Broudcast 224.0.0.1 von dem Gateway vor Zyxell Flex 100 schreibt log voll
![[Deleted User]](https://us.v-cdn.net/6029482/uploads/defaultavatar/nN4PAQRO7TCNP.jpg)



Hi,
Geräteanordnung
ISP - DigiBox(10.0.0.1) - Zywall(10.0.0.100;192.168.2.1) -
Im log taucht folgendes auf
… 10.0.0.1 224.0.0.1 notice secure-policy ACCESS BLOCK Match default rule, DROP
Ich habe diverse Regeln eingefügt,
zB habe ich Source 10.0.0.1 bzw. Destination 224.0.0.1 geblockt, also eine entsprechende Policy eingefügt, nur werden die Zeilen weiter ins Log geschrieben.
Wie kann ich den Multicast Eintrag vermeiden?
thx
Chris
All Replies
-
0
-
Hi Kevin,
padon, what do you mean with diag-info?
one Log entry every 2 minutes:
4 2023-06-06 00:01:39 10.0.0.1 224.0.0.1 notice secure-policy ACCESS BLOCK Match default rule, DROP
I also used WAN for from, and 10.0.0.1 for Source, but still entries in the log files.thx
0 -
ok, found diag-info.
I will update later, remote not feasible for me.
0 -
Hi @Rogge ,
The IGMP logs will be defined as debug level logs. Please kindly check "Security Policy Control" log level is normal.
Thank you
0 -
Hi Kevin, it is normal
0 -
the trick was to use ZyWall for „to“ instead of any(Excluding ZyWall)!!!
thx Kevin!1
Categories
- All Categories
- 434 Beta Program
- 2.7K Nebula
- 174 Nebula Ideas
- 117 Nebula Status and Incidents
- 6.1K Security
- 418 USG FLEX H Series
- 297 Security Ideas
- 1.6K Switch
- 78 Switch Ideas
- 1.2K Wireless
- 43 Wireless Ideas
- 6.7K Consumer Product
- 269 Service & License
- 416 News and Release
- 87 Security Advisories
- 31 Education Center
- 10 [Campaign] Zyxel Network Detective
- 4.1K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 83 About Community
- 87 Security Highlight