Sending event/alert log to mail server has failed.
All Replies
-
Hi @PeterUK ,
Can you post firewall event log when it send event/alert log to mail server.
0 -
from flex200
951
2023-07-07 07:15:00
notice
Security Policy Control
Match default rule, DROP
194.26.135.33:49137
br0
94.173.xx.xx:3337
br0
tcp
ACCESS BLOCK
952
2023-07-07 07:14:58
notice
Security Policy Control
Match default rule, DROP
131.0.216.25:48031
br0
94.173.xx.xx:6881
br0
udp
ACCESS BLOCK
953
2023-07-07 07:14:56
notice
Security Policy Control
Match default rule, DROP
147.78.47.250:58400
br0
94.173.xx.xx:3390
br0
tcp
ACCESS BLOCK
954
2023-07-07 07:14:56
notice
Security Policy Control
Match default rule, DROP
38.51.158.124:53240
br0
94.173.xx.xx:3389
br0
tcp
ACCESS BLOCK
955
2023-07-07 07:14:53
info
IKE
Recv:[HASH][NOTIFY:R_U_THERE_ACK]
192.168.255.241:500192.168.255.237:500
IKE_LOG
956
2023-07-07 07:14:53
info
IKE
The cookie pair is : 0x2a6b5ea48d684318 / 0x496bbbab06a34c68
192.168.255.241:500192.168.255.237:500
IKE_LOG
957
2023-07-07 07:14:53
info
IKE
Send:[HASH][NOTIFY:R_U_THERE]
192.168.255.237:500192.168.255.241:500
IKE_LOG
958
2023-07-07 07:14:53
info
IKE
The cookie pair is : 0x496bbbab06a34c68 / 0x2a6b5ea48d684318
192.168.255.237:500192.168.255.241:500
IKE_LOG
959
2023-07-07 07:14:51
notice
Security Policy Control
Match default rule, ICMP Type:8, DROP [count=11]
80.249.99.164
wan2
94.173.xx.xxicmp
ACCESS BLOCK
960
2023-07-07 07:14:51
notice
Security Policy Control
Match default rule, ICMP Type:8, DROP [count=11]
80.249.99.164
br0
94.173.xx.xx
br0
icmp
ACCESS BLOCK
961
2023-07-07 07:14:49
notice
Security Policy Control
Match default rule, DROP [count=12]
93.95.230.84:22
br0
94.173.xx.xx:25565
br0
tcp
ACCESS BLOCK
962
2023-07-07 07:14:47
info
IKE
Recv:[HASH][NOTIFY:R_U_THERE_ACK]
31.94.36.79:450094.173.xx.xx:4500
IKE_LOG
963
2023-07-07 07:14:47
info
IKE
The cookie pair is : 0xdfd3d716be63c41f / 0x89cdff6cf66f6e4e
31.94.36.79:450094.173.xx.xx:4500
IKE_LOG
964
2023-07-07 07:14:47
info
IKE
Send:[HASH][NOTIFY:R_U_THERE]
94.173.xx.xx:450031.94.36.79:4500
IKE_LOG
965
2023-07-07 07:14:47
info
IKE
The cookie pair is : 0x89cdff6cf66f6e4e / 0xdfd3d716be63c41f
94.173.xx.xx:450031.94.36.79:4500
IKE_LOG
966
2023-07-07 07:14:40
notice
Security Policy Control
Match default rule, ICMP Type:8, DROP [count=11]
80.249.99.164
wan2
94.173.xx.xxicmp
ACCESS BLOCK
967
2023-07-07 07:14:40
notice
Security Policy Control
Match default rule, ICMP Type:8, DROP [count=11]
80.249.99.164
br0
94.173.xx.xx
br0
icmp
ACCESS BLOCK
968
2023-07-07 07:14:38
notice
Security Policy Control
Match default rule, DROP [count=8]
93.95.230.84:22
br0
94.173.xx.xx:25565
br0
tcp
ACCESS BLOCK
969
2023-07-07 07:14:36
notice
Security Policy Control
Match default rule, DROP
194.62.182.53:53
br0
94.173.xx.xx:46290
br0
udp
ACCESS BLOCK
970
2023-07-07 07:14:36
notice
Security Policy Control
Match default rule, DROP
108.181.13.234:53
br0
94.173.xx.xx:43898
br0
udp
ACCESS BLOCK
971
2023-07-07 07:14:36
notice
Security Policy Control
Match default rule, DROP
194.62.182.53:53
br0
94.173.xx.xx:42789
br0
udp
ACCESS BLOCK
972
2023-07-07 07:14:35
notice
Security Policy Control
Match default rule, DROP
162.216.150.217:58550
br0
94.173.xx.xx:9708
br0
tcp
ACCESS BLOCK
973
2023-07-07 07:14:35
notice
Security Policy Control
Match default rule, DROP
173.249.34.229:62669
br0
94.173.xx.xx:3389
br0
tcp
ACCESS BLOCK
974
2023-07-07 07:14:34
notice
Security Policy Control
Match default rule, DROP
194.62.182.53:53
br0
94.173.xx.xx:60812
br0
udp
ACCESS BLOCK
975
2023-07-07 07:14:34
notice
Security Policy Control
Match default rule, DROP
107.170.232.17:47784
br0
94.173.xx.xx:5938
br0
tcp
ACCESS BLOCK
976
2023-07-07 07:14:33
info
IKE
Send:[HASH][NOTIFY:R_U_THERE_ACK]
192.168.255.237:500192.168.255.241:500
IKE_LOG
977
2023-07-07 07:14:33
info
IKE
The cookie pair is : 0x496bbbab06a34c68 / 0x2a6b5ea48d684318
192.168.255.237:500192.168.255.241:500
IKE_LOG
978
2023-07-07 07:14:33
info
IKE
Recv:[HASH][NOTIFY:R_U_THERE]
192.168.255.241:500192.168.255.237:500
IKE_LOG
979
2023-07-07 07:14:33
info
IKE
The cookie pair is : 0x2a6b5ea48d684318 / 0x496bbbab06a34c68
192.168.255.241:500192.168.255.237:500
IKE_LOG
980
2023-07-07 07:14:32
notice
Security Policy Control
Match default rule, DROP
173.249.34.229:60876
br0
94.173.xx.xx:3389
br0
tcp
ACCESS BLOCK
981
2023-07-07 07:14:32
notice
Security Policy Control
Match default rule, DROP
92.205.128.45:54191
br0
94.173.xx.xx:3389
br0
tcp
ACCESS BLOCK
982
2023-07-07 07:14:31
info
IKE
Send:[HASH][NOTIFY:R_U_THERE_ACK]
94.173.xx.xx:450031.94.36.79:4500
IKE_LOG
983
2023-07-07 07:14:31
info
IKE
The cookie pair is : 0x89cdff6cf66f6e4e / 0xdfd3d716be63c41f
94.173.xx.xx:450031.94.36.79:4500
IKE_LOG
984
2023-07-07 07:14:31
info
IKE
Recv:[HASH][NOTIFY:R_U_THERE]
31.94.36.79:450094.173.xx.xx:4500
IKE_LOG
985
2023-07-07 07:14:31
info
IKE
The cookie pair is : 0xdfd3d716be63c41f / 0x89cdff6cf66f6e4e
31.94.36.79:450094.173.xx.xx:4500
IKE_LOG
986
2023-07-07 07:14:31
notice
Security Policy Control
Match default rule, DROP
37.212.49.72:7442
br0
94.173.xx.xx:27032
br0
tcp
ACCESS BLOCK
987
2023-07-07 07:14:29
notice
Security Policy Control
Match default rule, ICMP Type:8, DROP [count=11]
80.249.99.164
wan2
94.173.xx.xxicmp
ACCESS BLOCK
988
2023-07-07 07:14:29
notice
Security Policy Control
Match default rule, ICMP Type:8, DROP [count=11]
80.249.99.164
br0
94.173.xx.xx
br0
icmp
ACCESS BLOCK
989
2023-07-07 07:14:28
notice
System
Sending event/alert log to mail server has failed.990
2023-07-07 07:14:25
notice
Security Policy Control
Match default rule, DROP [count=12]
93.95.230.84:22
br0
94.173.xx.xx:25565
br0
tcp
ACCESS BLOCK
991
2023-07-07 07:14:24
notice
Security Policy Control
Match default rule, DROP
193.106.29.122:64095
br0
94.173.xx.xx:8008
br0
tcp
ACCESS BLOCK
992
2023-07-07 07:14:22
info
IKE
Recv:[HASH][NOTIFY:R_U_THERE_ACK]
192.168.255.241:500192.168.255.237:500
IKE_LOG
993
2023-07-07 07:14:22
info
IKE
The cookie pair is : 0x2a6b5ea48d684318 / 0x496bbbab06a34c68
192.168.255.241:500192.168.255.237:500
IKE_LOG
994
2023-07-07 07:14:22
info
IKE
Send:[HASH][NOTIFY:R_U_THERE]
192.168.255.237:500192.168.255.241:500
IKE_LOG
995
2023-07-07 07:14:22
info
IKE
The cookie pair is : 0x496bbbab06a34c68 / 0x2a6b5ea48d684318
192.168.255.237:500192.168.255.241:500
IKE_LOG
996
2023-07-07 07:14:21
notice
Security Policy Control
Match default rule, DROP
74.50.73.186:60368
br0
94.173.xx.xx:3389
br0
tcp
ACCESS BLOCK
997
2023-07-07 07:14:20
notice
Security Policy Control
Match default rule, DROP
112.116.85.16:10318
br0
94.173.xx.xx:23
br0
tcp
ACCESS BLOCK
998
2023-07-07 07:14:19
notice
Security Policy Control
Match default rule, DROP
108.181.13.234:53
br0
94.173.xx.xx:46219
br0
udp
ACCESS BLOCK
999
2023-07-07 07:14:19
notice
Security Policy Control
Match default rule, DROP
144.76.65.244:53
br0
94.173.xx.xx:36812
br0
udp
ACCESS BLOCK
1000
2023-07-07 07:14:19
notice
Security Policy Control
Match default rule, DROP
144.76.65.244:53
br0
94.173.xx.xx:38480
br0
udp
ACCESS BLOCK0
Categories
- All Categories
- 415 Beta Program
- 2.4K Nebula
- 149 Nebula Ideas
- 96 Nebula Status and Incidents
- 5.7K Security
- 263 USG FLEX H Series
- 271 Security Ideas
- 1.4K Switch
- 74 Switch Ideas
- 1.1K Wireless
- 40 Wireless Ideas
- 6.4K Consumer Product
- 249 Service & License
- 387 News and Release
- 84 Security Advisories
- 29 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.5K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 85 About Community
- 73 Security Highlight