|
|
Expected NETSCREEN logs |
|
NETSCREEN syslog alert |
Log 1: Apr 4 15:12:51 127.0.0.1 HOST_NETSCREEN: NetScreen device_id=HOST_NETSCREEN [No Name]system-notification-00257(traffic): start_time="2006-04-04 15:12:51" duration=0 policy_id=320001 service=icmp proto=1 src zone=Null dst zone=self action=Deny sent=0 rcvd=28 src=AAA.BBB.CCC.DDD dst=AAA.BBB.CCC.DDD icmp type=8 session_id=0
Log 2: Apr 4 15:12:51 127.0.0.1 HOST_NETSCREEN: NetScreen device_id=HOST_NETSCREEN [Root]system-notification-00535: PKI: Saved CA configuration (CA cert subject name OU=Secure Server Certification Authority,O=RSA Data Security, Inc.,C=US,) (2006-04-04 15:12:50)
Log 3: Apr 4 15:12:52 127.0.0.1 HOST_NETSCREEN: NetScreen device_id=HOST_NETSCREEN [No Name]system-notification-00257(traffic): start_time="2006-04-04 15:12:20" duration=32 policy_id=31 service=snmp proto=17 src zone=ADM-SERV dst zone=Trust action=Permit sent=190 rcvd=184 src=AAA.BBB.CCC.DDD dst=AAA.BBB.CCC.DDD src_port=45328 dst_port=161 src-xlated ip=port=45328 session_id=32028
Log 4: Apr 4 16:04:14 127.0.0.1 HOST_NETSCREEN: NetScreen device_id=HOST_NETSCREEN [Root]system-critical-00032: Malicious URL! From AAA.BBB.CCC.DDD:42581 to AAA.BBB.CCC.DDD:80, proto TCP (zone V1-Untrust, int v1-untrust). Occurred 1 times. (2006-04-04 16:04:15)
Log 5: Apr 5 14:35:14 127.0.0.1 HOST_NETSCREEN: NetScreen device_id=HOST_NETSCREEN [Root]system-critical-00436: Large ICMP packet! From AAA.BBB.CCC.DDD to AAA.BBB.CCC.DDD, proto 1 (zone V1-Untrust, int v1-untrust). Occurred 1 times. (2006-04-05 14:35:14)
Log 6: Apr 24 15:29:32 127.0.0.1 HOST_NETSCREEN: NetScreen device_id=HOST_NETSCREEN [Root]system-notification-00257(traffic): start_time="2006-04-24 15:29:31" duration=0 policy_id=320001 service=proto:112/port:0 proto=112 src zone=Null dst zone=self action=Deny sent=0 rcvd=48 src=AAA.BBB.CCC.DDD dst=224.0.0.18
Log 7: Apr 24 15:30:16 127.0.0.1 HOST_NETSCREEN: NetScreen device_id=HOST_NETSCREEN [No Name]system-notification-00257(traffic): start_time="2006-04-24 15:30:13" duration=4 policy_id=15 service=http proto=6 src zone=DMZ dst zone=Trust action=Permit sent=1087 rcvd=7120 src=AAA.BBB.CCC.DDD dst=AAA.BBB.CCC.DDD src_port=6484 dst_port=80 src-xlated ip=AAA.BBB.CCC.DDD port=6484
Log 8: Apr 24 15:43:03 127.0.0.1 HOST_NETSCREEN: NetScreen device_id=HOST_NETSCREEN [No Name]system-notification-00257(traffic): start_time="2006-04-24 15:43:03" duration=0 policy_id=320001 service=proto:88/port:0 proto=88 src zone=Null dst zone=self action=Deny sent=0 rcvd=60 src=AAA.BBB.CCC.DDD dst=224.0.0.10
Log 9: Apr 24 15:54:27 127.0.0.1 HOST_NETSCREEN: NetScreen device_id=HOST_NETSCREEN [No Name]system-notification-00257(traffic): start_time="2006-04-24 15:54:26" duration=0 policy_id=320001 service=udp/port:1985 proto=17 src zone=Null dst zone=self action=Deny sent=0 rcvd=48 src=AAA.BBB.CCC.DDD dst=224.0.0.2 src_port=1985 dst_port=1985
Log 10: Apr 24 16:01:08 127.0.0.1 HOST_NETSCREEN: NetScreen device_id=HOST_NETSCREEN [Root]system-notification-00257(traffic): start_time="2006-04-24 16:01:05" duration=4 policy_id=13 service=tcp/port:3306 proto=6 src zone=DMZ2 dst zone=Trust action=Permit sent=1109 rcvd=1007 src=AAA.BBB.CCC.DDD dst=AAA.BBB.CCC.DDD src_port=28176 dst_port=3306 src-xlated ip=AAA.BBB.CCC.DDD port=28176
Log 11: Apr 24 16:05:15 127.0.0.1 HOST_NETSCREEN: NetScreen device_id=HOST_NETSCREEN [No Name]system-notification-00257(traffic): start_time="2006-04-24 16:05:15" duration=0 policy_id=320001 service=udp/port:1985 proto=17 src zone=Null dst zone=self action=Deny sent=0 rcvd=48 src=AAA.BBB.CCC.DDD dst=224.0.0.2 src_port=1985 dst_port=1985
Log 12: Apr 24 17:44:26 127.0.0.1 HOST_NETSCREEN: NetScreen device_id=HOST_NETSCREEN system-critical-00413: No tcp flag has been detected! From AAA.BBB.CCC.DDD:56411 to AAA.BBB.CCC.DDD:1392, using protocol TCP, and arriving at interface v1-untrust in zone V1-Untrust.The attack occurred 1 times. (2006-04-24 18:08:29)
Log 13: Apr 24 19:55:17 127.0.0.1 HOST_NETSCREEN: NetScreen device_id=HOST_NETSCREEN [Root]system-critical-00438: FIN but no ACK bit! From AAA.BBB.CCC.DDD:57491 to AAA.BBB.CCC.DDD:6346, proto TCP (zone V1-Untrust, int v1-untrust). Occurred 1 times. (2006-04-24 19:55:17)
Log 14: Apr 24 21:08:21 127.0.0.1 HOST_NETSCREEN: NetScreen device_id=HOST_NETSCREEN system-critical-00032: Malicious URL has been detected! From AAA.BBB.CCC.DDD:3562 to AAA.BBB.CCC.DDD:80, using protocol TCP, and arriving at interface v1-untrust in zone V1-Untrust.The attack occurred 1 times. (2006-04-24 21:32:25)
Log 15: Apr 4 15:12:50 127.0.0.1 HOST_NETSCREEN: NetScreen device_id=HOST_NETSCREEN [Root]system-notification-00019: Syslog has been enabled. (2006-04-04 15:12:50)
Log 16: 2005-03-01 09:45:08 Local0.Notice 127.0.0.1 HOST_NETSCREEN: NetScreen device_id=HOST_NETSCREEN [No Name]system-notification-00257(traffic): start_time="2005-03-01 09:45:17" duration=0 policy_id=20 service=tcp/port:2386 proto=6 src zone=Trust dst zone=Untrust action=Deny sent=0 rcvd=0 src=AAA.BBB.CCC.DDD dst=AAA.BBB.CCC.DDD src_port=2809 dst_port=2386<000>
Log 17: 2005-03-01 09:45:13 Local0.Notice 127.0.0.1 HOST_NETSCREEN: NetScreen device_id=HOST_NETSCREEN [No Name]system-notification-00257(traffic): start_time="2005-03-01 09:45:22" duration=0 policy_id=21 service=tcp/port:3472 proto=6 src zone=Trust dst zone=Untrust action=Deny sent=0 rcvd=0 src=AAA.BBB.CCC.DDD dst=AAA.BBB.CCC.DDD src_port=2809 dst_port=3472<000>
Log 18: 2005-03-01 09:45:04 Local0.Notice 127.0.0.1 HOST_NETSCREEN: NetScreen device_id=HOST_NETSCREEN [Root]system-notification-00019: Syslog has been enabled. (2005-03-01 09:45:14)<000>
|
|
| |
|