2.36. IPSEC

These log messages refer to the IPSEC (IPsec (VPN) events) category.

2.36.1. fatal_ipsec_event (ID: 01800100)

Default Severity
ALERT
Log Message
Fatal event occured, because of <reason>
Explanation
Fatal event occured in IPsec stack.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
reason

2.36.2. warning_ipsec_event (ID: 01800101)

Default Severity
WARNING
Log Message
Warning event occured, because of <reason>
Explanation
Warning event from IPsec stack.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
reason

2.36.3. audit_event (ID: 01800103)

Default Severity
NOTICE
Log Message
Source IP: <srcip>, Destination IP: <destip>, SPI: <spi>, Seq: <seq>, Protocol: <protocol>, Reason: <reason>.
Explanation
An audit event occured in the IPsec stack.
Firewall Action
None
Recommended Action
None
Revision
2
Parameters
srcip
destip
spi
seq
protocol
reason

2.36.4. audit_flood (ID: 01800104)

Default Severity
NOTICE
Log Message
<reason>.
Explanation
The rate limit for audit messages was reached.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
reason

2.36.5. ike_delete_notification (ID: 01800105)

Default Severity
NOTICE
Log Message
Local IP: <local_ip>, Remote IP: <remote_ip>, Cookies: <cookies>, Reason: <reason>.
Explanation
None
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
local_ip
remote_ip
cookies
reason

2.36.6. ike_invalid_payload (ID: 01800106)

Default Severity
WARNING
Log Message
Local IP: <local_ip>, Remote IP: <remote_ip>, Cookies: <cookies>, Reason: <reason>.
Explanation
None
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
local_ip
remote_ip
cookies
reason

2.36.7. ike_invalid_proposal (ID: 01800107)

Default Severity
WARNING
Log Message
Local IP: <local_ip>, Remote IP: <remote_ip>, Cookies: <cookies>, Reason: <reason>.
Explanation
The proposal for the security association could not be accepted.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
local_ip
remote_ip
cookies
reason

2.36.8. ike_retry_limit_reached (ID: 01800108)

Default Severity
NOTICE
Log Message
Local IP: <local_ip>, Remote IP: <remote_ip>, Cookies: <cookies>, Reason: <reason>.
Explanation
The retry limit for transmitting ISAKMP messages was reached.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
local_ip
remote_ip
cookies
reason

2.36.9. ike_quickmode_failed (ID: 01800109)

Default Severity
WARNING
Log Message
Local IP: <local_ip>, Remote IP: <remote_ip>, Cookies: <cookies>, Reason: <reason>.
Explanation
None
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
local_ip
remote_ip
cookies
reason

2.36.10. packet_corrupt (ID: 01800110)

Default Severity
NOTICE
Log Message
Source IP: <srcip>, Destination IP: <destip>, SPI: <spi>, Seq: <seq>, Protocol: <protocol>, Reason: <reason>.
Explanation
Received a corrupt packet.
Firewall Action
drop
Recommended Action
None
Revision
2
Parameters
srcip
destip
spi
seq
protocol
reason

2.36.11. icv_failure (ID: 01800111)

Default Severity
NOTICE
Log Message
Source IP: <srcip>, Destination IP: <destip>, SPI: <spi>, Seq: <seq>, Protocol: <protocol>, Reason: <reason>.
Explanation
The computed and ICV of the received packet did not match.
Firewall Action
drop
Recommended Action
None
Revision
3
Parameters
srcip
destip
spi
seq
protocol
reason
packet_data

2.36.12. sequence_number_failure (ID: 01800112)

Default Severity
NOTICE
Log Message
Source IP: <srcip>, Destination IP: <destip>, SPI: <spi>, Seq: <seq>, Protocol: <protocol>, Reason: <reason>.
Explanation
The received packet did not fall within the sliding window.
Firewall Action
drop
Recommended Action
None
Revision
2
Parameters
srcip
destip
spi
seq
protocol
reason

2.36.13. sa_lookup_failure (ID: 01800113)

Default Severity
NOTICE
Log Message
Source IP: <srcip>, Destination IP: <destip>, SPI: <spi>, Seq: <seq>, Protocol: <protocol>, Reason: <reason>.
Explanation
The received packet could not be mapped to an appropriate SA.
Firewall Action
drop
Recommended Action
None
Revision
2
Parameters
srcip
destip
spi
seq
protocol
reason

2.36.14. ip_fragment (ID: 01800114)

Default Severity
NOTICE
Log Message
Source IP: <srcip>, Destination IP: <destip>, SPI: <spi>, Seq: <seq>, Protocol: <protocol>, Reason: <reason>.
Explanation
The packet offered to AH/ESP processing appears to be an IP fragment.
Firewall Action
None
Recommended Action
None
Revision
3
Parameters
srcip
destip
spi
seq
protocol
reason
packet_data

2.36.15. sequence_number_overflow (ID: 01800115)

Default Severity
NOTICE
Log Message
Source IP: <srcip>, Destination IP: <destip>, SPI: <spi>, Seq: <seq>, Protocol: <protocol>, Reason: <reason>.
Explanation
An attempt to transmit a packet that would result in sequence number overflow.
Firewall Action
None
Recommended Action
None
Revision
2
Parameters
srcip
destip
spi
seq
protocol
reason

2.36.16. bad_padding (ID: 01800116)

Default Severity
NOTICE
Log Message
Source IP: <srcip>, Destination IP: <destip>, SPI: <spi>, Seq: <seq>, Protocol: <protocol>, Reason: <reason>.
Explanation
The received packet has incorrect padding.
Firewall Action
drop
Recommended Action
None
Revision
3
Parameters
srcip
destip
spi
seq
protocol
reason
packet_data

2.36.17. hardware_accelerator_congested (ID: 01800117)

Default Severity
NOTICE
Log Message
Source IP: <srcip>, Destination IP: <destip>, SPI: <spi>, Seq: <seq>, Protocol: <protocol>, Reason: <reason>.
Explanation
Hardware accleration failed due to resource shortage.
Firewall Action
drop
Recommended Action
None
Revision
2
Parameters
srcip
destip
spi
seq
protocol
reason

2.36.18. hardware_acceleration_failure (ID: 01800118)

Default Severity
NOTICE
Log Message
Source IP: <srcip>, Destination IP: <destip>, SPI: <spi>, Seq: <seq>, Protocol: <protocol>, Reason: <reason>.
Explanation
Hardware acceleration failed due to resource shortage, a corrupt packet or other hardware related error.
Firewall Action
drop
Recommended Action
None
Revision
3
Parameters
srcip
destip
spi
seq
protocol
reason
packet_data

2.36.19. ip_validation_failure (ID: 01800119)

Default Severity
NOTICE
Log Message
Source IP: <srcip>, Destination IP: <destip>, SPI: <spi>, Seq: <seq>, Protocol: <protocol>, ID: <id>, Reason: <reason>.
Explanation
The source or destination address/port did not match the traffic selectors for the SA.
Firewall Action
drop
Recommended Action
None
Revision
2
Parameters
srcip
destip
spi
seq
protocol
id
reason

2.36.20. commit_failed (ID: 01800200)

Default Severity
CRITICAL
Log Message
Failed to commit IPsec configuration
Explanation
Failed to commit IPsec configuration.
Firewall Action
IPsec_configuration_disabled
Recommended Action
Reconfigure_IPsec.
Revision
1

2.36.21. commit_succeeded (ID: 01800201)

Default Severity
INFORMATIONAL
Log Message
Commit succeeded - recalculating flows and reapplying routes
Explanation
Succeeded to commit IPsec configuration. Flows will be recalculated and reapplied.
Firewall Action
None
Recommended Action
None
Revision
1

2.36.22. x509_init_failed (ID: 01800203)

Default Severity
CRITICAL
Log Message
Failed to initilaze x509 library
Explanation
Failed to initilaze x509 library.
Firewall Action
IPsec_configuration_disabled
Recommended Action
None
Revision
1

2.36.23. pm_create_failed (ID: 01800204)

Default Severity
ERROR
Log Message
Failed to create policymanager
Explanation
Failed to create policymanager. Out of memory.
Firewall Action
reduce_number_of_tunnels
Recommended Action
None
Revision
1

2.36.24. failed_to_start_ipsec (ID: 01800205)

Default Severity
CRITICAL
Log Message
Failed to start IPsec
Explanation
Failed to start IPsec. Policy Manager create did not complete.
Firewall Action
ipsec_disabled
Recommended Action
Restart.
Revision
1

2.36.25. failed_to_start_ipsec (ID: 01800206)

Default Severity
ERROR
Log Message
Disable all IPsec tunnels
Explanation
Disable all IPsec tunnels due to memory limitations.
Firewall Action
disable_all_ipsec_interfaces
Recommended Action
None
Revision
1

2.36.26. failed_create_audit_module (ID: 01800207)

Default Severity
ERROR
Log Message
Failed to create audit module.
Explanation
Failed to create audit module.
Firewall Action
IPsec_audit_disabled
Recommended Action
None
Revision
1

2.36.27. failed_attach_audit_module (ID: 01800208)

Default Severity
ERROR
Log Message
Failed to attach audit module.
Explanation
Failed to attach audit module.
Firewall Action
IPsec_audit_disabled
Recommended Action
None
Revision
1

2.36.28. failed_to_configure_IPsec (ID: 01800209)

Default Severity
CRITICAL
Log Message
Failed during configuration with error: <error_msg> for tunnel: <tunnel>
Explanation
Failed to set IPsec configuration.
Firewall Action
IPsec_configuration_disabled
Recommended Action
Reconfigure_IPsec.
Revision
1
Parameters
error_msg
tunnel

2.36.29. failed_to_configure_IPsec (ID: 01800210)

Default Severity
CRITICAL
Log Message
Failed during configuration with error: <error_msg>
Explanation
Failed to set IPsec configuration.
Firewall Action
IPsec_configuration_disabled
Recommended Action
Reconfigure_IPsec.
Revision
1
Parameters
error_msg

2.36.30. reconfig_IPsec (ID: 01800211)

Default Severity
INFORMATIONAL
Log Message
Reconfiguration of IPsec started
Explanation
Reconfiguration of IPsec started.
Firewall Action
ipsec_reconfigured
Recommended Action
None
Revision
2

2.36.31. failed_to_reconfig_ipsec (ID: 01800212)

Default Severity
ERROR
Log Message
Failed to reconfigure IPsec
Explanation
Failed to reconfigure IPsec. No policymanager object.
Firewall Action
new_ipsec_configuration_disabled
Recommended Action
None
Revision
2

2.36.32. IPsec_init_failed (ID: 01800213)

Default Severity
CRITICAL
Log Message
Failed to initialize IPsec
Explanation
Failed to start IPsec.
Firewall Action
IPsec_configuration_disabled
Recommended Action
Restart.
Revision
1

2.36.33. ipsec_started_successfully (ID: 01800214)

Default Severity
INFORMATIONAL
Log Message
IPsec started successfully
Explanation
Succeeded to create Policymanger and commit IPsec configuration.
Firewall Action
ipsec_started
Recommended Action
None
Revision
2

2.36.34. Failed_to_set_local_ID (ID: 01800301)

Default Severity
ERROR
Log Message
Failed to configure Local ID <local_id> for tunnel <tunnel>
Explanation
Failed to configure tunnel with specified local id.
Firewall Action
LocalID_disabled
Recommended Action
None
Revision
1
Parameters
local_id
tunnel

2.36.35. Failed_to_add_certificate (ID: 01800302)

Default Severity
ERROR
Log Message
Failed add host certificate: <certificate>, for tunnel <tunnel>
Explanation
Failed to add specified host certificate.
Firewall Action
certificate_disabled
Recommended Action
Reconfigure_tunnnel.
Revision
1
Parameters
certificate
tunnel

2.36.36. Default_IKE_DH_groups_will_be_used (ID: 01800303)

Default Severity
INFORMATIONAL
Log Message
Default configuration for IKE DH groups (2 and 5) will be used for tunnel: <tunnel>
Explanation
Inform that default DH groups settings will be used.
Firewall Action
Use_default_IKE_DH_groups
Recommended Action
None
Revision
1
Parameters
tunnel

2.36.37. failed_to_set_algorithm_properties (ID: 01800304)

Default Severity
ERROR
Log Message
Failed to set properties IPsec alogorithm <alg>, for tunnel <tunnel>
Explanation
Failed to set specified properties (keysize, lifetimes) for IPsec algorithm.
Firewall Action
use_default_values_for_algorithm
Recommended Action
None
Revision
2
Parameters
alg
tunnel

2.36.38. failed_to_add_root_certificate (ID: 01800306)

Default Severity
ERROR
Log Message
Failed add root certificate: <certificate>, for tunnel <tunnel>
Explanation
Failed to set specified certificate as root certificate.
Firewall Action
disable_certificate
Recommended Action
Reconfigure_tunnnel.
Revision
1
Parameters
certificate
tunnel

2.36.39. dns_resolve_failed (ID: 01800308)

Default Severity
WARNING
Log Message
Failed to resolve remote endpoint through DNS
Explanation
None
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
endpoint
ipsectunnel

2.36.40. dns_resolve_timeout (ID: 01800309)

Default Severity
WARNING
Log Message
DNS resolve timed out
Explanation
None
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
endpoint
ipsectunnel

2.36.41. dns_no_record (ID: 01800311)

Default Severity
WARNING
Log Message
DNS query returned no records for remote endpoint <endpoint>.
Explanation
Configured remote endpoint DNS does not have any IP addresses.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
endpoint
ipsectunnel

2.36.42. remote_endpoint_ip_added (ID: 01800313)

Default Severity
INFORMATIONAL
Log Message
Resolved remote-endpoint <endpoint> to IP <ip> for IPsec tunnel <ipsectunnel>.
Explanation
A new remote endpoint IP was added to IPsec tunnel.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
endpoint
ipsectunnel
ip
TTL
TTR

2.36.43. failed_to_add_rules (ID: 01800314)

Default Severity
ERROR
Log Message
Failed to commit rules after remote endpoint <endpoint> have been resolved by DNS for IPsec tunnel: <ipsectunnel>
Explanation
Failed to add rules to tunnel after remote endpoint have been resolved by DNS.
Firewall Action
IPsec_tunnel_disabled
Recommended Action
None
Revision
2
Parameters
endpoint
ipsectunnel

2.36.44. no_policymanager (ID: 01800316)

Default Severity
CRITICAL
Log Message
No policymanager!! to free tunnel object from
Explanation
No policymanager to free tunnel from!!! IPsec does not work properly.
Firewall Action
ipsec_out_of_work
Recommended Action
Restart.
Revision
1

2.36.45. peer_is_dead (ID: 01800317)

Default Severity
INFORMATIONAL
Log Message
Peer <peer> has been detected dead
Explanation
A remote peer have been detected as dead. This will cause all tunnels associated with the peer to be taken down.
Firewall Action
IPsec_tunnel_disabled
Recommended Action
None
Revision
1
Parameters
peer

2.36.46. failed_to_set_dpd_cb (ID: 01800318)

Default Severity
ERROR
Log Message
Failed to set callback for Dead Peer Detection
Explanation
Failed to set callback for Dead Peer Detection User will not receive log message when a peer has been detected dead and the tunnel have been killed.
Firewall Action
None
Recommended Action
None
Revision
1

2.36.47. failed_to_add_certificate (ID: 01800319)

Default Severity
ERROR
Log Message
Failed with error: <status_msg>, message <answermsg>, when adding certificate: <certificate>
Explanation
Failed to add endpoint certificate to external key provider.
Firewall Action
certificate_disabled
Recommended Action
Reconfigure_tunnel.
Revision
1
Parameters
status_msg
answermsg
certificate

2.36.48. failed_to_remove_key_provider (ID: 01800320)

Default Severity
CRITICAL
Log Message
Try to read out external keyporvider object when no policymanager object avaliable!!
Explanation
Try to read out external keyporvider object when no policymanager object avaliable!.
Firewall Action
None
Recommended Action
None
Revision
1

2.36.49. failed_to_add_key_provider (ID: 01800321)

Default Severity
CRITICAL
Log Message
Failed with error: <status_msg>, when adding external key provider for certificate handling
Explanation
Failed to add external key provider. All certificate authentication will be disabled.
Firewall Action
IPsec_disabled
Recommended Action
Restart.
Revision
1
Parameters
status_msg

2.36.50. failed_to_add_certificate (ID: 01800322)

Default Severity
ERROR
Log Message
Failed add certificate: <certificate>, for tunnel <tunnel>
Explanation
Failed to add certificate. Tunnel configured with this certificate for authentication will fail while negotiate.
Firewall Action
certificate_disabled
Recommended Action
None
Revision
1
Parameters
certificate
tunnel

2.36.51. remote_endpoint_ip_removed (ID: 01800327)

Default Severity
INFORMATIONAL
Log Message
Remote endpoint <endpoint> IP <ip> was removed from IPsec tunnel <ipsectunnel>.
Explanation
Remote endpoint IP was removed from DNS cache.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
endpoint
ipsectunnel
ip

2.36.52. Failed_to_set_Remote_ID (ID: 01800332)

Default Severity
ERROR
Log Message
Failed to configure Remote ID <remote_id> for tunnel <tunnel>
Explanation
Failed to configure tunnel with specified remote id.
Firewall Action
RemoteID_disabled
Recommended Action
None
Revision
1
Parameters
remote_id
tunnel

2.36.53. failed_to_set_certificate_trust (ID: 01800342)

Default Severity
ERROR
Log Message
Failed set trust for host certificate <certificate> for tunnel <tunnel>
Explanation
Failed to set trust for the specified host certificate.
Firewall Action
certificate_disabled
Recommended Action
Reconfigure_tunnnel.
Revision
1
Parameters
certificate
tunnel

2.36.54. failed_to_set_crl_distribution_points (ID: 01800343)

Default Severity
ERROR
Log Message
Failed set CRL distribution points for certificate: <certificate>
Explanation
Failed to set CRL distribution points for the specified certificate.
Firewall Action
certificate_disabled
Recommended Action
None
Revision
1
Parameters
certificate

2.36.55. dns_cache_removed (ID: 01800344)

Default Severity
WARNING
Log Message
Remote endpoint <endpoint> was removed from DNS cache.
Explanation
All IP address are removed from the DNS cache subsystem for this endpoint.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
endpoint
ipsectunnel

2.36.56. ippool_does_not_exist (ID: 01800400)

Default Severity
WARNING
Log Message
IP pool does not exist: <ippool>
Explanation
The config mode pool refers to an IP pool that does not exist. As a result, IPsec clients using config mode will not be able lease IP addresses.
Firewall Action
None
Recommended Action
Update your config mode configuration.
Revision
1
Parameters
ippool

2.36.57. cfgmode_ip_allocated (ID: 01800401)

Default Severity
NOTICE
Log Message
Allocated IP <ip> for use in IKE config mode
Explanation
A dynamically allocated ip was allocated for use with IKE config.
Firewall Action
None
Recommended Action
None
Revision
2
Parameters
ip
num_dhcp
num_dns
num_wins
num_subnets

2.36.58. cfgmode_ip_freed_by_ippool (ID: 01800402)

Default Severity
NOTICE
Log Message
Returned a dynamic cfg mode IP <ip> to the IP pool
Explanation
A dynamically allocated ip used for IKE cfg mode was returned to the IP pool.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
ip

2.36.59. cfgmode_ip_freed_by_ike (ID: 01800403)

Default Severity
NOTICE
Log Message
Freed IP <ip> from use in IKE config mode
Explanation
A dynamically allocated IP was freed from use with IKE config.
Firewall Action
None
Recommended Action
None
Revision
2
Parameters
ip

2.36.60. cfgmode_no_context (ID: 01800404)

Default Severity
ALERT
Log Message
No IP pool context could be allocated; out of memory.
Explanation
An attempt to allocate an IP pool context failed because the system ran out of memory.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
ippool

2.36.61. cfgmode_no_ip_fetched (ID: 01800405)

Default Severity
WARNING
Log Message
No IP address fetched from IP pool (<ippool>)
Explanation
No IP address could be fetched from the IP pool.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
ippool

2.36.62. cfgmode_no_ip_data_acquired (ID: 01800406)

Default Severity
WARNING
Log Message
No IP address data acquired from IP pool (<ippool>)
Explanation
No IP address data could be acquired from the IP pool.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
ippool

2.36.63. cfgmode_failed_to_add_ip (ID: 01800407)

Default Severity
WARNING
Log Message
Failed to add IP to address table
Explanation
The IP address could not be added to the internal address table (probably because the system ran out out of memory).
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
ippool

2.36.64. recieved_packet_to_disabled_IPsec (ID: 01800500)

Default Severity
NOTICE
Log Message
received plaintext packet disabled IPsec. Packet will be dropped
Explanation
Received plain text packet to IPsec while disabled.
Firewall Action
packet_will_be_dropped
Recommended Action
None
Revision
2

2.36.65. recieved_packet_to_disabled_IPsec (ID: 01800501)

Default Severity
NOTICE
Log Message
Received plain text packet to IPsec while shutting down. Packet will be dropped
Explanation
Received plain text packet to IPsec while shutting down.
Firewall Action
packet_will_be_dropped
Recommended Action
None
Revision
1

2.36.66. Recieved_plaintext_packet_for_disabled_IPsec_interface (ID: 01800502)

Default Severity
WARNING
Log Message
IPsec tunnel <ipsec_connection> is disabled. Packet will be dropped
Explanation
A packed was dropped due to the IPsec interface being disabled.
Firewall Action
packet_will_be_dropped
Recommended Action
This is usualy a consequence of low memory or a bad configuration. Look for previous log messages to find the cause for the interface being disabled.
Revision
1
Parameters
ipsec_connection

2.36.67. no_remote_gateway (ID: 01800503)

Default Severity
ERROR
Log Message
Remote gateway is null. No route is possible
Explanation
No remote gateway for packet, i.e no route defined.
Firewall Action
packet_will_be_dropped
Recommended Action
None
Revision
1

2.36.68. no_route (ID: 01800504)

Default Severity
ERROR
Log Message
Failed to lookup route. No route for packet.
Explanation
No remote gateway for packet, i.e no route defined.
Firewall Action
packet_will_be_dropped
Recommended Action
None
Revision
1

2.36.69. ipsec_interface_disabled (ID: 01800506)

Default Severity
ERROR
Log Message
IPsec interface disabled
Explanation
IPsec interface disabled.
Firewall Action
None
Recommended Action
None
Revision
1

2.36.70. no_route (ID: 01800507)

Default Severity
WARNING
Log Message
Failed to lookup route. No route for packet to remote gateway: <remote_ip>
Explanation
No remote gateway for packet, i.e no route defined.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
ipsec_if
table
remote_ip

2.36.71. no_userauth_specified_for_eap (ID: 01800600)

Default Severity
ERROR
Log Message
No EAP userauth rule found for eap authentication with remote ike peer: <srcif> <remote_peer>
Explanation
No user authentication rule avaliable for eap authentication.
Firewall Action
eap_protocols_disabled
Recommended Action
Reconfigure_tunnel.
Revision
2
Parameters
remote_peer
srcif

2.36.72. no_radius_server_configured_for_eap (ID: 01800601)

Default Severity
ERROR
Log Message
No RADIUS server configured for EAP!
Explanation
No RADIUS server configured for EAP!.
Firewall Action
eap_authentication_will_fail
Recommended Action
Reconfigure.
Revision
1

2.36.73. insufficient_resources_for_eap (ID: 01800602)

Default Severity
ERROR
Log Message
Insufficient resources for EAP protocol
Explanation
Insufficient resources for EAP protocol.
Firewall Action
eap_authentication_will_fail
Recommended Action
None
Revision
1

2.36.74. unknown_type_of_eap (ID: 01800603)

Default Severity
ERROR
Log Message
Unknown type of EAP protocol
Explanation
Type of EAP authentication protocol unknown. EAP protocol not accepted.
Firewall Action
eap_authentication_will_fail
Recommended Action
None
Revision
1

2.36.75. unknown_eap_status (ID: 01800604)

Default Severity
ERROR
Log Message
Failed to add EAP-SIM as eap protocol
Explanation
Failed to add EAP-SIM as accepted eap protocol.
Firewall Action
None
Recommended Action
None
Revision
1

2.36.76. eap_but_not_passthrough (ID: 01800605)

Default Severity
INFORMATIONAL
Log Message
Radius and EAP enabled, but PASS THROUGH is not set as authentication method
Explanation
Radius and EAP enabled, but PASS THROUGH is not set as authentication method.
Firewall Action
None
Recommended Action
None
Revision
1

2.36.77. eap_not_supported (ID: 01800606)

Default Severity
ERROR
Log Message
No support for EAP/RADIUS: no EAP protocols can be enabled
Explanation
CORE sw does not support EAP/RADIUS. I.e EAP protocols can be enabled.
Firewall Action
eap_authentication_will_fail
Recommended Action
None
Revision
1

2.36.78. can_not_add_eap_auth_type (ID: 01800607)

Default Severity
INFORMATIONAL
Log Message
Can't add EAP authentication: insufficient information
Explanation
Can't add EAP authentication: insufficient information.
Firewall Action
continue_with_next_eap_userauth_rule
Recommended Action
None
Revision
1

2.36.79. eap_disabled (ID: 01800608)

Default Severity
NOTICE
Log Message
EAP is not set as authentication method
Explanation
EAP is not set as authentication method for phase 1.
Firewall Action
None
Recommended Action
None
Revision
1

2.36.80. no_eap_identity (ID: 01800609)

Default Severity
ERROR
Log Message
Failed to get EAP identity for tunnel <tunnelname>
Explanation
Failed to get EAP identity.
Firewall Action
eap_authentication_will_fail
Recommended Action
None
Revision
1
Parameters
tunnelname

2.36.81. eap_disabled (ID: 01800610)

Default Severity
ERROR
Log Message
No EAP secret for tunnel <tunnelname>
Explanation
No stored eap secret for tunnel.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
tunnelname

2.36.82. no_eapstate (ID: 01800611)

Default Severity
ERROR
Log Message
Eapstate/Phase1 not available
Explanation
No Eapstate/Phase1 to get eap identity from.
Firewall Action
None
Recommended Action
None
Revision
1

2.36.83. IDi_used_as_eap_id (ID: 01800612)

Default Severity
INFORMATIONAL
Log Message
IKEv2 IDi will be used as EAP identity
Explanation
IKEv2 IDi will be used as EAP identity.
Firewall Action
None
Recommended Action
None
Revision
1

2.36.84. no_eap_identity (ID: 01800613)

Default Severity
ERROR
Log Message
No EAP identity established
Explanation
No EAP identity established.
Firewall Action
eap_authentication_will_fail
Recommended Action
None
Revision
1

2.36.85. no_userauth_specified_for_xauth (ID: 01800614)

Default Severity
ERROR
Log Message
No XAuth userauth rule found for eap authentication with remote ike peer: <srcif> <remote_peer>
Explanation
No user authentication rule avaliable for xauth authentication.
Firewall Action
xauth_protocols_disabled
Recommended Action
Reconfigure_tunnel.
Revision
1
Parameters
remote_peer
srcif

2.36.86. attach_of_eap_radius_server_failed (ID: 01800630)

Default Severity
INFORMATIONAL
Log Message
Failed to attach up EAP RADIUS server. Internal error code: <error>
Explanation
Failed to attach EAP RADIUS server.
Firewall Action
radius_server_not_attached
Recommended Action
None
Revision
1
Parameters
error

2.36.87. no_eap_identity_or_radius_username (ID: 01800631)

Default Severity
ERROR
Log Message
We did not get any EAP identity/ RADIUS username
Explanation
We did not get any EAP identity/ RADIUS username.
Firewall Action
continue_radius_message
Recommended Action
None
Revision
1

2.36.88. radius_timeout (ID: 01800633)

Default Severity
ERROR
Log Message
Timeout/internal error received from RADIUS server
Explanation
Timeout/internal error received from RADIUS server.
Firewall Action
radius_communication_disabled
Recommended Action
None
Revision
1

2.36.89. radius_reject (ID: 01800634)

Default Severity
ERROR
Log Message
Radius Access Reject received from RADIUS server
Explanation
Radius Access Reject received from RADIUS server.
Firewall Action
radius_communication_disabled
Recommended Action
None
Revision
1

2.36.90. radius_access_accept (ID: 01800635)

Default Severity
INFORMATIONAL
Log Message
Radius Access Accept received from RADIUS server
Explanation
Radius Access Accept received from RADIUS server.
Firewall Action
None
Recommended Action
None
Revision
1

2.36.91. outofmem_forward_eap_packet (ID: 01800636)

Default Severity
ERROR
Log Message
Cannot create EAP packet to be sent to client
Explanation
Out of memory. Cannot create EAP packet to be sent to client.
Firewall Action
eap_packet_dropped
Recommended Action
None
Revision
1

2.36.92. eap_packet_discarded (ID: 01800637)

Default Severity
ERROR
Log Message
Inavlid EAP packet detected
Explanation
Length less than 4 indicates that the EAP packet was invalid.
Firewall Action
eap_packet_discarded
Recommended Action
None
Revision
1

2.36.93. outofmem_forward_eap_packet (ID: 01800638)

Default Severity
ERROR
Log Message
Dropping EAP packet from RADIUS server due to internal error
Explanation
Dropping EAP packet from RADIUS server due to internal error Radius_GetEAPRequest returns inconsistent values: requested length=[length], actual length=[actuallen].
Firewall Action
eap_packet_dropped
Recommended Action
None
Revision
1
Parameters
length
actuallen

2.36.94. outofmem_forward_eap_packet (ID: 01800639)

Default Severity
ERROR
Log Message
Out of memory. Unable to create RADIUS request
Explanation
Out of memory. Unable to create RADIUS request.
Firewall Action
eap_packet_dropped
Recommended Action
None
Revision
1

2.36.95. failed_to_send_eap_id_response_to_radius (ID: 01800640)

Default Severity
ERROR
Log Message
Failed to send the EAP identity response to the RADIUS server
Explanation
Failed to send the EAP identity response to the RADIUS server.
Firewall Action
eap_packet_dropped
Recommended Action
None
Revision
1

2.36.96. no_imsi (ID: 01800641)

Default Severity
WARNING
Log Message
User IMSI could not be extracted
Explanation
No IMSI could be extracted from the user identity (IDi) or fetched from the RADIUS server.
Firewall Action
disallowed_login
Recommended Action
None
Revision
1

2.36.97. maximum_allowed_tunnels_limit_reached (ID: 01800900)

Default Severity
WARNING
Log Message
Negotiation aborted due to license restrictions. Reached maximum of <allowed_tunnels> active IPsec tunnels
Explanation
More tunnels and/or unique peers than the license allow are trying to establish.
Firewall Action
negotiation_aborted
Recommended Action
None
Revision
2
Parameters
allowed_tunnels

2.36.98. ipsec_sa_destroy_peer_imsi (ID: 01800902)

Default Severity
INFORMATIONAL
Log Message
IPsec SA destroyed: peer <peer> | IMSI <imsi>
Explanation
Inform about destroyed child SA remote peer and IMSI.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
peer
imsi

2.36.99. ipsec_sa_peer_imsi (ID: 01800903)

Default Severity
INFORMATIONAL
Log Message
Child SA established with peer <peer> using IMSI <imsi>
Explanation
Inform about remote peer and IMSI used to establish the child SA.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
imsi
peer

2.36.100. ike_sa_rekeyed (ID: 01800905)

Default Severity
INFORMATIONAL
Log Message
IKE SA rekeyed, Local IKE peer: <local_ip>:<local_port> <local_id>, Remote IKE peer: <remote_iface>:<remote_ip>:<remote_port> <remote_id>.
Explanation
An IKE SA rekeyed successfully.
Firewall Action
None
Recommended Action
None
Revision
3
Parameters
ipsec_if
local_ip
local_port
remote_iface
remote_ip
remote_port
local_id
remote_id
local_ike_spi
remote_ike_spi
initiator
algorithms
lifetime
local_behind_nat
remote_behind_nat

2.36.101. ike_sa_deleted (ID: 01800906)

Default Severity
INFORMATIONAL
Log Message
IKE SA deleted, Local IKE peer: <local_ip>:<local_port> <local_id>, Remote IKE peer: <remote_iface>:<remote_ip>:<remote_port> <remote_id>.
Explanation
An IKE SA was deleted.
Firewall Action
None
Recommended Action
None
Revision
3
Parameters
ipsec_if
local_ip
local_port
remote_iface
remote_ip
remote_port
local_id
remote_id
local_ike_spi
remote_ike_spi
peer_dead

2.36.102. ipsec_sa_created (ID: 01800907)

Default Severity
INFORMATIONAL
Log Message
IPsec SA created, Source IP: <local_ip>, Destination IP: <remote_ip>, Inbound SPI: <esp_spi_in> Outbound: <esp_spi_out>.
Explanation
An IPsec SA was successfully created.
Firewall Action
None
Recommended Action
None
Revision
3
Parameters
ipsec_if
local_ip
remote_ip
cfgmode_ip
esp_spi_in
esp_spi_out
ike_spi_i
ike_spi_r
esp_cipher
esp_cipher_keysize
esp_mac
esp_mac_keysize
life_seconds
life_kilobytes
dh_group
dh_bits
local_ts
remote_ts
imsi

2.36.103. ipsec_sa_rekeyed (ID: 01800908)

Default Severity
INFORMATIONAL
Log Message
IPsec SA rekeyed, Source IP: <local_ip>, Destination IP: <remote_ip>, Inbound SPI: <esp_spi_in>, Outbound SPI: <esp_spi_out>).
Explanation
An IPsec SA rekeyed successfully.
Firewall Action
None
Recommended Action
None
Revision
3
Parameters
ipsec_if
local_ip
remote_ip
cfgmode_ip
esp_spi_in
esp_spi_out
old_spi
ike_spi_i
ike_spi_r
esp_cipher
esp_cipher_keysize
esp_mac
esp_mac_keysize
life_seconds
life_kilobytes
initiator
dh_group
dh_bits
local_ts
remote_ts
imsi

2.36.104. ipsec_sa_deleted (ID: 01800909)

Default Severity
INFORMATIONAL
Log Message
IPsec SA deleted, Inbound SPI: <esp_spi_in>, Outbound SPI: <esp_spi_out>).
Explanation
An IPsec SA was deleted.
Firewall Action
None
Recommended Action
None
Revision
2
Parameters
ipsec_if
esp_spi_in
esp_spi_out

2.36.105. ipsec_sa_keys (ID: 01800910)

Default Severity
INFORMATIONAL
Log Message
IPsec SA keys, Inbound SPI: <esp_spi_in>, Outbound SPI: <esp_spi_out>.
Explanation
Encryption and authentication keys for an IPsec SA.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
ipsec_if
esp_spi_in
cipher_key_in
mac_key_in
esp_spi_out
cipher_key_out
mac_key_out

2.36.106. out_of_memory (ID: 01801100)

Default Severity
ALERT
Log Message
Out of memory while trying to report a connection to the UNC.
Explanation
System ran out of memory while allocating packet data.
Firewall Action
scip_connection_report_not_sent
Recommended Action
None
Revision
1

2.36.107. out_of_memory (ID: 01801101)

Default Severity
ALERT
Log Message
Out of memory while trying to report load to the UNC.
Explanation
System ran out of memory while allocating packet data.
Firewall Action
scip_load_report_not_sent
Recommended Action
None
Revision
1

2.36.108. out_of_memory (ID: 01801102)

Default Severity
ALERT
Log Message
Out of memory while allocating client context.
Explanation
System ran out of memory while allocating client context.
Firewall Action
scip_disabled_for_client
Recommended Action
None
Revision
1

2.36.109. connected (ID: 01801104)

Default Severity
NOTICE
Log Message
SCIP connection established with <scip_server> on port <server_port>.
Explanation
A SCIP connection was established.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
scip_server
server_port

2.36.110. disconnected (ID: 01801105)

Default Severity
NOTICE
Log Message
SCIP connection with <scip_server> on port <scip_port> closed.
Explanation
A SCIP connection was closed.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
scip_server
scip_port

2.36.111. send_to_closed_scip_connection (ID: 01801106)

Default Severity
NOTICE
Log Message
SCIP-packet dropped while trying to sen to a closed SCIP connection.
Explanation
SCIP-packet dropped while trying to sen to a closed SCIP connection.
Firewall Action
drop
Recommended Action
None
Revision
2

2.36.112. send_failed_no_free_socket (ID: 01801107)

Default Severity
WARNING
Log Message
No more SCIP sockets available. Could not connect to address <ipaddress>:<port>.
Explanation
SCIP-packet dropped. Out of sockets. No new connection could be set up.
Firewall Action
drop
Recommended Action
None
Revision
1
Parameters
ipaddress
port

2.36.113. trigger_non_ip_packet (ID: 01802001)

Default Severity
WARNING
Log Message
Trigger for non-IP packet of protocol <proto>. Dropping request for policy
Explanation
Trigger for non IP packet, dropping request.
Firewall Action
dropping_request
Recommended Action
None
Revision
1
Parameters
proto

2.36.114. rule_not_active (ID: 01802002)

Default Severity
WARNING
Log Message
The rule is not in the active configuration. Dropping request for policy
Explanation
The rule is not in the active configuration, dropping request.
Firewall Action
dropping_request
Recommended Action
None
Revision
1

2.36.115. malformed_packet (ID: 01802003)

Default Severity
WARNING
Log Message
Malformed packet for trigger.Dropping request for policy
Explanation
Malformed packet for trigger, dropping request.
Firewall Action
dropping_request
Recommended Action
None
Revision
1

2.36.116. max_ipsec_sa_negotiations_reached (ID: 01802004)

Default Severity
WARNING
Log Message
The maximum number of active Quick-Mode negotiations reached. Rekey not done.
Explanation
Maximum number of active Quick-Mode negotiations reached.
Firewall Action
rekey_not_done
Recommended Action
None
Revision
1

2.36.117. run_out_of_ike_sa (ID: 01802010)

Default Severity
WARNING
Log Message
Running out of IKE SAs (<num_p1_negs_active> concurrent IKE negotiations). Dropped new IKE SA request from <ikestr>
Explanation
Running out of IKE SAs dropping new IKE SA request.
Firewall Action
drop_new_ike_sa_request
Recommended Action
None
Revision
1
Parameters
num_p1_negs_active
ikestr

2.36.118. PSK_length_invalid (ID: 01802012)

Default Severity
INFORMATIONAL
Log Message
Remote identity specifies PSK that is not usable for selected IKE SA MAC algorithm (xcbcmac-aes)
Explanation
PSK key length invalid for xcbcmac-aes (restriced to 16 chars).
Firewall Action
authentication_failed
Recommended Action
Reconfigure_VPN.
Revision
1
Parameters
maxtunnels

2.36.119. ike_sa_rekey_failed (ID: 01802020)

Default Severity
WARNING
Log Message
Rekey of IKE sa failed: <statusmsg> (<status>), Local IKE peer: <local_peer>, Remote IKE peer: <remote_peer>, Initiator SPI: <spi_i>, Responder SPI: <spi_r>.
Explanation
Rekey of IKE SA failed.
Firewall Action
no_new_ike_sa
Recommended Action
None
Revision
3
Parameters
statusmsg
status
local_peer
remote_peer
spi_i
spi_r
old_spi_i
old_spi_r
initiator

2.36.120. ike_sa_statistics (ID: 01802021)

Default Severity
INFORMATIONAL
Log Message
IKE SA negotiations: <done> done, <success> successful, <failed> failed
Explanation
Ike SA statistics.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
done
success
failed

2.36.121. ike_sa_failed (ID: 01802022)

Default Severity
WARNING
Log Message
IKE SA negotiation failed: <statusmsg> <reason>, Local IKE peer: <local_peer>, Remote IKE peer: <remote_peer>, Initiator SPI: <spi_i>, Responder SPI: <spi_r>.
Explanation
Negotiation of IKE SA failed.
Firewall Action
no_ike_sa
Recommended Action
None
Revision
6
Parameters
statusmsg
reason
local_peer
remote_peer
spi_i
spi_r
initiator
ipsec_if

2.36.122. ike_sa_statistics (ID: 01802023)

Default Severity
INFORMATIONAL
Log Message
IKE SA negotiations: <done> done, <success> successful, <failed> failed
Explanation
Ike SA statistics.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
done
success
failed

2.36.123. ipsec_sa_failed (ID: 01802049)

Default Severity
INFORMATIONAL
Log Message
IPsec SA negotiation failed: <statusmsg> <reason> Local IKE peer: <local_peer> Remote IKE peer: <remote_peer> Initiator SPI: <ike_spi_i> Responder SPI: <ike_spi_r>.
Explanation
IPsec SA negotiation failed.
Firewall Action
ipsec_sa_disabled
Recommended Action
None
Revision
2
Parameters
statusmsg
reason
local_peer
remote_peer
ike_spi_i
ike_spi_r

2.36.124. nat_mapping_changed_ike (ID: 01802050)

Default Severity
INFORMATIONAL
Log Message
NAT mapping changed, Local endpoint: <local_endpoint>, Remote endpoint: <remote_endpoint>, Initiator SPI: <ike_spi_i>, Responder SPI: <ike_spi_r>, IP address: <ip_addr> New port: <port>.
Explanation
NAT mappings changed for an IKE SA.
Firewall Action
updating_ike_sa
Recommended Action
None
Revision
2
Parameters
local_endpoint
remote_endpoint
ike_spi_i
ike_spi_r
ip_addr
port

2.36.125. nat_mapping_change_not_allowed (ID: 01802051)

Default Severity
INFORMATIONAL
Log Message
NAT mapping change not allowed, Local endpoint: <local_endpoint>, Remote endpoint: <remote_endpoint>, Initiator SPI: <ike_spi_i>, Responder SPI: <ike_spi_r>, New IP address: <ip_addr> New port: <port>.
Explanation
NAT mappings changed for an IKE SA.
Firewall Action
drop
Recommended Action
None
Revision
2
Parameters
local_endpoint
remote_endpoint
ike_spi_i
ike_spi_r
ip_addr
port

2.36.126. ipsec_sa_negotiation_aborted (ID: 01802060)

Default Severity
ERROR
Log Message
IPsec SA Negotiation aborted: AH can not be initiated with NAT-T
Explanation
Negotiation aborted since AH can not be initiated with NAT-T.
Firewall Action
ipsec_sa_negotiation_aborted
Recommended Action
None
Revision
1

2.36.127. could_not_narrow_traffic_selectors (ID: 01802061)

Default Severity
ERROR
Log Message
Could not narrow traffic selectors SA from policy rule
Explanation
Failed to narrow configured traffic selectors.
Firewall Action
ipsec_sa_negotiation_aborted
Recommended Action
Reconfigure_VPN.
Revision
1

2.36.128. failed_to_narrow_traffic_selectors (ID: 01802062)

Default Severity
ERROR
Log Message
Failed to narrow traffic selectors SA remote access clients
Explanation
Failed to narrow traffic selector for config mode client.
Firewall Action
ipsec_sa_negotiation_aborted
Recommended Action
None
Revision
2

2.36.129. malformed_remote_id_configured (ID: 01802070)

Default Severity
ERROR
Log Message
Malformed Remote IKE identity <remoteid> configured for tunnel
Explanation
Malformed remote identity for PSK specified in configuration.
Firewall Action
VPN_tunnel_invalid
Recommended Action
Reconfigure_remote_id.
Revision
1
Parameters
remoteid

2.36.130. malformed_psk_configured (ID: 01802071)

Default Severity
ERROR
Log Message
Malformed IKE secret (PSK) configured for tunnel
Explanation
Malformed IKE secret specified in configuration.
Firewall Action
VPN_tunnel_invalid
Recommended Action
Reconfigure_PSK.
Revision
1

2.36.131. nat_mapping_changed_ipsec (ID: 01802080)

Default Severity
INFORMATIONAL
Log Message
NAT mapping changed, Local endpoint: <local_endpoint>, Remote endpoint: <remote_endpoint>, New port: <port>, SPI: <esp_spi_in>.
Explanation
NAT mappings changed for an IPsec SA.
Firewall Action
updating_ipsec_sa
Recommended Action
None
Revision
1
Parameters
local_endpoint
remote_endpoint
port
esp_spi_in

2.36.132. no_authentication_method_specified (ID: 01802100)

Default Severity
ERROR
Log Message
Neither pre-shared keys nor CA certificates nor EAP are specified for a tunnel
Explanation
No authentication method is specified for the tunnel.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_IPsec.
Revision
1

2.36.133. invalid_authentication_algorithm_configured (ID: 01802101)

Default Severity
ERROR
Log Message
AES counter mode cannot be used without an authentication algorithm
Explanation
AES counter mode specified but no authentication algoritm specified for tunnel.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_IPsec.
Revision
1

2.36.134. no_key_method_configured_for tunnel (ID: 01802102)

Default Severity
ERROR
Log Message
Tunnel does not specify any keying method (IKE or manual)
Explanation
No keying method (IKE/manual) is configured for tunnel.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_IPsec.
Revision
1

2.36.135. invalid_configuration_of_force_open (ID: 01802103)

Default Severity
ERROR
Log Message
Auto-start rule specifies more than one traffic selector item and no IKE peer is specified
Explanation
Can not use Auto-start rule (force open) for roaming tunnels.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_IPsec.
Revision
1

2.36.136. invalid_configuration_of_force_open (ID: 01802104)

Default Severity
ERROR
Log Message
Auto-start rule does not specify single IP address or domain name for its remote peer
Explanation
Can not use Auto-start rule (force open) for roaming tunnels.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_IPsec.
Revision
1

2.36.137. invalid_rule_setting (ID: 01802105)

Default Severity
ERROR
Log Message
Both REJECT and PASS defined for a rule
Explanation
Can not specify both pass and reject for a rule.
Firewall Action
None
Recommended Action
None
Revision
1

2.36.138. invalid_rule_setting (ID: 01802107)

Default Severity
ERROR
Log Message
To-tunnel specified for a REJECT rule
Explanation
To-tunnel can not be specified for REJECT rule.
Firewall Action
None
Recommended Action
None
Revision
1

2.36.139. max_number_of_policy_rules_reached (ID: 01802110)

Default Severity
CRITICAL
Log Message
The maximum number of policy rules reached
Explanation
The maximum number of policy rules reached.
Firewall Action
VPN_configuration_disabled
Recommended Action
Review the advanced setting IPsecMaxRules.
Revision
2

2.36.140. input_traffic_selector_corrupt (ID: 01802111)

Default Severity
ERROR
Log Message
Input traffic selector is corrupt. Cannot parse input traffic selector
Explanation
No authentication method is specified for the tunnel.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_IPsec.
Revision
1

2.36.141. input_traffic_selector_corrupt (ID: 01802112)

Default Severity
ERROR
Log Message
Input traffic selector contains more than the built in maximum number of items
Explanation
Input traffic selector contains more than the built in maximum number of items: IPSEC_MAX_RULE_TRAFFIC_SELECTORS_ITEMS.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_IPsec.
Revision
1

2.36.142. invalid_traffic_selectors (ID: 01802113)

Default Severity
ERROR
Log Message
Specified traffic selectors for the rule's are invalid
Explanation
Invalid traffic selectors are configured for tunnel.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_IPsec.
Revision
1

2.36.143. suspicious_outbound_rule (ID: 01802114)

Default Severity
ERROR
Log Message
Detected suspicious outbound IPsec rule without any selectors
Explanation
Detected suspicious outbound IPsec rule without any selectors specified.
Firewall Action
the_rule_might_not_work
Recommended Action
Reconfigure_IPsec.
Revision
2

2.36.144. failed_to_add_rule_to_engine (ID: 01802115)

Default Severity
ERROR
Log Message
Failed to add rule to engine database
Explanation
Failed to add rule to engine database.
Firewall Action
tunnel_will_not_work_as_expected
Recommended Action
None
Revision
1

2.36.145. no_algorithms_configured_for_tunnel (ID: 01802200)

Default Severity
ERROR
Log Message
ESP tunnel is missing encryption and authentication algorithms
Explanation
ESP tunnel [tunnel] not configured with encryption and authentication algorithms.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_tunnel.
Revision
1
Parameters
tunnel

2.36.146. no_encryption_algorithm_configured_for_tunnel (ID: 01802201)

Default Severity
ERROR
Log Message
ESP tunnel <tunnel> is missing encryption algorithm. Null encryption algorithm must be specified if no encryption is required
Explanation
ESP tunnel not configured with any encryption algorithm, not even Null.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_tunnel.
Revision
1
Parameters
tunnel

2.36.147. esp_null-null_configuration (ID: 01802202)

Default Severity
ERROR
Log Message
ESP NULL-NULL is proposed for this tunnel <tunnel>. This is forbidden by RFC 2406.
Explanation
Tunnel is configured with invalid algorithm: ESP NULL-NULL.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_tunnel.
Revision
1
Parameters
tunnel

2.36.148. no_authentication_algorithm_specified (ID: 01802203)

Default Severity
ERROR
Log Message
No authentication algorithm configured for AH tunnel <tunnel>
Explanation
AH tunnel is configured without spetication algorithm.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_tunnel.
Revision
1
Parameters
tunnel

2.36.149. AH_not_supported (ID: 01802204)

Default Severity
ERROR
Log Message
AH configured but not supported
Explanation
Tunnel [tunnel] configured for AH, but AH is not supported.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_tunnel.
Revision
1
Parameters
tunnel

2.36.150. invalid_cipher_keysize (ID: 01802205)

Default Severity
ERROR
Log Message
Configured max cipher key size <keysize> for tunnel <tunnel> is bigger than the built-in maximum <max>
Explanation
Tunnel configured invalid key size for cipher.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_tunnel.
Revision
1
Parameters
keysize
tunnel
max

2.36.151. invalid_mac_keysize (ID: 01802206)

Default Severity
ERROR
Log Message
Configured max MAC key size <keysize> is bigger for tunnel <tunnel> than the built-in maximum <max>
Explanation
Tunnel configured with invalid key size for cipher.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_tunnel.
Revision
1
Parameters
keysize
tunnel
max

2.36.152. invalid_tunnel_configuration (ID: 01802207)

Default Severity
ERROR
Log Message
Misconfiguration for tunnel <tunnel> Anti-replay detection must be enabled when using 64 bit sequence numbers
Explanation
Anti-replay detection must be enabled when using 64 bit sequence numbers.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_tunnel.
Revision
1
Parameters
tunnel

2.36.153. invalid_tunnel_configuration (ID: 01802208)

Default Severity
ERROR
Log Message
No IPsec transform (AH or ESP) specified for tunnel <tunnel>
Explanation
IPsec transform type must be specified for tunnel.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_tunnel.
Revision
2
Parameters
tunnel

2.36.154. invalid_tunnel_configuration (ID: 01802209)

Default Severity
ERROR
Log Message
Auto-start tunnel <tunnel> configured for `per-port' or `per-host' SA.
Explanation
`per-port' or `per-host' SA can not be specified for auto-start tunnels [tunnel].
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_tunnel.
Revision
1
Parameters
tunnel

2.36.155. invalid_tunnel_configuration (ID: 01802210)

Default Severity
ERROR
Log Message
Both `auto-start' and `dont-initiate' specified for tunnel <tunnel>
Explanation
Both `auto-start' and `dont-initiate' can not be specified for a tunnel.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_tunnel.
Revision
1
Parameters
tunnel

2.36.156. out_of_memory_for_tunnel (ID: 01802211)

Default Severity
ERROR
Log Message
Out of memory. Could not allocate memory for tunnel name! <tunnel>
Explanation
Out of memory. Could not allocate memory for tunnel name!.
Firewall Action
VPN_tunnel_disabled
Recommended Action
None
Revision
1
Parameters
tunnel

2.36.157. out_of_memory_for_tunnel (ID: 01802212)

Default Severity
ERROR
Log Message
Out of memory. Could not allocate memory tunnel <tunnel> endpoints
Explanation
Out of memory. Could not allocate memory for tunnel endpoints!.
Firewall Action
VPN_tunnel_disabled
Recommended Action
None
Revision
1
Parameters
tunnel

2.36.158. invalid_length_of_PSK_when_used_with_AES-XCBC_MAC (ID: 01802213)

Default Severity
ERROR
Log Message
Invalid length of local secret for tunnel when configured to use AES-XCBC Mac algorithm
Explanation
Local secret must be 16 octets long to be usable for AES-XCBC Mac algorithm.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_tunnel.
Revision
2

2.36.159. invalid_key_size (ID: 01802214)

Default Severity
ERROR
Log Message
Invalid key sizes specified for algorithms
Explanation
Invalid key sizes specified for algorithms.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_tunnel.
Revision
2

2.36.160. invalid_key_size (ID: 01802215)

Default Severity
ERROR
Log Message
Algorithm key sizes specified for unknown algorithm
Explanation
Algorithm key sizes specified for unknown algorithm.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_tunnel.
Revision
2

2.36.161. invalid_key_size (ID: 01802216)

Default Severity
ERROR
Log Message
Algorithm key sizes specified for unknown algorithm
Explanation
Algorithm key sizes specified for unknown algorithm.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_tunnel.
Revision
2

2.36.162. invalid_key_size (ID: 01802217)

Default Severity
ERROR
Log Message
Specified key size limits for cipher <alg> with fixed key size
Explanation
Configuration specifies key size limits for cipher with fixed key size.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_tunnel.
Revision
2
Parameters
alg

2.36.163. invalid_cipher_keysize (ID: 01802218)

Default Severity
ERROR
Log Message
Configured max cipher key size <keysize> is bigger than the built-in maximum <max>
Explanation
Tunnel configured invalid key size for cipher.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_tunnel.
Revision
1
Parameters
keysize
max

2.36.164. invalid_key_size (ID: 01802219)

Default Severity
ERROR
Log Message
Tunnel specified key size limits for mac <alg> with fixed key size
Explanation
Configuration specifies key size limits for cipher with fixed key size.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_tunnel.
Revision
1
Parameters
alg

2.36.165. invalid_cipher_keysize (ID: 01802220)

Default Severity
ERROR
Log Message
Configured max MAC key size <keysize> is bigger than the built-in maximum <max>
Explanation
Tunnel configured invalid key size for MAC.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_tunnel.
Revision
1
Parameters
keysize
max

2.36.166. no_matching_tunnel_found (ID: 01802221)

Default Severity
ERROR
Log Message
No tunnel found matching the local address <localaddr> , remote address <remoteaddr> and source interface <srcif>
Explanation
No tunnel found matching the local address and remote address.
Firewall Action
packet_will_be_discarded
Recommended Action
None
Revision
1
Parameters
localaddr
remoteaddr
srcif

2.36.167. no_tunnel_id_specified (ID: 01802222)

Default Severity
ERROR
Log Message
No tunnel identity specified for tunnel
Explanation
No tunnel identity specified in configuration.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_VPN.
Revision
1

2.36.168. several_local_id_specified_for_tunnel (ID: 01802223)

Default Severity
ERROR
Log Message
More than one local id specified for tunnel
Explanation
Cannot add more than one local identity to a tunnel.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_VPN.
Revision
1

2.36.169. several_local_id_specified_for_tunnel (ID: 01802224)

Default Severity
ERROR
Log Message
More than one remote id specified for tunnel
Explanation
Cannot add more than one remote identity to a tunnel.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_VPN.
Revision
1

2.36.170. malformed_tunnel_id_configured (ID: 01802225)

Default Severity
ERROR
Log Message
Malformed identity <id> configured for tunnel
Explanation
Malformed identity specified in configuration.
Firewall Action
VPN_tunnel_invalid
Recommended Action
Reconfigure_remote_id.
Revision
1
Parameters
id

2.36.171. several_secrets_specified_for_tunnel (ID: 01802226)

Default Severity
ERROR
Log Message
More than one secret specified for tunnel
Explanation
Cannot add more configure more than one secret for a tunnel.
Firewall Action
VPN_tunnel_disabled
Recommended Action
Reconfigure_VPN.
Revision
1

2.36.172. malformed_psk_configured (ID: 01802228)

Default Severity
ERROR
Log Message
Malformed IKE secret (PSK) configured for tunnel
Explanation
Malformed IKE secret specified in configuration.
Firewall Action
VPN_tunnel_invalid
Recommended Action
Reconfigure_PSK.
Revision
1

2.36.173. max_ike_sa_reached (ID: 01802400)

Default Severity
WARNING
Log Message
The maximum number of active IKE SAs reached
Explanation
Maximum number of active IKE SAs reached.
Firewall Action
negotiation_aborted
Recommended Action
Review your configuration or upgrade license.
Revision
3

2.36.174. max_ike_rekeys_reached (ID: 01802401)

Default Severity
NOTICE
Log Message
The maximum number of active IKE rekeys reached
Explanation
Maximum number of active IKE rekeys reached.
Firewall Action
rekey_aborted
Recommended Action
None
Revision
1

2.36.175. max_phase1_sa_reached (ID: 01802402)

Default Severity
NOTICE
Log Message
The maximum number of active Phase-1 negotiations reached
Explanation
Maximum number of active Phase-1 negotiations reached.
Firewall Action
negotiation_aborted
Recommended Action
None
Revision
1

2.36.176. max_active_quickmode_negotiation_reached (ID: 01802403)

Default Severity
NOTICE
Log Message
The maximum number of active Quick-Mode negotiations reached
Explanation
Maximum number of active Quick-Mode negotiations reached.
Firewall Action
quick-mode_not_done
Recommended Action
None
Revision
1

2.36.177. warning_level_active_ipsec_sas_reached (ID: 01802404)

Default Severity
WARNING
Log Message
The number of active IPsec SA:s reached 90%
Explanation
The number of active IPsec SA:s reached 90%.
Firewall Action
ipsec_sa_created
Recommended Action
None
Revision
1

2.36.178. warning_level_ike_sa_reached (ID: 01802405)

Default Severity
WARNING
Log Message
The number of active IKE SAs reached 90% of the maximum allowed
Explanation
The number of active IKE SAs reached 90% of the maximum allowed.
Firewall Action
negotiation_done
Recommended Action
None
Revision
1

2.36.179. max_ipsec_sa_reached (ID: 01802406)

Default Severity
WARNING
Log Message
The maximum number of active IPsec SAs reached
Explanation
Maximum number of active IPsec SAs reached.
Firewall Action
negotiation_aborted
Recommended Action
Review your configuration or upgrade license.
Revision
1

2.36.180. invalid_format_syslog_audit (ID: 01802500)

Default Severity
NOTICE
Log Message
Cannot use binary formatting for syslog auditing.
Explanation
Cannot use binary formatting for syslog auditing.
Firewall Action
None
Recommended Action
None
Revision
1

2.36.181. cannot_create_audit_file_context (ID: 01802501)

Default Severity
NOTICE
Log Message
Cannot create audit file context. Filename for audit: <filename>
Explanation
Cannot create audit file context.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
filename

2.36.182. could_not_decode_certificate (ID: 01802600)

Default Severity
WARNING
Log Message
Could not decode Certificate to pem format. The certificate may be corrupted or it was given in unrecognized format.
Explanation
Could_not_decode_certificate.
Firewall Action
certificate_invalid
Recommended Action
None
Revision
1

2.36.183. could_not_convert_certificate (ID: 01802601)

Default Severity
WARNING
Log Message
Could not convert CMi certificate to X.509 certificate
Explanation
Could not convert CMi certificate to X.509 certificate.
Firewall Action
certificate_invalid
Recommended Action
None
Revision
1

2.36.184. could_not_get_subject_nam_from_ca_cert (ID: 01802602)

Default Severity
WARNING
Log Message
Could not get subject name from a CA certificate. This certificate is not usable as an IPsec authenticator and is not inserted into loal list of trusted CAs
Explanation
Could not get subject name from a CA certificate.
Firewall Action
certificate_not_trusted
Recommended Action
None
Revision
1

2.36.185. could_not_set_cert_to_non_CRL_issuer (ID: 01802603)

Default Severity
WARNING
Log Message
Could not set CA certificate to non-CRL issuer. This may cause authentication errors if valid CRLs are not available
Explanation
Could not set CA certificate to non-CRL issuer.
Firewall Action
certificate_not_usable_if_no_valid_CRLs
Recommended Action
None
Revision
1

2.36.186. could_not_force_cert_to_be_trusted (ID: 01802604)

Default Severity
WARNING
Log Message
Could not force CA certificate as a point of trust
Explanation
Could not force CA certificate as a point of trust.
Firewall Action
certificate_disabled
Recommended Action
None
Revision
1

2.36.187. could_not_trusted_set_for_cert (ID: 01802605)

Default Severity
WARNING
Log Message
Could not set the trusted set for a CA certificate
Explanation
Could not set the trusted set for a CA certificate.
Firewall Action
certificate_disabled
Recommended Action
None
Revision
1

2.36.188. could_not_insert_cert_to_db (ID: 01802606)

Default Severity
ERROR
Log Message
Can not insert CA certificate into local database
Explanation
Can not insert CA certificate into local database.
Firewall Action
certificate_disabled
Recommended Action
None
Revision
1

2.36.189. could_not_decode_certificate (ID: 01802607)

Default Severity
WARNING
Log Message
Could not decode Certificate to pem format. The certificate may be corrupted or it was given in unrecognized format.
Explanation
Could_not_decode_certificate.
Firewall Action
certificate_invalid
Recommended Action
None
Revision
1

2.36.190. could_not_lock_certificate (ID: 01802608)

Default Severity
WARNING
Log Message
Could not lock certificate in cache
Explanation
Could not lock certificate in cache.
Firewall Action
certificate_invalid
Recommended Action
None
Revision
1

2.36.191. could_not_insert_cert_to_db (ID: 01802609)

Default Severity
ERROR
Log Message
Could not insert certificate into local database
Explanation
Could not insert certificate into local database.
Firewall Action
certificate_disabled
Recommended Action
None
Revision
1

2.36.192. could_not_decode_crl (ID: 01802610)

Default Severity
WARNING
Log Message
Could not decode CRL. The certificate may be corrupted or it was given in unrecognized format. File format may be wrong
Explanation
Could_not_decode_CRL.
Firewall Action
certificate_invalid
Recommended Action
None
Revision
1

2.36.193. http_crl_failed (ID: 01802611)

Default Severity
ERROR
Log Message
Failed to get CRL over HTTP. <reason>
Explanation
CRL couldn't be fetched from the URL specified in the certificate.
Firewall Action
None
Recommended Action
Check your connectivity to the URL or disable CRL lookup on you certificates. Note that disabling the CRL lookup cause the gateway to accept certificates that may have been revoked by the certificate authority.
Revision
1
Parameters
reason
url

2.36.194. Certificate_contains_bad_IP_address (ID: 01802705)

Default Severity
WARNING
Log Message
Certificate contains bad IP address: length=<len>
Explanation
Certificate contains bad IP address.
Firewall Action
try_next_certificate
Recommended Action
None
Revision
1
Parameters
len

2.36.195. dn_name_as_subject_alt_name (ID: 01802706)

Default Severity
WARNING
Log Message
Directory names are not supported as subject alternative names. Skipping DN: <dn_name>
Explanation
Directory specified as subject alternative name.
Firewall Action
skip_dn_name
Recommended Action
None
Revision
1
Parameters
dn_name

2.36.196. could_not_decode_certificate (ID: 01802707)

Default Severity
WARNING
Log Message
Could not decode Certificate to pem format. The certificate may be corrupted or it was given in unrecognized format.
Explanation
Could_not_decode_certificate.
Firewall Action
certificate_invalid
Recommended Action
None
Revision
1

2.36.197. cfgmode_exchange_event (ID: 01802709)

Default Severity
INFORMATIONAL
Log Message
Event occured for config mode <cfgmode> exchange: <msg>. Internal severity level: <int_severity>
Explanation
Config mode exchange event.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
cfgmode
msg
int_severity

2.36.198. remote_access_address (ID: 01802710)

Default Severity
INFORMATIONAL
Log Message
Addresses for remote access attributes: <ipaddr> expires time <time>
Explanation
Addresses for remote access attributes.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
ipaddr
time

2.36.199. remote_access_dns (ID: 01802711)

Default Severity
INFORMATIONAL
Log Message
DNS for remote access attributes: <dns_server>
Explanation
DNS for remote access attributes.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
dns_server

2.36.200. remote_access_wins (ID: 01802712)

Default Severity
INFORMATIONAL
Log Message
WINS for remote access attributes: <win>
Explanation
WINS for remote access attributes.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
win

2.36.201. remote_access_dhcp (ID: 01802713)

Default Severity
INFORMATIONAL
Log Message
DHCP for remote access attributes: <dhcp_s>
Explanation
DHCP remote access attributes.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
dhcp_s

2.36.202. remote_access_subnets (ID: 01802714)

Default Severity
INFORMATIONAL
Log Message
Subnets remote access attributes: <subnets>
Explanation
Subnets remote access attributes.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
subnets

2.36.203. event_on_ike_sa (ID: 01802715)

Default Severity
WARNING
Log Message
Event: <msg> occured for IKE SA: <side>. Internal severity level: <int_severity>
Explanation
Event occured at IKE SA.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
side
msg
int_severity

2.36.204. ipsec_sa_selection_failed (ID: 01802717)

Default Severity
WARNING
Log Message
Selection of IPsec SA failed due to <reason>. Internal severity level: <int_severity>
Explanation
Failed to select a SA.
Firewall Action
no_ipsec_sa_selected
Recommended Action
None
Revision
2
Parameters
reason
int_severity

2.36.205. crl_search_failed (ID: 01802719)

Default Severity
WARNING
Log Message
Certificate manager search failure: <reason>. Internal severity level: <int_severity>
Explanation
Search for a CRL failed. Certificate validation will conintue as CRL checks are not enforced by the current configuration.
Firewall Action
continuing
Recommended Action
None
Revision
1
Parameters
reason
int_severity

2.36.206. outofmem_create_policy_manager (ID: 01802800)

Default Severity
CRITICAL
Log Message
Failed to create Policy Manger
Explanation
Could not allocate memory for policymanager object.
Firewall Action
ipsec_disabled
Recommended Action
None
Revision
1

2.36.207. ek_accelerator_disabled (ID: 01802801)

Default Severity
ERROR
Log Message
Failed to set external key accelerator
Explanation
Invalid type of external key accelerator defined.
Firewall Action
ipsec_disabled
Recommended Action
None
Revision
1

2.36.208. ek_accelerator_disabled (ID: 01802802)

Default Severity
ERROR
Log Message
Failed to set init info to external key accelerator
Explanation
Invalid init info to external key accelerator.
Firewall Action
ipsec_disabled
Recommended Action
None
Revision
1

2.36.209. outofmem_create_engine (ID: 01802901)

Default Severity
CRITICAL
Log Message
Failed to allocate memory for engine object
Explanation
Could not allocate memory for engine object.
Firewall Action
ipsec_disabled
Recommended Action
None
Revision
1

2.36.210. failed_init_fastpath (ID: 01802902)

Default Severity
CRITICAL
Log Message
Failed to initialize fastpath
Explanation
Failed to initialize fastpath.
Firewall Action
ipsec_disabled
Recommended Action
None
Revision
1

2.36.211. init_rulelooklup_failed (ID: 01802903)

Default Severity
CRITICAL
Log Message
Initialization of rule lookup failed
Explanation
Initialization of rule lookup failed.
Firewall Action
ipsec_disabled
Recommended Action
None
Revision
1

2.36.212. init_rule_looklup_failed (ID: 01802904)

Default Severity
CRITICAL
Log Message
Allocating default drop rule failed!
Explanation
Allocating default drop rule failed!.
Firewall Action
ipsec_disabled
Recommended Action
None
Revision
1

2.36.213. init_rule_looklup_failed (ID: 01802905)

Default Severity
CRITICAL
Log Message
allocating default pass rule failed!
Explanation
Allocating default pass rule failed!.
Firewall Action
ipsec_disabled
Recommended Action
None
Revision
1

2.36.214. maximum_nr_of_ipsec_sa_per_ike_sa_reached (ID: 01803000)

Default Severity
ERROR
Log Message
Maximum number (<max_ipsec>) of allowed IPsec SAs per IKE SA reached by peer <peerip>
Explanation
Maximum number of allowed IPsec SA per IKE SA reached by peer.
Firewall Action
Discarding request and sending No Additional SAs response
Recommended Action
Discarding request and sending No Additional SAs response.
Revision
1
Parameters
max_ipsec
peerip

2.36.215. ipsec_sa_per_ike_sa_limit_violated_too_many_times (ID: 01803001)

Default Severity
ERROR
Log Message
Maximum number of IPsec SAs limit has been violated too many times (<limit>)
Explanation
Maximum number of IPsec SAs limit has been violated too many times.
Firewall Action
Discarding request and deleting SA
Recommended Action
Discarding request and deleting SA.
Revision
2
Parameters
limit

2.36.216. certificate_validation_check_failed (ID: 01803100)

Default Severity
WARNING
Log Message
Warning: Host certificate <certname> has expired <not_valid_after>
Explanation
Host certificate has expired.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
certname
not_valid_after

2.36.217. certificate_validation_check_warning (ID: 01803101)

Default Severity
WARNING
Log Message
Warning: Host certificate <certname> expires <not_valid_after>
Explanation
Host certificate expires within two days.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
certname
not_valid_after

2.36.218. audit_event (ID: 01803200)

Default Severity
INFORMATIONAL
Log Message
An audit event occured: <msg>. Internal severity level: <int_severity>
Explanation
An audit event occured in the IPsec stack.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
msg
int_severity

2.36.219. failed_to_link_ike_and_userauth (ID: 01803300)

Default Severity
WARNING
Log Message
Failed to link IKE SA with userauth object. No userauth object were found for peer <peer> with IMSI <imsi>. The imported SA will be destroyed.
Explanation
Failed to link an imported IKE SA with an userauthentication object.
Firewall Action
None
Recommended Action
None
Revision
2
Parameters
peer
imsi

2.36.220. failed_to_find_userauthobject_for_ipsec_sa (ID: 01803302)

Default Severity
NOTICE
Log Message
No userauth object were found for IP <cfgmodeip> on iface <iface>. The IPsec SA will not be imported.
Explanation
Failed to find an userauth object when importing a IPsec SA. The IPsec SA will not be imported.
Firewall Action
None
Recommended Action
None
Revision
2
Parameters
cfgmodeip
iface

2.36.221. modexp_accel_failed (ID: 01803400)

Default Severity
NOTICE
Log Message
Hardware acceleration of modexp calculation failed due to <msg>.
Explanation
The failed calculation will be made in software instead. Hardware acceleration can fail due to valid reasons like a full request queue. A lot of these logs during a short timeframe could indicate issues with hardware acceleration.
Firewall Action
None
Recommended Action
Verify that the firewall is not in a overloaded state. If it's not overloaded and a lot of these logs is generated, contact the support and report this issue.
Revision
2
Parameters
msg

2.36.222. eap_authentication_failed (ID: 01803500)

Default Severity
WARNING
Log Message
EAP Authentication failed (<errorcode>).
Explanation
Client failed EAP authentication.
Firewall Action
ike_negotiation_aborted
Recommended Action
None
Revision
1
Parameters
errorcode

2.36.223. monitored_host_reachable (ID: 01803600)

Default Severity
INFORMATIONAL
Log Message
Monitored host <ip> is reachable over tunnel <tunnel>.
Explanation
Monitored host started to respond on ICMP ping.
Firewall Action
None
Recommended Action
None
Revision
1
Parameters
ip
tunnel

2.36.224. monitored_host_unreachable (ID: 01803601)

Default Severity
WARNING
Log Message
Monitored host <ip> didn't respond. Deleting all IKE and IPsec SAs for tunnel <tunnel>
Explanation
Monitored host didn't respond on ICMP ping. All IKE and IPsec SAs for the tunnel interface will be deleted and traffic routed into the tunnel will trigger a new IKE negotiation against the remote peer.
Firewall Action
sas_deleted
Recommended Action
Check the connectivity of the monitored host.
Revision
1
Parameters
ip
tunnel

2.36.225. failed_to_attach_radius (ID: 01803700)

Default Severity
WARNING
Log Message
Failed to attach RADIUS (<errorcode>) server in IKE negotiation for peer <peer_ip>:<peer_port>
Explanation
Failed to attach RADIUS server communication, IKE negotiation will fail.
Firewall Action
fail_ike_negotiation
Recommended Action
None
Revision
1
Parameters
errorcode
peer_ip
peer_port

2.36.226. failed_to_attach_radius (ID: 01803701)

Default Severity
WARNING
Log Message
Failed to attach RADIUS (<errorcode>) server in IKE negotiation for peer <peer_ip>:<peer_port>
Explanation
Failed to attach RADIUS server communication, IKE negotiation will fail.
Firewall Action
fail_ike_negotiation
Recommended Action
None
Revision
1
Parameters
errorcode
peer_ip
peer_port