Session
- Using the CLI Help Facility
- About SHELL Commands
- SHELL Commands
- About CONFIG Commands
- CONFIG Commands
- Connection commands
- Filterset commands
- Queue commands
- IP Gateway commands
- IPv6 Commands
- IP DNS commands
- IP IGMP commands
- NTP commands
- Application Layer Gateway (ALG) commands
- Dynamic DNS Commands
- Link commands
- Management commands
- Remote access commands
- Physical interfaces commands
- PPPoE relay commands
- NAT Pinhole commands
- Security Stateful Packet Inspection (SPI) commands
- VoIP commands
- System commands
- Debug Commands
- CHAPTER 5 Technical Specifications and Safety Information
- Appendix A Motorola® Gateway Captive Portal Implementation
- Appendix B Quality of Service (QoS) Examples
- Index
99
11. TCP SYN flood detected: This log-message is generated whenever a SYN packet destined to
the router's management interface is dropped because the number of
SYN-sent and SYN-receives exceeds one half the number of allow-
able connections in the router.
12. Telnet receive DoS attack -
packets dropped:
This log-message is generated whenever TCP packets destined to
the router's telnet management interface are dropped due to over-
whelming receive data.
13. dropped - reassembly time-
out:
This log-message is generated whenever packets, traversing the
router or destined to the router itself, are dropped because of reas-
sembly timeout.
14. dropped - illegal size: This log-message is generated whenever packets, traversing the
router or destined to the router itself, are dropped during reassembly
because of illegal packet size in a fragment.
Firewall Log Messages Detail (AT&T requirement #841)
Reason Enumeration ( C )
Log Text
Representation
Why the packet was
logged
NM_LOGDROP_CAT_DIR DIRECTION Direction (generic)
NM_LOGDROP_CAT_DIR_UP DIRECTION-UP Upstream direction
NM_LOGDROP_CAT_DIR_DOWN DIRECTION-DOWN Downstream direction
NM_LOGDROP_CAT_ETH ETH Ethernet Header (generic)
NM_LOGDROP_CAT_ETH_SRC_ADDR ETH-SRC Ethernet Source MAC Address
NM_LOGDROP_CAT_ETH_DST_ADDR ETH-DST Ethernet Destination MAC
Address
NM_LOGDROP_CAT_ETH_PROT ETH-PROTOCOL Ethernet Protocol
NM_LOGDROP_CAT_ETH_VLAN ETH-VLAN Ethernet VLAN ID (where appli-
cable)
NM_LOGDROP_CAT_IP IP IP Header (generic)
NM_LOGDROP_CAT_IP_SRC IP-SRC IP Source Address
NM_LOGDROP_CAT_IP_DST IP-DST IP Destination Address
NM_LOGDROP_CAT_IP_PROT IP-PROTOCOL IP Protocol
NM_LOGDROP_CAT_IP_SPOOF IP-SPOOF IP Address is spoofed (could not
have been sent by a device legit-
imately with the address in the
source address field)
NM_LOGDROP_CAT_IP_ILL IP-ILLEGAL IP Address is illegal (either src or
dest)
NM_LOGDROP_CAT_TCP TCP TCP Header (generic)
NM_LOGDROP_CAT_TCP_SRC_PORT TCP-SRC-PORT TCP Source Port
NM_LOGDROP_CAT_TCP_DST_PORT TCP-DST-PORT TCP Destination Port
NM_LOGDROP_CAT_TCP_FLAGS TCP-FLAGS TCP Flags field
NM_LOGDROP_CAT_UDP UDP UDP Header (generic)
NM_LOGDROP_CAT_UDP_SRC_PORT UDP-SRC-PORT UDP Source Port
NM_LOGDROP_CAT_UDP_DST_PORT UDP-DST-PORT UDP Destination Port
Access-related Log Messages