![[Note]](images/note.png) |
Note: This document is also available in other formats |
A PDF version of this document along with all current and older documentation
in PDF format can be found at https://my.clavister.com.
It is also available in a framed HTML version.
|
This guide is a reference for all log messages generated by the Clavister cOS Stream. It is designed to be a valuable information
source
for both management and troubleshooting.
1.1. Log Message Structure
All log messages have a common design with attributes that include category, severity and recommended actions.
These attributes enable the easy filtering of log messages, either within the system prior
to sending them to a log receiver, or as part of analysis that takes place after the logging and storage of
messages on an external log server.
The following information is provided for each specific log message:
- Name
-
The name of the log message, which is the message's main category followed
by "_" followed by a short string in which each new word begins with a capital letter.
- ID
-
The ID is a string of digits which uniquely identifies the log message.
![[Note]](images/note.png) |
Note |
The Name and the ID of the log message form the title of the section
describing the log message.
|
- Log Categories
-
Log messages belong to categories, where each category maps to a specific subsystem.
For instance, the IPSEC category includes some hundreds of log messages,
all related to IPSec VPN activities. A log message can belong to more than one
category and each message has a main category.
In this guide, categories are listed as sections in Chapter 2, Log Message Reference
and each section includes log messages with that category as their main category.
- Log Message
- A brief explanation of the event that took place.
- Default Log Severity
-
The default severity level for this log message. For a list of severity levels, please see
section Section 1.2, Severity levels.
- SNMP Trap Category
-
The category of an associated SNMP Trap.
- SNMP Trap MIB Name
-
The name of an associated SNMP Trap in the trap MIB.
- SNMP Trap MIB OID
-
The OID of an associated SNMP Trap in the trap MIB.
- Parameters
-
The parameter values that are included in the log message.
- Explanation
-
A detailed explanation of the event.
Note that this information is only featured in this reference guide, and is never actually included in the log message.
- Gateway Action
-
A short string, 1-3 words separated by _, of what action the system will take. If the log message is purely informative, this
is set to "None".
- Action Description
-
Describes what is actually meant by the specified gateway action.
Note that this piece of information is only featured in this reference guide,
and is never actually included in the log message.
- Proposed Action
-
A detailed proposal of what the administrator can do if this log message is received.
If the log message is purely informative, this is set to "None".
Note that this information is only featured in this reference guide, and is never actually included in the log message.
An event has a default severity level, based on how serious the event is.
The following eight severity levels are possible, as defined by the Syslog protocol:
- 0 - Emergency
- Emergency conditions, which most likely led to the system being unusable.
- 1 - Alert
- Alert conditions, which affected the functionality of the unit. Needs attention immediately.
- 2 - Critical
- Critical conditions, which affected the functionality of the unit. Action should be taken as soon as possible.
- 3 - Error
- Error conditions, which probably affected the functionality of the unit.
- 4 - Warning
- Warning conditions, which could affect the functionality of the unit.
- 5 - Notice
- Normal, but significant, conditions.
- 6 - Informational
- Informational conditions.
- 7 - Debug
- Debug level events.
The Dynamic Severity
There is an additional severity type called
Dynamic which does not fit into the
progressive severity list given above. A severity of
Dynamic means that the
severity of the log event can change. There are two uses for this severity type:
-
The system can set the severity of the event to a specific level to indicate that the triggering condition
has not been dealt with.
-
The severity of the event can be explicitly set by the administrator.
Priority in Syslog Messages
In Syslog messages the priority is indicated by the parameter
prio=nn.
Excluding Logged Messages
The Clavister cOS Stream allows the exclusion from logging of entire catageories of log messages or just specific log messages.
It is also possible to change the severity level of log messages so that a specific category or a specific message
has the severity reset to a particular level when it is sent. These features are documented further
in the separate
Clavister cOS Stream Administrators Guide.
Chapter 2: Log Message Reference
This chapter lists all the log event messages that can be generated by cOS Stream.
The messages are grouped by category and the ID of each message is unique.
![[Note]](images/note.png) |
Sort Order |
All log messages are sorted by their category and then by their ID number.
|
These log messages refer to the APPCONTROL category.
2.1.1. [ID: 1643] Application changed
- Log Categories
- APPCONTROL
- Log Message
- Application changed.
- Default Log Severity
- Information
- Parameters
- flow, flowusage, app, user, userid
- Explanation
- Application control has identified that the application of the flow has changed.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.1.2. [ID: 1645] Application identified
- Log Categories
- APPCONTROL
- Log Message
- Application identified.
- Default Log Severity
- Information
- Parameters
- flow, flowusage, app, user, userid
- Explanation
- Application control has identified the application of the flow.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.1.3. [ID: 1021] Application Control license has just expired
- Log Categories
- APPCONTROL
- Log Message
- Application Control license has just expired. Application Control will not work until subscription is renewed.
- Default Log Severity
- Critical
- Parameters
-
- Explanation
- The Application Control part of the license has just expired.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Renew the subscription.
These log messages refer to the ARP category.
2.2.1. [ID: 142] Allowed by access rule
- Log Categories
- ARP
- Log Message
- Allowed by access rule.
- Default Log Severity
- Notice
- Parameters
- srchw, srcip, destip, recviface, rule
- Explanation
- The ARP sender IP address was verified and accepted by an access rule in the access section.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- Modify the access rule accordingly, if the sender should not be allowed.
2.2.2. [ID: 144] Hardware address changed
- Log Categories
- ARP
- Log Message
- Hardware address changed.
- Default Log Severity
- Notice
- Parameters
- knownip, knownhw, newhw
- Explanation
- The received ARP packet has a different hardware address compared to the previously known dynamic entry.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- If this is not the wanted behavior, change the setting ARPTableSettings:ARPChanges.
2.2.3. [ID: 279] Hardware address change disallowed
- Log Categories
- ARP
- Log Message
- Hardware address change disallowed.
- Default Log Severity
- Notice
- Parameters
- knownip, knownhw, newhw, pkt
- Explanation
- The received ARP packet has a different hardware address compared to the previously known dynamic entry.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If this is not the wanted behavior, change the setting ARPTableSettings:ARPChanges.
2.2.4. [ID: 638] Hardware address change detected
- Log Categories
- ARP
- Log Message
- Hardware address change detected.
- Default Log Severity
- Warning
- Parameters
- knownip, knownhw, newhw, pkt
- Explanation
- The received ARP packet has a different hardware address compared to the previously known dynamic entry. The address will
not be updated since ARPTableSettings:ARPRequests setting does not allow updates from requests.
- Gateway Action
- Ignore
- Action Description
- None
- Proposed Action
- If hardware address changes should be allowed, both ARPTableSettings:ARPRequests and ARPTableSettings:ARPChanges must be set to allow.
2.2.5. [ID: 123] IP conflict detected
- Log Categories
- ARP
- Log Message
- IP conflict detected.
- Default Log Severity
- Warning
- Parameters
- srcip, srchw, iface, pkt
- Explanation
- A host/device using one the firewall interfaces IPs as source address were detected which could lead to connectivity problems.
- Gateway Action
- Reject
- Action Description
- Attempted to resolve the conflict by broadcasting ARP (gratuitous) ownership updates
- Proposed Action
- Check the network for incorrectly configured devices/hosts.
2.2.6. [ID: 653] IP conflict detected
- Log Categories
- ARP
- Log Message
- IP conflict detected.
- Default Log Severity
- Warning
- Parameters
- srcip, srchw, iface, pkt
- Explanation
- A host/device using one the firewall interfaces IPs as source address were detected which could lead to connectivity problems.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Check the network for incorrectly configured devices/hosts.
2.2.7. [ID: 534] Illegal ARP sender hardware address
- Log Categories
- ARP,VALIDATE
- Log Message
- Illegal ARP sender hardware address.
- Default Log Severity
- Warning
- Parameters
- srchw, pkt
- Explanation
- A host in the network is using an illegal Ethernet sender address.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Trace down the host and verify that it is not faulty/compromised.
2.2.8. [ID: 622] Out of memory initializing ARP
- Log Categories
- ARP,SYSTEM
- Log Message
- Out of memory initializing ARP.
- Default Log Severity
- Critical
- Parameters
-
- Explanation
- The ARP subsystem could not be initialized due to insufficient free memory.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- Review system wide settings and try to tweak memory consuming features to use less memory.
2.2.9. [ID: 240] Disallowed by access rule
- Log Categories
- ARP,VALIDATE
- Log Message
- Disallowed by access rule.
- Default Log Severity
- Warning
- Parameters
- srchw, srcip, destip, recviface, pkt, rule
- Explanation
- The sender IP is not allowed according to the access rules and/or routing table.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If the address should be allowed modify the access rule and/or routing table accordingly.
2.2.10. [ID: 269] Mismatching hardware addresses
- Log Categories
- ARP,VALIDATE
- Log Message
- Mismatching hardware addresses.
- Default Log Severity
- Notice
- Parameters
- hwaddr, arphw, pkt
- Explanation
- The hardware sender address specified in the ARP data does not match the Ethernet hardware sender address.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- If this is not the wanted behavior, change the setting ARPTableSettings:ARPMatchEnetSender.
2.2.11. [ID: 618] Mismatching hardware addresses
- Log Categories
- ARP,VALIDATE
- Log Message
- Mismatching hardware addresses.
- Default Log Severity
- Notice
- Parameters
- hwaddr, arphw, pkt
- Explanation
- The hardware sender address specified in the ARP data does not match the Ethernet hardware sender address.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If this is not the wanted behavior, change the setting ARPTableSettings:ARPMatchEnetSender.
2.2.12. [ID: 350] Unable to add ARP entry to cache due to no[...]
- Log Categories
- ARP
- Log Message
- Unable to add ARP entry to cache due to no free entries.
- Default Log Severity
- Error
- Parameters
- hwaddr, ip, iface, pkt
- Explanation
- Unable to store ARP cache entry due exhaustion.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If the number of communication devices/hosts is as expected the setting ARPTableSettings:ARPCacheSize might need to be increased.
2.2.13. [ID: 377] ARP entry lost due to cache limit
- Log Categories
- ARP,STATEFUL
- Log Message
- ARP entry lost due to cache limit.
- Default Log Severity
- Warning
- Parameters
- ip, knownhw, iface
- Explanation
- The firewall need to resolve an IP address, but the current virtual system is out of free ARP entries. The ARP entry for IP
ip at interface iface has been freed in order to continue.
- Gateway Action
- Discard
- Action Description
- The firewall has been forced to discard one existing ARP entry in use
- Proposed Action
- This log is commonly seen during some denial-of-service attacks. If you think that the system should be able to handle this
amount of dynamic ARP entries, review the ARPTableSettings:ARPCacheSize setting and consider increasing it. Whether to log this event is controlled by the ARPTableSettings:LogARPOutOfEntries setting.
2.2.14. [ID: 302] No sender IP
- Log Categories
- ARP,VALIDATE
- Log Message
- No sender IP.
- Default Log Severity
- Notice
- Parameters
- pkt
- Explanation
- The source IP address of an ARP query is 0.0.0.0 which may introduce problems.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- If this is not the wanted behavior, change the setting ARPTableSettings:ARPQueryNoSenderIP.
2.2.15. [ID: 626] No sender IP
- Log Categories
- ARP,VALIDATE
- Log Message
- No sender IP.
- Default Log Severity
- Notice
- Parameters
- pkt
- Explanation
- The source IP address of an ARP query is 0.0.0.0 which may introduce problems.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If this is not the wanted behavior, change the setting ARPTableSettings:ARPQueryNoSenderIP.
2.2.16. [ID: 526] ARP resolve timeout
- Log Categories
- ARP,STATEFUL
- Log Message
- ARP resolve timeout.
- Default Log Severity
- Notice
- Parameters
- localip, ip, iface, flow, user, userid
- Explanation
- The firewall failed to resolve IP ip at interface iface. The IP is not reachable via the local network; traffic to and from this address will be dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The "arpsnoop" feature will allow realtime examination of the ARP traffic at interface iface; use this to pinpoint the problem. Review the route configuration and the access rules, especially when seemingly valid ARP
replies are discarded. Verify whether is possible to route bidirectional traffic to and from IP ip at interface iface. Whether to log this event is controlled by the ARPTableSettings:LogARPResolveFailure setting.
2.2.17. [ID: 106] ARP sender hardware address is broadcast[...]
- Log Categories
- ARP,VALIDATE
- Log Message
- ARP sender hardware address is broadcast address.
- Default Log Severity
- Notice
- Parameters
- pkt
- Explanation
- The sender address specified in the ARP data matches the broadcast address which may introduce problems.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- If this is not the wanted behavior, change the setting ARPTableSettings:ARPBroadcast.
2.2.18. [ID: 247] ARP sender hardware address is broadcast[...]
- Log Categories
- ARP,VALIDATE
- Log Message
- ARP sender hardware address is broadcast address.
- Default Log Severity
- Warning
- Parameters
- pkt
- Explanation
- The sender address specified in the ARP data matches the broadcast address which may introduce problems.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If this is not the wanted behavior, change the setting ARPTableSettings:ARPBroadcast.
2.2.19. [ID: 262] ARP sender hardware address is multicast[...]
- Log Categories
- ARP,VALIDATE
- Log Message
- ARP sender hardware address is multicast address.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- The sender address specified in the ARP data matches the multicast address range which may introduce problems.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- If this is not the wanted behavior, change the setting ARPTableSettings:ARPMulticast.
2.2.20. [ID: 117] ARP sender hardware address is multicast[...]
- Log Categories
- ARP,VALIDATE
- Log Message
- ARP sender hardware address is multicast address.
- Default Log Severity
- Notice
- Parameters
- pkt
- Explanation
- The sender address specified in the ARP data matches the multicast address range which may introduce problems.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If this is not the wanted behavior, change the setting ARPTableSettings:ARPMulticast.
2.2.21. [ID: 308] ARP collides with static entry
- Log Categories
- ARP
- Log Message
- ARP collides with static entry.
- Default Log Severity
- Warning
- Parameters
- knowntype, knownip, knownhw, pkt
- Explanation
- The hardware sender address does not match the static entry in the ARP table and static ARP changes are not allowed.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If the new address is correct, update the static ARP entry.
2.2.22. [ID: 584] Unsolicited ARP reply received
- Log Categories
- ARP
- Log Message
- Unsolicited ARP reply received.
- Default Log Severity
- Notice
- Parameters
- pkt
- Explanation
- An ARP reply was received even though no reply was currently expected for this IP.
- Gateway Action
- Allow
- Action Description
- The ARP reply was accepted and local ARP cache updated
- Proposed Action
- If this is not the wanted behavior, change the setting ARPTableSettings:UnsolicitedARPReplies.
2.2.23. [ID: 540] Unsolicited ARP reply received
- Log Categories
- ARP
- Log Message
- Unsolicited ARP reply received.
- Default Log Severity
- Notice
- Parameters
- pkt
- Explanation
- An ARP reply was received even though no reply was currently expected for this IP.
- Gateway Action
- Drop
- Action Description
- The ARP reply was dropped
- Proposed Action
- If this is not the wanted behavior, change the setting ARPTableSettings:UnsolicitedARPReplies.
These log messages refer to the AUTHSYS category.
2.3.1. [ID: 684] User is already logged in
- Log Categories
- AUTHSYS
- Log Message
- User is already logged in.
- Default Log Severity
- Warning
- Parameters
- userid, user, ip, profile, agent
- Explanation
- A user with the same username as an already authenticated user tried to log in and was rejected.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.3.2. [ID: 669] Failed to retrieve information from[...]
- Log Categories
- AUTHSYS
- Log Message
- Failed to retrieve information from authentication source.
- Default Log Severity
- Warning
- Parameters
- userid, user, ip, profile, agent, userdb
- Explanation
- Information regarding a user session could not be retrieved from the source database.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.3.3. [ID: 690] Unknown user or invalid password
- Log Categories
- AUTHSYS
- Log Message
- Unknown user or invalid password.
- Default Log Severity
- Notice
- Parameters
- userid, user, ip, profile, agent
- Explanation
- A user failed to log in. The entered username or password was invalid.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.3.4. [ID: 679] Login prevented due to brute force attack[...]
- Log Categories
- AUTHSYS
- Log Message
- Login prevented due to brute force attack prevention.
- Default Log Severity
- Warning
- Parameters
- userid, user, ip, profile, agent
- Explanation
- A login attempt was prevented due to quick repeated failures when validating user credentials.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.3.5. [ID: 793] Invalid Charging characteristics attribute in[...]
- Log Categories
- AUTHSYS
- Log Message
- Invalid Charging characteristics attribute in RADIUS Access-Accept.
- Default Log Severity
- Warning
- Parameters
- userid, user, ip, profile, agent, userdb
- Explanation
- The RADIUS server sent a Charging Characteristics attribute which could not be interpreted.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify that the Charging Characteristics attribute on the RADIUS server is configured correctly.
2.3.6. [ID: 685] Received an invalid EAP packet
- Log Categories
- AUTHSYS
- Log Message
- Received an invalid EAP packet.
- Default Log Severity
- Warning
- Parameters
- userid, user, ip, profile, agent, userdb
- Explanation
- Received an invalid EAP packet from an authentication source.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.3.7. [ID: 774] Maximum number of user sessions for the[...]
- Log Categories
- AUTHSYS
- Log Message
- Maximum number of user sessions for the username has been reached.
- Default Log Severity
- Warning
- Parameters
- user, profile, agent
- Explanation
- The maximum allowed number of simultaneous session for a user has been reached and the new session is rejected.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.3.8. [ID: 670] IMSI attribute missing in RADIUS Access-Accept
- Log Categories
- AUTHSYS
- Log Message
- IMSI attribute missing in RADIUS Access-Accept.
- Default Log Severity
- Warning
- Parameters
- userid, user, ip, profile, agent, userdb
- Explanation
- No IMSI could be extracted from the user identity (IDi) or fetched from the RADIUS server.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.3.9. [ID: 810] MSISDN attribute missing in RADIUS[...]
- Log Categories
- AUTHSYS
- Log Message
- MSISDN attribute missing in RADIUS Access-Accept.
- Default Log Severity
- Notice
- Parameters
- userid, user, ip, profile, agent, userdb
- Explanation
- The MSISDN attribute (Callback-Number) was missing in the Access-Accept message.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check the RADIUS server's user configuration.
2.3.10. [ID: 844] EAP type is not allowed by authentication[...]
- Log Categories
- AUTHSYS
- Log Message
- EAP type is not allowed by authentication profile.
- Default Log Severity
- Warning
- Parameters
- userid, user, ip, profile, agent, type
- Explanation
- A user and server used an EAP type that was not allowed by the authentication profile.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check the authentication profile configuration if the EAP type should be allowed.
2.3.11. [ID: 674] Out of memory while authenticating a user
- Log Categories
- AUTHSYS
- Log Message
- Out of memory while authenticating a user.
- Default Log Severity
- Alert
- Parameters
- userid, user, ip, profile, agent
- Explanation
- The unit failed to allocate and is out of memory.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.3.12. [ID: 688] Denied access according to authentication[...]
- Log Categories
- AUTHSYS
- Log Message
- Denied access according to authentication profile.
- Default Log Severity
- Warning
- Parameters
-
- Explanation
- A user is not allowed to authenticate according to the authentication profile settings.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.3.13. [ID: 792] The authentication profile is still in[...]
- Log Categories
- AUTHSYS
- Log Message
- The authentication profile is still in initialization process.
- Default Log Severity
- Warning
- Parameters
- profile, agent
- Explanation
- A user requesting login was rejected as the authentication profile has not been fully initialized yet.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.3.14. [ID: 673] Received RADIUS Access-Accept message
- Log Categories
- AUTHSYS
- Log Message
- Received RADIUS Access-Accept message.
- Default Log Severity
- Notice
- Parameters
- userid, user, ip, profile, agent, userdb
- Explanation
- Access-Accept message received from RADIUS server.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.3.15. [ID: 1666] Received RADIUS Access-Challenge message
- Log Categories
- AUTHSYS
- Log Message
- Received RADIUS Access-Challenge message.
- Default Log Severity
- Information
- Parameters
- userid, user, ip, profile, agent, userdb
- Explanation
- Access-Challenge message received from RADIUS server.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.3.16. [ID: 681] Received RADIUS Access-Reject message
- Log Categories
- AUTHSYS
- Log Message
- Received RADIUS Access-Reject message.
- Default Log Severity
- Warning
- Parameters
- userid, user, ip, profile, agent, userdb
- Explanation
- Access-Reject message received from RADIUS server.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.3.17. [ID: 812] Challenges are not supported when using XAuth
- Log Categories
- AUTHSYS
- Log Message
- Challenges are not supported when using XAuth.
- Default Log Severity
- Warning
- Parameters
- userid, user, ip, profile, agent, userdb
- Explanation
- The XAuth agent does not support the challenge-and-response method.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Disable the challenge-and-response feature in the RADIUS server, and use password verification instead.
2.3.18. [ID: 689] Internal RADIUS error
- Log Categories
- AUTHSYS
- Log Message
- Internal RADIUS error.
- Default Log Severity
- Warning
- Parameters
- userid, user, ip, profile, agent, userdb
- Explanation
- An internal error occurred within the RADIUS client.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check RADIUS logs for details.
2.3.19. [ID: 665] User logged out due to session timeout
- Log Categories
- AUTHSYS
- Log Message
- User logged out due to session timeout.
- Default Log Severity
- Notice
- Parameters
- userid, user, ip, profile, agent
- Explanation
- A user was logged out due to session timeout.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.3.20. [ID: 809] Authentication source did not respond
- Log Categories
- AUTHSYS
- Log Message
- Authentication source did not respond.
- Default Log Severity
- Warning
- Parameters
- userid, user, ip, profile, agent, userdb
- Explanation
- A request that was sent for a user did not receive a response in time from an authentication source.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.3.21. [ID: 677] User belongs in too many groups
- Log Categories
- AUTHSYS
- Log Message
- User belongs in too many groups. Keeping the 32 first.
- Default Log Severity
- Warning
- Parameters
- userid, user, ip, profile, agent
- Explanation
- A user can only be a member of a maximum of 32 groups. This user is a member of too many groups, and only the 32 first groups
will be used.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Lower the number of groups that this user belongs to.
2.3.22. [ID: 676] User added
- Log Categories
- AUTHSYS
- Log Message
- User added.
- Default Log Severity
- Notice
- Parameters
- userid, user, ip, profile, agent
- Explanation
- A user was added and is now awaiting confirmation.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.3.23. [ID: 761] User updated with new IP address
- Log Categories
- AUTHSYS
- Log Message
- User updated with new IP address.
- Default Log Severity
- Notice
- Parameters
- userid, user, ip, profile, agent, old
- Explanation
- The authenticated IP address for a logged in user was changed.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.3.24. [ID: 760] Invalid user session found
- Log Categories
- AUTHSYS
- Log Message
- Invalid user session found.
- Default Log Severity
- Warning
- Parameters
- userid, user, ip, profile, agent
- Explanation
- An invalid user session has been found and will be removed.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.3.25. [ID: 672] User logged in
- Log Categories
- AUTHSYS
- Log Message
- User logged in.
- Default Log Severity
- Notice
- Parameters
- userid, user, ip, profile, agent, userdb, usergroups
- Explanation
- A user logged in and has been granted access, according to the group membership or user name information.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.3.26. [ID: 667] User logged out
- Log Categories
- AUTHSYS
- Log Message
- User logged out.
- Default Log Severity
- Notice
- Parameters
- userid, user, ip, profile, agent
- Explanation
- A user logged out and is no longer authenticated.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.3.27. [ID: 759] User updated with new username
- Log Categories
- AUTHSYS
- Log Message
- User updated with new username.
- Default Log Severity
- Notice
- Parameters
- userid, user, ip, profile, agent, old
- Explanation
- A user logged in with a pseudonym and its username was changed to its full username.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.3.28. [ID: 671] User replaced
- Log Categories
- AUTHSYS
- Log Message
- User replaced.
- Default Log Severity
- Notice
- Parameters
- userid, user, ip, profile, agent
- Explanation
- An old user session was replaced with a new one.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.3.29. [ID: 687] User table is full
- Log Categories
- AUTHSYS
- Log Message
- User table is full.
- Default Log Severity
- Warning
- Parameters
-
- Explanation
- Maximum number of allowed logged in users has been reached.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
These log messages refer to the BGP category.
2.4.1. [ID: 1311] Failed to lookup gateway of BGP route
- Log Categories
- BGP,DYNROUTE
- Log Message
- Failed to lookup gateway of BGP route.
- Default Log Severity
- Error
- Parameters
- gwip, iprange, table
- Explanation
- BGP was unable to export the route due to route-lookup failure of the gateway IP.
- Gateway Action
- Discard
- Action Description
- Route is discarded
- Proposed Action
- Update the referred routing table so that the gateway IP becomes routable.
2.4.2. [ID: 1699] BGP graceful restart not negotiated with[...]
- Log Categories
- BGP
- Log Message
- BGP graceful restart not negotiated with established neighbor.
- Default Log Severity
- Warning
- Parameters
- neighborip
- Explanation
- System is running HA and graceful restart has not been negotiated for an established BGP neighbor. This will result in withdrawn
prefixes and possible traffic disruptions at HA failover.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify that both the local BGP configuration as well as the configuration on the peer is configured for graceful restart.
2.4.3. [ID: 1687] Unable to enable BFD due to unroutable BGP[...]
- Log Categories
- BGP,BFD
- Log Message
- Unable to enable BFD due to unroutable BGP neighbor.
- Default Log Severity
- Warning
- Parameters
- neighborip, table
- Explanation
- A BFD session cannot be created for the BGP neighbor due to missing route.
- Gateway Action
- Disable
- Action Description
- None
- Proposed Action
- Make sure the BGP peer IP has route coverage in the routing table used when communicating with the peer.
2.4.4. [ID: 1316] BGP dynrouting event
- Log Categories
- BGP,DYNROUTE
- Log Message
- BGP dynrouting event.
- Default Log Severity
- Error
- Parameters
- msg
- Explanation
- This is a generic message for BGP classified as erroneous.
- Gateway Action
- Inconclusive
- Action Description
- None
- Proposed Action
- Investigate the nature of the error message and how it affects the system.
2.4.5. [ID: 1315] BGP dynrouting event
- Log Categories
- BGP,DYNROUTE
- Log Message
- BGP dynrouting event.
- Default Log Severity
- Information
- Parameters
- msg
- Explanation
- This is a generic message for BGP classified as informational.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.4.6. [ID: 1318] BGP dynrouting event
- Log Categories
- BGP,DYNROUTE
- Log Message
- BGP dynrouting event.
- Default Log Severity
- Warning
- Parameters
- msg
- Explanation
- This is a generic message for BGP classified as warning.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Investigate the nature of the warning message and how it affects the system.
2.4.7. [ID: 1310] Failed to add BGP route
- Log Categories
- BGP,DYNROUTE
- Log Message
- Failed to add BGP route.
- Default Log Severity
- Error
- Parameters
- iprange, gwip, table
- Explanation
- BGP was unable to add the route to the routing table for unknown reasons.
- Gateway Action
- Discard
- Action Description
- None
- Proposed Action
- Contact customer support.
2.4.8. [ID: 1313] Failed to remove BGP route
- Log Categories
- BGP,DYNROUTE
- Log Message
- Failed to remove BGP route.
- Default Log Severity
- Error
- Parameters
- iprange, gwip, table
- Explanation
- BGP was unable to remove the route to the routing table for unknown reasons.
- Gateway Action
- Discard
- Action Description
- None
- Proposed Action
- Contact customer support.
These log messages refer to the CLI category.
2.5.1. [ID: 272] Failed adding CLI command data resource
- Log Categories
- CLI
- Log Message
- Failed adding CLI command data resource.
- Default Log Severity
- Critical
- Parameters
-
- Explanation
- A CLI command data resource could not be added.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify that the system has sufficient memory available.
2.5.2. [ID: 443] All CLI commands could not be listed
- Log Categories
- CLI
- Log Message
- All CLI commands could not be listed.
- Default Log Severity
- Critical
- Parameters
-
- Explanation
- All CLI commands could not be listed by the CLI during the initiation phase. This could result in that some commands are unavailable.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify that the disk media is intact and functions correctly.
2.5.3. [ID: 213] Failed allocating memory when starting CLI[...]
- Log Categories
- CLI,SYSTEM
- Log Message
- Failed allocating memory when starting CLI command.
- Default Log Severity
- Alert
- Parameters
-
- Explanation
- The CLI failed to allocate the amount of memory needed to start the command.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify that the system has a sufficient amount of free memory.
2.5.4. [ID: 1118] Attempt to access service command view
- Log Categories
- CLI,SYSTEM
- Log Message
- Attempt to access service command view.
- Default Log Severity
- Information
- Parameters
- user, userid, count, max
- Explanation
- User tried to access to "service" command view.
- Gateway Action
- Deny
- Action Description
- None
- Proposed Action
- None
2.5.5. [ID: 1101] Service command view access granted
- Log Categories
- CLI,SYSTEM
- Log Message
- Service command view access granted.
- Default Log Severity
- Information
- Parameters
- user, userid
- Explanation
- Access to "service" command view was granted to user.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- None
2.5.6. [ID: 1117] Maximum number of service command view access[...]
- Log Categories
- CLI,SYSTEM
- Log Message
- Maximum number of service command view access attempts reached.
- Default Log Severity
- Information
- Parameters
- user, userid
- Explanation
- Maximum number of "service" command view access attempts was reached. Access to "service" command view was rejected and new
challenge is generated.
- Gateway Action
- Deny
- Action Description
- None
- Proposed Action
- None
2.5.7. [ID: 765] Serial console CLI instance started
- Log Categories
- CLI
- Log Message
- Serial console CLI instance started.
- Default Log Severity
- Notice
- Parameters
- user, accesslevel, profile
- Explanation
- A serial console CLI session was started.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.5.8. [ID: 769] Serial console CLI authentication failed
- Log Categories
- CLI
- Log Message
- Serial console CLI authentication failed.
- Default Log Severity
- Notice
- Parameters
- user, profile
- Explanation
- A serial console login attempt failed since the supplied username and password could not be verified towards the correct authentication
group.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify that the user exists with the specified password. Make sure that the user has the appropriate access group(s) (Administrators
and/or Auditor) set.
2.5.9. [ID: 767] Serial console CLI authentication succeeded
- Log Categories
- CLI
- Log Message
- Serial console CLI authentication succeeded.
- Default Log Severity
- Notice
- Parameters
- user, profile
- Explanation
- A serial console login authentication succeeded towards the authentication profile.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.5.10. [ID: 773] Serial console CLI session ended
- Log Categories
- CLI
- Log Message
- Serial console CLI session ended.
- Default Log Severity
- Notice
- Parameters
- user, profile
- Explanation
- None
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.5.11. [ID: 764] Serial console CLI system error
- Log Categories
- CLI,SYSTEM
- Log Message
- Serial console CLI system error.
- Default Log Severity
- Alert
- Parameters
-
- Explanation
- The configuration and authentication of the serial console access is not available. As a result, and for debugging purposes
the serial console CLI is started with administrator privileges.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify the serial console configuration and restart the system.
2.5.12. [ID: 332] Resource Manager failed memory allocation[...]
- Log Categories
- CLI,SYSTEM
- Log Message
- Resource Manager failed memory allocation when adding data resources.
- Default Log Severity
- Alert
- Parameters
-
- Explanation
- Additional memory could not be allocated when adding data resources.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify that the system has a sufficient amount of free memory available.
2.5.13. [ID: 483] Resource Manager failed to read information[...]
- Log Categories
- CLI
- Log Message
- Resource Manager failed to read information from resource files.
- Default Log Severity
- Critical
- Parameters
-
- Explanation
- The management system data resources could not be fully updated. This could result in that management systems such as the
CLI no longer functions correctly.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify that the system has sufficient amount of resources, e.g. free memory. Verify that the storage media is intact.
These log messages refer to the CONFIG category.
2.6.1. [ID: 1071] Certificate created
- Log Categories
- CONFIG
- Log Message
- Certificate created.
- Default Log Severity
- Notice
- Parameters
- name
- Explanation
- Certificate name has been created.
- Gateway Action
- Accept
- Action Description
- None
- Proposed Action
- None
2.6.2. [ID: 1070] Certificate is now revoked
- Log Categories
- CONFIG
- Log Message
- Certificate is now revoked.
- Default Log Severity
- Notice
- Parameters
- name
- Explanation
- Certificate name has been revoked and is no longer valid.
- Gateway Action
- Accept
- Action Description
- None
- Proposed Action
- None
2.6.3. [ID: 1069] Certificate has been updated
- Log Categories
- CONFIG
- Log Message
- Certificate has been updated.
- Default Log Severity
- Notice
- Parameters
- name
- Explanation
- Certificate name has been updated.
- Gateway Action
- Accept
- Action Description
- None
- Proposed Action
- None
2.6.4. [ID: 512] Activating configuration changes
- Log Categories
- CONFIG
- Log Message
- Activating configuration changes.
- Default Log Severity
- Notice
- Parameters
- cfgver, mgmtsys, clientip, user, userid
- Explanation
- A new configuration will be activated.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.6.5. [ID: 105] Failed to establish bi-directional[...]
- Log Categories
- CONFIG
- Log Message
- Failed to establish bi-directional communication with peer.
- Default Log Severity
- Critical
- Parameters
-
- Explanation
- The system failed to establish a connection back to peer, using the new configuration.
- Gateway Action
- None
- Action Description
- The system will revert to the previous configuration
- Proposed Action
- Verify that the new configuration file does not contain errors that would cause bi-directional communication failure.
2.6.6. [ID: 1048] Configuration commit failed
- Log Categories
- CONFIG
- Log Message
- Configuration commit failed.
- Default Log Severity
- Error
- Parameters
- cfgver, mgmtsys, clientip, user, userid
- Explanation
- The configuration could not be commited.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- This could be due to lack of storage space. Try freeing up allocated disk space.
2.6.7. [ID: 355] New configuration activated
- Log Categories
- CONFIG
- Log Message
- New configuration activated.
- Default Log Severity
- Notice
- SNMP Trap Category
- STARTUP
- SNMP Trap MIB name
- warmStart
- SNMP Trap MIB OID
- 1.3.6.1.6.3.1.1.5.2 (SNMPv2-MIB, RFC3418)
- Parameters
- cfgver, mgmtsys, clientip, user, userid
- Explanation
- The firewall is up and running using the new configuration.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.6.8. [ID: 532] New configuration committed
- Log Categories
- CONFIG
- Log Message
- New configuration committed.
- Default Log Severity
- Notice
- Parameters
- cfgver, mgmtsys, clientip, user, userid
- Explanation
- The firewall has written a new version of the configuration to permanent storage.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.6.9. [ID: 494] DCOS could not allocate memory when creating[...]
- Log Categories
- CONFIG,SYSTEM
- Log Message
- DCOS could not allocate memory when creating new netobject.
- Default Log Severity
- Critical
- Parameters
-
- Explanation
- DCOS could not allocate the amount of memory needed to create a new netobject. DCOS and netobject functionality might not
be fully functional.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify that there is enough free memory within the system.
2.6.10. [ID: 216] DCOS could not allocate enough memory to[...]
- Log Categories
- CONFIG,SYSTEM
- Log Message
- DCOS could not allocate enough memory to execute the netobjects CLI command.
- Default Log Severity
- Critical
- Parameters
-
- Explanation
- The system does not have enough free memory to execute the netobjects command with the given parameters.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify the amount of free memory and/or try executing the netobjects command with another parameter combination.
2.6.11. [ID: 319] DCOS storage could not be initialized
- Log Categories
- CONFIG
- Log Message
- DCOS storage could not be initialized.
- Default Log Severity
- Critical
- Parameters
-
- Explanation
- DCOS could not re-initialize properly during the reconfigure phase. All netobject functionality will be unavailable.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify that there is enough free memory within the system.
2.6.12. [ID: 1080] An address object is dynamically updated
- Log Categories
- CONFIG
- Log Message
- An address object is dynamically updated.
- Default Log Severity
- Notice
- Parameters
- module, name, value
- Explanation
-
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.6.13. [ID: 251] Beginning system reconfigure
- Log Categories
- CONFIG,SYSTEM
- Log Message
- Beginning system reconfigure.
- Default Log Severity
- Notice
- Parameters
- type, reason
- Explanation
- The firewall will load a new configuration, or reload the running configuration.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.6.14. [ID: 593] Failed to reconfigure system
- Log Categories
- CONFIG,SYSTEM
- Log Message
- Failed to reconfigure system.
- Default Log Severity
- Error
- Parameters
- user, userid
- Explanation
- Failed to load configuration.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.6.15. [ID: 594] Reconfigure completed successfully
- Log Categories
- CONFIG,SYSTEM
- Log Message
- Reconfigure completed successfully.
- Default Log Severity
- Notice
- Parameters
- user, userid
- Explanation
- The system has finished loading configuration.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.6.16. [ID: 1408] Reconfigure is triggered by subsystem
- Log Categories
- CONFIG,SYSTEM
- Log Message
- Reconfigure is triggered by subsystem.
- Default Log Severity
- Notice
- Parameters
- module, reason
- Explanation
- Reconfigure is triggered by subsystem.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
These log messages refer to the DHCPCLIENT category.
2.7.1. [ID: 306] Interface has successfully acquired a lease
- Log Categories
- DHCPCLIENT
- Log Message
- Interface has successfully acquired a lease.
- Default Log Severity
- Notice
- Parameters
- clientip, netmask, bcastip, gwip, serverip, iface
- Explanation
- An interface has successfully acquired a lease.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.7.2. [ID: 191] Lease for the interface has expired
- Log Categories
- DHCPCLIENT
- Log Message
- Lease for the interface has expired.
- Default Log Severity
- Warning
- Parameters
- iface
- Explanation
- A lease has expired and the IP data for this interface is no longer valid.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check connection and DHCP server reachability.
2.7.3. [ID: 1078] Lease for the interface was successfully[...]
- Log Categories
- DHCPCLIENT
- Log Message
- Lease for the interface was successfully updated.
- Default Log Severity
- Notice
- Parameters
- clientip, netmask, bcastip, gwip, serverip, iface
- Explanation
- An interface has successfully updated its lease.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.7.4. [ID: 472] No DHCP offers were received by the DHCP[...]
- Log Categories
- DHCPCLIENT
- Log Message
- No DHCP offers were received by the DHCP service.
- Default Log Severity
- Warning
- Parameters
- iface
- Explanation
- No DHCP offers were received from DHCP servers.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check if selected DHCP servers are available and configured properly.
2.7.5. [ID: 287] No valid DHCP offers were received
- Log Categories
- DHCPCLIENT
- Log Message
- No valid DHCP offers were received.
- Default Log Severity
- Warning
- Parameters
- iface
- Explanation
- No valid DHCP offers were received from DHCP servers.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check if DHCP client filters are properly configured.
2.7.6. [ID: 1094] Interface received a lease where the offered[...]
- Log Categories
- DHCPCLIENT
- Log Message
- Interface received a lease where the offered broadcast address equals the offered gateway.
- Default Log Severity
- Warning
- Parameters
- bcastip, iface
- Explanation
- An interface received a lease where the offered broadcast address equals the offered gateway address.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- Check DHCP server configuration.
2.7.7. [ID: 395] The lease was rejected by an address filter
- Log Categories
- DHCPCLIENT
- Log Message
- The lease was rejected by an address filter.
- Default Log Severity
- Notice
- Parameters
- clientip, iface
- Explanation
- The lease was rejected due to an address filter.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- Change DHCP client address filter to allow lease.
2.7.8. [ID: 522] The lease was rejected by a server filter
- Log Categories
- DHCPCLIENT
- Log Message
- The lease was rejected by a server filter.
- Default Log Severity
- Notice
- Parameters
- serverip, iface
- Explanation
- The lease was rejected due to a server filter.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- Change DHCP client server filter to allow lease.
2.7.9. [ID: 559] Interface received a lease which will cause[...]
- Log Categories
- DHCPCLIENT
- Log Message
- Interface received a lease which will cause an IP collision with a configured route.
- Default Log Severity
- Warning
- Parameters
- clientip, iface
- Explanation
- An interface received a lease which will cause an IP collision with a configured route.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- Check DHCP server configuration and system interface configuration.
2.7.10. [ID: 274] Interface received a lease with an offered IP[...]
- Log Categories
- DHCPCLIENT
- Log Message
- Interface received a lease with an offered IP that appear to be occupied.
- Default Log Severity
- Warning
- Parameters
- clientip, iface
- Explanation
- An interface received a lease which appears to be in use by someone else.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- Check network for statically configured hosts or incorrectly proxy ARPed routes.
2.7.11. [ID: 230] Interface received a lease with an invalid[...]
- Log Categories
- DHCPCLIENT
- Log Message
- Interface received a lease with an invalid broadcast address.
- Default Log Severity
- Warning
- Parameters
- bcastip, iface
- Explanation
- An interface received a lease with an invalid broadcast address.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- Check DHCP server configuration.
2.7.12. [ID: 435] Interface received a lease with an invalid[...]
- Log Categories
- DHCPCLIENT
- Log Message
- Interface received a lease with an invalid gateway address.
- Default Log Severity
- Warning
- Parameters
- gwip, iface
- Explanation
- An interface received a lease with an invalid gateway address.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- Check DHCP server configuration.
2.7.13. [ID: 223] Interface received a lease with an invalid IP[...]
- Log Categories
- DHCPCLIENT
- Log Message
- Interface received a lease with an invalid IP address.
- Default Log Severity
- Warning
- Parameters
- clientip, iface
- Explanation
- An interface received a lease with an invalid offered IP address.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- Check DHCP server configuration.
2.7.14. [ID: 325] Interface received a lease with an invalid[...]
- Log Categories
- DHCPCLIENT
- Log Message
- Interface received a lease with an invalid netmask address.
- Default Log Severity
- Warning
- Parameters
- netmask, iface
- Explanation
- An interface received a lease with an invalid netmask.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- Check DHCP server configuration.
2.7.15. [ID: 499] Interface received a lease with an invalid[...]
- Log Categories
- DHCPCLIENT
- Log Message
- Interface received a lease with an invalid DHCP server address.
- Default Log Severity
- Warning
- Parameters
- serverip, iface
- Explanation
- An interface received an invalid DHCP server address.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- Check DHCP server configuration.
2.7.16. [ID: 481] The requested lease was rejected by the server
- Log Categories
- DHCPCLIENT
- Log Message
- The requested lease was rejected by the server.
- Default Log Severity
- Warning
- Parameters
- clientip, serverip, iface
- Explanation
- A requested lease was rejected by a DHCP server.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- Check if client has moved to new subnet or if client's lease has expired.
2.7.17. [ID: 222] Interface received a lease which will cause a[...]
- Log Categories
- DHCPCLIENT
- Log Message
- Interface received a lease which will cause a route collision with a configured route.
- Default Log Severity
- Warning
- Parameters
- clientip, iface
- Explanation
- An interface received a lease which will cause a route collision with a configured route.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- Check DHCP server configuration and system interface configuration.
2.7.18. [ID: 324] Too many DHCP offers received
- Log Categories
- DHCPCLIENT
- Log Message
- Too many DHCP offers received.
- Default Log Severity
- Warning
- Parameters
- iface
- Explanation
- To many DHCP offers received for the interface.
- Gateway Action
- Ignore
- Action Description
- This and subsequent offers will be ignored
- Proposed Action
- Change DHCP client configuration to filter leases.
These log messages refer to the DHCPSERVER category.
2.8.1. [ID: 1394] Invalid DHCP packet received
- Log Categories
- DHCPSERVER,DHCPCLIENT
- Log Message
- Invalid DHCP packet received.
- Default Log Severity
- Warning
- Parameters
- len, iface
- Explanation
- The system received a DHCP packet that was too short to process.
- Gateway Action
- Drop
- Action Description
-
- Proposed Action
- Investigate why broken DHCP packets are sent on the network.
2.8.2. [ID: 892] All pools are depleted
- Log Categories
- DHCPSERVER
- Log Message
- All pools are depleted. Unable to handle request. Ignoring.
- Default Log Severity
- Warning
- Parameters
-
- Explanation
- All pools have depleted.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Extend the pools to support more clients.
2.8.3. [ID: 907] Blacklist item timed out
- Log Categories
- DHCPSERVER
- Log Message
- Blacklist item timed out. IP is.
- Default Log Severity
- Notice
- Parameters
- clientip
- Explanation
- Blacklisted ip automatically timeout.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.8.4. [ID: 888] Client accepted and bounded with IP
- Log Categories
- DHCPSERVER
- Log Message
- Client accepted and bounded with IP.
- Default Log Severity
- Notice
- Parameters
- srchw, clientip
- Explanation
- Client accepted the IP address and are now bound.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.8.5. [ID: 884] Client renewed IP
- Log Categories
- DHCPSERVER
- Log Message
- Client renewed IP.
- Default Log Severity
- Notice
- Parameters
- srchw, clientip
- Explanation
- Client successfully renewed its lease.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.8.6. [ID: 906] DHCP Server error
- Log Categories
- DHCPSERVER
- Log Message
- DHCP Server error.
- Default Log Severity
- Warning
- Parameters
- value, code, option
- Explanation
- DHCP Server error.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.8.7. [ID: 905] Got decline for ip on wrong interface so[...]
- Log Categories
- DHCPSERVER
- Log Message
- Got decline for ip on wrong interface so ignored it.
- Default Log Severity
- Notice
- Parameters
- srchw, clientip, iface, recviface
- Explanation
- Got decline from a client on the wrong interface.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check network for inconsistent routes.
2.8.8. [ID: 882] Client declined non offered IP
- Log Categories
- DHCPSERVER
- Log Message
- Client declined non offered IP. Decline is ignored.
- Default Log Severity
- Notice
- Parameters
- srchw
- Explanation
- Client rejected non a offered IP.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.8.9. [ID: 898] Server identifier not specified in incoming[...]
- Log Categories
- DHCPSERVER
- Log Message
- Server identifier not specified in incoming Decline message.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- Server identifier not specified in incoming Decline message.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.8.10. [ID: 881] Server identifier in Decline message does not[...]
- Log Categories
- DHCPSERVER
- Log Message
- Server identifier in Decline message does not match this server.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- Server identifier in Decline message does not match this server.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.8.11. [ID: 886] Client declined IP
- Log Categories
- DHCPSERVER
- Log Message
- Client declined IP. Blacklisted it.
- Default Log Severity
- Warning
- Parameters
- srchw, clientip
- Explanation
- A client declined (indicated that the IP is already in use someone else) offered IP.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check network for statically configured hosts or incorrectly proxy ARPed routes.
2.8.12. [ID: 883] Received DHCP packet is smaller than the[...]
- Log Categories
- DHCPSERVER
- Log Message
- Received DHCP packet is smaller than the minimum allowed 300 bytes. Dropping.
- Default Log Severity
- Warning
- Parameters
-
- Explanation
- Received a DHCP packet which is smaller than the minimum allowed 300 bytes.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Investigate what client implementation is being used.
2.8.13. [ID: 903] Got INFORM request from client
- Log Categories
- DHCPSERVER
- Log Message
- Got INFORM request from client. Acknowledging.
- Default Log Severity
- Notice
- Parameters
- srchw, clientip
- Explanation
- Got an inform (client already got an IP and asks for configuration parameters) request from a client.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.8.14. [ID: 1398] Received packet with invalid DHCP cookie
- Log Categories
- DHCPSERVER
- Log Message
- Received packet with invalid DHCP cookie. Dropping.
- Default Log Severity
- Warning
- Parameters
-
- Explanation
- The system received a DHCP packet without the proper DHCP cookie.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.8.15. [ID: 921] Unable to load the lease database
- Log Categories
- DHCPSERVER
- Log Message
- Unable to load the lease database.
- Default Log Severity
- Error
- Parameters
-
- Explanation
- Unable to load the lease database.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.8.16. [ID: 922] Lease database was successfully loaded
- Log Categories
- DHCPSERVER
- Log Message
- Lease database was successfully loaded.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- Lease database was successfully loaded.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.8.17. [ID: 924] Unable to auto save the lease database to disk
- Log Categories
- DHCPSERVER
- Log Message
- Unable to auto save the lease database to disk.
- Default Log Severity
- Error
- Parameters
-
- Explanation
- Unable to auto save the lease database to disk.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.8.18. [ID: 923] Lease database was successfully auto saved to[...]
- Log Categories
- DHCPSERVER
- Log Message
- Lease database was successfully auto saved to disk.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- Lease database was successfully auto saved to disk.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.8.19. [ID: 896] Lease timed out
- Log Categories
- DHCPSERVER
- Log Message
- Lease timed out. Was bound to client.
- Default Log Severity
- Notice
- Parameters
- clientip, srchw
- Explanation
- A client lease wasn't renewed and timed out.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.8.20. [ID: 889] Offer timed out
- Log Categories
- DHCPSERVER
- Log Message
- Offer timed out. Was bound to client.
- Default Log Severity
- Notice
- Parameters
- clientip, srchw
- Explanation
- An offer to a client was never accepted and timed out.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.8.21. [ID: 887] The option section is too big
- Log Categories
- DHCPSERVER
- Log Message
- The option section is too big. Unable to reply. Dropping.
- Default Log Severity
- Warning
- Parameters
-
- Explanation
- Unable to send reply since the DHCP option section is too big.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Reduce the number of used DHCP options.
2.8.22. [ID: 948] All IPs in the pool are in use now
- Log Categories
- DHCPSERVER
- Log Message
- All IPs in the pool are in use now.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- There is no address left in the pool for fulfilling the next DHCPDISCOVER.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.8.23. [ID: 890] All IPs in the pool are in use
- Log Categories
- DHCPSERVER
- Log Message
- All IPs in the pool are in use. Discover cannot be fulfilled.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- A DISCOVER cannot be fulfilled since all pools are in use.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Extend the pools to support more clients.
2.8.24. [ID: 885] Got release for IP on wrong interface
- Log Categories
- DHCPSERVER
- Log Message
- Got release for IP on wrong interface. Release is ignored.
- Default Log Severity
- Warning
- Parameters
- srchw, clientip, recviface, iface
- Explanation
- Got release from a client on the wrong interface.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check network for inconsistent routes.
2.8.25. [ID: 1043] The IP address the client tried to release is[...]
- Log Categories
- DHCPSERVER
- Log Message
- The IP address the client tried to release is not associated with the offered client identifier. Dropping.
- Default Log Severity
- Notice
- Parameters
- id, ip, knownip
- Explanation
- The IP address the client tried to release is not associated with the offered client identifier. Dropping. Argument id is
client identifier of the lease.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.8.26. [ID: 1042] The IP address the client tried to release is[...]
- Log Categories
- DHCPSERVER
- Log Message
- The IP address the client tried to release is not associated with the offered MAC address. Dropping.
- Default Log Severity
- Notice
- Parameters
- srchw, ip, knownip
- Explanation
- The IP address the client tried to release is not associated with the offered client identifier. Dropping.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.8.27. [ID: 900] Client released IP
- Log Categories
- DHCPSERVER
- Log Message
- Client released IP.
- Default Log Severity
- Notice
- Parameters
- srchw, clientip
- Explanation
- A client released (prematurely ended) its lease.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.8.28. [ID: 901] Received a request from bounded client for[...]
- Log Categories
- DHCPSERVER
- Log Message
- Received a request from bounded client for not known IP with correct serverident. Ignoring.
- Default Log Severity
- Warning
- Parameters
- srchw, clientip
- Explanation
- Received a request from bounded client for not known IP with correct serverident. Ignoring.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.8.29. [ID: 895] Received a request from bounded client for IP[...]
- Log Categories
- DHCPSERVER
- Log Message
- Received a request from bounded client for IP with incorrect serverident. Rejecting.
- Default Log Severity
- Warning
- Parameters
- srchw, clientip
- Explanation
- Received a request from bounded client for IP with incorrect serverident. Rejecting.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- None
2.8.30. [ID: 899] Received a request from not-bounded client[...]
- Log Categories
- DHCPSERVER
- Log Message
- Received a request from not-bounded client for not known IP with correct serverident. Ignoring.
- Default Log Severity
- Warning
- Parameters
- srchw, newip
- Explanation
- Received a request from not-bounded client for not known IP with correct serverident. Ignoring.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.8.31. [ID: 904] Received a request from not-bounded client[...]
- Log Categories
- DHCPSERVER
- Log Message
- Received a request from not-bounded client for IP with incorrect serverident. Rejecting.
- Default Log Severity
- Warning
- Parameters
- srchw, newip
- Explanation
- Received a request from not-bounded client for IP with incorrect serverident. Rejecting.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- None
2.8.32. [ID: 891] Client requested non bound IP
- Log Categories
- DHCPSERVER
- Log Message
- Client requested non bound IP. Rejecting.
- Default Log Severity
- Warning
- Parameters
- srchw, ip, knownip
- Explanation
- Client sent a request for a non bound IP.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- None
2.8.33. [ID: 893] Client requested non offered IP
- Log Categories
- DHCPSERVER
- Log Message
- Client requested non offered IP. Rejecting.
- Default Log Severity
- Warning
- Parameters
- srchw, ip, knownip
- Explanation
- Client requested a non bound IP.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- None
2.8.34. [ID: 894] Received request with bad UDP checksum
- Log Categories
- DHCPSERVER
- Log Message
- Received request with bad UDP checksum. Dropping.
- Default Log Severity
- Warning
- Parameters
-
- Explanation
- Received request with bad UDP checksum.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Check network equipment for errors.
2.8.35. [ID: 902] Sending IP offer for received DISCOVER
- Log Categories
- DHCPSERVER
- Log Message
- Sending IP offer for received DISCOVER.
- Default Log Severity
- Notice
- Parameters
- srchw, knownip
- Explanation
- Received discover (initial IP query) from a client.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.8.36. [ID: 897] Failed to get buffer for sending
- Log Categories
- DHCPSERVER
- Log Message
- Failed to get buffer for sending. Unable to reply.
- Default Log Severity
- Warning
- Parameters
-
- Explanation
- Unable to get a buffer for sending.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check buffer consumption.
2.8.37. [ID: 919] The matching rule does not have useful lease[...]
- Log Categories
- DHCPSERVER
- Log Message
- The matching rule does not have useful lease and allows further matching. Rematching with the next rule.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- The matching rule does not have useful lease and allows further matching. Rematching with the next rule.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.8.38. [ID: 1399] Received DHCP option without message type
- Log Categories
- DHCPSERVER
- Log Message
- Received DHCP option without message type. Dropping.
- Default Log Severity
- Warning
- Parameters
-
- Explanation
- The system received a DHCP message with an option without type.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Investigate why broken DHCP packets are sent on the network.
2.8.39. [ID: 920] The matching rule does not have useful lease[...]
- Log Categories
- DHCPSERVER
- Log Message
- The matching rule does not have useful lease and does not allow further matching. Dropping.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- The matching rule does not have useful lease and does not allow further matching. Dropping.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.8.40. [ID: 1392] Received DHCP message with unknown type
- Log Categories
- DHCPSERVER
- Log Message
- Received DHCP message with unknown type. Dropping.
- Default Log Severity
- Warning
- Parameters
- type
- Explanation
- The system received a DHCP message with an unknown DHCP type.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
These log messages refer to the DNSALG category.
2.9.1. [ID: 1303] Failed to create new session
- Log Categories
- DNSALG
- Log Message
- Failed to create new session.
- Default Log Severity
- Error
- Parameters
-
- Explanation
- An attempt to create a new DNSALG session failed, because the unit is out of memory.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Decrease the maximum allowed DNSALG session, or try to free some of the RAM used.
2.9.2. [ID: 1307] Flow failed
- Log Categories
- DNSALG
- Log Message
- Flow failed.
- Default Log Severity
- Notice
- Parameters
- reason, originator, sessionid, flow, rule
- Explanation
- An error occurred that caused the DNS flow to be aborted.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- None
2.9.3. [ID: 1306] DNS packet rejected
- Log Categories
- DNSALG
- Log Message
- DNS packet rejected.
- Default Log Severity
- Information
- Parameters
- sessionid, profile, reason, flow
- Explanation
- A DNS packet was rejected by the ALG.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Verify that the DNS clients are correctly configured.
2.9.4. [ID: 1308] Session closed
- Log Categories
- DNSALG
- Log Message
- Session closed.
- Default Log Severity
- Information
- Parameters
- sessionid, profile, flow
- Explanation
- A session using the DNS ALG was closed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.9.5. [ID: 1304] Session opened
- Log Categories
- DNSALG
- Log Message
- Session opened.
- Default Log Severity
- Information
- Parameters
- sessionid, profile, flow
- Explanation
- A session using the DNS ALG was opened.
- Gateway Action
- Open
- Action Description
- None
- Proposed Action
- None
2.9.6. [ID: 1302] Transaction closed
- Log Categories
- DNSALG
- Log Message
- Transaction closed.
- Default Log Severity
- Information
- Parameters
- sessionid, profile, transactionid, flow
- Explanation
- A transaction using the DNS ALG was closed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.9.7. [ID: 1305] Transaction opened
- Log Categories
- DNSALG
- Log Message
- Transaction opened.
- Default Log Severity
- Information
- Parameters
- sessionid, profile, transactionid, flow
- Explanation
- A transaction using the DNS ALG was opened.
- Gateway Action
- Open
- Action Description
- None
- Proposed Action
- None
These log messages refer to the DYNROUTE category.
2.10.1. [ID: 1319] Dynrouting message
- Log Categories
- DYNROUTE
- Log Message
- Dynrouting message.
- Default Log Severity
- Error
- Parameters
- module, msg
- Explanation
- This is a generic warning/error message from a dynroute module.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Contact customer support.
2.10.2. [ID: 1698] Failed to add socket rules
- Log Categories
- DYNROUTE
- Log Message
- Failed to add socket rules.
- Default Log Severity
- Warning
- Parameters
- remoteip, srcport, destport
- Explanation
- Failed to add socket rules in dataplane.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Contact customer support.
2.10.3. [ID: 1697] Failed to remove socket rules
- Log Categories
- DYNROUTE
- Log Message
- Failed to remove socket rules.
- Default Log Severity
- Warning
- Parameters
- remoteip, srcport, destport
- Explanation
- Failed to remove socket rules in dataplane.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Contact customer support.
2.10.4. [ID: 1312] Route lookup for dynrouting peer failed
- Log Categories
- DYNROUTE
- Log Message
- Route lookup for dynrouting peer failed.
- Default Log Severity
- Error
- Parameters
- remoteip, destport, table
- Explanation
- Unable to perform a route lookup for the dynrouting peer.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Update the referred routing table so that the peer IP becomes routable.
These log messages refer to the ETHERNET category.
2.11.1. [ID: 357] Broadcast Ethernet source
- Log Categories
- ETHERNET,STATELESS,VALIDATE
- Log Message
- Broadcast Ethernet source.
- Default Log Severity
- Warning
- Parameters
- srchw, pkt
- Explanation
- An Ethernet packet with the sender address set to the broadcast address was received.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- Legal uses for network packets with a broadcast Ethernet sender are rare. Consider adjusting the EthernetSettings:BroadcastEnetSender setting to drop these kind of packets.
2.11.2. [ID: 613] Broadcast Ethernet source
- Log Categories
- ETHERNET,STATELESS,VALIDATE
- Log Message
- Broadcast Ethernet source.
- Default Log Severity
- Warning
- Parameters
- srchw, pkt
- Explanation
- An Ethernet packet with the sender address set to the broadcast address was received.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Legal uses for network packets with a broadcast Ethernet sender are rare. The EthernetSettings:BroadcastEnetSender setting can be changed to allow these kind of packets.
2.11.3. [ID: 615] Multicast Ethernet source
- Log Categories
- ETHERNET,STATELESS,VALIDATE
- Log Message
- Multicast Ethernet source.
- Default Log Severity
- Warning
- Parameters
- srchw, pkt
- Explanation
- An Ethernet packet with the sender address set to a multicast address was received.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- Legal uses for network packets with a multicast Ethernet sender are rare. Consider adjusting the EthernetSettings:MulticastEnetSender setting to drop these kind of packets.
2.11.4. [ID: 428] Multicast Ethernet source
- Log Categories
- ETHERNET,STATELESS,VALIDATE
- Log Message
- Multicast Ethernet source.
- Default Log Severity
- Warning
- Parameters
- srchw, pkt
- Explanation
- An Ethernet packet with the sender address set to a multicast address was received.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Legal uses for network packets with a multicast Ethernet sender are rare. The EthernetSettings:MulticastEnetSender setting can be changed to allow these kind of packets.
2.11.5. [ID: 132] Not for me
- Log Categories
- ETHERNET,STATELESS,VALIDATE
- Log Message
- Not for me.
- Default Log Severity
- Debug
- Parameters
- srchw, desthw, recviface, pkt
- Explanation
- A unicast Ethernet packet has been received by interface recviface, but was dropped because the Ethernet destination of the packet was not that of this interface.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This message can be turned off using the setting MiscSettings:NotLocalEnetDest.
2.11.6. [ID: 327] Null Ethernet source
- Log Categories
- ETHERNET,STATELESS,VALIDATE
- Log Message
- Null Ethernet source.
- Default Log Severity
- Warning
- Parameters
- pkt
- Explanation
- An Ethernet packet with a sender address consisting of all zeroes was dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the EthernetSettings:NullEnetSender advanced setting to modify the logging Ethernet packets with a zero sender address.
2.11.7. [ID: 537] Unicast MAC with broadcast IP
- Log Categories
- ETHERNET,IPV4,STATELESS,VALIDATE
- Log Message
- Unicast MAC with broadcast IP.
- Default Log Severity
- Warning
- Parameters
- destip, desthw, pkt
- Explanation
- The Ethernet destination is unicast, but the IP destination is broadcast.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:MulticastIPEnetOnMismatch setting can be changed to control the gateway's behavior for multicast/broadcast IP packets on an Ethernet network, where
the Ethernet and the IP destination do not match.
2.11.8. [ID: 490] Unicast MAC with broadcast IP
- Log Categories
- ETHERNET,IPV4,STATELESS,VALIDATE
- Log Message
- Unicast MAC with broadcast IP.
- Default Log Severity
- Warning
- Parameters
- destip, desthw, pkt
- Explanation
- The Ethernet destination is unicast, but the IP destination is broadcast.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The IPSettings:MulticastIPEnetOnMismatch setting can be changed to control the gateway's behavior for multicast/broadcast IP packets on an Ethernet network, where
the Ethernet and the IP destination do not match. The recommended action is to drop these packets.
2.11.9. [ID: 229] Unicast MAC with multicast IP
- Log Categories
- ETHERNET,IPV4,STATELESS,VALIDATE
- Log Message
- Unicast MAC with multicast IP.
- Default Log Severity
- Warning
- Parameters
- destip, desthw, pkt
- Explanation
- The Ethernet destination is unicast, but the IP destination is multicast. This is a known exploit against some multicast protocol.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:MulticastIPEnetOnMismatch setting can be changed to control the gateway's behavior for multicast/broadcast IP packets on an Ethernet network, where
the Ethernet and the IP destination do not match.
2.11.10. [ID: 104] Unicast MAC with multicast IP
- Log Categories
- ETHERNET,IPV4,STATELESS,VALIDATE
- Log Message
- Unicast MAC with multicast IP.
- Default Log Severity
- Warning
- Parameters
- destip, desthw, pkt
- Explanation
- The Ethernet destination is unicast, but the IP destination is multicast. This is a known exploit against some multicast protocol.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The IPSettings:MulticastIPEnetOnMismatch setting can be changed to control the gateway's behavior for multicast/broadcast IP packets on an Ethernet network, where
the Ethernet and the IP destination do not match. The recommended action is to drop these packets.
2.11.11. [ID: 548] Non matching IP and MAC multicast
- Log Categories
- ETHERNET,IPV4,STATELESS,VALIDATE
- Log Message
- Non matching IP and MAC multicast.
- Default Log Severity
- Warning
- Parameters
- destip, desthw, pkt
- Explanation
- The Ethernet multicast destination does not match that of the IP multicast destination.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:MulticastIPEnetOnMismatch setting can be changed to control the gateway's behavior for multicast/broadcast IP packets on an Ethernet network, where
the Ethernet and the IP destination do not match.
2.11.12. [ID: 340] Non matching IP and MAC multicast
- Log Categories
- ETHERNET,IPV4,STATELESS,VALIDATE
- Log Message
- Non matching IP and MAC multicast.
- Default Log Severity
- Warning
- Parameters
- destip, desthw, pkt
- Explanation
- The Ethernet multicast destination does not match that of the IP multicast destination.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The IPSettings:MulticastIPEnetOnMismatch setting can be changed to control the gateway's behavior for multicast/broadcast IP packets on an Ethernet network, where
the Ethernet and the IP destination do not match. The recommended action is to drop these packets.
2.11.13. [ID: 627] Multicast MAC with unicast IP
- Log Categories
- ETHERNET,IPV4,STATELESS,VALIDATE
- Log Message
- Multicast MAC with unicast IP.
- Default Log Severity
- Warning
- Parameters
- destip, desthw, pkt
- Explanation
- The Ethernet destination is multicast, but the IP destination is not multicast.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:MulticastIPEnetOnMismatch setting can be changed to control the gateway's behavior for multicast/broadcast IP packets on an Ethernet network, where
the Ethernet and the IP destination do not match.
2.11.14. [ID: 423] Multicast MAC with unicast IP
- Log Categories
- ETHERNET,IPV4,STATELESS,VALIDATE
- Log Message
- Multicast MAC with unicast IP.
- Default Log Severity
- Warning
- Parameters
- destip, desthw, pkt
- Explanation
- The Ethernet destination is multicast, but the IP destination is not multicast.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The IPSettings:MulticastIPEnetOnMismatch setting can be changed to control the gateway's behavior for multicast/broadcast IP packets on an Ethernet network, where
the Ethernet and the IP destination do not match. The recommended action is to drop these packets.
2.11.15. [ID: 1665] IPv6 broadcast packet
- Log Categories
- ETHERNET,IPV6,STATELESS,VALIDATE
- Log Message
- IPv6 broadcast packet.
- Default Log Severity
- Warning
- Parameters
- srchw, desthw, recviface, pkt
- Explanation
- A multicast IPv6 packet, using a broadcast (or possibly some other type of non-conformal multicast) Ethernet destination,
was received. This is not supported by the IPv6 standard, and most appliances will ignore such traffic.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Investigate why these packets appear; identify, isolate and optionally update the source of the packets. As this type of messages
are illegal to use in IPv6 networks, yet are universally supported by all Ethernet II capable devices, there is still a possibility
that some network appliances will act in unexpected ways on the traffic. This in turn makes it a possible attack vector against
IPv6 multicast services such as, but not limited to, ND (neighbour discovery) and MLD. This log message can be disabled by
the IPSettings:LogNonIP4 setting.
2.11.16. [ID: 219] Unicast MAC with multicast IP
- Log Categories
- ETHERNET,IPV6,STATELESS,VALIDATE
- Log Message
- Unicast MAC with multicast IP.
- Default Log Severity
- Warning
- Parameters
- destip, desthw, pkt
- Explanation
- The Ethernet destination is unicast, but the IP destination is multicast. This is a known exploit against some multicast protocol.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:MulticastIPEnetOnMismatch setting can be changed to control the gateway's behavior for multicast/broadcast IP packets on an Ethernet network, where
the Ethernet and the IP destination do not match.
- Proposed Action
- The IPSettings:MulticastIPEnetOnMismatch setting can be changed to control the gateway's behavior for multicast/broadcast IP packets on an Ethernet network, where
the Ethernet and the IP destination do not match.
2.11.17. [ID: 362] Unicast MAC with multicast IP
- Log Categories
- ETHERNET,IPV6,STATELESS,VALIDATE
- Log Message
- Unicast MAC with multicast IP.
- Default Log Severity
- Warning
- Parameters
- destip, desthw, pkt
- Explanation
- The Ethernet destination is unicast, but the IP destination is multicast. This is a known exploit against some multicast protocol.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The IPSettings:MulticastIPEnetOnMismatch setting can be changed to control the gateway's behavior for multicast/broadcast IP packets on an Ethernet network, where
the Ethernet and the IP destination do not match. The recommended action is to drop these packets.
- Proposed Action
- The IPSettings:MulticastIPEnetOnMismatch setting can be changed to control the gateway's behavior for multicast/broadcast IP packets on an Ethernet network, where
the Ethernet and the IP destination do not match. The recommended action is to drop these packets.
2.11.18. [ID: 192] Non matching IP and MAC multicast
- Log Categories
- ETHERNET,IPV6,STATELESS,VALIDATE
- Log Message
- Non matching IP and MAC multicast.
- Default Log Severity
- Notice
- Parameters
- destip, desthw, pkt
- Explanation
- The Ethernet multicast destination does not match that of the IP multicast destination.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:MulticastIPEnetOnMismatch setting can be changed to control the gateway's behavior for multicast/broadcast IP packets on an Ethernet network, where
the Ethernet and the IP destination do not match.
2.11.19. [ID: 438] Non matching IP and MAC multicast
- Log Categories
- ETHERNET,IPV6,STATELESS,VALIDATE
- Log Message
- Non matching IP and MAC multicast.
- Default Log Severity
- Notice
- Parameters
- destip, desthw, pkt
- Explanation
- The Ethernet multicast destination does not match that of the IP multicast destination.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The IPSettings:MulticastIPEnetOnMismatch setting can be changed to control the gateway's behavior for multicast/broadcast IP packets on an Ethernet network, where
the Ethernet and the IP destination do not match. The recommended action is to drop these packets.
2.11.20. [ID: 595] Multicast MAC with unicast IP
- Log Categories
- ETHERNET,IPV6,STATELESS,VALIDATE
- Log Message
- Multicast MAC with unicast IP.
- Default Log Severity
- Warning
- Parameters
- destip, desthw, pkt
- Explanation
- The Ethernet destination is multicast, but the IP destination is not multicast.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:MulticastIPEnetOnMismatch setting can be changed to control the gateway's behavior for multicast/broadcast IP packets on an Ethernet network, where
the Ethernet and the IP destination do not match.
2.11.21. [ID: 397] Multicast MAC with unicast IP
- Log Categories
- ETHERNET,IPV6,STATELESS,VALIDATE
- Log Message
- Multicast MAC with unicast IP.
- Default Log Severity
- Warning
- Parameters
- destip, desthw, pkt
- Explanation
- The Ethernet destination is multicast, but the IP destination is not multicast.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The IPSettings:MulticastIPEnetOnMismatch setting can be changed to control the gateway's behavior for multicast/broadcast IP packets on an Ethernet network, where
the Ethernet and the IP destination do not match. The recommended action is to drop these packets.
These log messages refer to the FLOW category.
2.12.1. [ID: 1740] Flow HA sync failed unexpectedly
- Log Categories
- FLOW,HA
- Log Message
- Flow HA sync failed unexpectedly.
- Default Log Severity
- Notice
- Parameters
- error, matchkey
- Explanation
- The flow could not be installed on the inactive node due to some uncategorized error.
- Gateway Action
- Skip
- Action Description
- None
- Proposed Action
- None
2.12.2. [ID: 788] Flow HA sync failed due to ruleset lookup[...]
- Log Categories
- FLOW
- Log Message
- Flow HA sync failed due to ruleset lookup failure.
- Default Log Severity
- Error
- Parameters
- matchkey
- Explanation
- The flow could not be installed on the inactive node since the ruleset lookup on the inactive node failed.
- Gateway Action
- Skip
- Action Description
- None
- Proposed Action
- Make sure that logging is enabled on the rules that matches the traffic and look for other logs that could reveal the actual
cause of the ruleset lookup failure. Could, for instance, be related to resources (memory, port allocation, etc) or configuration.
2.12.3. [ID: 333] The flow cannot be updated to comply with[...]
- Log Categories
- FLOW
- Log Message
- The flow cannot be updated to comply with rule changes.
- Default Log Severity
- Notice
- Parameters
- conflictrule, flow, flowusage, app, rule, ruletype, ruleorigin, user, userid
- Explanation
- The rules had been changed in such a way that the flow state could not be updated to comply. Packets with the same traffic
parameters would still be able to setup new, slightly different, flow states but this flow state had to be closed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.12.4. [ID: 1007] Flow closed by application control
- Log Categories
- FLOW
- Log Message
- Flow closed by application control.
- Default Log Severity
- Information
- Parameters
- flow, flowusage, user, userid
- Explanation
- The flow was closed by the application control function.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.12.5. [ID: 1127] Flow closed by an ALG
- Log Categories
- FLOW
- Log Message
- Flow closed by an ALG.
- Default Log Severity
- Information
- Parameters
- flow, flowusage, geoip, app, rule, ruletype, ruleorigin, user, userid
- Explanation
- A flow was closed by an ALG.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.12.6. [ID: 460] Flow closed by admin
- Log Categories
- FLOW
- Log Message
- Flow closed by admin.
- Default Log Severity
- Notice
- Parameters
- flow, flowusage, geoip, app, user, userid
- Explanation
- The flow was closed by request of the administrator.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.12.7. [ID: 1644] Flow closed by module
- Log Categories
- FLOW
- Log Message
- Flow closed by module.
- Default Log Severity
- Information
- Parameters
- module, reason, flow, flowusage, geoip, app, user, userid
- Explanation
- A module in the system closed the flow, due to error condition or rule violation.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.12.8. [ID: 341] Flow closed due to random replacement
- Log Categories
- FLOW
- Log Message
- Flow closed due to random replacement.
- Default Log Severity
- Warning
- Parameters
- flow, flowusage, geoip, app, user, userid
- Explanation
- There was a shortage of free flows and therefore, one randomly selected active flow or flow-pair was removed. This only happens
when someone is trying to open more flows than the system has been configured to support. For instance, a distributed denial-of-service
attack might trigger this event.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Configure the system to support more simultaneous flows, or try to track down the host(s) that overloads the network.
2.12.9. [ID: 379] Flow closed due to timeout
- Log Categories
- FLOW
- Log Message
- Flow closed due to timeout.
- Default Log Severity
- Information
- Parameters
- flow, flowusage, geoip, app, rule, ruletype, ruleorigin, user, userid
- Explanation
- The flow or flow-pair was closed since it had exceeded its idle lifetime.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- The idle lifetime can be increased or decreased per protocol type or service.
2.12.10. [ID: 367] Flow closed due to reopen
- Log Categories
- FLOW
- Log Message
- Flow closed due to reopen.
- Default Log Severity
- Information
- Parameters
- flow, flowusage, app, user, userid
- Explanation
- A received packet belonged to another logical connection than the one represented by the flow state that matched the packet.
The flow state was closed so that a new flow state could be opened for the packet. Currently, this applies when receiving
a TCP SYN that does not match the state of the existing flow state.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- If a new TCP SYN is allowed to close an existing flow state and create a new flow state is controlled by the setting TCPSettings:TCPAllowReopen.
2.12.11. [ID: 111] The matching flow cannot be used for the[...]
- Log Categories
- FLOW
- Log Message
- The matching flow cannot be used for the packet anymore.
- Default Log Severity
- Debug
- Parameters
- pkt
- Explanation
- The flow that matched the packet was changed, that is, updated or closed and opened up again, while the packet was processed
by the gateway. The changes in the flow made it impossible to continue processing the packet so the packet had to be dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.12.12. [ID: 500] Out of memory during flow maintenance
- Log Categories
- FLOW,SYSTEM
- Log Message
- Out of memory during flow maintenance.
- Default Log Severity
- Emergency
- Parameters
-
- Explanation
- A memory allocation attempt failed while allocating memory needed for flow maintenance. Normal operation cannot be guaranteed.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- Investigate why the system is low on RAM. Review the configuration and try to free more RAM.
2.12.13. [ID: 400] Flow maintenance failed
- Log Categories
- FLOW
- Log Message
- Flow maintenance failed.
- Default Log Severity
- Error
- Parameters
- error, flow, flowusage, app, rule, ruletype, ruleorigin, user, userid
- Explanation
- The device failed to update a flow and had to close it. This can be a sign of a system-wide problem, for instance, low on
memory.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Search for other logs that can provide more information.
2.12.14. [ID: 300] There is no flow for the packet anymore
- Log Categories
- FLOW
- Log Message
- There is no flow for the packet anymore.
- Default Log Severity
- Debug
- Parameters
- pkt
- Explanation
- The flow that matched the packet was closed while the packet was processed by the gateway. Since the packet was partially
processed it could not safely be used to setup a new flow so the packet had to be dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.12.15. [ID: 224] Packet not allowed to trigger maintenance of[...]
- Log Categories
- FLOW
- Log Message
- Packet not allowed to trigger maintenance of the flow state.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- When trying to process a packet using a flow state, the flow state was found to be outdated. This packet could not be used
to update the flow state so the packet was dropped. There are several reasons why a packet cannot be used to trigger an update
of a flow state, for instance, that the packet has been partially processed or that the packet is related to the flow state
rather than belonging to the connection that the flow state represents. One example of related packets is ICMP errors.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.12.16. [ID: 424] The flow is not allowed anymore
- Log Categories
- FLOW
- Log Message
- The flow is not allowed anymore.
- Default Log Severity
- Notice
- Parameters
- conflictrule, flow, flowusage, app, rule, ruletype, ruleorigin, user, userid
- Explanation
- The rules had been changed so that the flow was not allowed anymore.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- If this flow should be allowed then verify that recent configuration changes are correct.
2.12.17. [ID: 1062] Not security equivalent after route change
- Log Categories
- FLOW
- Log Message
- Not security equivalent after route change.
- Default Log Severity
- Notice
- Parameters
- conflictrule, flow, flowusage, app, rule, ruletype, ruleorigin, user, userid
- Explanation
- The routes had been changed in such a way that the flow state would have been routed through interfaces that were not security
equivalent with the ones originally used. Packets with the same traffic parameters would still be able to setup new, slightly
different, flow states but this flow state had to be closed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.12.18. [ID: 372] Flow opened
- Log Categories
- FLOW
- Log Message
- Flow opened.
- Default Log Severity
- Information
- Parameters
- trafficshaping, route, sessionid, ipsrule, flow, geoip, app, rule, ruletype, ruleorigin, user, userid
- Explanation
- A packet was received that triggered a new stateful flow to be created.
- Gateway Action
- Open
- Action Description
- None
- Proposed Action
- None
2.12.19. [ID: 1014] Flow opened stateless
- Log Categories
- FLOW
- Log Message
- Flow opened stateless.
- Default Log Severity
- Information
- Parameters
- trafficshaping, route, sessionid, ipsrule, flow, geoip, rule, ruletype, ruleorigin, user, userid
- Explanation
- A packet was received that triggered a new stateless flow to be created. Packets forwarded on stateless flows are only subject
for stateless packet validation.
- Gateway Action
- Open
- Action Description
- None
- Proposed Action
- None
2.12.20. [ID: 1390] Out of memory when attempting to allocate[...]
- Log Categories
- FLOW,SYSTEM
- Log Message
- Out of memory when attempting to allocate flow data.
- Default Log Severity
- Emergency
- Parameters
- matchkey
- Explanation
- The system was out of memory and failed to allocate a new flow. All new traffic may have been completely locked out.
- Gateway Action
- Discard
- Action Description
- The system was unable to open a flow, even though policy allowed it
- Proposed Action
- Investigate why the system is low on RAM. Contact technical support if the cause is not obvious.
2.12.21. [ID: 543] Reject flow opened
- Log Categories
- FLOW
- Log Message
- Reject flow opened.
- Default Log Severity
- Warning
- Parameters
- trafficshaping, route, flow, geoip, rule, user, userid
- Explanation
- A packet matched a reject rule and a corresponding reject flow was created. A reject flow is a flow with the purpose of rejecting
future packets matching the same parameters as the original packet.
- Gateway Action
- Open
- Action Description
- None
- Proposed Action
- None
2.12.22. [ID: 1646] Failed to reopen flow
- Log Categories
- FLOW
- Log Message
- Failed to reopen flow.
- Default Log Severity
- Error
- Parameters
- error, flow, rule, ruletype, ruleorigin, user, userid
- Explanation
- The system failed to reopen the flow. The flow will remain closed and the packet will be dropped.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.12.23. [ID: 122] Flow reopened
- Log Categories
- FLOW
- Log Message
- Flow reopened.
- Default Log Severity
- Information
- Parameters
- flow, app, user, userid
- Explanation
- A packet was received that triggered a new stateful flow to be created.
- Gateway Action
- Open
- Action Description
- None
- Proposed Action
- None
2.12.24. [ID: 790] Failed to setup flow due to ruleset lookup[...]
- Log Categories
- FLOW
- Log Message
- Failed to setup flow due to ruleset lookup failure.
- Default Log Severity
- Error
- Parameters
- pkt
- Explanation
- A flow could not be opened for the packet since the ruleset lookup failed. The packet was dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Make sure that logging is enabled on the rules that matches the traffic and look for other logs that could reveal the actual
cause of the ruleset lookup failure. Could, for instance, be related to resources (memory, port allocation, etc) or configuration.
2.12.25. [ID: 521] Flow maintenance failed
- Log Categories
- FLOW
- Log Message
- Flow maintenance failed.
- Default Log Severity
- Notice
- Parameters
- error, flow, flowusage, app, rule, ruletype, ruleorigin, user, userid
- Explanation
- The device failed to update a flow and had to close it. This can be a sign of a problem related to this particular flow but
it can also be sign of a system-wide problem, for instance, out of memory.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Search for other logs that can provide more information.
2.12.26. [ID: 1314] Packet MD5 digest did not match packet data
- Log Categories
- FLOW,TCP,BGP
- Log Message
- Packet MD5 digest did not match packet data.
- Default Log Severity
- Error
- Parameters
- pkt
- Explanation
- MD5 digest included in packet did not match rest of the packet data.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Check BGP neighbor configuration.
2.12.27. [ID: 1320] Failed to insert MD5 digest to packet
- Log Categories
- FLOW,TCP,BGP
- Log Message
- Failed to insert MD5 digest to packet.
- Default Log Severity
- Error
- Parameters
- pkt
- Explanation
- System was unable to add MD5 digest to packet.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Contact customer support.
2.12.28. [ID: 1317] Packet did not contain md5 digest
- Log Categories
- FLOW,TCP,BGP
- Log Message
- Packet did not contain md5 digest.
- Default Log Severity
- Error
- Parameters
- pkt
- Explanation
- Packet did not contain any MD5 digest.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.12.29. [ID: 1309] Packet is too small to contain MD5 digest
- Log Categories
- FLOW,TCP,BGP
- Log Message
- Packet is too small to contain MD5 digest.
- Default Log Severity
- Error
- Parameters
- pkt
- Explanation
- Packet is too small to contain MD5 digest.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.12.30. [ID: 1056] Same pipe used twice in same flow
- Log Categories
- FLOW,PIPES
- Log Message
- Same pipe used twice in same flow.
- Default Log Severity
- Warning
- Parameters
- pipe, conflictrule, rule
- Explanation
- The same pipe object pipe has been applied twice to the same flow by two different rules (rule and conflictrule). The effect of this is probably undesirable. Whether to log this event is controlled by the MiscSettings:PipeDupLog setting.
- Gateway Action
- Ignore
- Action Description
- None
- Proposed Action
- Review the configuration and consider re-arranging rules and traffic profiles so that no pipe object can be added by different
rules matching the same traffic.
2.12.31. [ID: 1389] Not enough ICMP data for protocol translation
- Log Categories
- FLOW,NAT64
- Log Message
- Not enough ICMP data for protocol translation.
- Default Log Severity
- Notice
- Parameters
- pkt
- Explanation
- An ICMP error was dropped because its payload was not large enough for protocol translation.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.12.32. [ID: 1397] Protocol translation was not applicable
- Log Categories
- FLOW,NAT64
- Log Message
- Protocol translation was not applicable.
- Default Log Severity
- Notice
- Parameters
- pkt
- Explanation
- An ICMP message was dropped because there was no applicable protocol translation.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.12.33. [ID: 1391] Unsupported media header in protocol[...]
- Log Categories
- FLOW,NAT64
- Log Message
- Unsupported media header in protocol translation.
- Default Log Severity
- Notice
- Parameters
- pkt
- Explanation
- A packet with an unsupported media header was dropped when attempting protocol translation.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.12.34. [ID: 1388] Unsupported transport header in protocol[...]
- Log Categories
- FLOW,NAT64
- Log Message
- Unsupported transport header in protocol translation.
- Default Log Severity
- Notice
- Parameters
- pkt
- Explanation
- A packet with an unsupported transport header was dropped when attempting protocol translation.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
These log messages refer to the FQDN category.
2.13.1. [ID: 1400] Added FQDN IP to netobject
- Log Categories
- FQDN
- Log Message
- Added FQDN IP to netobject.
- Default Log Severity
- Information
- Parameters
- name, fqdn, ip
- Explanation
- A new IP address has been resolved and added for a FQDN set on a netobject.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.13.2. [ID: 1413] All IP addresses expired for FQDN in netobject
- Log Categories
- FQDN
- Log Message
- All IP addresses expired for FQDN in netobject.
- Default Log Severity
- Warning
- Parameters
- name, fqdn
- Explanation
- All IP addresses for a FQDN in a netobject has expired. This might mean that the DNS server is no longer reachable.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check the DNS server.
2.13.3. [ID: 1422] Could not resolve FQDN for netobject
- Log Categories
- FQDN
- Log Message
- Could not resolve FQDN for netobject.
- Default Log Severity
- Warning
- Parameters
- name, fqdn, type
- Explanation
- It was not possible to resolve a FQDN set on a netobject. Either the FQDN does not exist, or it was not possible to reach
DNS server.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check the FQDN for spelling mistakes, and that the DNS server is reachable.
2.13.4. [ID: 1423] IP expired from netobject
- Log Categories
- FQDN
- Log Message
- IP expired from netobject.
- Default Log Severity
- Notice
- Parameters
- name, fqdn, ip
- Explanation
- An IP address reached the time it is valid after TTL has expired, and was removed from netobject.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Increase the FQDNValidAfterTTL if it is necessary to keep IP addresses longer after the TTL has expired.
These log messages refer to the FRAG category.
2.14.1. [ID: 505] Fragment with invalid offset
- Log Categories
- FRAG,VALIDATE,STATEFUL
- Log Message
- Fragment with invalid offset.
- Default Log Severity
- Error
- Parameters
- pkt
- Explanation
- A fragment with invalid offset was received.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the FragSettings:IllegalFrags setting to modify the handling of illegal fragments.
2.14.2. [ID: 617] The fragment has an invalid IP data length
- Log Categories
- FRAG,VALIDATE,STATELESS
- Log Message
- The fragment has an invalid IP data length.
- Default Log Severity
- Error
- Parameters
- datalen, pkt
- Explanation
- The partly reassembled IP packet has an invalid IP data length.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the FragSettings:IllegalFrags setting to modify the handling of illegal fragments.
2.14.3. [ID: 495] Dropping stored fragments of disallowed packet
- Log Categories
- FRAG,VALIDATE,STATEFUL
- Log Message
- Dropping stored fragments of disallowed packet.
- Default Log Severity
- Warning
- Parameters
- count, srcip, destip, ipproto, fragid, state, value
- Explanation
- The fragments of a disallowed IP packet were dropped. The count parameter displays the number of freed fragments while the value parameter contains fragment offset and IP length for the freed fragments.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the FragSettings:DroppedFrags setting to modify the logging of dropped fragments.
2.14.4. [ID: 389] Dropping duplicate fragment
- Log Categories
- FRAG,VALIDATE,STATEFUL
- Log Message
- Dropping duplicate fragment.
- Default Log Severity
- Warning
- Parameters
- pkt
- Explanation
- A duplicate fragment of an IP packet was received.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the FragSettings:DuplicateFrags setting to modify the logging of duplicate fragments.
2.14.5. [ID: 174] Duplicate fragment with different data[...]
- Log Categories
- FRAG,VALIDATE,STATEFUL
- Log Message
- Duplicate fragment with different data received.
- Default Log Severity
- Error
- Parameters
- pkt
- Explanation
- The fragment was a duplicate of an already received fragment, but the fragment data differed.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the FragSettings:IllegalFrags setting to modify the handling of illegal fragments.
2.14.6. [ID: 525] Duplicate fragment with different length[...]
- Log Categories
- FRAG,VALIDATE,STATEFUL
- Log Message
- Duplicate fragment with different length received.
- Default Log Severity
- Error
- Parameters
- pkt
- Explanation
- The fragment was a duplicate of an already received fragment, but the fragment lengths differed.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the FragSettings:IllegalFrags setting to modify the handling of illegal fragments.
2.14.7. [ID: 343] Dropping duplicate fragment of suspect packet
- Log Categories
- FRAG,VALIDATE,STATEFUL
- Log Message
- Dropping duplicate fragment of suspect packet.
- Default Log Severity
- Warning
- Parameters
- pkt
- Explanation
- A duplicate fragment of a suspect IP packet was received.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the FragSettings:DuplicateFrags setting to modify the logging of duplicate fragments.
2.14.8. [ID: 528] Dropping extraneous fragments of completed[...]
- Log Categories
- FRAG,VALIDATE,STATEFUL
- Log Message
- Dropping extraneous fragments of completed packet.
- Default Log Severity
- Warning
- Parameters
- count, srcip, destip, ipproto, fragid, state, value
- Explanation
- A completed reassembled IP packet contained extraneous fragments, which were dropped. The count parameter displays the number of freed fragments while the value parameter contains fragment offset and IP length for the freed fragments.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the FragSettings:IllegalFrags setting to modify the handling of illegal fragments.
2.14.9. [ID: 473] Fragment offset plus length not in range
- Log Categories
- FRAG,VALIDATE,STATELESS
- Log Message
- Fragment offset plus length not in range.
- Default Log Severity
- Error
- Parameters
- minlen, maxlen, pkt
- Explanation
- The fragment offset and length would be outside of the allowed IP size range.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the LengthLimSettings:LogOversizedPackets setting to modify the logging of over sized packets.
2.14.10. [ID: 171] Dropping extraneous fragment of completed[...]
- Log Categories
- FRAG,VALIDATE,STATEFUL
- Log Message
- Dropping extraneous fragment of completed packet.
- Default Log Severity
- Warning
- Parameters
- pkt
- Explanation
- A completed reassembled IP packet contained an extraneous fragment, which was dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the FragSettings:IllegalFrags setting to modify the handling of illegal fragments.
2.14.11. [ID: 100] Dropping fragment of disallowed packet
- Log Categories
- FRAG,VALIDATE,STATEFUL
- Log Message
- Dropping fragment of disallowed packet.
- Default Log Severity
- Warning
- Parameters
- pkt
- Explanation
- A fragment of a disallowed IP packet was dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the FragSettings:DroppedFrags setting to modify the logging of dropped fragments.
2.14.12. [ID: 383] Dropping fragment of disallowed suspect packet
- Log Categories
- FRAG,VALIDATE,STATEFUL
- Log Message
- Dropping fragment of disallowed suspect packet.
- Default Log Severity
- Warning
- Parameters
- pkt
- Explanation
- A fragment of a disallowed suspect IP packet was dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the FragSettings:DroppedFrags setting to modify the logging of dropped fragments.
2.14.13. [ID: 582] Dropping fragment of failed packet
- Log Categories
- FRAG,VALIDATE,STATEFUL
- Log Message
- Dropping fragment of failed packet.
- Default Log Severity
- Warning
- Parameters
- pkt
- Explanation
- A fragment of a failed IP packet was dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the FragSettings:FragReassemblyFail setting to modify the logging of failed packet reassembly attempts.
2.14.14. [ID: 248] Dropping fragment of failed suspect packet
- Log Categories
- FRAG,VALIDATE,STATEFUL
- Log Message
- Dropping fragment of failed suspect packet.
- Default Log Severity
- Warning
- Parameters
- pkt
- Explanation
- A fragment of a failed suspect IP packet was dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the FragSettings:FragReassemblyFail setting to modify the logging of failed packet reassembly attempts.
2.14.15. [ID: 336] Dropping fragment of illegal packet
- Log Categories
- FRAG,VALIDATE,STATEFUL
- Log Message
- Dropping fragment of illegal packet.
- Default Log Severity
- Warning
- Parameters
- pkt
- Explanation
- A fragment of an illegal IP packet was dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- FRAG_DropIllegal
2.14.16. [ID: 203] Fragmented ICMP error
- Log Categories
- FRAG,VALIDATE,STATELESS
- Log Message
- Fragmented ICMP error.
- Default Log Severity
- Warning
- Parameters
- type, pkt
- Explanation
- A disallowed fragmented ICMP error message was received. Only "Echo" and "EchoReply" are allowed to be fragmented.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the FragSettings:FragmentedICMP setting to modify the handling of fragmented ICMP error messages.
2.14.17. [ID: 577] Fragments partially overlap
- Log Categories
- FRAG,VALIDATE,STATEFUL
- Log Message
- Fragments partially overlap.
- Default Log Severity
- Error
- Parameters
- pkt
- Explanation
- Two fragments partially overlap.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the FragSettings:IllegalFrags setting to modify the handling of illegal fragments.
2.14.18. [ID: 570] Dropping fragments of illegal packet
- Log Categories
- FRAG,VALIDATE,STATEFUL
- Log Message
- Dropping fragments of illegal packet.
- Default Log Severity
- Warning
- Parameters
- count, srcip, destip, ipproto, fragid, state, value
- Explanation
- The fragments of an illegal IP packet were dropped. The count parameter displays the number of freed fragments while the value parameter contains fragment offset and IP length for the freed fragments.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the FragSettings:IllegalFrags setting to modify the handling of illegal fragments.
2.14.19. [ID: 380] Fragment offset plus length is greater than[...]
- Log Categories
- FRAG,VALIDATE,STATELESS
- Log Message
- Fragment offset plus length is greater than the configured maximum.
- Default Log Severity
- Error
- Parameters
- max, pkt
- Explanation
- The fragment offset plus length would result in a greater length than the configured maximum length of an IP packet.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the LengthLimSettings:LogOversizedPackets setting to modify the logging of over sized packets.
2.14.20. [ID: 265] Out of reassembly resources
- Log Categories
- FRAG,VALIDATE,STATELESS
- Log Message
- Out of reassembly resources.
- Default Log Severity
- Critical
- Parameters
- count, srcip, destip, ipproto, fragid, state, value
- Explanation
- Out of fragmentation reassembly resources when processing the IP packet. Dropping packet and freeing resources. The count parameter displays the number of freed fragments while the value parameter contains fragment offset and IP length for the freed fragments.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the FragSettings:FragReassemblyFail setting to modify the logging of failed packet reassembly attempts.
2.14.21. [ID: 414] Out of reassembly resources for suspect packet
- Log Categories
- FRAG,VALIDATE,STATELESS
- Log Message
- Out of reassembly resources for suspect packet.
- Default Log Severity
- Critical
- Parameters
- count, srcip, destip, ipproto, fragid, state, value
- Explanation
- Out of fragmentation reassembly resources when processing the suspect IP packet. Dropping packet and freeing resources. The
count parameter displays the number of freed fragments while the value parameter contains fragment offset and IP length for the freed fragments.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the FragSettings:FragReassemblyFail setting to modify the logging of failed packet reassembly attempts.
2.14.22. [ID: 159] Fragment overlapping next fragment offset
- Log Categories
- FRAG,VALIDATE,STATEFUL
- Log Message
- Fragment overlapping next fragment offset.
- Default Log Severity
- Error
- Parameters
- pkt
- Explanation
- This fragment would overlap the next fragment offset.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the FragSettings:IllegalFrags setting to modify the handling of illegal fragments.
2.14.23. [ID: 516] Dropping stored fragments of disallowed[...]
- Log Categories
- FRAG,VALIDATE,STATEFUL
- Log Message
- Dropping stored fragments of disallowed suspect packet.
- Default Log Severity
- Warning
- Parameters
- count, srcip, destip, ipproto, fragid, state, value
- Explanation
- The fragments of a disallowed suspect IP packet were dropped. The count parameter displays the number of freed fragments while the value parameter contains fragment offset and IP length for the freed fragments.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- FRAG_DropDisallowed
2.14.24. [ID: 289] Time out reassembling
- Log Categories
- FRAG,VALIDATE,STATEFUL
- Log Message
- Time out reassembling.
- Default Log Severity
- Critical
- Parameters
- count, srcip, destip, ipproto, fragid, state, value
- Explanation
- Timed out when reassembling a fragmented IP packet. Dropping packet. The count parameter displays the number of freed fragments while the value parameter contains fragment offset and IP length for the freed fragments.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the FragSettings:FragReassemblyFail setting to modify the logging of failed packet reassembly attempts.
2.14.25. [ID: 326] Time out reassembling suspect
- Log Categories
- FRAG,VALIDATE,STATEFUL
- Log Message
- Time out reassembling suspect.
- Default Log Severity
- Critical
- Parameters
- count, srcip, destip, ipproto, fragid, state, value
- Explanation
- Timed out when reassembling a fragmented suspect IP packet. The count parameter displays the number of freed fragments while the value parameter contains fragment offset and IP length for the freed fragments.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the FragSettings:FragReassemblyFail setting to modify the logging of failed packet reassembly attempts.
2.14.26. [ID: 126] Fragmented ICMP error
- Log Categories
- FRAG,VALIDATE,STATELESS
- Log Message
- Fragmented ICMP error.
- Default Log Severity
- Warning
- Parameters
- type, pkt
- Explanation
- A disallowed fragmented ICMP error message was received. Only "Echo" and "EchoReply" are allowed to be fragmented.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- Change the FragSettings:FragmentedICMP setting to modify the handling of fragmented ICMP error messages.
These log messages refer to the FTPALG category.
2.15.1. [ID: 1146] CLNT command not allowed
- Log Categories
- FTPALG
- Log Message
- CLNT command not allowed.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, cmdline, flow
- Explanation
- The client tried to issue a "CLNT" command, which is not valid since the client is not allowed to do this. The command will
be rejected.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- If the client should be allowed to issue "CLNT" commands, modify the FTP profile configuration.
2.15.2. [ID: 1163] Command rate limit exceeded on session
- Log Categories
- FTPALG
- Log Message
- Command rate limit exceeded on session.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, max, flow
- Explanation
- The configured command rate limit was exceeded on a session.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- If this occurs during normal usage, consider increasing the limit configured on the FTP profile.
2.15.3. [ID: 1144] Data channel traffic direction restricted
- Log Categories
- FTPALG
- Log Message
- Data channel traffic direction restricted.
- Default Log Severity
- Information
- Parameters
- profile, sessionid, command, alloweddir
- Explanation
- Traffic on the data channel should only flow in one direction depending on which FTP command was issued. As the rule allowing
the data channel is created before the direction is known, it is modified to restrict the direction once the allowed direction
is learned.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.15.4. [ID: 1116] Disallowed client IP
- Log Categories
- FTPALG
- Log Message
- Disallowed client IP.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, ip, flow
- Explanation
- The client want the server to connect the data channel to an IP which is not the clients own IP.
- Gateway Action
- Deny
- Action Description
- None
- Proposed Action
- None
2.15.5. [ID: 1096] Client port outside configured range
- Log Categories
- FTPALG
- Log Message
- Client port outside configured range.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, port, portrange, flow
- Explanation
- The client tried to use a port for the data channel which is disallowed by the ClientPorts setting in the FTPAlgProfile used.
- Gateway Action
- Deny
- Action Description
- None
- Proposed Action
- None
2.15.6. [ID: 1149] Disallowed MODE argument
- Log Categories
- FTPALG
- Log Message
- Disallowed MODE argument.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, cmdline, flow
- Explanation
- The client has tried to issue a MODE command to use block mode or compressed mode, which is disallowed. Command is rejected.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- None
2.15.7. [ID: 1103] Disallowed OPTS argument
- Log Categories
- FTPALG
- Log Message
- Disallowed OPTS argument.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, cmdline, flow
- Explanation
- A disallowed OPTS argument was received, and the command will be rejected.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- None
2.15.8. [ID: 1154] Mismatched data channel IP protocol
- Log Categories
- FTPALG
- Log Message
- Mismatched data channel IP protocol.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, ipver, flow
- Explanation
- The client has tried to negotiate a different IP protocol for the data channel than the protocol it is using to connect to
the ftp server on the control channel.
- Gateway Action
- Deny
- Action Description
- None
- Proposed Action
- None
2.15.9. [ID: 1125] Disallowed server IP
- Log Categories
- FTPALG
- Log Message
- Disallowed server IP.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, ip, flow
- Explanation
- The server wants the client to connect the data channel to an IP which is not the servers own IP.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.15.10. [ID: 1104] Server port outside configured range
- Log Categories
- FTPALG
- Log Message
- Server port outside configured range.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, port, portrange, flow
- Explanation
- The server tried to use a port for the data channel which is disallowed by the ServerPorts setting in the FTPAlgProfile used.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.15.11. [ID: 1145] Command is illegal since EPSV ALL is in effect
- Log Categories
- FTPALG
- Log Message
- Command is illegal since EPSV ALL is in effect.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, cmdline, flow
- Explanation
- The client has already issued an "EPSV ALL" command and may no longer use any of the commands PORT, PASV or EPRT.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- None
2.15.12. [ID: 1095] Failed setting up data channel rule from[...]
- Log Categories
- FTPALG
- Log Message
- Failed setting up data channel rule from server to client.
- Default Log Severity
- Error
- Parameters
- sessionid, profile, srcip, destip, srcport, destport, flow
- Explanation
- An error occurred when creating a data connection from the server to client. This could possibly be a result of lack of memory.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.15.13. [ID: 1108] Failed setting up data channel rule from[...]
- Log Categories
- FTPALG
- Log Message
- Failed setting up data channel rule from client to server.
- Default Log Severity
- Error
- Parameters
- sessionid, profile, srcip, destip, srcport, destport, flow
- Explanation
- An error occurred when creating a data connection from the client to server. This could possibly be a result of lack of memory.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.15.14. [ID: 1135] Failed parsing EPRT command
- Log Categories
- FTPALG
- Log Message
- Failed parsing EPRT command.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, cmdline, flow
- Explanation
- Invalid parameters to the "EPRT" command were received. The connection will be closed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.15.15. [ID: 1157] Failed parsing EPSV command
- Log Categories
- FTPALG
- Log Message
- Failed parsing EPSV command.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, cmdline, flow
- Explanation
- Invalid parameters to the "EPSV" command were received. The command was rejected with an error message to the client.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- None
2.15.16. [ID: 1132] Failed parsing EPSV response
- Log Categories
- FTPALG
- Log Message
- Failed parsing EPSV response.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, cmdline, flow
- Explanation
- The response to the "EPSV" command was not formatted according to the standard. The connection will be closed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.15.17. [ID: 1143] Failed parsing PASV response
- Log Categories
- FTPALG
- Log Message
- Failed parsing PASV response.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, cmdline, flow
- Explanation
- The response to the "PASV" command was not formatted according to the standard. The connection will be closed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.15.18. [ID: 1124] Failed parsing PORT command
- Log Categories
- FTPALG
- Log Message
- Failed parsing PORT command.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, cmdline, flow
- Explanation
- Invalid parameters to the "PORT" command were received. The connection will be closed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.15.19. [ID: 1086] Failed to create new session
- Log Categories
- FTPALG
- Log Message
- Failed to create new session.
- Default Log Severity
- Error
- Parameters
-
- Explanation
- An attempt to create a new FTPALG session failed, because the unit is out of memory.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Decrease the maximum allowed FTPALG sessions, or try to free some of the RAM used.
2.15.20. [ID: 1100] Control channel failed
- Log Categories
- FTPALG
- Log Message
- Control channel failed.
- Default Log Severity
- Notice
- Parameters
- reason, originator, sessionid, flow, rule
- Explanation
- An error occurred that caused the FTP control channel to be aborted.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- None
2.15.21. [ID: 1113] Illegal command received
- Log Categories
- FTPALG
- Log Message
- Illegal command received.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, cmdline, flow
- Explanation
- An illegal command was received, and the command will be rejected.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- None
2.15.22. [ID: 1110] Illegal multiline response from server
- Log Categories
- FTPALG
- Log Message
- Illegal multiline response from server.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, cmdline, flow
- Explanation
- An illegal multiline response was received from server, and the connection will be closed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.15.23. [ID: 1089] Illegal numeric reply from server
- Log Categories
- FTPALG
- Log Message
- Illegal numeric reply from server.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, cmdline, flow
- Explanation
- An illegal numerical reply was received from server, and the connection will be closed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.15.24. [ID: 1112] Invalid command from client
- Log Categories
- FTPALG
- Log Message
- Invalid command from client.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, cmdline, flow
- Explanation
- An invalid command was received on the control channel. This is not allowed, and the connection will be closed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- If unknown commands should be allowed, modify the FTP profile configuration.
2.15.25. [ID: 1156] Invalid MODE argument
- Log Categories
- FTPALG
- Log Message
- Invalid MODE argument.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, cmdline, flow
- Explanation
- The client has issued a MODE command with an invalid argument. Command is rejected.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- None
2.15.26. [ID: 1092] Invalid OPTS argument
- Log Categories
- FTPALG
- Log Message
- Invalid OPTS argument.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, cmdline, flow
- Explanation
- An invalid OPTS argument was received. The argument does not start with an alphabetic letter, and the command will be rejected.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- None
2.15.27. [ID: 1102] Maximum line length exceeded
- Log Categories
- FTPALG
- Log Message
- Maximum line length exceeded.
- Default Log Severity
- Error
- Parameters
- maxlen, len, originator, sessionid, profile, flow, rule
- Explanation
- The maximum length of a text line sent over the control channel was exceeded, and the session will be closed. Note that the
len parameter may or may not contain the full length of the violating line, it may contain the length of a partial line that
exceeds the limit.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- Sending long lines might be an attempt to attack software that fails to handle lines above a certain length. If this incident
is unlikely to be an attack then consider increasing the limit. The maximum line length is a configuration property of the
FTP profile object.
2.15.28. [ID: 1161] No data channel setup yet
- Log Categories
- FTPALG
- Log Message
- No data channel setup yet.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, cmdline, flow
- Explanation
- A command which requires a data channel was issued without first having setup a data channel. The command is rejected.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- None
2.15.29. [ID: 1140] Data channel dynamic PREPBR rule added
- Log Categories
- FTPALG
- Log Message
- Data channel dynamic PREPBR rule added.
- Default Log Severity
- Information
- Parameters
- profile, sessionid, command, srcip, destip, srcport, destport, srciface
- Explanation
- To ensure that the data channel always uses the same routing tables as the control channel, a PREPBR rule has been added to
the system.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.15.30. [ID: 1148] Data channel dynamic PREPBR rule removed
- Log Categories
- FTPALG
- Log Message
- Data channel dynamic PREPBR rule removed.
- Default Log Severity
- Information
- Parameters
- profile, sessionid, command, srcip, destip, srcport, destport, srciface
- Explanation
- A PREPBR rule, which was added to ensure that the data channel always uses the same routing tables as the control channel,
has now been removed.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.15.31. [ID: 1093] Invalid command from client
- Log Categories
- FTPALG
- Log Message
- Invalid command from client.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, cmdline, flow
- Explanation
- An invalid command was received on the control channel. This is allowed, but the command will be rejected as it is not understood.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- If unknown commands should not be allowed, modify the FTP profile configuration.
2.15.32. [ID: 1097] Data channel dynamic rule added
- Log Categories
- FTPALG
- Log Message
- Data channel dynamic rule added.
- Default Log Severity
- Information
- Parameters
- profile, sessionid, command, srcip, destip, srcport, destport, srciface, destiface
- Explanation
- FTPALG has added a dynamic rule to allow the data channel for FTP.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.15.33. [ID: 1099] Data channel dynamic rule removed
- Log Categories
- FTPALG
- Log Message
- Data channel dynamic rule removed.
- Default Log Severity
- Information
- Parameters
- profile, sessionid, command, srcip, destip, srcport, destport, srciface, destiface
- Explanation
- FTPALG has removed a dynamic rule it added previously to allow the data channel for FTP.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.15.34. [ID: 1119] Session closed
- Log Categories
- FTPALG
- Log Message
- Session closed.
- Default Log Severity
- Information
- Parameters
- sessionid, profile, flow
- Explanation
- A session using the FTP ALG was closed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.15.35. [ID: 1105] Session opened
- Log Categories
- FTPALG
- Log Message
- Session opened.
- Default Log Severity
- Information
- Parameters
- sessionid, profile, flow
- Explanation
- A session using the FTP ALG was opened.
- Gateway Action
- Open
- Action Description
- None
- Proposed Action
- None
2.15.36. [ID: 1153] SITE EXEC not allowed
- Log Categories
- FTPALG
- Log Message
- SITE EXEC not allowed.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, cmdline, flow
- Explanation
- The client tried to issue a "SITE EXEC" command, which is not valid since the client is not allowed to do this. The command
will be rejected.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- If the client should be allowed to issue "SITE EXEC" commands, modify the FTP profile configuration.
2.15.37. [ID: 1114] Unexpected telnet control chars from client
- Log Categories
- FTPALG
- Log Message
- Unexpected telnet control chars from client.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, flow
- Explanation
- Unexpected telnet control characters were discovered in the control channel. This is not allowed according to the FTPALG profile
configuration, and the connection will be closed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- If unknown commands should be allowed, modify the FTP profile configuration.
2.15.38. [ID: 1106] Unexpected telnet control chars from server
- Log Categories
- FTPALG
- Log Message
- Unexpected telnet control chars from server.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, flow
- Explanation
- Unexpected telnet control characters were discovered in the control channel. This is not allowed according to the FTP profile
configuration, and the connection will be closed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- If unknown commands should be allowed, modify the FTP profile configuration.
2.15.39. [ID: 1090] Unknown command received
- Log Categories
- FTPALG
- Log Message
- Unknown command received.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, cmdline, flow
- Explanation
- An unknown command was received, and the command will be rejected.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- If unknown commands should be allowed, modify the FTP profile configuration.
2.15.40. [ID: 1321] Unknown FEAT response from server
- Log Categories
- FTPALG
- Log Message
- Unknown FEAT response from server.
- Default Log Severity
- Information
- Parameters
- sessionid, profile, cmdline, flow
- Explanation
- An unknown FEAT response was received from server and was stripped.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- If the FEAT response the server sent is needed, change the FTP profile to allow unknown commands.
2.15.41. [ID: 1111] Unknown OPTS argument
- Log Categories
- FTPALG
- Log Message
- Unknown OPTS argument.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, cmdline, flow
- Explanation
- An unknown OPTS argument was received, and the command will be rejected.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- If unknown commands should be allowed, modify the FTP profile configuration.
2.15.42. [ID: 1131] Unsolicited extended passive mode response[...]
- Log Categories
- FTPALG
- Log Message
- Unsolicited extended passive mode response from server.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, flow
- Explanation
- An illegal response was received from the server, and the connection is closed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.15.43. [ID: 1122] Unsolicited passive mode response from server
- Log Categories
- FTPALG
- Log Message
- Unsolicited passive mode response from server.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, flow
- Explanation
- An illegal response was received from the server, and the connection is closed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.15.44. [ID: 1137] Unsupported encryption FEAT response from[...]
- Log Categories
- FTPALG
- Log Message
- Unsupported encryption FEAT response from server.
- Default Log Severity
- Information
- Parameters
- sessionid, profile, cmdline, flow
- Explanation
- A feature response from the server announcing support for encryption unsupported by the FTPALG has been stripped from the
response.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- None
2.15.45. [ID: 1162] Unsupported encryption command rejected
- Log Categories
- FTPALG
- Log Message
- Unsupported encryption command rejected.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, cmdline, flow
- Explanation
- An FTP command related to encryption, that is not supported by the FTPALG, has been rejected.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- None
2.15.46. [ID: 1155] Data in wrong direction on data channel
- Log Categories
- FTPALG
- Log Message
- Data in wrong direction on data channel.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, command, alloweddir, flow, user, userid
- Explanation
- Data has been sent on the data channel in a direction not expected according to the command issued to retrieve or store file.
The control channel and data channel will be closed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
These log messages refer to the GRE category.
2.16.1. [ID: 1650] GRE packet without any payload after GRE[...]
- Log Categories
- GRE
- Log Message
- GRE packet without any payload after GRE header.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- Received a GRE packet without any payload after the GRE header.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.16.2. [ID: 1651] Mismatch between the GRE payload protocol[...]
- Log Categories
- GRE
- Log Message
- Mismatch between the GRE payload protocol type and the payload IP version.
- Default Log Severity
- Warning
- Parameters
- proto, ipver, flow, pkt, user, userid
- Explanation
- Received a GRE packet with header protocol type and payload IP version mismatch.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.16.3. [ID: 1649] Failed to reassemble fragmented GRE packet
- Log Categories
- GRE,FRAG
- Log Message
- Failed to reassemble fragmented GRE packet.
- Default Log Severity
- Warning
- Parameters
- pktlen, flow, pkt, user, userid
- Explanation
- The packet was fragmented and could not be reassembled.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.16.4. [ID: 1647] Unsupported GRE flags
- Log Categories
- GRE
- Log Message
- Unsupported GRE flags.
- Default Log Severity
- Warning
- Parameters
- flags, flow, pkt, user, userid
- Explanation
- Received a GRE packet with unsupported flags. Only support "checksum present", "key present", "sequence number present" flags.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Check GRE endpoint configuration.
2.16.5. [ID: 1652] Unsupported GRE payload protocol type
- Log Categories
- GRE
- Log Message
- Unsupported GRE payload protocol type.
- Default Log Severity
- Warning
- Parameters
- proto, flow, pkt, user, userid
- Explanation
- Received a GRE packet with unsupported payload protocol type. Only IPv4 (0x0800) and IPv6 (0x86DD) are supported.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.16.6. [ID: 1648] Unsupported GRE version
- Log Categories
- GRE
- Log Message
- Unsupported GRE version.
- Default Log Severity
- Warning
- Parameters
- version, flow, pkt, user, userid
- Explanation
- Received a GRE packet with unsupported version. Only version 0 is supported.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
These log messages refer to the GTP category.
2.17.1. [ID: 971] Failed to activate PDP context
- Log Categories
- GTP
- Log Message
- Failed to activate PDP context.
- Default Log Severity
- Warning
- Parameters
- imsi, msisdn, eua, teiddi, iface
- Explanation
- The system received a PDP context response, and a GTP tunnel negotiation was almost finished, when it was interrupted.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Verify that the GGSN is correctly configured.
2.17.2. [ID: 776] Active PDP context negotiation
- Log Categories
- GTP
- Log Message
- Active PDP context negotiation.
- Default Log Severity
- Notice
- Parameters
- imsi, msisdn, eua, teiddi, type, iface
- Explanation
- A PDP context negotiation is active.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.3. [ID: 757] Failed to allocate message
- Log Categories
- GTP
- Log Message
- Failed to allocate message.
- Default Log Severity
- Error
- Parameters
- localip, remoteip, scope, iface
- Explanation
- The system could not allocate a message buffer.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- None
2.17.4. [ID: 717] Bad GTP header length
- Log Categories
- GTP
- Log Message
- Bad GTP header length.
- Default Log Severity
- Notice
- Parameters
- pkt
- Explanation
- Received GTP packet with a bad length.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Verify the integrity of the sending device.
2.17.5. [ID: 950] Failed to connect to GGSN
- Log Categories
- GTP
- Log Message
- Failed to connect to GGSN.
- Default Log Severity
- Warning
- Parameters
- imsi, msisdn, eua, teiddi, iface
- Explanation
- The system could not create a connection to the GGSN by preforming a APN lookup to the DNS server.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- Verify that the APN can be resolved by a DNS server lookup.
2.17.6. [ID: 960] Connection closed
- Log Categories
- GTP
- Log Message
- Connection closed.
- Default Log Severity
- Notice
- Parameters
- localip, remoteip, scope, iface
- Explanation
- A GTP connection to a GGSN has been closed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.17.7. [ID: 964] Connection established
- Log Categories
- GTP
- Log Message
- Connection established.
- Default Log Severity
- Information
- Parameters
- localip, remoteip, scope, iface
- Explanation
- A new GTP connection to a GGSN has been established.
- Gateway Action
- Open
- Action Description
- None
- Proposed Action
- None
2.17.8. [ID: 710] Failed to establish connection
- Log Categories
- GTP
- Log Message
- Failed to establish connection.
- Default Log Severity
- Warning
- Parameters
- localip, remoteip, scope, iface
- Explanation
- A connection to a GGSN could not be established.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- None
2.17.9. [ID: 957] Invalid connection action
- Log Categories
- GTP
- Log Message
- Invalid connection action.
- Default Log Severity
- Warning
- Parameters
- localip, remoteip, scope, type, iface
- Explanation
- A GGSN connection has been closed, but still receives GTP-C traffic.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.17.10. [ID: 969] Failed to create lookup for APN
- Log Categories
- GTP
- Log Message
- Failed to create lookup for APN.
- Default Log Severity
- Error
- Parameters
- fqdn, iface
- Explanation
- The system tried unsuccessfully to resolve the APN for a remote gateway.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.11. [ID: 697] DNS resolve failed
- Log Categories
- GTP
- Log Message
- DNS resolve failed.
- Default Log Severity
- Warning
- Parameters
- fqdn, iface
- Explanation
- The IP address for the APN could not be resolved.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.12. [ID: 721] DNS resolve successful
- Log Categories
- GTP
- Log Message
- DNS resolve successful.
- Default Log Severity
- Information
- Parameters
- fqdn, iface
- Explanation
- The IP address for the APN was resolved successfully.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.13. [ID: 926] Populating recovery file failed
- Log Categories
- GTP
- Log Message
- Populating recovery file failed.
- Default Log Severity
- Warning
- Parameters
- file
- Explanation
- Recovery values were not successfully retrieved from the persistent storage file.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.14. [ID: 983] Failed to find MM context
- Log Categories
- GTP
- Log Message
- Failed to find MM context.
- Default Log Severity
- Notice
- Parameters
- imsi, msisdn, eua, teiddi, iface
- Explanation
- A MM context and its PDP context were in inconsistent states.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.15. [ID: 975] Found dangling PDP context in GGSN
- Log Categories
- GTP
- Log Message
- Found dangling PDP context in GGSN.
- Default Log Severity
- Warning
- Parameters
- imsi, msisdn, eua, teiddi, iface
- Explanation
- The TTG determined that the GGSN had a dangling PDP context with non matching TEID.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.17.16. [ID: 708] GGSN restarted
- Log Categories
- GTP
- Log Message
- GGSN restarted.
- Default Log Severity
- Warning
- Parameters
- localip, remoteip, scope, iface
- Explanation
- The remote GGSN has restarted and the current tunnels connected to that host is invalid.
- Gateway Action
- Close
- Action Description
- The tunnels that are connected to the specified GGSN will be deleted
- Proposed Action
- None
2.17.17. [ID: 976] All GGSNs for APN unreachable
- Log Categories
- GTP
- Log Message
- All GGSNs for APN unreachable.
- Default Log Severity
- Error
- Parameters
- localip, remoteip, scope, iface
- Explanation
- No GGSN responded on any of the IP addresses for which the APN resolved.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify that GGSNs are reachable from the TTG using the IP associated with the APN.
2.17.18. [ID: 754] Failed to register GTP-U session
- Log Categories
- GTP
- Log Message
- Failed to register GTP-U session.
- Default Log Severity
- Critical
- Parameters
- remoteip, teiddi, iface
- Explanation
- GTP failed to initialize Control plane to User plane communication.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.19. [ID: 970] Incorrect packet header type
- Log Categories
- GTP
- Log Message
- Incorrect packet header type.
- Default Log Severity
- Warning
- Parameters
- localip, remoteip, scope, messagetype, version, iface
- Explanation
- The TTG received a messagetype packet using a GTP header version.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Verify that the GGSN uses GTPv1.
2.17.20. [ID: 967] Incorrect GTP packet version
- Log Categories
- GTP
- Log Message
- Incorrect GTP packet version.
- Default Log Severity
- Warning
- Parameters
- imsi, msisdn, eua, teiddi, messagetype, iface
- Explanation
- The TTG received a non GTPv1 packet of messagetype.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify that the GGSN uses GTPv1.
2.17.21. [ID: 783] Invalid length in information element
- Log Categories
- GTP
- Log Message
- Invalid length in information element.
- Default Log Severity
- Error
- Parameters
- imsi, msisdn, eua, teiddi, messagetype, iface
- Explanation
- An information element specified a bad length in a GTP packet.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.22. [ID: 705] Invalid mandatory information element
- Log Categories
- GTP
- Log Message
- Invalid mandatory information element.
- Default Log Severity
- Warning
- Parameters
- localip, remoteip, scope, messagetype, ie, iface
- Explanation
- Invalid mandatory information element in received message.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.23. [ID: 965] Invalid optional information element
- Log Categories
- GTP
- Log Message
- Invalid optional information element.
- Default Log Severity
- Warning
- Parameters
- localip, remoteip, scope, messagetype, ie, iface
- Explanation
- Invalid optional information element in received message.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.24. [ID: 949] Packet with invalid header
- Log Categories
- GTP
- Log Message
- Packet with invalid header.
- Default Log Severity
- Warning
- Parameters
- localip, remoteip, scope, messagetype, iface
- Explanation
- Invalid header in received message.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.17.25. [ID: 953] Packet with invalid length
- Log Categories
- GTP
- Log Message
- Packet with invalid length.
- Default Log Severity
- Notice
- Parameters
- localip, remoteip, len, minlen
- Explanation
- Received a GTP-C packet with invalid length.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Verify the integrity of the sending device.
2.17.26. [ID: 956] Invalid TEID
- Log Categories
- GTP
- Log Message
- Invalid TEID.
- Default Log Severity
- Warning
- Parameters
- imsi, msisdn, eua, teiddi, messagetype, iface
- Explanation
- The TTG received a message using a reserved TEID.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.27. [ID: 981] Lingering MM context with no PDP context
- Log Categories
- GTP
- Log Message
- Lingering MM context with no PDP context.
- Default Log Severity
- Warning
- Parameters
- imsi, msisdn, iface
- Explanation
- A MM context without associated PDP context lingered in the TTG.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.28. [ID: 977] Could not create MM context
- Log Categories
- GTP
- Log Message
- Could not create MM context.
- Default Log Severity
- Error
- Parameters
- imsi, msisdn, iface
- Explanation
- A client tried to connect but a MM context could not be created, possibly because of an invalid configuration.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- None
2.17.29. [ID: 748] Maximum number of tunnels reached
- Log Categories
- GTP
- Log Message
- Maximum number of tunnels reached.
- Default Log Severity
- Warning
- Parameters
- max, iface
- Explanation
- Maximum number of allowed tunnels has been established, no more clients can connect.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- Increase tunnel limit in configuration.
2.17.30. [ID: 726] Missing mandatory information element
- Log Categories
- GTP
- Log Message
- Missing mandatory information element.
- Default Log Severity
- Warning
- Parameters
- localip, remoteip, scope, messagetype, ie, iface
- Explanation
- A message that is missing a mandatory information element was received.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.31. [ID: 973] Missing PDP context for reponse
- Log Categories
- GTP
- Log Message
- Missing PDP context for reponse.
- Default Log Severity
- Warning
- Parameters
- imsi, msisdn, eua, teiddi, messagetype, iface
- Explanation
- The TTG received a GGSN response but no PDP context existed in the TTG with TEID teiddi.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Make sure that the correct GGSN is configured to the TTG.
2.17.32. [ID: 958] Failed open connection
- Log Categories
- GTP
- Log Message
- Failed open connection.
- Default Log Severity
- Warning
- Parameters
- localip, remoteip, scope, iface
- Explanation
- The TTG was unable to initialize a control plane connection to the GGSN.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- None
2.17.33. [ID: 779] Out of bounds information element
- Log Categories
- GTP
- Log Message
- Out of bounds information element.
- Default Log Severity
- Error
- Parameters
- imsi, msisdn, eua, teiddi, messagetype, iface
- Explanation
- The GTP implementation does not have enough space to extract the number of information elements present in the packet.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.17.34. [ID: 784] Out of sequence information element
- Log Categories
- GTP
- Log Message
- Out of sequence information element.
- Default Log Severity
- Error
- Parameters
- imsi, msisdn, eua, teiddi, messagetype, iface
- Explanation
- The information elements in a GTP packet were out of sequence.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.17.35. [ID: 980] Could not create PDP context
- Log Categories
- GTP
- Log Message
- Could not create PDP context.
- Default Log Severity
- Error
- Parameters
- imsi, msisdn, type, iface
- Explanation
- A client tried to connect but a PDP context could not be created, possibly because of an invalid configuration.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- None
2.17.36. [ID: 963] Packet with extension headers
- Log Categories
- GTP
- Log Message
- Packet with extension headers.
- Default Log Severity
- Notice
- Parameters
- localip, remoteip, scope, type, iface
- Explanation
- The TTG received a GTP-C packet containing extension headers which was dropped.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.17.37. [ID: 962] Packet with unknown extension header
- Log Categories
- GTP
- Log Message
- Packet with unknown extension header.
- Default Log Severity
- Warning
- Parameters
- localip, remoteip, scope, type, iface
- Explanation
- The TTG received a GTP-U packet with unknown extension headers.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.17.38. [ID: 740] Path check failed
- Log Categories
- GTP
- Log Message
- Path check failed.
- Default Log Severity
- Warning
- Parameters
- localip, remoteip, scope, iface
- Explanation
- A GGSN did not respond to echo requests in time and is considered as unreachable.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.17.39. [ID: 979] Received message
- Log Categories
- GTP
- Log Message
- Received message.
- Default Log Severity
- Notice
- Parameters
- localip, remoteip, scope, messagetype, iface
- Explanation
- The TTG received a messagetype message for scope .
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.40. [ID: 972] Received not supported message
- Log Categories
- GTP
- Log Message
- Received not supported message.
- Default Log Severity
- Notice
- Parameters
- localip, remoteip, scope, messagetype, iface
- Explanation
- The TTG received an unknown control plane message of messagetype .
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.41. [ID: 945] Received User Plane packet for non-existent[...]
- Log Categories
- GTP
- Log Message
- Received User Plane packet for non-existent interface.
- Default Log Severity
- Notice
- Parameters
- srcip, destip, messagetype, iface
- Explanation
- Received User Plane packet addressed for a non-existent GTP interface.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.42. [ID: 944] Failed to register PDP context from User Plane
- Log Categories
- GTP
- Log Message
- Failed to register PDP context from User Plane.
- Default Log Severity
- Warning
- Parameters
- teiddi, srcip, destip, iface
- Explanation
- Failed to register PDP context from User Plane .
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.43. [ID: 930] Failed to register PDP context
- Log Categories
- GTP
- Log Message
- Failed to register PDP context.
- Default Log Severity
- Notice
- Parameters
- teiddi, type, code, iface
- Explanation
- GTP failed to register a PDP context with the User plane.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.44. [ID: 939] Failed to register GTP User Plane session
- Log Categories
- GTP
- Log Message
- Failed to register GTP User Plane session.
- Default Log Severity
- Notice
- Parameters
- code, iface
- Explanation
- Failed to register GTP User Plane session.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.45. [ID: 982] Removing connection
- Log Categories
- GTP
- Log Message
- Removing connection.
- Default Log Severity
- Information
- Parameters
- localip, remoteip, scope, reason, iface
- Explanation
- The TTG tried to close down a scope connection because of reason.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.17.46. [ID: 936] Removing invalid request
- Log Categories
- GTP
- Log Message
- Removing invalid request.
- Default Log Severity
- Notice
- Parameters
- localip, remoteip, imsi, msisdn, eua, teiddi, seqno, type, scope, iface
- Explanation
- A remaining GTP message was detected intended for a no longer existing PDP context.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.47. [ID: 961] Failed to remove all previous User Plane GTP[...]
- Log Categories
- GTP
- Log Message
- Failed to remove all previous User Plane GTP sessions.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- Failed to remove all previous User Plane GTP sessions.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.48. [ID: 955] Failed re-open connection
- Log Categories
- GTP
- Log Message
- Failed re-open connection.
- Default Log Severity
- Warning
- Parameters
- iface
- Explanation
- A previous opened and then closed connection could not be re-openend.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- Verify that the GGSN can be reached.
2.17.49. [ID: 951] Request was rejected
- Log Categories
- GTP
- Log Message
- Request was rejected.
- Default Log Severity
- Warning
- Parameters
- imsi, msisdn, eua, teiddi, messagetype, cause, iface
- Explanation
- The TTG sent a request to the GGSN. The GGSN rejected the messagetype request for reason cause.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.50. [ID: 932] Request response mismatch
- Log Categories
- GTP
- Log Message
- Request response mismatch.
- Default Log Severity
- Notice
- Parameters
- localip, remoteip, imsi, msisdn, eua, teiddi, seqno, type, scope, iface
- Explanation
- The received message and the expected message differ.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Verify that the firewall is connected to the correct GGSN.
2.17.51. [ID: 694] IE TEID in create PDP context message is[...]
- Log Categories
- GTP
- Log Message
- IE TEID in create PDP context message is reserved.
- Default Log Severity
- Warning
- Parameters
-
- Explanation
- The received create PDP context message contained the reserved value (0) in the TEID information element.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.17.52. [ID: 978] Query resolve APN
- Log Categories
- GTP
- Log Message
- Query resolve APN.
- Default Log Severity
- Notice
- Parameters
- fqdn, state, iface
- Explanation
- The TTG issued a query to preform a DNS resolve for the APN fqdn, and is currently state.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.53. [ID: 966] Route lookup failed
- Log Categories
- GTP
- Log Message
- Route lookup failed.
- Default Log Severity
- Warning
- Parameters
- remoteip, reason
- Explanation
- The TTG could not find a route table when preforming a route lookup.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.17.54. [ID: 959] Failed to send message
- Log Categories
- GTP
- Log Message
- Failed to send message.
- Default Log Severity
- Warning
- Parameters
- localip, remoteip, scope, iface
- Explanation
- The TTG tried to send scope traffic to the GGSN, but failed to do so.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.17.55. [ID: 952] Failed sending packet to GGSN
- Log Categories
- GTP
- Log Message
- Failed sending packet to GGSN.
- Default Log Severity
- Warning
- Parameters
- localip, remoteip, scope, messagetype, iface
- Explanation
- The TTG tried unsuccessfully to send a response of messagetypeto a GGSN .
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify that the GGSN can be reached from the TTG.
2.17.56. [ID: 937] Sending to GGSN
- Log Categories
- GTP
- Log Message
- Sending to GGSN.
- Default Log Severity
- Notice
- Parameters
- localip, remoteip, imsi, msisdn, eua, teiddi, seqno, type, scope, iface
- Explanation
- GTP informational sending message to a GGSN.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.57. [ID: 943] Send Control Plane packet to User Plane failed
- Log Categories
- GTP
- Log Message
- Send Control Plane packet to User Plane failed.
- Default Log Severity
- Notice
- Parameters
- srcip, destip, iface
- Explanation
- Communication by sending a packet to User Plane failed.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.58. [ID: 777] GTP statefile read error
- Log Categories
- GTP
- Log Message
- GTP statefile read error.
- Default Log Severity
- Notice
- Parameters
- file
- Explanation
- The state file for GTP containing connection information for GTP tunnels could not be retrieved from storage.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.59. [ID: 941] GTP statefile read success
- Log Categories
- GTP
- Log Message
- GTP statefile read success.
- Default Log Severity
- Information
- Parameters
- file
- Explanation
- Recovery values were successfully retrieved from the persistent storage file containing them.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.60. [ID: 762] GTP statefile write error
- Log Categories
- GTP
- Log Message
- GTP statefile write error.
- Default Log Severity
- Warning
- Parameters
- file
- Explanation
- The state file for GTP containing connection information for GTP tunnels could not be stored.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.61. [ID: 934] GTP statefile write success
- Log Categories
- GTP
- Log Message
- GTP statefile write success.
- Default Log Severity
- Notice
- Parameters
- file
- Explanation
- Recovery values were successfully stored to the persistent storage file.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.62. [ID: 749] GTP tunnel deleted by GGSN
- Log Categories
- GTP
- Log Message
- GTP tunnel deleted by GGSN.
- Default Log Severity
- Notice
- Parameters
- imsi, msisdn, eua, teiddi, iface
- Explanation
- A GTP tunnel was deleted due a delete PDP context request from the GGSN.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.17.63. [ID: 747] GTP tunnel deleted by the stitched interface
- Log Categories
- GTP
- Log Message
- GTP tunnel deleted by the stitched interface.
- Default Log Severity
- Notice
- Parameters
- imsi, msisdn, eua, teiddi, iface
- Explanation
- A GTP tunnel was deleted upon a request from the stitched interface.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.17.64. [ID: 756] GTP tunnel deleted due to being invalid
- Log Categories
- GTP
- Log Message
- GTP tunnel deleted due to being invalid.
- Default Log Severity
- Notice
- Parameters
- imsi, msisdn, eua, teiddi, iface
- Explanation
- A GTP tunnel was deleted because the TEID was unknown to the GGSN.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.17.65. [ID: 716] GTP tunnel established
- Log Categories
- GTP
- Log Message
- GTP tunnel established.
- Default Log Severity
- Information
- Parameters
- imsi, msisdn, eua, teiddi, iface
- Explanation
- A new GTP tunnel has been established for a client. The client has been assigned eua as its IP address.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.66. [ID: 723] Unexpected GTP message type
- Log Categories
- GTP
- Log Message
- Unexpected GTP message type.
- Default Log Severity
- Warning
- Parameters
- type
- Explanation
- A GTP message with an unexpected and unhandled type was received.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Check the logs for other types of erroneous events that might result in this scenario.
2.17.67. [ID: 1593] Unexpected signaling message
- Log Categories
- GTP
- Log Message
- Unexpected signaling message.
- Default Log Severity
- Notice
- Parameters
- localip, remoteip, scope, messagetype, iface
- Explanation
-
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.68. [ID: 968] Control Plane unknown PDP context
- Log Categories
- GTP
- Log Message
- Control Plane unknown PDP context.
- Default Log Severity
- Notice
- Parameters
- localip, remoteip, teiddi
- Explanation
- Received a GTP-C packet with an unknown tunnel endpoint identifier.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.69. [ID: 940] Control Plane unknown PDP context
- Log Categories
- GTP
- Log Message
- Control Plane unknown PDP context.
- Default Log Severity
- Notice
- Parameters
- teiddi, type, code, iface
- Explanation
- A PDP context unknown to the Control plane was registered with the User Plane.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.70. [ID: 974] Unknown GTP version
- Log Categories
- GTP
- Log Message
- Unknown GTP version.
- Default Log Severity
- Warning
- Parameters
- localip, remoteip, scope, messagetype, iface
- Explanation
- The TTG detected use of an unknown GTP version.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.71. [ID: 712] Unknown information element
- Log Categories
- GTP
- Log Message
- Unknown information element.
- Default Log Severity
- Notice
- Parameters
- imsi, msisdn, eua, teiddi, messagetype, iface
- Explanation
- An unknown or unsupported information element was found in a GTP packet.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.72. [ID: 695] Unknown GTP tunnel endpoint identifier
- Log Categories
- GTP
- Log Message
- Unknown GTP tunnel endpoint identifier.
- Default Log Severity
- Notice
- Parameters
- id, direction
- Explanation
- Received a GTP G-PDU packet with an unknown tunnel endpoint identifier. direction refers to the direction of the GTP packet, in or out of the GTP-tunnel.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Check the logs for other types of erroneous events that might result in this scenario.
2.17.73. [ID: 929] Unknown User Plane action
- Log Categories
- GTP
- Log Message
- Unknown User Plane action.
- Default Log Severity
- Notice
- Parameters
- srcip, destip, type, iface
- Explanation
- GTP received a User Plane message with an associated action that didn't make sense in that context.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.74. [ID: 927] Unknown User Plane action
- Log Categories
- GTP
- Log Message
- Unknown User Plane action.
- Default Log Severity
- Warning
- Parameters
- teiddi, type, code, iface
- Explanation
- The Control plane received an unknown response message from User plane.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.75. [ID: 709] Unknown GTP version
- Log Categories
- GTP
- Log Message
- Unknown GTP version.
- Default Log Severity
- Notice
- Parameters
- version
- Explanation
- Received a GTP packet with a unknown or unsupported version.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Reconfigure the sender to use a supported GTP version.
2.17.76. [ID: 942] Failed to remove PDP context from User Plane
- Log Categories
- GTP
- Log Message
- Failed to remove PDP context from User Plane.
- Default Log Severity
- Notice
- Parameters
- teiddi, iface
- Explanation
- Failed to remove PDP context from User Plane.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.77. [ID: 938] Failed to unregister PDP context from User[...]
- Log Categories
- GTP
- Log Message
- Failed to unregister PDP context from User Plane.
- Default Log Severity
- Notice
- Parameters
- teiddi, type, code, iface
- Explanation
- Failed to unregister PDP context from User Plane.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.78. [ID: 933] Failed to remove User Plane GTP session
- Log Categories
- GTP
- Log Message
- Failed to remove User Plane GTP session.
- Default Log Severity
- Warning
- Parameters
- iface
- Explanation
- Failed to remove a previous User Plane GTP session .
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.79. [ID: 778] Version not supported by GGSN
- Log Categories
- GTP
- Log Message
- Version not supported by GGSN.
- Default Log Severity
- Critical
- Parameters
- localip, remoteip, scope, version, iface
- Explanation
- The peer does not support the GTP version currently used. version indicates the latest supported version.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.17.80. [ID: 780] Version not supported by TTG
- Log Categories
- GTP
- Log Message
- Version not supported by TTG.
- Default Log Severity
- Notice
- Parameters
- localip, remoteip, scope, messagetype, version, iface
- Explanation
- The peer does not support the GTP version currently used. version indicates the latest supported version.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
These log messages refer to the GTPINSPECTION category.
2.18.1. [ID: 1519] GTP-U bearer creation completely rejected by[...]
- Log Categories
- GTPINSPECTION
- Log Message
- GTP-U bearer creation completely rejected by endpoint.
- Default Log Severity
- Notice
- Parameters
- sessionid, cause, flow
- Explanation
- All of the request to create GTP-U bearer was rejected by endpoint.
- Gateway Action
- Discard
- Action Description
- None
- Proposed Action
- None
2.18.2. [ID: 1536] GTP-U bearer creation rejected by endpoint
- Log Categories
- GTPINSPECTION
- Log Message
- GTP-U bearer creation rejected by endpoint.
- Default Log Severity
- Notice
- Parameters
- sessionid, bearerid, cause, flow
- Explanation
- The other endpoint rejected the request to create GTP-U bearer.
- Gateway Action
- Discard
- Action Description
- None
- Proposed Action
- None
2.18.3. [ID: 1528] GTP-U bearer deletion completely rejected by[...]
- Log Categories
- GTPINSPECTION
- Log Message
- GTP-U bearer deletion completely rejected by endpoint.
- Default Log Severity
- Notice
- Parameters
- sessionid, cause, flow
- Explanation
- All of the request to delete GTP-U bearer was rejected by endpoint.
- Gateway Action
- Discard
- Action Description
- None
- Proposed Action
- None
2.18.4. [ID: 1512] GTP-U bearer deletion rejected by endpoint
- Log Categories
- GTPINSPECTION
- Log Message
- GTP-U bearer deletion rejected by endpoint.
- Default Log Severity
- Notice
- Parameters
- sessionid, bearerid, cause, flow
- Explanation
- The other endpoint rejected the request to delete GTP-U bearer.
- Gateway Action
- Discard
- Action Description
- None
- Proposed Action
- None
2.18.5. [ID: 1522] GTP-U bearer modification completely rejected[...]
- Log Categories
- GTPINSPECTION
- Log Message
- GTP-U bearer modification completely rejected by endpoint.
- Default Log Severity
- Notice
- Parameters
- sessionid, cause, flow
- Explanation
- All of the request to modify GTP-U bearer was rejected by endpoint.
- Gateway Action
- Discard
- Action Description
- None
- Proposed Action
- None
2.18.6. [ID: 1534] GTP-U bearer modification rejected by endpoint
- Log Categories
- GTPINSPECTION
- Log Message
- GTP-U bearer modification rejected by endpoint.
- Default Log Severity
- Notice
- Parameters
- sessionid, bearerid, cause, flow
- Explanation
- The other endpoint rejected the request to modify GTP-U bearer.
- Gateway Action
- Discard
- Action Description
- None
- Proposed Action
- None
2.18.7. [ID: 1521] G-PDU dropped due to empty T-PDU
- Log Categories
- GTPINSPECTION,VALIDATE
- Log Message
- G-PDU dropped due to empty T-PDU.
- Default Log Severity
- Notice
- Parameters
- flow, user, userid
- Explanation
- G-PDU message dropped due to empty T-PDU.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.8. [ID: 1538] Flow closed
- Log Categories
- GTPINSPECTION
- Log Message
- Flow closed.
- Default Log Severity
- Information
- Parameters
- flow
- Explanation
- A flow using GTP inspection was closed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.18.9. [ID: 1524] Flow failed
- Log Categories
- GTPINSPECTION
- Log Message
- Flow failed.
- Default Log Severity
- Notice
- Parameters
- reason, originator, flow, rule
- Explanation
- An error occurred that caused the GTP inspection flow to be aborted.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- None
2.18.10. [ID: 1523] Flow opened
- Log Categories
- GTPINSPECTION
- Log Message
- Flow opened.
- Default Log Severity
- Information
- Parameters
- flow
- Explanation
- A flow using GTP inspection was opened.
- Gateway Action
- Open
- Action Description
- None
- Proposed Action
- None
2.18.11. [ID: 1567] Bearer ID does not exist
- Log Categories
- GTPINSPECTION
- Log Message
- Bearer ID does not exist.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The received GTP-C message containing a NSAPI/EPS bearer ID for which no GTP-U bearer exist.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.12. [ID: 1624] Bearer ID does not exist
- Log Categories
- GTPINSPECTION
- Log Message
- Bearer ID does not exist.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The received GTP-C message containing a NSAPI/EPS bearer ID for which no GTP-U bearer exist.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.13. [ID: 1561] Bearer lacks F-TEID
- Log Categories
- GTPINSPECTION
- Log Message
- Bearer lacks F-TEID.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The GTP-C message does not contain a F-TEID for a GTP-U bearer.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.14. [ID: 1598] Bearer lacks F-TEID
- Log Categories
- GTPINSPECTION
- Log Message
- Bearer lacks F-TEID.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The GTP-C message does not contain a F-TEID for a GTP-U bearer.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.15. [ID: 1565] TEID of bearer should not be zero
- Log Categories
- GTPINSPECTION
- Log Message
- TEID of bearer should not be zero.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The GTP-C message contained a zero F-TEID for a GTP-U bearer.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.16. [ID: 1632] TEID of bearer should not be zero
- Log Categories
- GTPINSPECTION
- Log Message
- TEID of bearer should not be zero.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The GTP-C message contained a zero F-TEID for a GTP-U bearer.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.17. [ID: 1564] Could not add proposed GTP-U bearer
- Log Categories
- GTPINSPECTION
- Log Message
- Could not add proposed GTP-U bearer.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The system could not create a new GTP-U bearer.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.18. [ID: 1634] Could not add proposed GTP-U bearer
- Log Categories
- GTPINSPECTION
- Log Message
- Could not add proposed GTP-U bearer.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The system could not create a new GTP-U bearer.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.19. [ID: 1573] Could not delete GTP-U bearer
- Log Categories
- GTPINSPECTION
- Log Message
- Could not delete GTP-U bearer.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The system could not delete a GTP-U bearer.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.20. [ID: 1600] Could not delete GTP-U bearer
- Log Categories
- GTPINSPECTION
- Log Message
- Could not delete GTP-U bearer.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The system could not delete a GTP-U bearer.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.21. [ID: 1559] Could not finalize GTP-U bearer
- Log Categories
- GTPINSPECTION
- Log Message
- Could not finalize GTP-U bearer.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The system could not finalize the creation of a new GTP-U bearer.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.22. [ID: 1614] Could not finalize GTP-U bearer
- Log Categories
- GTPINSPECTION
- Log Message
- Could not finalize GTP-U bearer.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The system could not finalize the creation of a new GTP-U bearer.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.23. [ID: 1552] Could not set proposed values on GTP-U bearer
- Log Categories
- GTPINSPECTION
- Log Message
- Could not set proposed values on GTP-U bearer.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The GTP-U bearer could not be updated with the values in the received GTP-C message.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.24. [ID: 1606] Could not set proposed values on GTP-U bearer
- Log Categories
- GTPINSPECTION
- Log Message
- Could not set proposed values on GTP-U bearer.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The GTP-U bearer could not be updated with the values in the received GTP-C message.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.25. [ID: 1585] Disallowed GTP version
- Log Categories
- GTPINSPECTION
- Log Message
- Disallowed GTP version.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, flow
- Explanation
- The GTP-C message with a version that is not allowed by the configuration.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Reconfigure the sender to use a supported GTP version.
2.18.26. [ID: 1566] Duplicate Bearer ID
- Log Categories
- GTPINSPECTION
- Log Message
- Duplicate Bearer ID.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The received GTP-C message contained a NSAPI/EPS bearer ID for which a GPT-U bearer already exist.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.27. [ID: 1616] Duplicate Bearer ID
- Log Categories
- GTPINSPECTION
- Log Message
- Duplicate Bearer ID.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The received GTP-C message contained a NSAPI/EPS bearer ID for which a GPT-U bearer already exist.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.28. [ID: 1587] Zero size extension header
- Log Categories
- GTPINSPECTION
- Log Message
- Zero size extension header.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The received GTP-C message contained an empty extension header.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.29. [ID: 1580] Failed to read IE
- Log Categories
- GTPINSPECTION
- Log Message
- Failed to read IE.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, ie, flow
- Explanation
- The system could not read an information element from the received GTP-C message.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.30. [ID: 1602] Failed to read IE
- Log Categories
- GTPINSPECTION
- Log Message
- Failed to read IE.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, ie, flow
- Explanation
- The system could not read an information element from the received GTP-C message.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.31. [ID: 1562] Incorrect optional IEs
- Log Categories
- GTPINSPECTION
- Log Message
- Incorrect optional IEs.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The received GTP-C message contained an incorrect optional information element.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.32. [ID: 1628] Incorrect optional IEs
- Log Categories
- GTPINSPECTION
- Log Message
- Incorrect optional IEs.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The received GTP-C message contained an incorrect optional information element.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.33. [ID: 1636] Invalid Bearer ID
- Log Categories
- GTPINSPECTION
- Log Message
- Invalid Bearer ID.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The received GTP-C message contained an invalid EPS bearer ID, due to spare bits being non-zero.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.34. [ID: 1635] Invalid Bearer ID
- Log Categories
- GTPINSPECTION
- Log Message
- Invalid Bearer ID.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The received GTP-C message contained an invalid EPS bearer ID, due to spare bits being non-zero.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.35. [ID: 1584] Invalid extension header content
- Log Categories
- GTPINSPECTION
- Log Message
- Invalid extension header content.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The received GTP-C message contained an extension header with invalid data.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.36. [ID: 1568] Invalid mandatory IE
- Log Categories
- GTPINSPECTION
- Log Message
- Invalid mandatory IE.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The received GTP-C message contained an invalid mandatory information element.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.37. [ID: 1612] Invalid mandatory IE
- Log Categories
- GTPINSPECTION
- Log Message
- Invalid mandatory IE.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The received GTP-C message contained an invalid mandatory information element.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.38. [ID: 1558] Invalid optional IE
- Log Categories
- GTPINSPECTION
- Log Message
- Invalid optional IE.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The received GTP-C message contained an invalid optional information element.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.39. [ID: 1604] Invalid optional IE
- Log Categories
- GTPINSPECTION
- Log Message
- Invalid optional IE.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The received GTP-C message contained an invalid optional information element.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.40. [ID: 1578] GTP-C sender IP is invalid
- Log Categories
- GTPINSPECTION
- Log Message
- GTP-C sender IP is invalid.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- GTP-C sender IP address was invalid.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.41. [ID: 1607] GTP-C sender IP is invalid
- Log Categories
- GTPINSPECTION
- Log Message
- GTP-C sender IP is invalid.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- GTP-C sender IP address was invalid.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.42. [ID: 1621] Main message blocked due to invalid piggyback
- Log Categories
- GTPINSPECTION
- Log Message
- Main message blocked due to invalid piggyback.
- Default Log Severity
- Notice
- Parameters
- sessionid, flow
- Explanation
- According to setting the piggy back message was dropped, and with it the main message was blocked.
- Gateway Action
- Block
- Action Description
- None
- Proposed Action
- None
2.18.43. [ID: 1583] Message in wrong direction
- Log Categories
- GTPINSPECTION
- Log Message
- Message in wrong direction.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The receive GTP-C message was sent in the wrong direction.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.44. [ID: 1597] Message in wrong direction
- Log Categories
- GTPINSPECTION
- Log Message
- Message in wrong direction.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The receive GTP-C message was sent in the wrong direction.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.45. [ID: 1574] Message too short
- Log Categories
- GTPINSPECTION
- Log Message
- Message too short.
- Default Log Severity
- Notice
- Parameters
- sessionid, paylen, flow
- Explanation
- The received GTP-C message was too short.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.46. [ID: 1625] Message too short
- Log Categories
- GTPINSPECTION
- Log Message
- Message too short.
- Default Log Severity
- Notice
- Parameters
- sessionid, paylen, flow
- Explanation
- The received GTP-C message was too short.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.47. [ID: 1575] Missing Conditionally Present IE
- Log Categories
- GTPINSPECTION
- Log Message
- Missing Conditionally Present IE.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, ie, flow
- Explanation
- The GTP-C message did not contain a mandatory information element.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.48. [ID: 1618] Missing Conditionally Present IE
- Log Categories
- GTPINSPECTION
- Log Message
- Missing Conditionally Present IE.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, ie, flow
- Explanation
- The GTP-C message did not contain a mandatory information element.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.49. [ID: 1563] Missing mandatorily present IE
- Log Categories
- GTPINSPECTION
- Log Message
- Missing mandatorily present IE.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, ie, flow
- Explanation
- The GTP-C message did not contain a mandatory information element.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.50. [ID: 1603] Missing mandatorily present IE
- Log Categories
- GTPINSPECTION
- Log Message
- Missing mandatorily present IE.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, ie, flow
- Explanation
- The GTP-C message did not contain a mandatory information element.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.51. [ID: 1572] Needs both GTP-U IP and TEID
- Log Categories
- GTPINSPECTION
- Log Message
- Needs both GTP-U IP and TEID.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The IP address or the TEID for the GTP-U bearer was not known.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.52. [ID: 1622] Needs both GTP-U IP and TEID
- Log Categories
- GTPINSPECTION
- Log Message
- Needs both GTP-U IP and TEID.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The IP address or the TEID for the GTP-U bearer was not known.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.53. [ID: 1553] Did not find outstanding request for response[...]
- Log Categories
- GTPINSPECTION
- Log Message
- Did not find outstanding request for response message.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The system received a GTP-C response message for which it had not received a corresponding request message.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.54. [ID: 1601] Did not find outstanding request for response[...]
- Log Categories
- GTPINSPECTION
- Log Message
- Did not find outstanding request for response message.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The system received a GTP-C response message for which it had not received a corresponding request message.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.55. [ID: 1613] Unknown message type
- Log Categories
- GTPINSPECTION
- Log Message
- Unknown message type.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The received GTP-C message type messagetype is not supported by the system.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.56. [ID: 1555] Unknown message type
- Log Categories
- GTPINSPECTION
- Log Message
- Unknown message type.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The received GTP-C message type messagetype is not supported by the system.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- None
2.18.57. [ID: 1615] Unknown message type
- Log Categories
- GTPINSPECTION
- Log Message
- Unknown message type.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The received GTP-C message type messagetype is not supported by the system.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.58. [ID: 1570] Unsupported GTP version
- Log Categories
- GTPINSPECTION
- Log Message
- Unsupported GTP version.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, flow
- Explanation
- Received a GTP packet with a unknown or unsupported version.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Reconfigure the sender to use a supported GTP version.
2.18.59. [ID: 1586] Out of sequence IE
- Log Categories
- GTPINSPECTION
- Log Message
- Out of sequence IE.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The received GTP-C message contained information elements that were not in increasing order.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.60. [ID: 1633] Out of sequence IE
- Log Categories
- GTPINSPECTION
- Log Message
- Out of sequence IE.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The received GTP-C message contained information elements that were not in increasing order.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.61. [ID: 1551] Repeated IEs
- Log Categories
- GTPINSPECTION
- Log Message
- Repeated IEs.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, ie, flow
- Explanation
- The GTP-C message contained to many information elements of the same type.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.62. [ID: 1623] Repeated IEs
- Log Categories
- GTPINSPECTION
- Log Message
- Repeated IEs.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, ie, flow
- Explanation
- The GTP-C message contained to many information elements of the same type.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.63. [ID: 1533] GTP-C session created
- Log Categories
- GTPINSPECTION
- Log Message
- GTP-C session created.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, origip, origteid, termip, termteid, flow
- Explanation
- A GTP-C session has been successfully created.
- Gateway Action
- Open
- Action Description
- None
- Proposed Action
- None
2.18.64. [ID: 1532] GTP-C session deleted
- Log Categories
- GTPINSPECTION
- Log Message
- GTP-C session deleted.
- Default Log Severity
- Notice
- Parameters
- sessionid, origip, origteid, termip, termteid, reason
- Explanation
- A GTP-C session has been successfully deleted.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.18.65. [ID: 1638] TEID of session should not be zero
- Log Categories
- GTPINSPECTION
- Log Message
- TEID of session should not be zero.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The GTP-C message contained a zero F-TEID.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.66. [ID: 1637] TEID of session should not be zero
- Log Categories
- GTPINSPECTION
- Log Message
- TEID of session should not be zero.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The GTP-C message contained a zero F-TEID.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.67. [ID: 1527] GTP-C session updated
- Log Categories
- GTPINSPECTION
- Log Message
- GTP-C session updated.
- Default Log Severity
- Notice
- Parameters
- sessionid, origip, origteid, termip, termteid, flow
- Explanation
- A GTP-C session has been successfully updated.
- Gateway Action
- Adjust
- Action Description
- None
- Proposed Action
- None
2.18.68. [ID: 1549] Message header should have sequence number
- Log Categories
- GTPINSPECTION
- Log Message
- Message header should have sequence number.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The received GTP message should contain a sequence number in its GTP header.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.69. [ID: 1577] Message header should have TEID
- Log Categories
- GTPINSPECTION
- Log Message
- Message header should have TEID.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, flow
- Explanation
- The received GTP message should contain a Tunnel Endpoint Identifier (TEID) in its GTP header.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.70. [ID: 1608] Message header should have TEID
- Log Categories
- GTPINSPECTION
- Log Message
- Message header should have TEID.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, flow
- Explanation
- The received GTP message should contain a Tunnel Endpoint Identifier (TEID) in its GTP header.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.71. [ID: 1554] Message header should not have TEID
- Log Categories
- GTPINSPECTION
- Log Message
- Message header should not have TEID.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, flow
- Explanation
- The received GTP message should not contain a Tunnel Endpoint Identifier (TEID) in its GTP header.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.72. [ID: 1605] Message header should not have TEID
- Log Categories
- GTPINSPECTION
- Log Message
- Message header should not have TEID.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, flow
- Explanation
- The received GTP message should not contain a Tunnel Endpoint Identifier (TEID) in its GTP header.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.73. [ID: 1560] Too many bearers
- Log Categories
- GTPINSPECTION
- Log Message
- Too many bearers.
- Default Log Severity
- Warning
- Parameters
- sessionid, version, messagetype, teid, max, flow
- Explanation
- The limit for the configured number of GTP-U bearers was exceeded.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Review the limits configured in the GTP inspection profile used.
2.18.74. [ID: 1599] Too many bearers
- Log Categories
- GTPINSPECTION
- Log Message
- Too many bearers.
- Default Log Severity
- Warning
- Parameters
- sessionid, version, messagetype, teid, max, flow
- Explanation
- The limit for the configured number of GTP-U bearers was exceeded.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- Review the limits configured in the GTP inspection profile used.
2.18.75. [ID: 1579] Too many piggy back messages
- Log Categories
- GTPINSPECTION
- Log Message
- Too many piggy back messages.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.76. [ID: 1629] Too many piggy back messages
- Log Categories
- GTPINSPECTION
- Log Message
- Too many piggy back messages.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.77. [ID: 1576] Too many sessions
- Log Categories
- GTPINSPECTION
- Log Message
- Too many sessions.
- Default Log Severity
- Warning
- Parameters
- sessionid, version, messagetype, teid, max, flow
- Explanation
- The limit for the configured number of GTP-C sessions was exceeded.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Review the limits configured in the GTP inspection profile used.
2.18.78. [ID: 1591] Too many sessions per IP
- Log Categories
- GTPINSPECTION
- Log Message
- Too many sessions per IP.
- Default Log Severity
- Warning
- Parameters
- sessionid, version, messagetype, teid, max, flow
- Explanation
- The limit for the configured number of GTP-C sessions per source IP was exceeded.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Review the limits configured in the GTP inspection profile used.
2.18.79. [ID: 1620] Too many sessions per IP
- Log Categories
- GTPINSPECTION
- Log Message
- Too many sessions per IP.
- Default Log Severity
- Warning
- Parameters
- sessionid, version, messagetype, teid, max, flow
- Explanation
- The limit for the configured number of GTP-C sessions per source IP was exceeded.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- Review the limits configured in the GTP inspection profile used.
2.18.80. [ID: 1619] Too many sessions
- Log Categories
- GTPINSPECTION
- Log Message
- Too many sessions.
- Default Log Severity
- Warning
- Parameters
- sessionid, version, messagetype, teid, max, flow
- Explanation
- The limit for the configured number of GTP-C sessions was exceeded.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- Review the limits configured in the GTP inspection profile used.
2.18.81. [ID: 1617] Unexpected IE
- Log Categories
- GTPINSPECTION
- Log Message
- Unexpected IE.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, ie, name, flow
- Explanation
- The received GTP-C message contained an information element of type ie that was not expected for the message type messagetype or for the current state.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.82. [ID: 1571] Unexpected IE
- Log Categories
- GTPINSPECTION
- Log Message
- Unexpected IE.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, ie, name, flow
- Explanation
- The received GTP-C message contained an information element of type ie that was not expected for the message type messagetype or for the current state.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- None
2.18.83. [ID: 1626] Unexpected IE
- Log Categories
- GTPINSPECTION
- Log Message
- Unexpected IE.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, ie, name, flow
- Explanation
- The received GTP-C message contained an information element of type ie that was not expected for the message type messagetype or for the current state .
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.84. [ID: 1556] Unexpected GTP signaling message
- Log Categories
- GTPINSPECTION
- Log Message
- Unexpected GTP signaling message.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- A GTP-C message of type messagetype was not expected at this time.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.85. [ID: 1630] Unexpected GTP signaling message
- Log Categories
- GTPINSPECTION
- Log Message
- Unexpected GTP signaling message.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- A GTP-C message of type messagetype was not expected at this time.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.86. [ID: 1627] Unknown IE
- Log Categories
- GTPINSPECTION
- Log Message
- Unknown IE.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, ie, flow
- Explanation
- The received GTP-C message contained an unknown information element of type ie.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.87. [ID: 1581] Unknown IE
- Log Categories
- GTPINSPECTION
- Log Message
- Unknown IE.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, ie, flow
- Explanation
- The received GTP-C message contained an unknown information element of type ie.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- None
2.18.88. [ID: 1610] Unknown IE
- Log Categories
- GTPINSPECTION
- Log Message
- Unknown IE.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, ie, flow
- Explanation
- The received GTP-C message contained an unknown information element of type ie.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.89. [ID: 1582] Unknown GTP signaling message
- Log Categories
- GTPINSPECTION
- Log Message
- Unknown GTP signaling message.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The received GTP-C message was of an unknown message type.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.90. [ID: 1611] Unknown GTP signaling message
- Log Categories
- GTPINSPECTION
- Log Message
- Unknown GTP signaling message.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The received GTP-C message was of an unknown message type.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.91. [ID: 1550] Wrong packet version of piggy back message
- Log Categories
- GTPINSPECTION
- Log Message
- Wrong packet version of piggy back message.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The piggybacked message contained the wrong GTP version. A piggybacked initial message is a message that is concatenated to
a response message and shares its UDP header.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.92. [ID: 1631] Wrong packet version of piggy back message
- Log Categories
- GTPINSPECTION
- Log Message
- Wrong packet version of piggy back message.
- Default Log Severity
- Notice
- Parameters
- sessionid, version, messagetype, teid, flow
- Explanation
- The piggybacked message contained the wrong GTP version. A piggybacked initial message is a message that is concatenated to
a response message and shares its UDP header.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.93. [ID: 1588] GTP-U bearer created
- Log Categories
- GTPINSPECTION
- Log Message
- GTP-U bearer created.
- Default Log Severity
- Notice
- Parameters
- sessionid, bearerid, origip, origteid, termip, termteid, flow
- Explanation
- A new GTP-U bearer has been created for the GTP-C session.
- Gateway Action
- Open
- Action Description
- None
- Proposed Action
- None
2.18.94. [ID: 1589] GTP-U bearer deleted
- Log Categories
- GTPINSPECTION
- Log Message
- GTP-U bearer deleted.
- Default Log Severity
- Notice
- Parameters
- sessionid, bearerid, origip, origteid, termip, termteid, reason
- Explanation
- A GTP-U bearer has been deleted from the GTP-C session.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.18.95. [ID: 1537] GTP-U bearer modified
- Log Categories
- GTPINSPECTION
- Log Message
- GTP-U bearer modified.
- Default Log Severity
- Notice
- Parameters
- sessionid, bearerid, origip, origteid, termip, termteid, flow
- Explanation
- A GTP-U bearer had one or both of its endpoints modified.
- Gateway Action
- Adjust
- Action Description
- None
- Proposed Action
- None
2.18.96. [ID: 1518] Message received after GTP-U End Marker
- Log Categories
- GTPINSPECTION,VALIDATE
- Log Message
- Message received after GTP-U End Marker.
- Default Log Severity
- Warning
- Parameters
- sessionid, origteid, termteid, flow, user, userid
- Explanation
- Message was dropped due to End Marker was previously received.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.97. [ID: 1511] Failed to validate GTP-U message
- Log Categories
- GTPINSPECTION,VALIDATE
- Log Message
- Failed to validate GTP-U message.
- Default Log Severity
- Warning
- Parameters
- messagetype, flow, user, userid
- Explanation
- Malformed GTP-U message.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Investigate sending GTP node.
2.18.98. [ID: 1641] Missing mandatorily present IE
- Log Categories
- GTPINSPECTION,VALIDATE
- Log Message
- Missing mandatorily present IE.
- Default Log Severity
- Notice
- Parameters
- messagetype, ie, flow, user, userid
- Explanation
- The GTP-U message did not contain a mandatory information element.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.99. [ID: 1546] GTP-U message should have sequence number
- Log Categories
- GTPINSPECTION,VALIDATE
- Log Message
- GTP-U message should have sequence number.
- Default Log Severity
- Warning
- Parameters
- messagetype, flow, user, userid
- Explanation
- Message should have contained a sequence number but does not.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Investigate sending GTP node.
2.18.100. [ID: 1642] Out of sequence IE
- Log Categories
- GTPINSPECTION,VALIDATE
- Log Message
- Out of sequence IE.
- Default Log Severity
- Notice
- Parameters
- messagetype, teid, flow, user, userid
- Explanation
- The received GTP-U message contained information elements that were not in increasing order.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.101. [ID: 1595] Repeated GTP-U IEs
- Log Categories
- GTPINSPECTION,VALIDATE
- Log Message
- Repeated GTP-U IEs.
- Default Log Severity
- Notice
- Parameters
- messagetype, teid, ie, flow, user, userid
- Explanation
- The GTP-U message contained to many information elements of the same type.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.102. [ID: 1539] GTP traffic inside a GTP tunnel detected
- Log Categories
- GTPINSPECTION,VALIDATE
- Log Message
- GTP traffic inside a GTP tunnel detected.
- Default Log Severity
- Warning
- Parameters
- flow, user, userid
- Explanation
- GTP traffic detected inside a GTP tunnel.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- Investigate the source of this GTP traffic.
2.18.103. [ID: 1513] GTP traffic inside a GTP tunnel detected
- Log Categories
- GTPINSPECTION,VALIDATE
- Log Message
- GTP traffic inside a GTP tunnel detected.
- Default Log Severity
- Warning
- Parameters
- flow, user, userid
- Explanation
- GTP traffic detected inside a GTP tunnel.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Investigate the source of this GTP traffic.
2.18.104. [ID: 1545] Message is dropped due to internal error
- Log Categories
- GTPINSPECTION,VALIDATE
- Log Message
- Message is dropped due to internal error.
- Default Log Severity
- Error
- Parameters
- flow, user, userid
- Explanation
- Message is dropped due to internal error.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.105. [ID: 1540] Invalid GTP header
- Log Categories
- GTPINSPECTION,VALIDATE
- Log Message
- Invalid GTP header.
- Default Log Severity
- Warning
- Parameters
- reason, flow, user, userid
- Explanation
- Incoming GTP-U packet has invalid GTP header.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Incoming packet is malformed. Investigate why GTP traffic sent is invalid.
2.18.106. [ID: 1514] Invalid Recovery IE value
- Log Categories
- GTPINSPECTION,VALIDATE
- Log Message
- Invalid Recovery IE value.
- Default Log Severity
- Warning
- Parameters
- type, flow, user, userid
- Explanation
- Recovery IE must be set to 0 by a sending peer.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Investigate sending GTP node.
2.18.107. [ID: 1526] Invalid GTP-U message type
- Log Categories
- GTPINSPECTION,VALIDATE
- Log Message
- Invalid GTP-U message type.
- Default Log Severity
- Warning
- Parameters
- flow, user, userid
- Explanation
- Incoming GTP-U packet has invalid message type in it's GTP header.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- Received GTP-U has an unsupported message type. Supported message types are Echo Request, Echo Response, Encapsulated T-PDUs,
Error Indication, Supported Extension Headers Notification and End Marker.
2.18.108. [ID: 1529] Invalid GTP-U message type
- Log Categories
- GTPINSPECTION,VALIDATE
- Log Message
- Invalid GTP-U message type.
- Default Log Severity
- Warning
- Parameters
- flow, user, userid
- Explanation
- Incoming GTP-U packet has invalid message type in it's GTP header.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Received GTP-U has an unsupported message type. Supported message types are Echo Request, Echo Response, Encapsulated T-PDUs,
Error Indication, Supported Extension Headers Notification and End Marker.
2.18.109. [ID: 1520] Invalid GTP version
- Log Categories
- GTPINSPECTION,VALIDATE
- Log Message
- Invalid GTP version.
- Default Log Severity
- Warning
- Parameters
- flow, user, userid
- Explanation
- Incoming GTP-U packet has unsupported GTP version.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- GTP-U is only supported in GTPv1.
2.18.110. [ID: 1542] No matching GTP-U bearer
- Log Categories
- GTPINSPECTION,VALIDATE
- Log Message
- No matching GTP-U bearer.
- Default Log Severity
- Warning
- Parameters
- teid, flow, user, userid
- Explanation
- GTP-U packet did not match any active bearers.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.111. [ID: 1531] GTP packet dropped
- Log Categories
- GTPINSPECTION
- Log Message
- GTP packet dropped.
- Default Log Severity
- Notice
- Parameters
- sessionid, reason, flow
- Explanation
- A GTP message was rejected by GTP inspection.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.18.112. [ID: 1609] GTP packet dropped
- Log Categories
- GTPINSPECTION
- Log Message
- GTP packet dropped.
- Default Log Severity
- Notice
- Parameters
- sessionid, reason, flow
- Explanation
- A GTP message was rejected by GTP inspection.
- Gateway Action
- Strippiggyback
- Action Description
- None
- Proposed Action
- None
2.18.113. [ID: 1547] GTP packet notice
- Log Categories
- GTPINSPECTION
- Log Message
- GTP packet notice.
- Default Log Severity
- Notice
- Parameters
- sessionid, reason, flow
- Explanation
- A GTP message that failed GTP inspection validation was forwarded.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- None
2.18.114. [ID: 1517] GTP-C session update rejected by endpoint
- Log Categories
- GTPINSPECTION
- Log Message
- GTP-C session update rejected by endpoint.
- Default Log Severity
- Notice
- Parameters
- sessionid, bearerid, cause, flow
- Explanation
- The other endpoint rejected the request to update GTP-C session.
- Gateway Action
- Discard
- Action Description
- None
- Proposed Action
- None
2.18.115. [ID: 1515] GTP-C session creation rejected by endpoint
- Log Categories
- GTPINSPECTION
- Log Message
- GTP-C session creation rejected by endpoint.
- Default Log Severity
- Notice
- Parameters
- sessionid, cause, flow
- Explanation
- The other endpoint rejected the request to create GTP-C session.
- Gateway Action
- Discard
- Action Description
- None
- Proposed Action
- None
2.18.116. [ID: 1541] GTP-C session deletion rejected by endpoint
- Log Categories
- GTPINSPECTION
- Log Message
- GTP-C session deletion rejected by endpoint.
- Default Log Severity
- Notice
- Parameters
- sessionid, cause, flow
- Explanation
- The other endpoint rejected the request to delete GTP-C session.
- Gateway Action
- Discard
- Action Description
- None
- Proposed Action
- None
2.18.117. [ID: 1530] GTP-C session update rejected by endpoint
- Log Categories
- GTPINSPECTION
- Log Message
- GTP-C session update rejected by endpoint.
- Default Log Severity
- Notice
- Parameters
- sessionid, cause, flow
- Explanation
- The other endpoint rejected the request to update GTP-C session.
- Gateway Action
- Discard
- Action Description
- None
- Proposed Action
- None
2.18.118. [ID: 1590] Unexpected GTP-U IE type
- Log Categories
- GTPINSPECTION,VALIDATE
- Log Message
- Unexpected GTP-U IE type.
- Default Log Severity
- Warning
- Parameters
- ie, flow, user, userid
- Explanation
- Unexpected GTP-U IE type found.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- Investigate the source of this GTP traffic.
2.18.119. [ID: 1596] Unexpected GTP-U IE type
- Log Categories
- GTPINSPECTION,VALIDATE
- Log Message
- Unexpected GTP-U IE type.
- Default Log Severity
- Warning
- Parameters
- ie, flow, user, userid
- Explanation
- Unexpected GTP-U IE type found.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Investigate the source of this GTP traffic.
2.18.120. [ID: 1594] Unknown GTP-U IE type
- Log Categories
- GTPINSPECTION,VALIDATE
- Log Message
- Unknown GTP-U IE type.
- Default Log Severity
- Notice
- Parameters
- ie, flow, user, userid
- Explanation
- An unknown IE was encountered in the message, but was allowed due to settings.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- Investigate why the endpoints are sending unknown IEs.
2.18.121. [ID: 1592] Unknown GTP-U IE type
- Log Categories
- GTPINSPECTION,VALIDATE
- Log Message
- Unknown GTP-U IE type.
- Default Log Severity
- Warning
- Parameters
- ie, flow, user, userid
- Explanation
- An unknown IE was encountered in the message.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Investigate why the endpoints are sending unknown IEs.
These log messages refer to the HA category.
2.19.1. [ID: 259] HA sync message reassembly failed
- Log Categories
- HA
- Log Message
- HA sync message reassembly failed.
- Default Log Severity
- Warning
- Parameters
-
- Explanation
- Some of the fragments matching this message reassembly were invalid or unexpected resulting in the whole message being dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Search for logs of invalid or unexpected HA sync message fragment and take action accordingly.
2.19.2. [ID: 398] HA sync message reassembly failed due to lack[...]
- Log Categories
- HA
- Log Message
- HA sync message reassembly failed due to lack of resources.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- The reassembly of a HA sync message could not be initiated or was prematurely aborted due to lack of resources.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If this happens frequently try increasing the setting HASyncFragSettings:MaxConcurrentReass.
2.19.3. [ID: 597] HA sync message reassembly failed due to[...]
- Log Categories
- HA
- Log Message
- HA sync message reassembly failed due to timeout.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- Not all fragments of a HA sync message was received before the reassembly was aborted due to timeout.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This event can be the result of packet loss on the HA sync interfaces. If it happens infrequently it should not be a problem
but if it happens more frequently then it might be a good idea to check if the sync interfaces are fully functional. It could
also indicate that the reassembler's configuration is not suitable for the current load so another possible action is to review
the HASyncFragSettings and increase the number of concurrent reassemblies or adjust the timing values.
2.19.4. [ID: 364] Received invalid HA sync message fragment
- Log Categories
- HA
- Log Message
- Received invalid HA sync message fragment.
- Default Log Severity
- Warning
- Parameters
-
- Explanation
- A packet that is not a valid HA sync message fragment was received.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Verify that the HA sync interfaces are properly secured. Untrusted systems should not be able to inject packets on the sync
interfaces. Other potential causes are software or hardware malfunction.
2.19.5. [ID: 609] Received unexpected HA sync message fragment
- Log Categories
- HA
- Log Message
- Received unexpected HA sync message fragment.
- Default Log Severity
- Warning
- Parameters
-
- Explanation
- The fragment did not fit the partially reassembled message that it matched.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If this happens frequently then it may be a sign that the load on the reassembler is too high or that reassembly timeouts
are too low. Review the HASyncFragSettings and increase the number of concurrent reassemblies or adjust the timing values.
2.19.6. [ID: 1044] Active-active scenario detected
- Log Categories
- HA,SYSTEM
- Log Message
- Active-active scenario detected. Remaining active since role is master.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- The cluster have ended up in a scenario where both members wants to be active. In these situations the master will remain
active while the slave go inactive.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- This is a erroneous scenario but, unless occurring frequently, can occur normally under special conditions.
2.19.7. [ID: 1047] Active-active scenario detected
- Log Categories
- HA,SYSTEM
- Log Message
- Active-active scenario detected. Going inactive since role is slave.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- The cluster have ended up in a scenario where both members wants to be active. In these situations the master will remain
active while the slave go inactive.
- Gateway Action
- Failover
- Action Description
- None
- Proposed Action
- This is a erroneous scenario but, unless occurring frequently, can occur normally under special conditions.
2.19.8. [ID: 1049] Config in sync
- Log Categories
- HA,SYSTEM
- Log Message
- Config in sync.
- Default Log Severity
- Notice
- Parameters
- localcfgver, remotecfgver
- Explanation
- Config versions match in both nodes of the HA cluster.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.19.9. [ID: 1051] Config not in sync
- Log Categories
- HA,SYSTEM
- Log Message
- Config not in sync.
- Default Log Severity
- Warning
- Parameters
- localcfgver, remotecfgver
- Explanation
- Config changes are done but not synced to the other node.
- Gateway Action
- None
- Action Description
- Config is not the same between the nodes in the HA cluster
- Proposed Action
- Set AutoSyncCfg in HighAvailability to True or send/receive configure on one node to make sure both nodes are running the
same configuration.
2.19.10. [ID: 580] Failed to establish sync connection
- Log Categories
- HA,SYSTEM
- Log Message
- Failed to establish sync connection.
- Default Log Severity
- Error
- Parameters
-
- Explanation
- The handshake to establish a new sync connection failed. A new handshake will be initiated.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- If the cluster fails to recover from this state on its own consider rebooting the inactive node.
2.19.11. [ID: 1736] No contact with monitored target
- Log Categories
- HA,IFACE
- Log Message
- No contact with monitored target.
- Default Log Severity
- Information
- Parameters
- targetip, physiface, targetiface
- Explanation
- This HA node was not able to establish bi-directional contact with the monitor target targetip, over targetiface. This log never shows up unless the HA cluster has failed to establish bidirectional heart-beat connectivity over the underlying
physiface.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check interface cabling and load and verify proper operation. If the interface pair has been intentionally left unconnected
then it is possible set the HAType property on the interfaces to NonCritical to stop the log from triggering, however, it
is probably desirable to restore the HAType to Critical when the interface is taken into service again to get normal monitoring
of the interface.
2.19.12. [ID: 546] Failure indication cleared
- Log Categories
- HA,SYSTEM
- Log Message
- Failure indication cleared.
- Default Log Severity
- Notice
- Parameters
- id, failure
- Explanation
- A previously indicated failure was reported to be resolved.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.19.13. [ID: 1726] Monitored target reachable
- Log Categories
- HA,IFACE
- Log Message
- Monitored target reachable.
- Default Log Severity
- Information
- Parameters
- targetip, physiface, targetiface
- Explanation
- The HA nodes were unable to successfully communicate through the heart-beats sent over the specific interface. This HA node
was still able to establish bi-directional contact with the monitor target targetip, over targetiface, so network access for physiface is considered functional.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check interface cabling and load and verify proper operation. If the interface pair has been intentionally left unconnected
then it is possible set the HAType property on the interfaces to NonCritical to stop the log from triggering, however, it
is probably desirable to restore the HAType to Critical when the interface is taken into service again to get normal monitoring
of the interface.
2.19.14. [ID: 605] Scheduling HA initiated system restart
- Log Categories
- HA,SYSTEM
- Log Message
- Scheduling HA initiated system restart.
- Default Log Severity
- Critical
- Parameters
- node, reason
- Explanation
- The HA monitor system detected a failure and initiated a system restart of the inactive HA member with the purpose of restoring
system functionality.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.19.15. [ID: 281] Failure indication set
- Log Categories
- HA,SYSTEM
- Log Message
- Failure indication set.
- Default Log Severity
- Notice
- Parameters
- id, failure
- Explanation
- A failure was reported to the HA system which may result in a HA hand-over.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Review the listed failure parameter and check for related logs to determine the cause of the malfunction.
2.19.16. [ID: 237] Going HA ACTIVE since HA peer is dead
- Log Categories
- HA,SYSTEM
- Log Message
- Going HA ACTIVE since HA peer is dead.
- Default Log Severity
- Alert
- SNMP Trap Category
- HA
- SNMP Trap MIB name
- ssmHAActivePeerDead
- SNMP Trap MIB OID
- 1.3.6.1.4.1.5089.3.0.2010.0.1005 (STREAM-TRAPS-MIB)
- Parameters
- node
- Explanation
- The previously active HA peer became offline and the inactive node took over in a failover.
- Gateway Action
- Failover
- Action Description
- None
- Proposed Action
- If this was an unplanned event, check the logs for hints on why the peer node became offline.
2.19.17. [ID: 317] Going HA ACTIVE since outranking peer
- Log Categories
- HA,SYSTEM
- Log Message
- Going HA ACTIVE since outranking peer.
- Default Log Severity
- Alert
- SNMP Trap Category
- HA
- SNMP Trap MIB name
- ssmHAActiveOutrankingPeer
- SNMP Trap MIB OID
- 1.3.6.1.4.1.5089.3.0.2010.0.1010 (STREAM-TRAPS-MIB)
- Parameters
- node, decider, localcriteria, peercriteria
- Explanation
- The previously active HA peer had some sort of malfunction and the inactive node took over.
- Gateway Action
- Failover
- Action Description
- None
- Proposed Action
- If this was an unplanned event, check the logs for hints on what type of malfunction occurred on the peer node.
2.19.18. [ID: 275] Going HA ACTIVE due to user request
- Log Categories
- HA,SYSTEM
- Log Message
- Going HA ACTIVE due to user request.
- Default Log Severity
- Notice
- SNMP Trap Category
- HA
- SNMP Trap MIB name
- ssmHAActiveUserRequest
- SNMP Trap MIB OID
- 1.3.6.1.4.1.5089.3.0.2010.0.1015 (STREAM-TRAPS-MIB)
- Parameters
- node
- Explanation
- The system administrator triggered a hand-over and the node became HA active.
- Gateway Action
- Failover
- Action Description
- None
- Proposed Action
- None
2.19.19. [ID: 130] Going HA INACTIVE due to being outranked by[...]
- Log Categories
- HA,SYSTEM
- Log Message
- Going HA INACTIVE due to being outranked by peer.
- Default Log Severity
- Alert
- SNMP Trap Category
- HA
- SNMP Trap MIB name
- ssmHAInactiveOutrankedByPeer
- SNMP Trap MIB OID
- 1.3.6.1.4.1.5089.3.0.2010.0.1020 (STREAM-TRAPS-MIB)
- Parameters
- node, failure, decider, localcriteria, peercriteria
- Explanation
- A hand-over was performed due to the peer node being deemed to be better fit to be active.
- Gateway Action
- Failover
- Action Description
- None
- Proposed Action
- Review the listed failures and check for related logs to determine the cause of the hand-over.
2.19.20. [ID: 146] Going HA INACTIVE due to user request
- Log Categories
- HA,SYSTEM
- Log Message
- Going HA INACTIVE due to user request.
- Default Log Severity
- Notice
- SNMP Trap Category
- HA
- SNMP Trap MIB name
- ssmHAInactiveUserRequest
- SNMP Trap MIB OID
- 1.3.6.1.4.1.5089.3.0.2010.0.1025 (STREAM-TRAPS-MIB)
- Parameters
- node
- Explanation
- The system administrator triggered a hand-over and the node became HA inactive.
- Gateway Action
- Failover
- Action Description
- None
- Proposed Action
- None
2.19.21. [ID: 663] HA bidir heart-beat communication over[...]
- Log Categories
- HA,IFACE
- Log Message
- HA bidir heart-beat communication over interface failed.
- Default Log Severity
- Notice
- Parameters
- physiface
- Explanation
- The HA nodes were unable to successfully communicate through the heart-beats sent over the specific interface. This communication
is used to monitor the health of the peer node and is the primary mean of monitoring the health of the interfaces.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check interface cabling and load and verify proper operation. If the interface pair has been intentionally left unconnected
then it is possible set the HAType property on the interfaces to NonCritical to stop the log from triggering, however, it
is probably desirable to restore the HAType to Critical when the interface is taken into service again to get normal monitoring
of the interface.
2.19.22. [ID: 177] HA interface offline
- Log Categories
- HA,SYSTEM
- Log Message
- HA interface offline.
- Default Log Severity
- Alert
- Parameters
- iface
- Explanation
- An interface became offline due to loss of connectivity.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check interface cabling and verify proper operation.
2.19.23. [ID: 475] HA interface online
- Log Categories
- HA,SYSTEM
- Log Message
- HA interface online.
- Default Log Severity
- Alert
- Parameters
- iface
- Explanation
- An interface which was previously offline became online.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.19.24. [ID: 1046] Inactive-inactive situation detected
- Log Categories
- HA,SYSTEM
- Log Message
- Inactive-inactive situation detected. Going active since role is master.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- The cluster has ended up in a scenario where both members wants to be inactive. In these situations the master will go active
while the slave remains inactive.
- Gateway Action
- Failover
- Action Description
- None
- Proposed Action
- This is an erroneous scenario but, unless occurring frequently, can occur normally under special conditions.
2.19.25. [ID: 1045] Inactive-inactive situation detected
- Log Categories
- HA,SYSTEM
- Log Message
- Inactive-inactive situation detected. Remaining inactive since role is slave.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- The cluster has ended up in a scenario where both members wants to be inactive. In these situations the master will go active
while the slave remains inactive.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- This is an erroneous scenario but, unless occurring frequently, can occur normally under special conditions.
2.19.26. [ID: 629] Scheduling HA initiated system restart to[...]
- Log Categories
- HA,SYSTEM
- Log Message
- Scheduling HA initiated system restart to resynchronize.
- Default Log Severity
- Warning
- Parameters
- node
- Explanation
- The HA system is restarting the inactive HA member in order to prepare the member to receive new sync data.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.19.27. [ID: 1509] No matching HA interface id found during HA[...]
- Log Categories
- HA,IFACE,SYSTEM
- Log Message
- No matching HA interface id found during HA Peer MAC learning.
- Default Log Severity
- Warning
- Parameters
- hwaddr
- Explanation
- When exchanging hardware addresses with HA peer, the node received data on one interface that could not be matched to existing
interfaces.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify if both HA nodes have the same number of interfaces and that their HA Types match. Also verify that the sync interface
is not on a shared network with other HA clusters.
2.19.28. [ID: 378] HA peer offline
- Log Categories
- HA,SYSTEM
- Log Message
- HA peer offline.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- The previously online HA peer is now offline.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- If this was an unplanned event, check the logs for hints on why the peer node became offline.
2.19.29. [ID: 403] HA peer have an incompatible HA version
- Log Categories
- HA,SYSTEM
- Log Message
- HA peer have an incompatible HA version.
- Default Log Severity
- Alert
- Parameters
- version, min
- Explanation
- Contact was established with a HA peer with an incompatible HA implementation.
- Gateway Action
- Abort
- Action Description
- HA synchronization will not be performed
- Proposed Action
- Make sure the HA peers run core binaries with the same version. All flows/states will be lost when upgrading.
2.19.30. [ID: 1510] Invalid peer MAC received during HA Peer MAC[...]
- Log Categories
- HA,IFACE,SYSTEM
- Log Message
- Invalid peer MAC received during HA Peer MAC learning.
- Default Log Severity
- Warning
- Parameters
- newhw, iface
- Explanation
- When exchanging hardware addresses with HA peer, the node received one invalid hardware address from one of the peer configured
interfaces.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify if the configuration is correct, and that interfaces using HA over Interface MAC are correctly paired.
2.19.31. [ID: 1507] HA Peer MAC learning successful
- Log Categories
- HA,IFACE,SYSTEM
- Log Message
- HA Peer MAC learning successful.
- Default Log Severity
- Information
- Parameters
- learnt
- Explanation
- The node received a packet containing all peer interfaces hardware address and updated values where needed.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- If automatic peer discovery is not intended, then the peer MAC addresses should be set using property EthernetAddress on the
EthernetInterface.
2.19.32. [ID: 1508] HA Peer MAC learning incomplete
- Log Categories
- HA,IFACE,SYSTEM
- Log Message
- HA Peer MAC learning incomplete.
- Default Log Severity
- Warning
- Parameters
- learnt
- Explanation
- The node received a packet containing all peer interfaces hardware address but some interfaces contained errors. These errors
were separately logged.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- If automatic peer discovery is not intended, then the peer MAC addresses should be set when configuring the interface, using
property 'EthernetAddress'. Also verify if both HA nodes have matching interface HA Types.
2.19.33. [ID: 114] HA peer online
- Log Categories
- HA,SYSTEM
- Log Message
- HA peer online.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- The previously offline HA peer is now online.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.19.34. [ID: 630] Dataplane shutting down
- Log Categories
- HA,SYSTEM
- Log Message
- Dataplane shutting down.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- Dataplane is shutting down.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.19.35. [ID: 808] Main resynchronization aborted
- Log Categories
- HA,SYSTEM
- Log Message
- Main resynchronization aborted.
- Default Log Severity
- Notice
- Parameters
- node, state, count
- Explanation
- The resynchronization of all HA state from the active node to the inactive node was aborted. Not all HA state was synchronized.
One of the nodes must be restarted to begin a new full resynchronization.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.19.36. [ID: 323] Main resynchronization done
- Log Categories
- HA,SYSTEM
- Log Message
- Main resynchronization done.
- Default Log Severity
- Information
- Parameters
- node, state, count
- Explanation
- Resynchronization of all HA state from the active node to the inactive node has finished. The inactive node now has sufficient
HA state information to take over if the active node fails.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.19.37. [ID: 285] Commencing main resynchronization
- Log Categories
- HA,SYSTEM
- Log Message
- Commencing main resynchronization.
- Default Log Severity
- Information
- Parameters
- node, state, count
- Explanation
- Resynchronization of all HA state from the active node to the inactive node has started. Once an inactive node is booted up,
it has no HA state information. The active node then starts to send all HA state information to its inactive peer.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.19.38. [ID: 206] Sync connection established
- Log Categories
- HA,SYSTEM
- Log Message
- Sync connection established.
- Default Log Severity
- Information
- Parameters
- id
- Explanation
- The two HA peer nodes have successfully completed a handshake over the sync interface(s) and are now ready for state synchronization.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.19.39. [ID: 436] Sync connection failed
- Log Categories
- HA,SYSTEM
- Log Message
- Sync connection failed.
- Default Log Severity
- Critical
- Parameters
-
- Explanation
- The device was unable to communicate with the HA peer node over the sync interface(s). Until this condition is resolved no
state will be synchronized from the active node to the inactive node.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Urgently investigate why the communication is not working.
2.19.40. [ID: 1425] System versions not equal
- Log Categories
- HA,SYSTEM
- Log Message
- System versions not equal.
- Default Log Severity
- Warning
- Parameters
- localsystemver, remotesystemver
- Explanation
- Config changes are done but not synced to the other node.
- Gateway Action
- None
- Action Description
- System versions are not the same in the HA cluster nodes
- Proposed Action
- Update the nodes in the HighAvailability cluster to the same system version.
2.19.41. [ID: 636] All flows closed due to HA activation or[...]
- Log Categories
- HA,SYSTEM,FLOW
- Log Message
- All flows closed due to HA activation or deactivation.
- Default Log Severity
- Warning
- Parameters
- state
- Explanation
- Enabling or disabling HA is a major configuration change. The event requires all flows to be closed.
- Gateway Action
- Close
- Action Description
- All flows are closed
- Proposed Action
- None
These log messages refer to the HWMON category.
2.20.1. [ID: 1081] Sensor value above monitor threshold
- Log Categories
- HWMON,SYSTEM
- Log Message
- Sensor value above monitor threshold.
- Default Log Severity
- Dynamic
- Parameters
- sensorid, description, name, value, threshold
- Explanation
- Read sensor value is above the upper limit set by the monitor.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Review sensor retrieved value and monitor setting for upper limit value.
2.20.2. [ID: 1079] Sensor value below monitor threshold
- Log Categories
- HWMON,SYSTEM
- Log Message
- Sensor value below monitor threshold.
- Default Log Severity
- Dynamic
- Parameters
- sensorid, description, name, value, threshold
- Explanation
- Read sensor value is below the lower limit set by the monitor.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Review sensor retrieved value and monitor setting for lower limit value.
2.20.3. [ID: 1082] Sensor returned to normal
- Log Categories
- HWMON,SYSTEM
- Log Message
- Sensor returned to normal.
- Default Log Severity
- Dynamic
- Parameters
- sensorid, description, name, value
- Explanation
- The sensor value was outside monitor limits, but is now within monitor limits again.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
These log messages refer to the ICMP category.
2.21.1. [ID: 204] Bad ICMP message checksum
- Log Categories
- ICMP,VALIDATE,STATELESS
- Log Message
- Bad ICMP message checksum.
- Default Log Severity
- Notice
- Parameters
- type, code, chksum, calcchksum, pkt
- Explanation
- An ICMP message has a bad checksum.
- Gateway Action
- Allow
- Action Description
- Node
- Proposed Action
- A bad checksum is normally an indication that the packet data has been corrupted, something that will happen spontaneously
when transferred over a physical network medium. This is only a concern when it happens in excess; in this case it may be
a sign of broken hardware inside the network. Try to locate and isolate the misbehaving unit. The ICMPSettings:ICMPValidateChecksum setting can be changed to control the gateway's behavior regarding packets with broken ICMP checksum.
2.21.2. [ID: 387] Bad ICMP message checksum
- Log Categories
- ICMP,VALIDATE,STATELESS
- Log Message
- Bad ICMP message checksum.
- Default Log Severity
- Warning
- Parameters
- type, code, chksum, calcchksum, pkt
- Explanation
- An ICMP message has a bad checksum.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- A bad checksum is normally an indication that the packet data has been corrupted, something that will happen spontaneously
when transferred over a physical network medium. This is only a concern when it happens in excess; in this case it may be
a sign of broken hardware inside the network. Try to locate and isolate the misbehaving unit. The ICMPSettings:ICMPValidateChecksum setting can be changed to control the gateway's behavior regarding packets with broken ICMP checksum.
2.21.3. [ID: 365] ICMP error with embedded trailer
- Log Categories
- ICMP,STATELESS,VALIDATE
- Log Message
- ICMP error with embedded trailer.
- Default Log Severity
- Warning
- Parameters
- type, code, srcip, destip, paylen, encapproto, encapsrcip, encapdestip, encappaylen, encaptrailer
- Explanation
- The embedded IP message inside the ICMP error, was shorter than the full payload of the ICMP error. A portion of the ICMP
payload therefore consisted of "undefined data".
- Gateway Action
- Strip
- Action Description
- The embedded trailer inside the ICMP payload has been zeroed out
- Proposed Action
- The ICMP error was likely generated as a response to a packet containing a trailer of the "undefined data", but the point
is that "undefined data" is a potential information leak and almost exclusively a sign of incorrect network handling. Try
to locate the node producing the trailers if this happens more than once, and see if it can be upgraded. This log message
can be turned off by modifying the IPSettings:LayerSizeConsistency setting, but the current handling cannot be turned off.
2.21.4. [ID: 328] Length of embedded header in ICMP error is[...]
- Log Categories
- ICMP,STATELESS,VALIDATE
- Log Message
- Length of embedded header in ICMP error is invalid.
- Default Log Severity
- Warning
- Parameters
- type, code, srcip, destip, paylen, encaphdrver, encaphdrlen, encappaylen
- Explanation
- An ICMP error message encapsulated an IPv4 header that was too large to be fully contained inside the original message together
with at least the beginning 8 bytes of an L4 header, meaning that the information to forward this message was never even contained
in the original message.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets. This log message can be disabled by the IPSettings:LayerSizeConsistency setting.
2.21.5. [ID: 450] ICMP error with incompatible IP version
- Log Categories
- ICMP,STATELESS,VALIDATE
- Log Message
- ICMP error with incompatible IP version.
- Default Log Severity
- Warning
- Parameters
- type, code, srcip, destip, encaphdrver, encapproto, encapsrcip, encapdestip
- Explanation
- An ICMP error message encapsulated a message with the incompatible IP version encaphdrver.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets. This log message can be disabled by the IPSettings:LayerSizeConsistency setting.
2.21.6. [ID: 134] ICMP error with incompatible IP version
- Log Categories
- ICMP,STATELESS,VALIDATE
- Log Message
- ICMP error with incompatible IP version.
- Default Log Severity
- Warning
- Parameters
- type, code, srcip, destip, encaphdrver, encapproto, encapsrcip, encapdestip
- Explanation
- An ICMP error message encapsulated a message with the incompatible IP version encaphdrver.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets. This log message can be disabled by the IPSettings:LayerSizeConsistency setting.
2.21.7. [ID: 600] ICMP error to fragment
- Log Categories
- ICMP,STATELESS,VALIDATE
- Log Message
- ICMP error to fragment.
- Default Log Severity
- Warning
- Parameters
- type, code, srcip, destip, encapproto, encapsrcip, encapdestip, encapfragid, encapfragoff
- Explanation
- An ICMP error message encapsulated a non-first IP fragment. Encapsulated non-first fragments are dropped since the protocol
specific information required for forwarding does not exist.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets. This log message can be disabled by the IPSettings:LayerSizeConsistency setting.
2.21.8. [ID: 296] Truncated embedded IP header in ICMPv4
- Log Categories
- ICMP,STATELESS,VALIDATE
- Log Message
- Truncated embedded IP header in ICMPv4.
- Default Log Severity
- Warning
- Parameters
- type, code, srcip, destip, paylen, encaphdrver, encaphdrlen
- Explanation
- An ICMP error message did not carry enough data to contain information required to forward the packet. The encapsulated IPv4
header was larger than an ordinary IPv4 header, and the ICMP error did not encapsulate the whole header.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets. This log message can be disabled by the IPSettings:LayerSizeConsistency setting.
2.21.9. [ID: 476] Dropped ICMP error message
- Log Categories
- ICMP,VALIDATE,STATEFUL
- Log Message
- Dropped ICMP error message.
- Default Log Severity
- Warning
- Parameters
- type, code, srcip, destip, flow, rule, user, userid
- Explanation
- An ICMP error of type type and code code has been received by flow flow, but this ICMP error type is prohibited by the configuration.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If you think the current behavior is incorrect, modify rule rule to use a service with an appropriate ICMP error filter.
2.21.10. [ID: 221] ICMP error to ICMP error
- Log Categories
- ICMP,STATELESS,VALIDATE
- Log Message
- ICMP error to ICMP error.
- Default Log Severity
- Warning
- Parameters
- type, code, srcip, destip, encaptype, encapcode, encapsrcip, encapdestip
- Explanation
- An ICMP error message was received, encapsulating another ICMP error. This is illegal according to RFC 792 (ICMPv4 spec) and
RFC 2463 (ICMPv6 spec) because of the potential to cause a never-ending loop.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Try to locate the node producing these errors, and see if it can be upgraded or replaced.
2.21.11. [ID: 376] Data in request differs from last request
- Log Categories
- ICMP,STATEFUL,VALIDATE
- Log Message
- Data in request differs from last request.
- Default Log Severity
- Information
- Parameters
- seqno, flow, pkt, user, userid
- Explanation
- The last seen ICMP ECHO REQUEST message did not contain the same data as the previous request message. This is legal but unexpected;
"ping" requests are generally using statically defined data to test various network conditions. Some utilities will routinely
use the first 8 bytes to contain a timestamp, so any change in the first 8 bytes since the last request have been ignored.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- The setting ICMPSettings:ICMP_DataTrack can be updated in order to modify how the firewall behaves with regards to the contents of the ICMP ECHO payload. Setting
it to anything but "Ignore" will cause the firewall to inspect the entire payload of the ICMP packet and report when a difference
has been detected between request and reply. This is mostly intended to aid tracking down some very special network anomalies.
This event may be a false positive if a "flood ping" utility has been used (sending requests faster than replies are being
received). In rare cases this can be a sign of hardware malfunction somewhere in the network, and in equally rare cases this
may be an attempt to relay "secret" data using the ICMP "ping" protocol; Check the sender and destination to see if the traffic
is legal. How to track down the kind of hardware malfunction that can give these symptoms is out of scope for this text, but
as much can be said that the network hardware handles data as changes between ones and zeroes. Problems are more likely to
arise with very few changes during a transfer (mostly ones or zeroes) or lots of changes (alternating ones and zeroes), so
the suggestion would be to begin testing these bit-patterns.
2.21.12. [ID: 286] Data in request differs from last request
- Log Categories
- ICMP,STATEFUL,VALIDATE
- Log Message
- Data in request differs from last request.
- Default Log Severity
- Warning
- Parameters
- seqno, flow, pkt, user, userid
- Explanation
- The last seen ICMP ECHO REQUEST message did not contain the same data as the previous request message. This is legal but unexpected;
"ping" requests are generally using statically defined data to test various network conditions. Some utilities will routinely
use the first 8 bytes to contain a timestamp, so any change in the first 8 bytes since the last request have been ignored.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The setting ICMPSettings:ICMP_DataTrack can be updated in order to modify how the firewall behaves with regards to the contents of the ICMP ECHO payload. Setting
it to anything but "Ignore" will cause the firewall to inspect the entire payload of the ICMP packet and report when a difference
has been detected between request and reply. This is mostly intended to aid tracking down some very special network anomalies.
This event may be a false positive if a "flood ping" utility has been used (sending requests faster than replies are being
received). In rare cases this can be a sign of hardware malfunction somewhere in the network, and in equally rare cases this
may be an attempt to relay "secret" data using the ICMP "ping" protocol; Check the sender and destination to see if the traffic
is legal. How to track down the kind of hardware malfunction that can give these symptoms is out of scope for this text, but
as much can be said that the network hardware handles data as changes between ones and zeroes. Problems are more likely to
arise with very few changes during a transfer (mostly ones or zeroes) or lots of changes (alternating ones and zeroes), so
the suggestion would be to begin testing these bit-patterns.
2.21.13. [ID: 426] Invalid ICMP type
- Log Categories
- ICMP,STATELESS,VALIDATE
- Log Message
- Invalid ICMP type.
- Default Log Severity
- Warning
- Parameters
- type, code, pkt
- Explanation
- An ICMP message that is not allowed to setup stateful connections, tried to setup a stateful connection. The ICMP message
in itself was allowed by the ruleset, but this particular message does not make sense to handle in a stateful manner.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- A rule to setup a stateful connection is apparently using a service that is not intended to handle a stateful connection.
Either revise the ruleset, or split the used service in two: One for stateful traffic and one for traffic that is not stateful
(allow, NAT and SAT rules are stateful, "fast forward" is non-stateful).
2.21.14. [ID: 496] Mismatching ICMP reply data
- Log Categories
- ICMP,STATEFUL,VALIDATE
- Log Message
- Mismatching ICMP reply data.
- Default Log Severity
- Notice
- Parameters
- seqno, flow, pkt, user, userid
- Explanation
- A received ICMP ECHO REPLY message did not contain the same data as the corresponding ICMP ECHO REQUEST message. This is not
in compliance with the ICMP "ping" protocol.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- The setting ICMPSettings:ICMP_DataTrack can be updated in order to modify how the firewall behaves with regards to the contents of the ICMP ECHO payload. Setting
it to anything but "Ignore" will cause the firewall to inspect the entire payload of the ICMP packet and report when a difference
has been detected between request and reply. This is mostly intended to aid tracking down some very special network anomalies.
This event may be a false positive if a "flood ping" utility has been used (sending requests faster than replies are being
received). In rare cases this can be a sign of hardware malfunction somewhere in the network, and in equally rare cases this
may be an attempt to relay "secret" data using the ICMP "ping" protocol; Check the sender and destination to see if the traffic
is legal. How to track down the kind of hardware malfunction that can give these symptoms is out of scope for this text, but
as much can be said that the network hardware handles data as changes between ones and zeroes. Problems are more likely to
arise with very few changes during a transfer (mostly ones or zeroes) or lots of changes (alternating ones and zeroes), so
the suggestion would be to begin testing these bit-patterns.
2.21.15. [ID: 555] Mismatching ICMP reply data
- Log Categories
- ICMP,STATEFUL,VALIDATE
- Log Message
- Mismatching ICMP reply data.
- Default Log Severity
- Warning
- Parameters
- seqno, flow, pkt, user, userid
- Explanation
- A received ICMP ECHO REPLY message did not contain the same data as the corresponding ICMP ECHO REQUEST message. This is not
in compliance with the ICMP "ping" protocol.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The setting ICMPSettings:ICMP_DataTrack can be updated in order to modify how the firewall behaves with regards to the contents of the ICMP ECHO payload. Setting
it to anything but "Ignore" will cause the firewall to inspect the entire payload of the ICMP packet and report when a difference
has been detected between request and reply. This is mostly intended to aid tracking down some very special network anomalies.
This event may be a false positive if a "flood ping" utility has been used (sending requests faster than replies are being
received). In rare cases this can be a sign of hardware malfunction somewhere in the network, and in equally rare cases this
may be an attempt to relay "secret" data using the ICMP "ping" protocol; Check the sender and destination to see if the traffic
is legal. How to track down the kind of hardware malfunction that can give these symptoms is out of scope for this text, but
as much can be said that the network hardware handles data as changes between ones and zeroes. Problems are more likely to
arise with very few changes during a transfer (mostly ones or zeroes) or lots of changes (alternating ones and zeroes), so
the suggestion would be to begin testing these bit-patterns.
2.21.16. [ID: 1504] ICMP error response to multicast
- Log Categories
- ICMP,STATELESS,VALIDATE
- Log Message
- ICMP error response to multicast.
- Default Log Severity
- Warning
- Parameters
- type, code, srcip, destip, encaphdrver, encapproto, encapsrcip, encapdestip
- Explanation
- An ICMP error was made in response to a multicast message, or used an otherwise illegal combination of multicast and ICMP.
Historically this has been used for amplification attacks, but is more frequently caused by devices misbehaving when exposed
to multicast traffic.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If this is a reoccurring issue, try to track down the sender of the ICMP error. The log message can also be disabled by IPSettings:LayerSizeConsistency, but even if there is no underlying malicious attempt, remember that software producing these messages may also be susceptible
for the associated amplification attacks.
2.21.17. [ID: 1503] ICMP error response to multicast
- Log Categories
- ICMP,STATELESS,VALIDATE
- Log Message
- ICMP error response to multicast.
- Default Log Severity
- Notice
- Parameters
- type, code, srcip, destip, encaphdrver, encapproto, encapsrcip, encapdestip
- Explanation
- An ICMP error was made in response to a multicast message. Normally this is illegal, albeit this particular case this is considered
legal. By nature it is a multicast reply, and needs tight control; without, it is a possible vector for amplification "attacks"
against the multicast source.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- Normally nothing needs to be done. ICMP errors are rate limited with ICMPSettings:ICMPErrorPerSecLimit, ICMPSettings:ICMPMaxErrorsPerRule and ICMPSettings:ICMPMaxErrorsPerFlow. In some scenarios, blocking specific ICMP error messages may be an option: Consider using a more restrictive service and
review the ICMP settings, in particular ICMPSettings:IP6PacketTooBig. This log message can be completely disabled by IPSettings:LayerSizeConsistency, but this will also disable many log messages that are of a more severe nature.
2.21.18. [ID: 301] Sequence number in reply is outside expected[...]
- Log Categories
- ICMP,STATEFUL,VALIDATE
- Log Message
- Sequence number in reply is outside expected range.
- Default Log Severity
- Notice
- Parameters
- min, max, seqno, flow, user, userid
- Explanation
- An ICMP reply had a sequence number outside the current window of expected sequence numbers. The sequence number seqno is below the lower bound min of the sequence window. This may occur if a stray message following a less efficient route or a duplicate message.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- When duplicate messages show up and/or messages are received out-of-order in abundance, the network should be examined for
broken hardware or misconfigured equipment. Note that wireless networks often produce this kind of anomalies even when they
are fully functional. The ICMPSettings:ICMP_SeqNoTrack setting can be changed to control the gateway's behavior regarding packets received out-of-order.
2.21.19. [ID: 273] Sequence number in reply is outside expected[...]
- Log Categories
- ICMP,STATEFUL,VALIDATE
- Log Message
- Sequence number in reply is outside expected range.
- Default Log Severity
- Warning
- Parameters
- min, max, seqno, flow, user, userid
- Explanation
- An ICMP reply had a sequence number outside the current window of expected sequence numbers. The sequence number seqno is below the lower bound min of the sequence window. This may occur if a stray message following a less efficient route or a duplicate message.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- When duplicate messages show up and/or messages are received out-of-order in abundance, the network should be examined for
broken hardware or misconfigured equipment. Note that wireless networks often produce this kind of anomalies even when they
are fully functional. The ICMPSettings:ICMP_SeqNoTrack setting can be changed to control the gateway's behavior regarding packets received out-of-order.
2.21.20. [ID: 288] Problem pointer outside of data
- Log Categories
- ICMP,STATELESS,VALIDATE
- Log Message
- Problem pointer outside of data.
- Default Log Severity
- Warning
- Parameters
- srcip, destip, paylen, encapproto, encapsrcip, encapdestip, encappaylen, ptr
- Explanation
- An ICMP "parameter problem" error message was received, but the "problem pointer" inside the error message did not point at
any data contained in the packet.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets. This log message can be disabled by the IPSettings:LayerSizeConsistency setting.
2.21.21. [ID: 507] Problem pointer outside of data
- Log Categories
- ICMP,STATELESS,VALIDATE
- Log Message
- Problem pointer outside of data.
- Default Log Severity
- Warning
- Parameters
- type, code, srcip, destip, paylen, encapproto, encapsrcip, encapdestip, encappaylen, ptr
- Explanation
- An ICMP "parameter problem" error message was received, but the "problem pointer" inside the error message did not point at
any data contained in the packet.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets. This log message can be disabled by the IPSettings:LayerSizeConsistency setting.
2.21.22. [ID: 612] Header length parameter problem
- Log Categories
- ICMP,STATELESS,VALIDATE
- Log Message
- Header length parameter problem.
- Default Log Severity
- Warning
- Parameters
- type, code, srcip, destip, paylen, encaphdrver, encaphdrlen, encappaylen
- Explanation
- An ICMP "parameter problem" message was received, pointing at the encapsulated IP headers length, total payload or possibly
using the general "header length error" code. It appears as if the original packets IPv4 header was too large to be fully
contained inside the original message itself. While this may be a legal ICMP error, the information needed to forward this
packet was never even present in the original packet, and the firewall cannot forward it in an easy way.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The encapsulated message inside the ICMP error is horribly broken. Judging from the information contained in the ICMP error,
the node at srcip is the one that discovered the broken packet. The rest of the information is not reliable. Examine why this broken packet
have been sent in the first place. If you need to forward this ICMP error, you need to setup a stateless ICMP rule that explicitly
forwards it to its destination destip. You will also need to set the ICMPSettings:ICMPErrorPerSecToSPLimit to a non-null value. This log message itself can be disabled with the IPSettings:LayerSizeConsistency setting.
2.21.23. [ID: 164] IP header version parameter problem
- Log Categories
- ICMP,STATELESS,VALIDATE
- Log Message
- IP header version parameter problem.
- Default Log Severity
- Notice
- Parameters
- type, code, hdrver, srcip, destip, encaphdrver, encapproto, encapsrcip, encapdestip
- Explanation
- An ICMP "parameter problem" message was received, pointing at the encapsulated IP headers version. It appears as if an IP
version hdrver only node is receiving IP traffic of version encaphdrver. While this may be a legal packet, the information needed to forward this packet is incompatible with the module that forwarded
the original IP version encaphdrver packet, and the firewall cannot forward it in an easy way.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Examine why IP version encaphdrver traffic is routed to the IP hdrver only node. If possible, upgrade or block IP version encaphdrver traffic to the node. If you need to forward this ICMP error, you need to setup a stateless ICMP rule that explicitly forwards
it to its destination destip. You will also need to set the ICMPSettings:ICMPErrorPerSecToSPLimit to a non-null value. This log message itself can be disabled with the IPSettings:LayerSizeConsistency setting.
2.21.24. [ID: 807] Failed to allocate reassembly buffer
- Log Categories
- ICMP,FRAG
- Log Message
- Failed to allocate reassembly buffer.
- Default Log Severity
- Warning
- Parameters
- pktlen, pkt
- Explanation
- The received packet was fragmented and could not be reassembled because there were no free buffers available to hold the reassembled
packet.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.21.25. [ID: 805] Reassembled packet exceeds allowed size
- Log Categories
- ICMP,FRAG
- Log Message
- Reassembled packet exceeds allowed size.
- Default Log Severity
- Warning
- Parameters
- maxlen, pkt
- Explanation
- The packet was fragmented and could not be reassembled because it exceeded the maximum allowed size.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The FragSettings:LocalReass_MaxSize can be used to change the maximum allowed size for locally reassembled packets.
2.21.26. [ID: 806] Failed to reassemble packet
- Log Categories
- ICMP,FRAG
- Log Message
- Failed to reassemble packet.
- Default Log Severity
- Error
- Parameters
- pktlen, pkt
- Explanation
- The packet was fragmented and could not be reassembled.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.21.27. [ID: 533] Received ICMP error message
- Log Categories
- ICMP,VALIDATE,STATEFUL
- Log Message
- Received ICMP error message.
- Default Log Severity
- Notice
- Parameters
- type, code, srcip, destip, flow, rule, user, userid
- Explanation
- An ICMP error of type type and code code has been received by flow flow.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- If you think the current behavior is incorrect, modify rule rule to use a service with an appropriate ICMP error filter.
2.21.28. [ID: 553] Sequence number in reply is above expected[...]
- Log Categories
- ICMP,STATEFUL,VALIDATE
- Log Message
- Sequence number in reply is above expected window.
- Default Log Severity
- Notice
- Parameters
- min, max, seqno, flow, user, userid
- Explanation
- An ICMP reply had a sequence number above the current window of expected sequence numbers. The sequence number seqno is higher than the maximum value max in the sequence window (and at the same time closer to max than to the lower bound min of the window). Therefore this looks like an illegal reply to a message that hasn't been sent.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- When duplicate messages show up and/or messages are received out-of-order in abundance, the network should be examined for
broken hardware or misconfigured equipment. Note that wireless networks often produce this kind of anomalies even when they
are fully functional. The ICMPSettings:ICMP_SeqNoTrack setting can be changed to control the gateway's behavior regarding packets received out-of-order.
2.21.29. [ID: 422] Sequence number in reply is above expected[...]
- Log Categories
- ICMP,STATEFUL,VALIDATE
- Log Message
- Sequence number in reply is above expected window.
- Default Log Severity
- Warning
- Parameters
- min, max, seqno, flow, user, userid
- Explanation
- An ICMP reply had a sequence number above the current window of expected sequence numbers. The sequence number seqno is higher than the maximum value max in the sequence window (and at the same time closer to max than to the lower bound min of the window). Therefore this looks like an illegal reply to a message that hasn't been sent.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- When duplicate messages show up and/or messages are received out-of-order in abundance, the network should be examined for
broken hardware or misconfigured equipment. Note that wireless networks often produce this kind of anomalies even when they
are fully functional. The ICMPSettings:ICMP_SeqNoTrack setting can be changed to control the gateway's behavior regarding packets received out-of-order.
2.21.30. [ID: 513] Sequence number in request is decreasing
- Log Categories
- ICMP,STATEFUL,VALIDATE
- Log Message
- Sequence number in request is decreasing.
- Default Log Severity
- Information
- Parameters
- min, max, seqno, flow, user, userid
- Explanation
- The sequence numbers in ICMP requests are expected to be monotonically increasing. In this case the sequence number is lower
than (or equal to) the highest sequence number max previously seen in the flow flow. While this is legal, it is still an odd and unexpected behavior. The most likely background is simply that the ICMP session
has been restarted, but this can also be a sign of network disturbances.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- The ICMPSettings:ICMP_SeqNoTrack setting can be changed to control the gateway's behavior regarding packets received out-of-order.
2.21.31. [ID: 143] Sequence number in request is decreasing
- Log Categories
- ICMP,STATEFUL,VALIDATE
- Log Message
- Sequence number in request is decreasing.
- Default Log Severity
- Warning
- Parameters
- min, max, seqno, flow, user, userid
- Explanation
- The sequence numbers in ICMP requests are expected to be monotonically increasing. In this case the sequence number is lower
than (or equal to) the highest sequence number max previously seen in the flow flow. While this is legal, it is still an odd and unexpected behavior. The most likely background is simply that the ICMP session
has been restarted, but this can also be a sign of network disturbances.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The ICMPSettings:ICMP_SeqNoTrack setting can be changed to control the gateway's behavior regarding packets received out-of-order.
2.21.32. [ID: 232] Truncated ICMPv4 payload
- Log Categories
- ICMP,STATELESS,VALIDATE
- Log Message
- Truncated ICMPv4 payload.
- Default Log Severity
- Warning
- Parameters
- type, code, srcip, destip, paylen
- Explanation
- An ICMPv4 error message did not carry enough data to encapsulate an IPv4 header.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets. This log message can be disabled by the IPSettings:LayerSizeConsistency setting.
2.21.33. [ID: 497] Truncated ICMPv6 payload
- Log Categories
- ICMP,IPV6,STATELESS,VALIDATE
- Log Message
- Truncated ICMPv6 payload.
- Default Log Severity
- Warning
- Parameters
- type, code, srcip, destip, paylen
- Explanation
- An ICMPv6 error message did not carry enough data to encapsulate an IPv6 header.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets. This log message can be disabled by the IPSettings:LayerSizeConsistency setting.
2.21.34. [ID: 536] ICMP error with truncated payload
- Log Categories
- ICMP,STATELESS,VALIDATE
- Log Message
- ICMP error with truncated payload.
- Default Log Severity
- Warning
- Parameters
- type, code, srcip, destip, paylen, encapproto, encapsrcip, encapdestip
- Explanation
- An ICMP error message did not carry enough data to encapsulate a minimal L4 header. The packet has been dropped since the
protocol specific information required for forwarding does not exist.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets. This log message can be disabled by the IPSettings:LayerSizeConsistency setting.
These log messages refer to the IFACE category.
2.22.1. [ID: 795] Ethernet interface is blocked
- Log Categories
- IFACE
- Log Message
- Ethernet interface is blocked.
- Default Log Severity
- Critical
- Parameters
- iface
- Explanation
- The software seemed to have stopped processing packets received on this interface leaving the interface unable to received
any packets.
- Gateway Action
- None
- Action Description
-
- Proposed Action
- Contact technical support. Check the load on the interface and verify that no packets are being picked up from that interface
and processed by the system and consider restarting the unit if it seems to be malfunctioning to see if that resolves the
situation.
2.22.2. [ID: 662] Ethernet interface is flooded
- Log Categories
- IFACE
- Log Message
- Ethernet interface is flooded.
- Default Log Severity
- Warning
- Parameters
- iface
- Explanation
- The interface started to drop packets since packets were arriving at a higher rate than the system was able to handle.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.22.3. [ID: 661] Ethernet interface is still flooded
- Log Categories
- IFACE
- Log Message
- Ethernet interface is still flooded.
- Default Log Severity
- Notice
- Parameters
- iface
- Explanation
- The interface has been dropping packets for some time since packets were arriving at a higher rate than the system was able
to handle.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.22.4. [ID: 1054] Ethernet link down
- Log Categories
- IFACE,ETHERNET,SYSTEM
- Log Message
- Ethernet link down.
- Default Log Severity
- Critical
- SNMP Trap Category
- LINK
- SNMP Trap MIB name
- linkDown
- SNMP Trap MIB OID
- 1.3.6.1.6.3.1.1.5.3 (IF-MIB, RFC2863)
- Parameters
- iface
- Explanation
- An Ethernet interface lost its link.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- If the condition persists then verify cabling and hardware on both the firewall and the peer device.
2.22.5. [ID: 1055] Ethernet link up
- Log Categories
- IFACE,ETHERNET,SYSTEM
- Log Message
- Ethernet link up.
- Default Log Severity
- Notice
- SNMP Trap Category
- LINK
- SNMP Trap MIB name
- linkUp
- SNMP Trap MIB OID
- 1.3.6.1.6.3.1.1.5.4 (IF-MIB, RFC2863)
- Parameters
- linkspeed, duplex, iface
- Explanation
- An Ethernet interface's link has been successfully established/negotiated.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
These log messages refer to the IKE category.
2.23.1. [ID: 1694] Acquired address
- Log Categories
- IKE,IPSEC
- Log Message
- Acquired address.
- Default Log Severity
- Information
- Parameters
- ip, iface
- Explanation
- An internal address for the IPsec tunnel was succcessfully acquired from an IP pool.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.23.2. [ID: 1695] No IP pool for address request
- Log Categories
- IKE,IPSEC
- Log Message
- No IP pool for address request.
- Default Log Severity
- Information
- Parameters
- name, count, iface
- Explanation
- A suitable IP pool for aquiring an internal address for the IPsec tunnel was not found.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.23.3. [ID: 1713] Failed to release address
- Log Categories
- IKE,IPSEC
- Log Message
- Failed to release address.
- Default Log Severity
- Error
- Parameters
- ip, iface
- Explanation
- An internal address for the IPsec tunnel could not be returned back to the IP pool it was acquired from.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.23.4. [ID: 1691] Released address
- Log Categories
- IKE,IPSEC
- Log Message
- Released address.
- Default Log Severity
- Information
- Parameters
- ip, iface
- Explanation
- An internal address for the IPsec tunnel was returned back to the IPPool it was acquired from.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.23.5. [ID: 1690] Released address
- Log Categories
- IKE,IPSEC
- Log Message
- Released address.
- Default Log Severity
- Information
- Parameters
- ip, name
- Explanation
- An internal address for the IPsec tunnel was returned back to the IP pool it was acquired from.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.23.6. [ID: 1693] Requesting address
- Log Categories
- IKE,IPSEC
- Log Message
- Requesting address.
- Default Log Severity
- Information
- Parameters
- ip, iface
- Explanation
- The system is requesting an internal address for the IPsec tunnel from an IP pool.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.23.7. [ID: 1692] Address request failed
- Log Categories
- IKE,IPSEC
- Log Message
- Address request failed.
- Default Log Severity
- Warning
- Parameters
- ip, iface
- Explanation
- The system failed to acquire an internal address for the IPsec tunnel from an IP pool.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Refer to IP pool related logs and statistics for more information.
2.23.8. [ID: 1700] Failed to schedule auto-establishment of[...]
- Log Categories
- IKE,IPSEC
- Log Message
- Failed to schedule auto-establishment of IPsec tunnels.
- Default Log Severity
- Error
- Parameters
- reason
- Explanation
- The system failed to start IKE negotiations for IPsec tunnels configured for auto-establishment.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.23.9. [ID: 1061] Half open IKE SA limit exceeded
- Log Categories
- IKE
- Log Message
- Half open IKE SA limit exceeded.
- Default Log Severity
- Notice
- Parameters
- localip, localport, remoteip, remoteport, max
- Explanation
- The system has too many ongoing IKE negotiations. The limit can be adjusted with IKESettings:MaxNegotiations.
- Gateway Action
- Drop
- Action Description
- The IKE negotiation will be dropped
- Proposed Action
- None
2.23.10. [ID: 813] IKE Max SA Warning
- Log Categories
- IKE
- Log Message
- IKE Max SA Warning.
- Default Log Severity
- Warning
- Parameters
-
- Explanation
- Incoming IKE requests exceeded 90 percent of the allowed number of concurrent IKE SAs (license limitation).
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Add more hardware devices or extend your license to support more IKE SAs to secure that all incoming IKE requests can be properly
established.
2.23.11. [ID: 642] IKE negotiation failed
- Log Categories
- IKE,IPSEC
- Log Message
- IKE negotiation failed.
- Default Log Severity
- Notice
- Parameters
- localip, localport, remoteip, remoteport, localid, remoteid, localikespi, remoteikespi, initiator, algorithms, rekeytime,
reauthtime, ikeversion, reason, iface, recviface
- Explanation
- An IKE negotiation failed due to the reason specified. The IKE SA may be deleted as a result but that will be logged in another
log event.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify that the configuration on both peers are correct.
2.23.12. [ID: 419] Failed to establish IKE SA
- Log Categories
- IKE,IPSEC
- Log Message
- Failed to establish IKE SA.
- Default Log Severity
- Warning
- Parameters
- localip, localport, remoteip, remoteport, localid, remoteid, localikespi, remoteikespi, initiator, algorithms, rekeytime,
reauthtime, ikeversion, reason, iface, recviface
- Explanation
- An IKE SA could not be established between the two endpoints.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify the configuration of algorithms and authentication material on each endpoint.
2.23.13. [ID: 530] Successfully established IKE SA
- Log Categories
- IKE,IPSEC
- Log Message
- Successfully established IKE SA.
- Default Log Severity
- Notice
- Parameters
- localip, localport, remoteip, remoteport, localid, remoteid, localikespi, remoteikespi, initiator, algorithms, rekeytime,
reauthtime, ikeversion, iface, recviface
- Explanation
- An IKE SA was successfully established between the two endpoints.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.23.14. [ID: 590] Successfully deleted IKE SA
- Log Categories
- IKE,IPSEC
- Log Message
- Successfully deleted IKE SA.
- Default Log Severity
- Notice
- Parameters
- localip, localport, remoteip, remoteport, localid, remoteid, localikespi, remoteikespi, initiator, algorithms, rekeytime,
reauthtime, ikeversion, iface, recviface
- Explanation
- The IKE SA was successfully removed from the system.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.23.15. [ID: 161] Failed to rekey IKE SA
- Log Categories
- IKE,IPSEC
- Log Message
- Failed to rekey IKE SA.
- Default Log Severity
- Warning
- Parameters
- localip, localport, remoteip, remoteport, localid, remoteid, localikespi, remoteikespi, initiator, algorithms, rekeytime,
reauthtime, ikeversion, reason, iface, recviface
- Explanation
- Failed to derive a new IKE SA from an existing IKE SA.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify that each endpoint is able to perform rekey and that both use the same policy for Perfect Forward Secrecy (PFS).
2.23.16. [ID: 616] Successfully rekeyed IKE SA
- Log Categories
- IKE,IPSEC
- Log Message
- Successfully rekeyed IKE SA.
- Default Log Severity
- Notice
- Parameters
- localip, localport, remoteip, remoteport, localid, remoteid, localikespi, remoteikespi, oldlocalikespi, oldremoteikespi, initiator,
algorithms, rekeytime, reauthtime, ikeversion, iface, recviface
- Explanation
- A new IKE SA was successfully derived from an existing IKE SA.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.23.17. [ID: 556] Failed to create IPsec SA
- Log Categories
- IKE,IPSEC
- Log Message
- Failed to create IPsec SA.
- Default Log Severity
- Warning
- Parameters
- localip, remoteip, inboundspi, outboundspi, proto, localts, remotets, lifetime, localikespi, remoteikespi, algorithms, initiator,
reason, iface, recviface
- Explanation
- Failed to establish an IPsec SA between the two endpoints. The IPsec tunnel cannot be established.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify the configuration of the IPsec proposals and traffic selectors on both endpoints.
2.23.18. [ID: 155] Successfully created IPsec SA
- Log Categories
- IKE,IPSEC
- Log Message
- Successfully created IPsec SA.
- Default Log Severity
- Notice
- Parameters
- localip, remoteip, inboundspi, outboundspi, proto, localts, remotets, lifetime, localikespi, remoteikespi, algorithms, initiator,
iface, recviface
- Explanation
- An IPsec SA was successfully established between the two endpoints.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.23.19. [ID: 183] Successfully deleted IPsec SA
- Log Categories
- IKE,IPSEC
- Log Message
- Successfully deleted IPsec SA.
- Default Log Severity
- Notice
- Parameters
- localip, remoteip, inboundspi, outboundspi, proto, localts, remotets, lifetime, localikespi, remoteikespi, algorithms, initiator,
iface, recviface
- Explanation
- The IPsec SA was successfully removed from the system.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.23.20. [ID: 172] Failed to rekey IPsec SA
- Log Categories
- IKE,IPSEC
- Log Message
- Failed to rekey IPsec SA.
- Default Log Severity
- Notice
- Parameters
- localip, remoteip, inboundspi, outboundspi, proto, localts, remotets, lifetime, localikespi, remoteikespi, algorithms, initiator,
reason, iface, recviface
- Explanation
- Failed to derive a new IPsec SA. The IPsec tunnel will be torn down when the lifetime of the current IPsec SA expires.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.23.21. [ID: 628] Successfully rekeyed IPsec SA
- Log Categories
- IKE,IPSEC
- Log Message
- Successfully rekeyed IPsec SA.
- Default Log Severity
- Information
- Parameters
- localip, remoteip, inboundspi, outboundspi, oldinboundspi, oldoutboundspi, proto, localts, remotets, lifetime, localikespi,
remoteikespi, algorithms, initiator, iface, recviface
- Explanation
- Successfully derived a new IPsec SA.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.23.22. [ID: 1060] Job limit exceeded
- Log Categories
- IKE
- Log Message
- Job limit exceeded.
- Default Log Severity
- Warning
- Parameters
- localip, localport, remoteip, remoteport, max
- Explanation
- The IKE subsystem is currently overloaded. It could also be a sign that IKESettings:MaxJobs is set too low.
- Gateway Action
- Drop
- Action Description
- The IKE negotiation will be dropped
- Proposed Action
- None
2.23.23. [ID: 803] Peer is dead
- Log Categories
- IKE
- Log Message
- Peer is dead.
- Default Log Severity
- Notice
- Parameters
- localip, localport, remoteip, remoteport, localid, remoteid, localikespi, remoteikespi, initiator, ikeversion, iface, recviface
- Explanation
- The peer didn't respond to DPD. The IKE SA and its child SAs will be deleted.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.23.24. [ID: 1059] Peer too aggressive
- Log Categories
- IKE
- Log Message
- Peer too aggressive.
- Default Log Severity
- Notice
- Parameters
- localip, localport, remoteip, remoteport, max
- Explanation
- The peer has too many ongoing IKE negotiations. The limit can be adjusted with IKESettings:MaxPeerNegotiations.
- Gateway Action
- Drop
- Action Description
- The IKE negotiation will be dropped
- Proposed Action
- None
2.23.25. [ID: 1655] Failed to re-initialize dynamic rules
- Log Categories
- IKE,RULE
- Log Message
- Failed to re-initialize dynamic rules.
- Default Log Severity
- Critical
- Parameters
-
- Explanation
- The system failed to re-initialize dynamic rules to recover from an unexpected event. This may result in reduced functionality.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The device might need to be manually restarted to get full functionality. This should be reported to the vendor of the device.
2.23.26. [ID: 1664] Failed to re-insert IKE rule
- Log Categories
- IKE
- Log Message
- Failed to re-insert IKE rule.
- Default Log Severity
- Error
- Parameters
- srcip, srcport, destip, destport
- Explanation
- The system failed to re-insert a dynamic rule to recover from an unexpected event. This may result in reduced functionality.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The device might need to be manually restarted to get full functionality. This should be reported to the vendor of the device.
2.23.27. [ID: 770] IKE thread watchdog triggered
- Log Categories
- IKE
- Log Message
- IKE thread watchdog triggered. Was not able to process jobs for 30s. IKE daemon will be restarted.
- Default Log Severity
- Alert
- Parameters
-
- Explanation
- IKE daemon was not able to process tasks for 30s. IKE daemon will be restarted. All IKE negotiated IPsec tunnels will be taken
down.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check for any new crashdumps and report the incident via your support channel.
2.23.28. [ID: 737] User logged out
- Log Categories
- IKE
- Log Message
- User logged out.
- Default Log Severity
- Notice
- Parameters
- userid, localikespi, remoteikespi
- Explanation
- User was logged out by the authentication system. Tunnels belonging to the user will be taken down.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
These log messages refer to the IPPOOL category.
2.24.1. [ID: 909] Pool has reached the maximum allowed number[...]
- Log Categories
- IPPOOL
- Log Message
- Pool has reached the maximum allowed number of addresses.
- Default Log Severity
- Notice
- Parameters
- value, max
- Explanation
- A new client cannot be created as the pool has handed out the maximum allowed number of addresses.
- Gateway Action
- Reject
- Action Description
- Reject new requests
- Proposed Action
- Increase the Maxclients value in configuration for more addresses.
2.24.2. [ID: 915] No offers received
- Log Categories
- IPPOOL
- Log Message
- No offers received.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- The Pool has not received any offers from the DHCP server.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.24.3. [ID: 917] Received Offer not valid
- Log Categories
- IPPOOL
- Log Message
- Received Offer not valid.
- Default Log Severity
- Warning
- Parameters
-
- Explanation
- Pool received at least one offer but none passed the requirements set by configuration.
- Gateway Action
- Discard
- Action Description
- None
- Proposed Action
- None
2.24.4. [ID: 916] Request received from Subsystem
- Log Categories
- IPPOOL
- Log Message
- Request received from Subsystem.
- Default Log Severity
- Information
- Parameters
-
- Explanation
- A request is made by the subsystem.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.24.5. [ID: 918] Client Bound
- Log Categories
- IPPOOL
- Log Message
- Client Bound.
- Default Log Severity
- Information
- Parameters
- clientip
- Explanation
- A response is sent to the subsystem when a client is bound.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.24.6. [ID: 911] Handed address no longer available
- Log Categories
- IPPOOL
- Log Message
- Handed address no longer available.
- Default Log Severity
- Notice
- Parameters
- ip
- Explanation
- Handed out address is no longer available. This is due to a release by the subsystem or a lease renew failure.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.24.7. [ID: 914] Address is returned back to IPPool system
- Log Categories
- IPPOOL
- Log Message
- Address is returned back to IPPool system.
- Default Log Severity
- Information
- Parameters
- ip
- Explanation
- Address is returned back to IPPool by the system using it.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.24.8. [ID: 908] The lease is rejected as it already exists in[...]
- Log Categories
- IPPOOL
- Log Message
- The lease is rejected as it already exists in the pool.
- Default Log Severity
- Warning
- Parameters
- ip
- Explanation
- The offered lease by DHCP server already exists.
- Gateway Action
- Discard
- Action Description
- None
- Proposed Action
- None
2.24.9. [ID: 910] Pool has run out of prefetch
- Log Categories
- IPPOOL
- Log Message
- Pool has run out of prefetch. Prefetching again.
- Default Log Severity
- Warning
- Parameters
- value, count
- Explanation
- The pool has run out of prefetched addresses. This happens during initial prefetch buildup or due to a lower prefetch value.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Set a higher prefetch value.
2.24.10. [ID: 913] Request to acquire an address from the IPPool[...]
- Log Categories
- IPPOOL
- Log Message
- Request to acquire an address from the IPPool failed.
- Default Log Severity
- Information
- Parameters
-
- Explanation
- Request by the subsystem to acquire an address from the IPPool failed. This is due to unavailability of addresses.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.24.11. [ID: 1077] Request to acquire an address is pending
- Log Categories
- IPPOOL
- Log Message
- Request to acquire an address is pending.
- Default Log Severity
- Information
- Parameters
-
- Explanation
- A request was made by the subsystem to acquire an address from the IPPool, but one was not immediately avaliable.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.24.12. [ID: 912] Acquired address
- Log Categories
- IPPOOL
- Log Message
- Acquired address.
- Default Log Severity
- Information
- Parameters
- ip
- Explanation
- Request by the subsystem to acquire an address from the IPPool was successful.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
These log messages refer to the IPS category.
2.25.1. [ID: 1403] Threat detected based on custom signature
- Log Categories
- IPS
- Log Message
- Threat detected based on custom signature.
- Default Log Severity
- Dynamic
- Parameters
- signature, signatureid, revision, ipsrule, direction, flow, flowusage, pkt, user, userid
- Explanation
- A custom signature matched the traffic.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Research the CVE database (searchable by the unique ID).
2.25.2. [ID: 1415] Threat prevented based on custom signature
- Log Categories
- IPS
- Log Message
- Threat prevented based on custom signature.
- Default Log Severity
- Dynamic
- Parameters
- signature, signatureid, revision, ipsrule, direction, flow, flowusage, pkt, user, userid
- Explanation
- A custom signature mapped to the "protect" action matched the traffic.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Research the CVE database (searchable by the unique ID).
2.25.3. [ID: 1405] Failed to scan data
- Log Categories
- IPS
- Log Message
- Failed to scan data.
- Default Log Severity
- Error
- Parameters
- reason, ipsrule, direction, flow, flowusage, pkt, user, userid
- Explanation
- The unit failed to scan data.
- Gateway Action
- Ignore
- Action Description
- None
- Proposed Action
- None
2.25.4. [ID: 1406] Failed to scan data
- Log Categories
- IPS
- Log Message
- Failed to scan data.
- Default Log Severity
- Error
- Parameters
- reason, ipsrule, direction, flow, flowusage, pkt, user, userid
- Explanation
- The unit failed to scan data.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.25.5. [ID: 1420] Failed to read current signature files
- Log Categories
- IPS
- Log Message
- Failed to read current signature files.
- Default Log Severity
- Error
- Parameters
-
- Explanation
- IPS failed to read the signature files currently in the active folder. This may be due to memory shortage.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.25.6. [ID: 1418] Failed to read new signature files
- Log Categories
- IPS
- Log Message
- Failed to read new signature files.
- Default Log Severity
- Warning
- Parameters
-
- Explanation
- IPS failed to read the new signature files. It will read the previously active signature files.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check if signature file content is according to the documentation.
2.25.7. [ID: 1402] Failed to parse HTTP URL
- Log Categories
- IPS
- Log Message
- Failed to parse HTTP URL.
- Default Log Severity
- Warning
- Parameters
- url, ipsrule, direction, flow, flowusage, pkt, user, userid
- Explanation
- The unit failed parsing an URL. The reason for this is probably because the URL has an invalid format, or it contains invalid
UTF8 formatted characters.
- Gateway Action
- Ignore
- Action Description
- None
- Proposed Action
- Make sure that the URL is formatted correctly.
2.25.8. [ID: 1424] Failed to parse HTTP URL
- Log Categories
- IPS
- Log Message
- Failed to parse HTTP URL.
- Default Log Severity
- Error
- Parameters
- url, ipsrule, direction, flow, flowusage, pkt, user, userid
- Explanation
- The unit failed parsing an URL. The reason for this is probably because the URL has an invalid format, or it contains invalid
UTF8 formatted characters.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Make sure that the URL is formatted correctly.
2.25.9. [ID: 1407] IPS license is going to expire
- Log Categories
- IPS,LICENSE
- Log Message
- IPS license is going to expire.
- Default Log Severity
- Warning
- Parameters
- date
- Explanation
- IPS license is going to expire in the near future. This log is sent periodically.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Renew the license.
2.25.10. [ID: 1426] IPS license has expired
- Log Categories
- IPS,LICENSE
- Log Message
- IPS license has expired.
- Default Log Severity
- Critical
- Parameters
-
- Explanation
- IPS scanning will stop working until new license is activated.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Upload a valid license.
2.25.11. [ID: 1414] Max signatures match limit exceeded
- Log Categories
- IPS
- Log Message
- Max signatures match limit exceeded.
- Default Log Severity
- Notice
- Parameters
- max, ipsrule, direction, flow, pkt, user, userid
- Explanation
- Analysing a single chunk of data triggered more signatures that the system is designed to handle. Some signature matches will
be ignored. The incident will be handled according to the fail mode.
- Gateway Action
- None
- Action Description
- Node
- Proposed Action
- None
2.25.12. [ID: 1401] Max signatures match limit exceeded
- Log Categories
- IPS
- Log Message
- Max signatures match limit exceeded.
- Default Log Severity
- Warning
- Parameters
- max, ipsrule, direction, flow, pkt, user, userid
- Explanation
- Analysing a single chunk of data triggered more signatures that the system is designed to handle. Some signature matches will
be ignored. The incident will be handled according to the fail mode.
- Gateway Action
- Close
- Action Description
- Node
- Proposed Action
- None
2.25.13. [ID: 1419] No signature loaded
- Log Categories
- IPS
- Log Message
- No signature loaded.
- Default Log Severity
- Critical
- Parameters
- flow, flowusage, user, userid
- Explanation
- IPS signature file has been disabled or no signature file was found.
- Gateway Action
- Abort
- Action Description
- IPS Scanning has been aborted
- Proposed Action
- For IPS scanning, a valid license with IPS enabled must be installed. If already installed, manually initiate downloading
of the latest signature file. IPS scanning can be disabled to avoid this log message.
2.25.14. [ID: 1421] IPS Notice
- Log Categories
- IPS
- Log Message
- IPS Notice.
- Default Log Severity
- Dynamic
- Parameters
- signature, signatureid, revision, ipsrule, direction, flow, flowusage, pkt, user, userid
- Explanation
- A notice signature matched the traffic.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- This is probably not an attack, but you may research the advisory (searchable by the unique ID).
2.25.15. [ID: 1417] IPS Notice
- Log Categories
- IPS
- Log Message
- IPS Notice.
- Default Log Severity
- Dynamic
- Parameters
- signature, signatureid, revision, ipsrule, direction, flow, flowusage, pkt, user, userid
- Explanation
- A notice signature mapped to the "protect" action matched the traffic, closing connection.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- This is probably not an attack, but you may research the advisory (searchable by the unique ID).
2.25.16. [ID: 1412] Failed to scan data
- Log Categories
- IPS
- Log Message
- Failed to scan data.
- Default Log Severity
- Error
- Parameters
- ipsrule, direction, flow, flowusage, pkt, user, userid
- Explanation
- The unit failed to scan data. The reason for this is due to low amount of memory.
- Gateway Action
- Ignore
- Action Description
- None
- Proposed Action
- Review your configuration.
2.25.17. [ID: 1410] Failed to scan data
- Log Categories
- IPS
- Log Message
- Failed to scan data.
- Default Log Severity
- Error
- Parameters
- ipsrule, direction, flow, flowusage, pkt, user, userid
- Explanation
- The unit failed to scan data. The reason for this is due to low amount of memory.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Review your configuration.
2.25.18. [ID: 1409] Scan detected
- Log Categories
- IPS
- Log Message
- Scan detected.
- Default Log Severity
- Dynamic
- Parameters
- signature, signatureid, revision, ipsrule, direction, flow, flowusage, pkt, user, userid
- Explanation
- A scan signature matched the traffic.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Research the advisory (searchable by the unique ID).
2.25.19. [ID: 1411] Scan detected
- Log Categories
- IPS
- Log Message
- Scan detected.
- Default Log Severity
- Dynamic
- Parameters
- signature, signatureid, revision, ipsrule, direction, flow, flowusage, pkt, user, userid
- Explanation
- A scan signature mapped to the "protect" action matched the traffic, closing connection.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Research the advisory (searchable by the unique ID), if you suspect an attack.
2.25.20. [ID: 1404] Threat detected
- Log Categories
- IPS
- Log Message
- Threat detected.
- Default Log Severity
- Dynamic
- Parameters
- signature, signatureid, revision, ipsrule, direction, flow, flowusage, pkt, user, userid
- Explanation
- An attack signature matched the traffic.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Research the advisory (searchable by the unique ID).
2.25.21. [ID: 1427] Threat prevented
- Log Categories
- IPS
- Log Message
- Threat prevented.
- Default Log Severity
- Dynamic
- Parameters
- signature, signatureid, revision, ipsrule, direction, flow, flowusage, pkt, user, userid
- Explanation
- An attack signature mapped to the "protect" action matched the traffic.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Research the advisory (searchable by the unique ID).
These log messages refer to the IPSEC category.
2.26.1. [ID: 1683] Failed to add dynamic route
- Log Categories
- IPSEC
- Log Message
- Failed to add dynamic route.
- Default Log Severity
- Error
- Parameters
- table, network, iface
- Explanation
- The system failed to add a dynamic route associated with an IPsec tunnel. This route will remain active inside the routing
table, where it will interfere with matching traffic.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Disconnect and reconnect the IPsec tunnel.
2.26.2. [ID: 278] Anti-replay check failed
- Log Categories
- IPSEC
- Log Message
- Anti-replay check failed.
- Default Log Severity
- Notice
- Parameters
- seqno, windowbase, windowsize, matchkey
- Explanation
- A packet with the same sequence number of the received packet has already been received, or the sequence number is too small
to fall within the sliding window. It may be the result of a lagging packet or the packet may have been replayed by a third
party.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.26.3. [ID: 606] Bad ciphertext length
- Log Categories
- IPSEC
- Log Message
- Bad ciphertext length.
- Default Log Severity
- Notice
- Parameters
- seqno, iplen, paylen, datalen, blklen, matchkey
- Explanation
- The received packet could not be decrypted because the length of the encrypted data was not a multiple of the cipher block
length.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If manual keying is used, check that both endpoints are configured with the same encryption algorithm and key.
2.26.4. [ID: 254] Bad IP version
- Log Categories
- IPSEC
- Log Message
- Bad IP version.
- Default Log Severity
- Notice
- Parameters
- seqno, ipver, matchkey
- Explanation
- The packet has a disallowed IP version.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.26.5. [ID: 464] Bad next header
- Log Categories
- IPSEC
- Log Message
- Bad next header.
- Default Log Severity
- Notice
- Parameters
- seqno, nexthdr, matchkey
- Explanation
- The packet did not contain the expected next layer protocol. This typically means that the packet was decrypted incorrectly.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If manual keying is used, check that both endpoints are configured with the same encryption algorithm and key.
2.26.6. [ID: 604] Bad padding
- Log Categories
- IPSEC
- Log Message
- Bad padding.
- Default Log Severity
- Notice
- Parameters
- seqno, datalen, padlen, matchkey
- Explanation
- The received packet contained ill formatted padding. This typically means that the packet was decrypted incorrectly, but it
could also mean that the two endpoints use different padding types.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If manual keying is used, check that both endpoints are configured with the same encryption algorithm and key. Also, verify
that the same padding type is used.
2.26.7. [ID: 282] Decryption failed
- Log Categories
- IPSEC
- Log Message
- Decryption failed.
- Default Log Severity
- Notice
- Parameters
- seqno, datalen, matchkey
- Explanation
- The received packet could not be decrypted, for example due to hardware congestion.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.26.8. [ID: 768] ECN codepoint mismatch
- Log Categories
- IPSEC
- Log Message
- ECN codepoint mismatch.
- Default Log Severity
- Warning
- Parameters
- seqno, outer, inner, matchkey
- Explanation
- The ECN codepoint of the inner and outer IP header did not match. The packet was dropped as an indication of congestion.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.26.9. [ID: 766] ECN codepoint mismatch
- Log Categories
- IPSEC
- Log Message
- ECN codepoint mismatch.
- Default Log Severity
- Notice
- Parameters
- seqno, outer, inner, new, matchkey
- Explanation
- The ECN codepoint of the inner and outer IP header did not match. The conflict was resolved using new.
- Gateway Action
- Adjust
- Action Description
- None
- Proposed Action
- None
2.26.10. [ID: 572] Encryption failed
- Log Categories
- IPSEC
- Log Message
- Encryption failed.
- Default Log Severity
- Notice
- Parameters
- seqno, datalen, matchkey
- Explanation
- The packet could not be encrypted, for example due to hardware congestion.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.26.11. [ID: 1057] Failed to generate IV
- Log Categories
- IPSEC
- Log Message
- Failed to generate IV.
- Default Log Severity
- Notice
- Parameters
- seqno, len, matchkey
- Explanation
- A initialization vector for the packet could not be generated, for example due to hardware congestion.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.26.12. [ID: 611] Integrity check failed
- Log Categories
- IPSEC
- Log Message
- Integrity check failed.
- Default Log Severity
- Notice
- Parameters
- seqno, matchkey
- Explanation
- The integrity check value of the received packet and the computed value did not match. This can be a result of that the integrity
key differs from the key at the peer, that the packet changed in transit, or that the packet was sent by a third party.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If manual keying is used, check that both endpoints are configured with the same integrity algorithm and key.
2.26.13. [ID: 413] Failed to allocate reassembly buffer
- Log Categories
- IPSEC,FRAG
- Log Message
- Failed to allocate reassembly buffer.
- Default Log Severity
- Notice
- Parameters
- seqno, pktlen, pkt
- Explanation
- The packet was fragmented and could not be reassembled because there were no free buffers available to hold the reassembled
packet.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.26.14. [ID: 133] Reassembled packet exceeds allowed size
- Log Categories
- IPSEC,FRAG
- Log Message
- Reassembled packet exceeds allowed size.
- Default Log Severity
- Notice
- Parameters
- seqno, pktlen, pkt
- Explanation
- The packet was fragmented and could not be reassembled because it exceeded the maximum allowed size. See FragSettings:LocalReass_MaxSize.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.26.15. [ID: 487] Failed to reassemble packet
- Log Categories
- IPSEC,FRAG
- Log Message
- Failed to reassemble packet.
- Default Log Severity
- Notice
- Parameters
- seqno, pktlen, pkt
- Explanation
- The packet was fragmented and could not be reassembled.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.26.16. [ID: 1682] Failed to remove dynamic route
- Log Categories
- IPSEC
- Log Message
- Failed to remove dynamic route.
- Default Log Severity
- Critical
- Parameters
- table, network, iface
- Explanation
- The system failed to remove a dynamic route associated with an IPsec tunnel. This route will remain active inside the routing
table, where it will interfere with matching traffic.
- Gateway Action
- None
- Action Description
-
- Proposed Action
- While it is possible that the system may recover by itself, proper operation can no longer be guaranteed and a manual reboot
is recommended.
2.26.17. [ID: 1696] Failed to remove IPsec policy rules
- Log Categories
- IPSEC
- Log Message
- Failed to remove IPsec policy rules.
- Default Log Severity
- Error
- Parameters
- localip, remoteip, spi, proto, localts, remotets, iface
- Explanation
- Failed to remove the IPsec policy rule from the rule database. Packets sent over the IPsec SA may still be allowed.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- A reboot of the system is recommended. Contact technical support if the problem persist.
2.26.18. [ID: 579] Failed to resize buffer
- Log Categories
- IPSEC
- Log Message
- Failed to resize buffer.
- Default Log Severity
- Debug
- Parameters
- seqno, pktlen, len, matchkey
- Explanation
- A packet buffer could not be resized to hold additional data.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If this happens frequently, consider lowering the MTU of the IPsec tunnel.
2.26.19. [ID: 264] Packet too small
- Log Categories
- IPSEC
- Log Message
- Packet too small.
- Default Log Severity
- Notice
- Parameters
- seqno, iplen, paylen, matchkey
- Explanation
- The received packet was too small to contain a valid ESP, AH, or IPComp packet.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.26.20. [ID: 135] Payload too small
- Log Categories
- IPSEC
- Log Message
- Payload too small.
- Default Log Severity
- Notice
- Parameters
- seqno, nexthdr, matchkey
- Explanation
- The received packet was too small to contain the specified next layer protocol.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.26.21. [ID: 632] Low memory initializing SAD
- Log Categories
- IPSEC
- Log Message
- Low memory initializing SAD.
- Default Log Severity
- Warning
- Parameters
- size, new
- Explanation
- The security association database could not be initialized according to current settings due to low memory. The performance
of the system may be degraded.
- Gateway Action
- Adjust
- Action Description
- The security association database has been configured for a lower number of entries
- Proposed Action
- Review system wide settings and try to tweak memory consuming features to use less memory.
2.26.22. [ID: 633] Out of memory initializing SAD
- Log Categories
- IPSEC
- Log Message
- Out of memory initializing SAD.
- Default Log Severity
- Critical
- Parameters
- size
- Explanation
- The security association database could not be initialized due to insufficient free memory.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- Review system wide settings and try to tweak memory consuming features to use less memory.
2.26.23. [ID: 339] Sequence number overflow
- Log Categories
- IPSEC
- Log Message
- Sequence number overflow.
- Default Log Severity
- Warning
- Parameters
- seqno, matchkey
- Explanation
- Attempted to transmit a packet that would result in sequence number overflow.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
These log messages refer to the IPV4 category.
2.27.1. [ID: 466] Invalid IP header checksum
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Invalid IP header checksum.
- Default Log Severity
- Warning
- Parameters
- chksum, calcchksum, pkt
- Explanation
- The received packet IP header checksum was invalid.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This log message can be disabled by the IPSettings:LogCheckSumErrors setting.
2.27.2. [ID: 518] Invalid header length
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Invalid header length.
- Default Log Severity
- Warning
- Parameters
- pktlen, hdrlen, pkt
- Explanation
- The received packet IP header specifies an invalid length. The IP Header length can never be smaller than 20 bytes or longer
than the total packet length.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets. This log message can be disabled by the IPSettings:LogNonIP4 setting.
2.27.3. [ID: 166] Bad IP version
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Bad IP version.
- Default Log Severity
- Warning
- Parameters
- ipver, pkt
- Explanation
- The received packet has a disallowed IP version. This typically means that there is a mismatch between the IP packet and a
lower layer protocol (such as Ethernet).
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets. This log message can be disabled by the IPSettings:LogNonIP4 setting.
2.27.4. [ID: 136] Non-zero IP Reserved Field
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Non-zero IP Reserved Field.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- The reserved field in the IPv4 header was found to be set. According to standards, this field should always be zero.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IPRF setting can be changed to control the gateway's behavior for packets with the reserved field set.
2.27.5. [ID: 568] Non-zero IP Reserved Field
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Non-zero IP Reserved Field.
- Default Log Severity
- Notice
- Parameters
- flow, pkt, user, userid
- Explanation
- The reserved field in the IPv4 header was found to be set. According to standards, this field should always be zero.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- The IPSettings:IPRF setting can be changed to control the gateway's behavior for packets with the reserved field set.
2.27.6. [ID: 228] Non-zero IP Reserved Field
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Non-zero IP Reserved Field.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- The reserved field in the IPv4 header was found to be set. According to standards, this field should always be zero.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- The IPSettings:IPRF setting can be changed to control the gateway's behavior for packets with the reserved field set.
2.27.7. [ID: 140] Option too large for option space
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Option too large for option space.
- Default Log Severity
- Warning
- Parameters
- option, avail, len, flow, pkt, user, userid
- Explanation
- The IP option is malformed. The claimed option does not fit within the option length of the packet.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If the packet sender is one of your network devices, investigate why the unit is sending broken IP options.
2.27.8. [ID: 141] Invalid option length
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Invalid option length.
- Default Log Severity
- Warning
- Parameters
- option, avail, minlen, flow, pkt, user, userid
- Explanation
- The IP option type is of multi-byte type which requires at least two bytes. The size of the option with option number option had less than two bytes.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If the packet sender is one of your network devices, investigate why the unit is sending malformed IP options.
2.27.9. [ID: 509] Received unknown IP option
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Received unknown IP option.
- Default Log Severity
- Notice
- Parameters
- option, flow, pkt, user, userid
- Explanation
- The packet contained an IP option other than Source Route, Timestamp and Router Alert.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- The IPSettings:IPOPT_OTHER setting can be changed to control the gateway's behavior for packets with an IP option other than Source Route, Timestamp
and Router Alert.
2.27.10. [ID: 587] Received unknown IP option
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Received unknown IP option.
- Default Log Severity
- Warning
- Parameters
- option, flow, pkt, user, userid
- Explanation
- The packet contained an IP option other than Source Route, Timestamp and Router Alert.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IPOPT_OTHER setting can be changed to control the gateway's behavior for packets with an IP option other than Source Route, Timestamp
and Router Alert.
2.27.11. [ID: 331] IP data is larger than the maximum allowed[...]
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- IP data is larger than the maximum allowed size.
- Default Log Severity
- Warning
- Parameters
- ipproto, maxlen, paylen, pkt
- Explanation
- Total IP payload is larger than the maximum allowed size for the given protocol. For fragmented traffic this is the size of
the reassembled payload, otherwise it is the data portion of one single packet.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If the network supports packets of this size (and this is a desired property of the network), modify the size limit settings
(LengthLimSettings:MaxTCPLen, LengthLimSettings:MaxUDPLen, LengthLimSettings:MaxICMPLen, LengthLimSettings:MaxGRELen, LengthLimSettings:MaxESPLen, LengthLimSettings:MaxAHLen, LengthLimSettings:MaxSKIPLen, LengthLimSettings:MaxOSPFLen, LengthLimSettings:MaxIPIPLen, LengthLimSettings:MaxIPCompLen, LengthLimSettings:MaxL2TPLen and LengthLimSettings:MaxOtherSubIPLen) accordingly. This log message can be turned off by modifying the LengthLimSettings:LogOversizedPackets setting.
2.27.12. [ID: 1015] Packet too big
- Log Categories
- IPV4,STATELESS,PMTU
- Log Message
- Packet too big.
- Default Log Severity
- Information
- Parameters
- mtu, iplen, flow, pkt, user, userid
- Explanation
- Packet was rejected in accordance with RFC 1191, since it was larger (iplen bytes) than the next-hop MTU (mtu bytes).
- Gateway Action
- Reject
- Action Description
- An ICMP error destination unreachable, fragment needed and DF set, was returned to the sender
- Proposed Action
- This is a normal part of the path-MTU discovery process. In the unlikely case where the path-MTU discovery process is becoming
a performance bottleneck, consider manually modifying the next-hop MTU.
2.27.13. [ID: 1016] Packet too big
- Log Categories
- IPV4,STATELESS,PMTU
- Log Message
- Packet too big.
- Default Log Severity
- Warning
- Parameters
- mtu, iplen, flow, pkt, user, userid
- Explanation
- Packet was dropped because it was too large (iplen bytes) in order to be properly forwarded to the next hop (with an MTU of mtu bytes). No ICMP error (fragmentation needed) was sent to the source to notify about this condition. Most likely the upper
limit of ICMP errors per second had been reached, but this can also be a sign of severe resource starvation. This breaks proper
path-MTU discovery as described by RFC 1191 and may cause network malfunction.
- Gateway Action
- Drop
- Action Description
- Packet was silently lost; the system failed to send an ICMP error
- Proposed Action
- Review the upper limit of ICMP errors per second (ICMPSettings:ICMPSendPerSecLimit) to see if there is a bottleneck. While not being the preferred solution, a workaround may be to manually update the next-hop
MTU at certain routes.
2.27.14. [ID: 371] Received RA IP option
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Received RA IP option.
- Default Log Severity
- Notice
- Parameters
- option, flow, pkt, user, userid
- Explanation
- The packet contained a Router Alert IP option, which according to configuration is allowed.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- The IPSettings:IPOPT_RTRALT setting can be changed to control the gateway's behavior for packets with Router Alert options.
2.27.15. [ID: 334] Invalid RA option length
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Invalid RA option length.
- Default Log Severity
- Warning
- Parameters
- option, optlen, flow, pkt, user, userid
- Explanation
- The length specified in the Router Alert IP option was invalid.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IPOPT_RTRALT setting can be changed to control the gateway's behavior for packets with Router Alert options.
2.27.16. [ID: 205] Received RA IP option
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Received RA IP option.
- Default Log Severity
- Warning
- Parameters
- option, flow, pkt, user, userid
- Explanation
- The packet contained a Router Alert IP option, which according to configuration is disallowed.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IPOPT_RTRALT setting can be changed to control the gateway's behavior for packets with Router Alert options.
2.27.17. [ID: 549] Packet too small for ip header
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Packet too small for ip header.
- Default Log Severity
- Warning
- Parameters
- pktlen, pkt
- Explanation
- The received packet is too small to contain an IP header.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets. This log message can be disabled by the IPSettings:LogNonIP4 setting.
2.27.18. [ID: 234] Received Source Route IP option
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Received Source Route IP option.
- Default Log Severity
- Notice
- Parameters
- option, flow, pkt, user, userid
- Explanation
- The packet contained a Source Route IP option, which according to configuration is allowed.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- The IPSettings:IPOPT_SR setting can be changed to control the gateway's behavior for packets with source or return routes.
2.27.19. [ID: 108] Invalid SR option length
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Invalid SR option length.
- Default Log Severity
- Warning
- Parameters
- option, optlen, type, flow, pkt, user, userid
- Explanation
- The length specified in the source/return routes IP option was invalid.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IPOPT_SR setting can be changed to control the gateway's behavior for packets with source or return routes.
2.27.20. [ID: 176] Invalid SR pointer
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Invalid SR pointer.
- Default Log Severity
- Warning
- Parameters
- option, ptr, flow, pkt, user, userid
- Explanation
- A route pointer in the source/return route IP option was invalid since it not aligned on a 4-byte boundary.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IPOPT_SR setting can be changed to control the gateway's behavior for packets with source or return routes.
2.27.21. [ID: 517] Received Source Route IP option
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Received Source Route IP option.
- Default Log Severity
- Warning
- Parameters
- option, flow, pkt, user, userid
- Explanation
- The packet contained a Source Route IP option, which according to configuration is disallowed.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IPOPT_SR setting can be changed to control the gateway's behavior for packets with source or return routes.
2.27.22. [ID: 196] Multiple source or return routes in SR IP[...]
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Multiple source or return routes in SR IP option.
- Default Log Severity
- Warning
- Parameters
- option, flow, pkt, user, userid
- Explanation
- Multiple source or return routes were specified in the Source Route IP option.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IPOPT_SR setting can be changed to control the gateway's behavior for packets with source or return routes.
2.27.23. [ID: 469] Non-zero IP TOS field
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Non-zero IP TOS field.
- Default Log Severity
- Notice
- Parameters
- value, flow, pkt, user, userid
- Explanation
- The Type of Service (TOS) field in the IPv4 header was non-zero. The TOS field may be used by Differentiated Services to group
traffic into different traffic classes.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- The IPSettings:TrafficClass setting can be changed to control the gateway's behavior for packets with the TOS field set.
2.27.24. [ID: 149] Non-zero IP TOS field
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Non-zero IP TOS field.
- Default Log Severity
- Warning
- Parameters
- value, flow, pkt, user, userid
- Explanation
- The Type of Service (TOS) field in the IPv4 header was non-zero. The TOS field may be used by Differentiated Services to group
traffic into different traffic classes.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:TrafficClass setting can be changed to control the gateway's behavior for packets with the TOS field set.
2.27.25. [ID: 467] Non-zero IP TOS field
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Non-zero IP TOS field.
- Default Log Severity
- Warning
- Parameters
- value, flow, pkt, user, userid
- Explanation
- The Type of Service (TOS) field in the IPv4 header was non-zero. The TOS field may be used by Differentiated Services to group
traffic into different traffic classes.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- The IPSettings:TrafficClass setting can be changed to control the gateway's behavior for packets with the TOS field set.
2.27.26. [ID: 175] Received TS IP option
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Received TS IP option.
- Default Log Severity
- Notice
- Parameters
- option, flow, pkt, user, userid
- Explanation
- The packet contained the Timestamp IP option, which according to configuration is allowed.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- The IPSettings:IPOPT_TS setting can be changed to control the gateway's behavior for packets with the Timestamp IP option.
2.27.27. [ID: 354] Invalid TS option length
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Invalid TS option length.
- Default Log Severity
- Warning
- Parameters
- option, optlen, flow, pkt, user, userid
- Explanation
- The length specified in the Timestamp IP option was invalid.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IPOPT_TS setting can be changed to control the gateway's behavior for packets with the Timestamp IP option.
2.27.28. [ID: 198] Invalid TS pointer
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Invalid TS pointer.
- Default Log Severity
- Warning
- Parameters
- option, ptr, flow, pkt, user, userid
- Explanation
- A time stamp pointer in the Timestamp IP option was invalid.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IPOPT_TS setting can be changed to control the gateway's behavior for packets with the Timestamp IP option.
2.27.29. [ID: 589] Invalid TS pointer with overflow
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Invalid TS pointer with overflow.
- Default Log Severity
- Warning
- Parameters
- option, ptr, value, flow, pkt, user, userid
- Explanation
- A packet was received with an invalid Timestamp pointer and overflow.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IPOPT_TS setting can be changed to control the gateway's behavior for packets with the Timestamp IP option.
2.27.30. [ID: 557] Received TS IP option
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Received TS IP option.
- Default Log Severity
- Warning
- Parameters
- option, flow, pkt, user, userid
- Explanation
- The packet contained the Timestamp IP option, which according to configuration is disallowed.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IPOPT_TS setting can be changed to control the gateway's behavior for packets with the Timestamp IP option.
2.27.31. [ID: 233] Multiple time stamps in TS IP option
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Multiple time stamps in TS IP option.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- Multiple time stamps were specified in the IP option.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IPOPT_TS setting can be changed to control the gateway's behavior for packets with the Timestamp IP option.
2.27.32. [ID: 442] TTL is zero
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- TTL is zero.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- An IPv4 packet with a TTL value of zero was received and dropped. Transmission of IPv4 packets with a TTL value of zero violates
the IP specification and should be dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This log message can be disabled by the IPSettings:LogReceivedTTL0 setting.
2.27.33. [ID: 298] TTL expired
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- TTL expired.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- An IPv4 packet with a TTL=1 was received. The packet was to be forwarded, at which point TTL reached zero and the packet had
to be dropped.
- Gateway Action
- Drop
- Action Description
- The packet has been dropped
- Proposed Action
- This log message is only possible when IPSettings:TTLMin is set to 1. Whether to log and/or reject can be controlled by the MiscSettings:TTL0OnFwd setting.
2.27.34. [ID: 503] TTL expired
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- TTL expired.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- An IPv4 packet with a TTL=1 was received. The packet was to be forwarded, at which point TTL reached zero and the packet had
to be dropped.
- Gateway Action
- Reject
- Action Description
- An ICMP error (TTL EXCEED) has been sent to the source IP of the packet
- Proposed Action
- This log message is only possible when IPSettings:TTLMin is set to 1. Whether to log and/or reject can be controlled by the MiscSettings:TTL0OnFwd setting.
2.27.35. [ID: 405] TTL too low
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- TTL too low.
- Default Log Severity
- Notice
- Parameters
- value, min, flow, pkt, user, userid
- Explanation
- An IPv4 packet with a TTL value less than the configured minimum value was detected.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- The IPSettings:TTLMin value should be larger than 3 to prevent a user to map routers behind the firewall, i.e. firewalking. In order to support
trace-route applications, the IPSettings:TTLMin value needs to be set to 1.
2.27.36. [ID: 185] TTL too low
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- TTL too low.
- Default Log Severity
- Warning
- Parameters
- value, min, flow, pkt, user, userid
- Explanation
- An IPv4 packet with a TTL value less than the configured minimum value was detected.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:TTLMin value should be larger than 3 to prevent a user to map routers behind the firewall, i.e. firewalking. In order to support
trace-route applications, the IPSettings:TTLMin value needs to be set to 1.
2.27.37. [ID: 409] TTL too low
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- TTL too low.
- Default Log Severity
- Warning
- Parameters
- value, min, flow, pkt, user, userid
- Explanation
- An IPv4 packet with a TTL value less than the configured minimum value was detected.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- The IPSettings:TTLMin value should be larger than 3 to prevent a user to map routers behind the firewall, i.e. firewalking. In order to support
trace-route applications, the IPSettings:TTLMin value needs to be set to 1.
2.27.38. [ID: 131] Packet too small for L4 header
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- Packet too small for L4 header.
- Default Log Severity
- Warning
- Parameters
- ipproto, paylen, pkt
- Explanation
- The received packet is too short to contain an L4 header of the specified protocol.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets. This log message can be disabled by the IPSettings:LogNonIP4 setting.
2.27.39. [ID: 156] IP length is larger than packet
- Log Categories
- IPV4,STATELESS,VALIDATE
- Log Message
- IP length is larger than packet.
- Default Log Severity
- Warning
- Parameters
- ipproto, pktlen, iplen, pkt
- Explanation
- The received packet IP total length is larger than the received transport data.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets. This log message can be disabled by the IPSettings:LogNonIP4 setting.
These log messages refer to the IPV6 category.
2.28.1. [ID: 115] Max IPv6 options per extension header reached
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Max IPv6 options per extension header reached.
- Default Log Severity
- Notice
- Parameters
- max, flow, pkt, user, userid
- Explanation
- The maximum amount of options within an extension header has been reached.
- Gateway Action
- Ignore
- Action Description
- None
- Proposed Action
- The IPSettings:IP6MaxOPH setting can be changed to increase or decrease the number of options allowed within an extension header. The IPSettings:IP6OnMaxOPH setting can be changed to control the gateway's behavior when the maximum number of options has been reached.
2.28.2. [ID: 492] Max IPv6 options per extension header reached
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Max IPv6 options per extension header reached.
- Default Log Severity
- Warning
- Parameters
- max, flow, pkt, user, userid
- Explanation
- The maximum amount of options within an extension header has been reached.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IP6MaxOPH setting can be changed to increase or decrease the number of options allowed within an extension header. The IPSettings:IP6OnMaxOPH setting can be changed to control the gateway's behavior when the maximum number of options has been reached.
2.28.3. [ID: 477] Order of extension headers is invalid
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Order of extension headers is invalid.
- Default Log Severity
- Warning
- Parameters
- exthdr, hdrver, offset, pkt
- Explanation
- IPv6 require a strict ordering between different extensions headers (the order among extension headers will change their semantics).
A packet that did not comply with this ordering have been received.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets. This log message can be disabled by the IPSettings:LogNonIP4 setting.
2.28.4. [ID: 304] Bad IP version
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Bad IP version.
- Default Log Severity
- Warning
- Parameters
- ipver, pkt
- Explanation
- The received packet has a disallowed IP version. This typically means that there is a mismatch between the IP packet and a
lower layer protocol (such as Ethernet).
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets. This log message can be disabled by the IPSettings:LogNonIP4 setting.
2.28.5. [ID: 401] Received unknown extension header
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Received unknown extension header.
- Default Log Severity
- Error
- Parameters
- exthdr, flow, pkt, user, userid
- Explanation
- An unknown extension header was not allowed to be forwarded by the gateway.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Verify that the packet was not malformed in any way using a network analysis tool. If the packet is valid, report the extension
header with header id exthdr to customer support.
2.28.6. [ID: 263] Non-zero IP Flow Label
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Non-zero IP Flow Label.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- Flow Labels provides an alternative and efficient way for Flow Label capable IPv6 routers to forward IPv6 packets based only
on data in the IP header at fixed positions. For more information see RFC3697.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IP6FL setting can be changed to control the gateway's behavior for packets with the Flow Label field set.
2.28.7. [ID: 486] Non-zero IP Flow Label
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Non-zero IP Flow Label.
- Default Log Severity
- Notice
- Parameters
- flow, pkt, user, userid
- Explanation
- Flow Labels provides an alternative and efficient way for Flow Label capable IPv6 routers to forward IPv6 packets based only
on data in the IP header at fixed positions. For more information see RFC3697.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- The IPSettings:IP6FL setting can be changed to control the gateway's behavior for packets with the Flow Label field set.
2.28.8. [ID: 621] Non-zero IP Flow Label
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Non-zero IP Flow Label.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- Flow Labels provides an alternative and efficient way for Flow Label capable IPv6 routers to forward IPv6 packets based only
on data in the IP header at fixed positions. For more information see RFC3697.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- The IPSettings:IP6FL setting can be changed to control the gateway's behavior for packets with the Flow Label field set.
2.28.9. [ID: 804] Illegal sender address
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Illegal sender address.
- Default Log Severity
- Notice
- Parameters
- srcip, pkt
- Explanation
- Received a packet where the source address does not identify a single node uniquely.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If possible, trace down the originator and validate its configuration.
2.28.10. [ID: 470] IPv6 extension header size limit reached
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- IPv6 extension header size limit reached.
- Default Log Severity
- Notice
- Parameters
- maxlen, flow, pkt, user, userid
- Explanation
- The maximum total size of extension header within an IPv6 packet has been reached.
- Gateway Action
- Ignore
- Action Description
- None
- Proposed Action
- The IPSettings:IP6MaxExtHdr setting can be changed to increase or decrease the total size of extension headers allowed. The IPSettings:IP6OnMaxExtHdr setting can be changed to control the gateway's behavior when the maximum extension header size is reached.
2.28.11. [ID: 249] IPv6 extension header size limit reached
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- IPv6 extension header size limit reached.
- Default Log Severity
- Warning
- Parameters
- maxlen, flow, pkt, user, userid
- Explanation
- The maximum total size of extension header within an IPv6 packet has been reached.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IP6MaxExtHdr setting can be changed to increase or decrease the total size of extension headers allowed. The IPSettings:IP6OnMaxExtHdr setting can be changed to control the gateway's behavior when the maximum extension header size is reached.
2.28.12. [ID: 220] Non-zero IPv6 PADN data
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Non-zero IPv6 PADN data.
- Default Log Severity
- Notice
- Parameters
- flow, pkt, user, userid
- Explanation
- The IPv6 PADN field(s) was found to be non-zero. It is recommended to at least strip this information from the packet to prevent
unfiltered data to be tunneled within the pad fields.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- The IPSettings:IP6OPT_PADN setting can be changed to control the gateway's behavior when processing packets with non-zero pad fields.
2.28.13. [ID: 575] Non-zero IPv6 PADN data
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Non-zero IPv6 PADN data.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- The IPv6 PADN field(s) was found to be non-zero. It is recommended to at least strip this information from the packet to prevent
unfiltered data to be tunneled within the pad fields.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IP6OPT_PADN setting can be changed to control the gateway's behavior when processing packets with non-zero pad fields.
2.28.14. [ID: 268] Non-zero IPv6 PADN data
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Non-zero IPv6 PADN data.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- The IPv6 PADN field(s) was found to be non-zero. It is recommended to at least strip this information from the packet to prevent
unfiltered data to be tunneled within the pad fields.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- The IPSettings:IP6OPT_PADN setting can be changed to control the gateway's behavior when processing packets with non-zero pad fields.
2.28.15. [ID: 347] Fragment header in non-fragment
- Log Categories
- IPV6,FRAG,STATELESS,VALIDATE
- Log Message
- Fragment header in non-fragment.
- Default Log Severity
- Information
- Parameters
- offset, pktlen, pkt
- Explanation
- An IPv6 packet may include a fragment header that states that "this is the first and only fragment". By definition, this is
not a fragment. This construction is perfectly legal, and is used when an IPv6 node have discovered that the path MTU is lower
than the minimal IPv6 MTU. This situation is likely when IPv6 traffic is tunneled via a non-IPv6 network, such as a modem
or an IPv4 network.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The FragSettings:IP6NopFrags setting can be changed to control the gateway's behavior for non-fragmented packets with a fragment header.
2.28.16. [ID: 283] Fragment header in non-fragment
- Log Categories
- IPV6,FRAG,STATELESS,VALIDATE
- Log Message
- Fragment header in non-fragment.
- Default Log Severity
- Notice
- Parameters
- offset, pktlen, pkt
- Explanation
- An IPv6 packet may include a fragment header that states that "this is the first and only fragment". By definition, this is
not a fragment. This construction is perfectly legal, and is used when an IPv6 node have discovered that the path MTU is lower
than the minimal IPv6 MTU. This situation is likely when IPv6 traffic is tunneled via a non-IPv6 network, such as a modem
or an IPv4 network.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Under normal circumstances, it is recommended to NOT drop this kind of packets. The FragSettings:IP6NopFrags setting can be changed to control the gateway's behavior for non-fragmented packets with a fragment header.
2.28.17. [ID: 260] Received fragmented jumbogram
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Received fragmented jumbogram.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- A packet carrying both a jumbogram option and a fragmentation header was received. Jumbograms are not allowed to be fragmented.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IP6OPT_JUMBO setting can be changed to control the gateway's behavior for validating IPv6 packets with Jumbogram options.
2.28.18. [ID: 128] Received fragmented jumbogram
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Received fragmented jumbogram.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- A packet carrying both a jumbogram option and a fragmentation header was received. Jumbograms are not allowed to be fragmented.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- The IPSettings:IP6OPT_JUMBO setting can be changed to control the gateway's behavior for validating IPv6 packets with Jumbogram options.
2.28.19. [ID: 157] Received Home Address option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Received Home Address option.
- Default Log Severity
- Notice
- Parameters
- flow, pkt, user, userid
- Explanation
- The packet contained a Home Address IPv6 option, which according to configuration is allowed.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- The IPSettings:IP6OPT_HA setting can be changed to control the gateway's behavior for IPv6 packets with Home Address options.
2.28.20. [ID: 150] Received Home Address option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Received Home Address option.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- The packet contained a Home Address IPv6 option, which according to configuration is disallowed.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IP6OPT_HA setting can be changed to control the gateway's behavior for IPv6 packets with Home Address options.
2.28.21. [ID: 535] Multicast Home Address option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Multicast Home Address option.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- The packet contained a Home Address IPv6 option with a non-unicast home address. According to RFC3775, the home address must
be a unicast address.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IP6OPT_HA setting can be changed to control the gateway's behavior for IPv6 packets with Home Address options.
2.28.22. [ID: 457] Received Home Address option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Received Home Address option.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- The packet contained a Home Address IPv6 option, which according to configuration should be treated as if the gateway did
not support that option.
- Gateway Action
- Drop
- Action Description
- The packet was dropped according to the action bits in the Home Address option
- Proposed Action
- The IPSettings:IP6OPT_HA setting can be changed to control the gateway's behavior for IPv6 packets with Home Address options.
2.28.23. [ID: 412] Received Home Address option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Received Home Address option.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- The packet contained a Home Address IPv6 option, which according to configuration should be treated as if the gateway did
not support that option.
- Gateway Action
- Reject
- Action Description
- The packet was rejected according to the action bits in the Home Address option
- Proposed Action
- The IPSettings:IP6OPT_HA setting can be changed to control the gateway's behavior for IPv6 packets with Home Address options.
2.28.24. [ID: 121] IP6 option with invalid size
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- IP6 option with invalid size.
- Default Log Severity
- Warning
- Parameters
- option, len, expectlen, flow, pkt, user, userid
- Explanation
- An IPv6 option with a known static size, claimed to be of another size than specified by the IPv6 specification.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If the packet sender is one of your network devices, investigate why the unit is sending malformed IP options.
2.28.25. [ID: 458] Received Jumbogram option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Received Jumbogram option.
- Default Log Severity
- Notice
- Parameters
- flow, pkt, user, userid
- Explanation
- The packet contained a Jumbogram IPv6 option, which according to configuration is allowed.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- The IPSettings:IP6OPT_JUMBO setting can be changed to control the gateway's behavior for IPv6 packets with Jumbogram options.
2.28.26. [ID: 586] Received Jumbogram option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Received Jumbogram option.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- The packet contained a Jumbogram option, which according to configuration is disallowed.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IP6OPT_JUMBO setting can be changed to control the gateway's behavior for IPv6 packets with Jumbogram options.
2.28.27. [ID: 101] Received Jumbogram option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Received Jumbogram option.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- The packet contained a Jumbogram option, which according to configuration should be treated as if the gateway did not support
that option. RFC2675 states that devices not supporting the Jumbogram option should reject the packet.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- The IPSettings:IP6OPT_JUMBO setting can be changed to control the gateway's behavior for IPv6 packets with Jumbogram options.
2.28.28. [ID: 417] Received malformed Jumbogram
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Received malformed Jumbogram.
- Default Log Severity
- Warning
- Parameters
- iplen, paylen, pktlen, flow, pkt, user, userid
- Explanation
- The packet contained a malformed Jumbogram option. The IP payload field iplen must be zero for jumbograms. The paylen parameter is the length indicated by the Jumbogram option. pktlen is the total packet length.
- Gateway Action
- Drop
- Action Description
- Ignoring RFC2675 reject behavior and dropping packet
- Proposed Action
- The IPSettings:IP6OPT_JUMBO setting can be changed to control the gateway's behavior for IPv6 packets with Jumbogram options. Unless the gateway is supposed
to be completely transparent, it is recommended to change the setting's action to ValidateLogRejectBad.
2.28.29. [ID: 603] Received malformed Jumbogram
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Received malformed Jumbogram.
- Default Log Severity
- Warning
- Parameters
- iplen, paylen, pktlen, flow, pkt, user, userid
- Explanation
- The packet contained a malformed Jumbogram option. The IP payload field iplen must be zero for jumbograms. The paylen parameter is the length indicated by the Jumbogram option. pktlen is the total packet length.
- Gateway Action
- Reject
- Action Description
- Rejecting packet according to RFC2675
- Proposed Action
- The IPSettings:IP6OPT_JUMBO setting can be changed to control the gateway's behavior for IPv6 packets with Jumbogram options. Unless the gateway is supposed
to be completely transparent, it is recommended to change the setting's action to ValidateLogRejectBad.
2.28.30. [ID: 407] Received unknown option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Received unknown option.
- Default Log Severity
- Warning
- Parameters
- option, optlen, flow, pkt, user, userid
- Explanation
- The packet contained an option type that was not recognized. The current configuration allows all unknown IPv6 options.
- Gateway Action
- Allow
- Action Description
- The option's action bits were ignored and the packet was allowed
- Proposed Action
- The IPSettings:IP6OPT_Other setting can be changed to control the gateway's behavior for packets with unknown IPv6 options. It is recommended that the
setting is set to RFC2460LogNoSupport which will make the gateway handle the packets according to the unknown option's action
bits.
2.28.31. [ID: 197] Received unknown option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Received unknown option.
- Default Log Severity
- Warning
- Parameters
- option, optlen, flow, pkt, user, userid
- Explanation
- The packet contained an option type that was not recognized. The current configuration disallows all unknown IPv6 options.
- Gateway Action
- Drop
- Action Description
- The option's action bits were ignored and the packet was dropped
- Proposed Action
- The IPSettings:IP6OPT_Other setting can be changed to control the gateway's behavior for packets with unknown IPv6 options. It is recommended that the
setting is set to RFC2460LogNoSupport which will make the gateway handle the packets according to the unknown option's action
bits.
2.28.32. [ID: 314] Processed unknown option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Processed unknown option.
- Default Log Severity
- Warning
- Parameters
- option, optlen, flow, pkt, user, userid
- Explanation
- The packet contained an option type that was not recognized. RFC2460 states that network nodes that do not recognize an option
should handle the packet according to the action bits within the unknown option.
- Gateway Action
- Drop
- Action Description
- The packet was dropped according to the unknown option's action bits
- Proposed Action
- The IPSettings:IP6OPT_Other setting can be changed to control the gateway's behavior for packets with unknown IPv6 options. It is recommended that the
packet is handled according to the option's action bits by configure the IPSettings:IP6OPT_Other setting to RFC2460LogNoSupport.
2.28.33. [ID: 280] Processed unknown option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Processed unknown option.
- Default Log Severity
- Warning
- Parameters
- option, optlen, flow, pkt, user, userid
- Explanation
- The packet contained an option type that was not recognized. The IPv6 specification states that network nodes that do not
recognize an option should handle the packet according to the action bits within the unknown option. The action bits for the
option option stated that the unknown option should be dropped and not rejected since the destination address is a non-unicast address.
- Gateway Action
- Drop
- Action Description
- The packet is dropped
- Proposed Action
- The IPSettings:IP6OPT_Other setting can be changed to control the gateway's behavior for packets with unknown IPv6 options. It is recommended that the
packet is handled according to the option's action bits by configure the IPSettings:IP6OPT_Other setting to RFC2460LogNoSupport.
2.28.34. [ID: 154] Processed unknown option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Processed unknown option.
- Default Log Severity
- Warning
- Parameters
- option, optlen, flow, pkt, user, userid
- Explanation
- The packet contained an option type that was not recognized. RFC2460 states that network nodes that do not recognize an option
should handle the packet according to the action bits within the unknown option. The action bits for the option option stated that the packet should be rejected regardless of destination address.
- Gateway Action
- Reject
- Action Description
- The packet was rejected according to the unknown option's action bits
- Proposed Action
- The IPSettings:IP6OPT_Other setting can be changed to control the gateway's behavior for packets with unknown IPv6 options. It is recommended that the
packet is handled according to the option's action bits by configure the IPSettings:IP6OPT_Other setting to RFC2460LogNoSupport.
2.28.35. [ID: 344] Processed unknown option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Processed unknown option.
- Default Log Severity
- Warning
- Parameters
- option, optlen, flow, pkt, user, userid
- Explanation
- The packet contained an option type that was not recognized. RFC2460 states that network nodes that do not recognize an option
should handle the packet according to the action bits within the unknown option. The action bits for the option option stated that the packet should be rejected if the destination address is a unicast address and dropped silently otherwise.
- Gateway Action
- Reject
- Action Description
- The packet was rejected according to the unknown option's action bits
- Proposed Action
- The IPSettings:IP6OPT_Other setting can be changed to control the gateway's behavior for packets with unknown IPv6 options. It is recommended that the
packet is handled according to the option's action bits by configure the IPSettings:IP6OPT_Other setting to RFC2460LogNoSupport.
2.28.36. [ID: 356] Processed unknown option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Processed unknown option.
- Default Log Severity
- Warning
- Parameters
- option, optlen, flow, pkt, user, userid
- Explanation
- The packet contained an option type that was not recognized. RFC2460 states that network nodes that do not recognize an option
should handle the packet according to the action bits within the unknown option. The action bits for the option option stated that the unknown option should be ignored and that the packet processing should continue.
- Gateway Action
- Allow
- Action Description
- The option was ignored according to the unknown option's action bits
- Proposed Action
- The IPSettings:IP6OPT_Other setting can be changed to control the gateway's behavior for packets with unknown IPv6 options. It is recommended that the
packet is handled according to the option's action bits by configure the IPSettings:IP6OPT_Other setting to RFC2460LogNoSupport.
2.28.37. [ID: 563] Received Router Alert option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Received Router Alert option.
- Default Log Severity
- Notice
- Parameters
- flow, pkt, user, userid
- Explanation
- The packet contained a Router Alert IPv6 option, which according to configuration is allowed.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- The IPSettings:IP6OPT_RA setting can be changed to control the gateway's behavior for IPv6 packets with Router Alert options. It is recommended that
the setting is set to RFC3775LogNoSupport which will make the gateway ignore the option according to the option's action bits.
2.28.38. [ID: 396] Received Router Alert option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Received Router Alert option.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- The packet contained a Router Alert IPv6 option, which according to configuration is disallowed.
- Gateway Action
- Drop
- Action Description
- The option's action bits were ignored and the packet was dropped
- Proposed Action
- The IPSettings:IP6OPT_RA setting can be changed to control the gateway's behavior for IPv6 packets with Router Alert options. It is recommended that
the setting is set to RFC3775LogNoSupport which will make the gateway ignore the option according to the option's action bits.
2.28.39. [ID: 214] Received Router Alert option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Received Router Alert option.
- Default Log Severity
- Notice
- Parameters
- flow, pkt, user, userid
- Explanation
- The packet contained a Router Alert IPv6 option, which according to configuration should be treated as if the gateway did
not support the option. RFC3775 states that the option should be ignored by devices not supporting it.
- Gateway Action
- Allow
- Action Description
- The option was ignored according to the action bits of the RA option
- Proposed Action
- The IPSettings:IP6OPT_RA setting can be changed to control the gateway's behavior for IPv6 packets with Router Alert options. It is recommended that
the setting is set to RFC3775LogNoSupport which will make the gateway ignore the option according to the option's action bits.
2.28.40. [ID: 178] Received Routing Header option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Received Routing Header option.
- Default Log Severity
- Warning
- Parameters
- type, segmentsleft, flow, pkt, user, userid
- Explanation
- An IPv6 packet carrying a Routing Header of type type and segments left value of segmentsleft was dropped according to configuration.
- Gateway Action
- Drop
- Action Description
- The segments field was ignored and the packet was dropped
- Proposed Action
- The IPSettings:IP6OPT_RH0, IPSettings:IP6OPT_RH2 and IPSettings:IP6OPT_RHOther settings can be changed to control the gateway's behavior for packets with routing headers. The IPv6 specifications states
that unknown routing headers should be rejected or accepted depending on the value of the segments left field in the routing
header.
2.28.41. [ID: 531] Received Routing Header option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Received Routing Header option.
- Default Log Severity
- Notice
- Parameters
- type, segmentsleft, flow, pkt, user, userid
- Explanation
- An IPv6 packet carrying a Routing Header of type type and segments left value of segmentsleft was allowed since all routes provided in the packet had been processed and the packet was heading for its final destination.
- Gateway Action
- Allow
- Action Description
- Packet was allowed since segments field was zero
- Proposed Action
- The IPSettings:IP6OPT_RH0, IPSettings:IP6OPT_RH2 and IPSettings:IP6OPT_RHOther settings can be changed to control the gateway's behavior for packets with routing headers. The IPv6 specifications states
that unknown routing headers should be rejected or accepted depending on the value of the segments left field in the routing
header.
2.28.42. [ID: 363] Received Routing Header option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Received Routing Header option.
- Default Log Severity
- Warning
- Parameters
- type, segmentsleft, flow, pkt, user, userid
- Explanation
- An IPv6 packet carrying a Routing Header of type type and segments left value of segmentsleft was rejected since all routes provided in the packet had not been processed.
- Gateway Action
- Reject
- Action Description
- Packet was rejected since segments field was non-zero
- Proposed Action
- The IPSettings:IP6OPT_RH0, IPSettings:IP6OPT_RH2 and IPSettings:IP6OPT_RHOther settings can be changed to control the gateway's behavior for packets with routing headers. The IPv6 specifications states
that unknown routing headers should be rejected or accepted depending on the value of the segments left field in the routing
header.
2.28.43. [ID: 578] IPv6 option extension header overflow
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- IPv6 option extension header overflow.
- Default Log Severity
- Warning
- Parameters
- exthdr, option, optlen, avail, flow, pkt, user, userid
- Explanation
- An option option within an extension header of type exthdr, claimed to be larger than the size of the extension header. The extension headers and options within an IPv6 packet must
be properly formatted so that routers and receivers can deliver and process the packet.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If the packet sender is one of your network devices, investigate why the unit is sending malformed IP options.
2.28.44. [ID: 562] IPv6 option extension header overflow
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- IPv6 option extension header overflow.
- Default Log Severity
- Warning
- Parameters
- exthdr, option, avail, flow, pkt, user, userid
- Explanation
- An option option within an extension header of type exthdr, could not be processed since the available length within the extension header was less then the minimum required length
of 2 bytes.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If the packet sender is one of your network devices, investigate why the unit is sending malformed IP options.
2.28.45. [ID: 439] IP data is larger than the maximum allowed[...]
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- IP data is larger than the maximum allowed size.
- Default Log Severity
- Warning
- Parameters
- ipproto, maxlen, paylen, pkt
- Explanation
- Total IP payload is larger than the maximum allowed size for the given protocol. For fragmented traffic this is the size of
the reassembled payload, otherwise it is the data portion of one single packet. Extension headers do not count as part of
the IP payload.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If the network supports packets of this size (and this is a desired property of the network), modify the size limit settings
(LengthLimSettings:MaxTCPLen, LengthLimSettings:MaxUDPLen, LengthLimSettings:MaxICMPLen, LengthLimSettings:MaxGRELen, LengthLimSettings:MaxESPLen, LengthLimSettings:MaxAHLen, LengthLimSettings:MaxSKIPLen, LengthLimSettings:MaxOSPFLen, LengthLimSettings:MaxIPIPLen, LengthLimSettings:MaxIPCompLen, LengthLimSettings:MaxL2TPLen and LengthLimSettings:MaxOtherSubIPLen) accordingly. This log message can be turned off by modifying the LengthLimSettings:LogOversizedPackets setting.
2.28.46. [ID: 1012] Packet too big
- Log Categories
- IPV6,STATELESS,PMTU
- Log Message
- Packet too big.
- Default Log Severity
- Information
- Parameters
- mtu, iplen, flow, pkt, user, userid
- Explanation
- Packet was rejected in accordance with RFC 1191, since it was larger (iplen bytes) than the next-hop MTU (mtu bytes).
- Gateway Action
- Reject
- Action Description
- An ICMP error packet too big was returned to the sender
- Proposed Action
- This is a normal part of the path-MTU discovery process. In the unlikely case where the path-MTU discovery process is becoming
a performance bottleneck, consider manually modifying the next-hop MTU.
2.28.47. [ID: 1013] Packet too big
- Log Categories
- IPV6,STATELESS,PMTU
- Log Message
- Packet too big.
- Default Log Severity
- Warning
- Parameters
- mtu, iplen, flow, pkt, user, userid
- Explanation
- Packet was dropped because it was too large (iplen bytes) in order to be properly forwarded to the next hop (with an MTU of mtu bytes). No ICMP error (packet too big) was sent to the source to notify about this condition. Most likely the upper limit
of ICMP errors per second had been reached, but this can also be a sign of severe resource starvation. This breaks proper
path-MTU discovery as described by RFC 1981 and may cause network malfunction.
- Gateway Action
- Drop
- Action Description
- Packet was silently lost; the system failed to send an ICMP error.
- Proposed Action
- Review the upper limit of ICMP errors per second (ICMPSettings:ICMPSendPerSecLimit) to see if there is a bottleneck. While not being the preferred solution, a workaround may be to manually update the next-hop
MTU at certain routes.
2.28.48. [ID: 656] Reserved bits in fragment header are non-zero
- Log Categories
- IPV6,FRAG,STATELESS,VALIDATE
- Log Message
- Reserved bits in fragment header are non-zero.
- Default Log Severity
- Warning
- Parameters
- value, offset, pktlen, pkt
- Explanation
- The IPv6 fragment header contains two reserved bits (third and second LSB of the fragment offset field). The IPv6 RFC 2460
states that these bits should be initialized to zero and ignored by all parts (including firewalls and routers). In this particular
case the bits were non-zero.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- While not RFC 2460 compliant, we recommend adjusting the setting FragSettings:IP6ResvBitFrags to 'strip' or 'striplog' in order to prevent information leakage.
2.28.49. [ID: 660] Reserved bits in fragment header are non-zero
- Log Categories
- IPV6,FRAG,STATELESS,VALIDATE
- Log Message
- Reserved bits in fragment header are non-zero.
- Default Log Severity
- Warning
- Parameters
- value, offset, pktlen, pkt
- Explanation
- The IPv6 fragment header contains two reserved bits (third and second LSB of the fragment offset field). The IPv6 RFC 2460
states that these bits should be initialized to zero and ignored by all parts (including firewalls and routers). In this particular
case the bits were non-zero.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This log message is controlled by the setting FragSettings:IP6ResvBitFrags.
2.28.50. [ID: 650] Reserved bits in fragment header are non-zero
- Log Categories
- IPV6,FRAG,STATELESS,VALIDATE
- Log Message
- Reserved bits in fragment header are non-zero.
- Default Log Severity
- Warning
- Parameters
- value, offset, pktlen, pkt
- Explanation
- The IPv6 fragment header contains two reserved bits (third and second LSB of the fragment offset field). The IPv6 RFC 2460
states that these bits should be initialized to zero and ignored by all parts (including firewalls and routers). In this particular
case the bits were non-zero.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- This log message is controlled by the setting FragSettings:IP6ResvBitFrags.
2.28.51. [ID: 658] Reserved field in fragment header is non-zero
- Log Categories
- IPV6,FRAG,STATELESS,VALIDATE
- Log Message
- Reserved field in fragment header is non-zero.
- Default Log Severity
- Warning
- Parameters
- value, offset, pktlen, pkt
- Explanation
- The IPv6 fragment header contains a reserved field where all other IPv6 extension headers would contain a size field. The
IPv6 RFC 2460 states that this field should be initialized to zero (which incidentally is what it would be if it had been
a size field), and ignored by all parts (including firewalls and routers). In this particular case this field was non-zero.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- While not RFC 2460 compliant, we recommend adjusting the setting FragSettings:IP6ResvFldFrags to 'strip' or 'striplog' in order to prevent information leakage and/or software malfunction.
2.28.52. [ID: 648] Reserved field in fragment header is non-zero
- Log Categories
- IPV6,FRAG,STATELESS,VALIDATE
- Log Message
- Reserved field in fragment header is non-zero.
- Default Log Severity
- Warning
- Parameters
- value, offset, pktlen, pkt
- Explanation
- The IPv6 fragment header contains a reserved field where all other IPv6 extension headers would contain a size field. The
IPv6 RFC 2460 states that this field should be initialized to zero (which incidentally is what it would be if it had been
a size field), and ignored by all parts (including firewalls and routers). In this particular case this field was non-zero.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This log message is controlled by the setting FragSettings:IP6ResvFldFrags.
2.28.53. [ID: 645] Reserved field in fragment header is non-zero
- Log Categories
- IPV6,FRAG,STATELESS,VALIDATE
- Log Message
- Reserved field in fragment header is non-zero.
- Default Log Severity
- Warning
- Parameters
- value, offset, pktlen, pkt
- Explanation
- The IPv6 fragment header contains a reserved field where all other IPv6 extension headers would contain a size field. The
IPv6 RFC 2460 states that this field should be initialized to zero (which incidentally is what it would be if it had been
a size field), and ignored by all parts (including firewalls and routers). In this particular case this field was non-zero.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- This log message is controlled by the setting FragSettings:IP6ResvFldFrags.
2.28.54. [ID: 508] Fragment truncated at L3 header
- Log Categories
- IPV6,FRAG,STATELESS,VALIDATE
- Log Message
- Fragment truncated at L3 header.
- Default Log Severity
- Warning
- Parameters
- exthdr, offset, pktlen, pkt, rule
- Explanation
- A first fragment was received, but a L4 header was not included inside. The fragment is truncated in the middle of an IPv6
extension header.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- First fragments that do not include the L4 header are considered a security threat. Examine why this kind of message have
been sent. This log message can be disabled by the IPSettings:LogNonIP4 setting.
2.28.55. [ID: 358] Packet truncated at L3 header
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Packet truncated at L3 header.
- Default Log Severity
- Warning
- Parameters
- exthdr, offset, pktlen, pkt
- Explanation
- The received message is either too small to contain the IPv6 header itself, or it is too small to contain an expected extension
header.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets. This log message can be disabled by the IPSettings:LogNonIP4 setting.
2.28.56. [ID: 158] Non-zero IP Traffic Class field
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Non-zero IP Traffic Class field.
- Default Log Severity
- Notice
- Parameters
- value, flow, pkt, user, userid
- Explanation
- The IPv6 Traffic Class field in the IPv6 header was non-zero. The Traffic Class field may be used by Differentiated Services
to group traffic into different traffic classes.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- The IPSettings:TrafficClass setting can be changed to control the gateway's behavior for packets with non-zero Traffic Class fields .
2.28.57. [ID: 585] Non-zero IP Traffic Class field
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Non-zero IP Traffic Class field.
- Default Log Severity
- Warning
- Parameters
- value, flow, pkt, user, userid
- Explanation
- The IPv6 Traffic Class field in the IPv6 header was non-zero. The Traffic Class field may be used by Differentiated Services
to group traffic into different traffic classes.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:TrafficClass setting can be changed to control the gateway's behavior for packets with non-zero Traffic Class fields .
2.28.58. [ID: 284] Non-zero IP Traffic Class field
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Non-zero IP Traffic Class field.
- Default Log Severity
- Warning
- Parameters
- value, flow, pkt, user, userid
- Explanation
- The IPv6 Traffic Class field in the IPv6 header was non-zero. The Traffic Class field may be used by Differentiated Services
to group traffic into different traffic classes.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- The IPSettings:TrafficClass setting can be changed to control the gateway's behavior for packets with non-zero Traffic Class fields .
2.28.59. [ID: 489] Hop Limit is zero
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Hop Limit is zero.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- An IPv6 packet with a Hop Limit value of zero was received and dropped. Transmission of IPv6 packets with a Hop Limit value
of zero violates the IP specification and should be dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This log message can be disabled by the IPSettings:LogReceivedTTL0 setting.
2.28.60. [ID: 408] HopLimit reached
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- HopLimit reached.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- An IPv4 packet with a TTL=1 was received. The packet was to be forwarded, at which point TTL reached zero and the packet had
to be dropped.
- Gateway Action
- Drop
- Action Description
- The packet has been dropped.
- Proposed Action
- This log message is only possible when IPSettings:TTLMin is set to 1. Whether to log and/or reject can be controlled by the MiscSettings:TTL0OnFwd setting.
2.28.61. [ID: 295] HopLimit reached
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- HopLimit reached.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- An IPv4 packet with a TTL=1 was received. The packet was to be forwarded, at which point TTL reached zero and the packet had
to be dropped.
- Gateway Action
- Drop
- Action Description
- The packet has been dropped.
- Proposed Action
- This log message is only possible when IPSettings:TTLMin is set to 1. Whether to log and/or reject can be controlled by the MiscSettings:TTL0OnFwd setting.
2.28.62. [ID: 148] Hop Limit too low
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Hop Limit too low.
- Default Log Severity
- Notice
- Parameters
- value, min, flow, pkt, user, userid
- Explanation
- An IPv6 packet with a Hop Limit value equal or less than the configured minimum value was detected.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- The Hop Limit value should be larger than 3 to prevent a user to map routers behind the firewall, i.e. firewalking. In order
to support trace-route applications, the IPSettings:TTLMin value needs to be set to 1.
2.28.63. [ID: 402] Hop Limit too low
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Hop Limit too low.
- Default Log Severity
- Warning
- Parameters
- value, min, flow, pkt, user, userid
- Explanation
- An IPv6 packet with a Hop Limit value equal or less than the configured minimum value was detected.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The Hop Limit value should be larger than 3 to prevent a user to map routers behind the firewall, i.e. firewalking. In order
to support trace-route applications, the IPSettings:TTLMin value needs to be set to 1.
2.28.64. [ID: 453] Hop Limit too low
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Hop Limit too low.
- Default Log Severity
- Warning
- Parameters
- value, min, flow, pkt, user, userid
- Explanation
- An IPv6 packet with a Hop Limit value equal or less than the configured minimum value was detected.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- The Hop Limit value should be larger than 3 to prevent a user to map routers behind the firewall, i.e. firewalking. In order
to support trace-route applications, the IPSettings:TTLMin value needs to be set to 1.
2.28.65. [ID: 118] Fragment truncated at L4 header
- Log Categories
- IPV6,FRAG,STATELESS,VALIDATE
- Log Message
- Fragment truncated at L4 header.
- Default Log Severity
- Warning
- Parameters
- ipproto, offset, pktlen, pkt, rule
- Explanation
- A first fragment was received. The fragment claims to contain an L4 header but the fragment is too short to contain a header
of the specific protocol.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets. This log message can be disabled by the IPSettings:LogNonIP4 setting.
2.28.66. [ID: 125] Header payload in fragment is truncated
- Log Categories
- IPV6,FRAG,STATELESS,VALIDATE
- Log Message
- Header payload in fragment is truncated.
- Default Log Severity
- Warning
- Parameters
- exthdr, offset, hdrlen, pktlen, pkt, rule
- Explanation
- A first fragment was received, but a L4 header was not included inside. The fragment is truncated in the middle of an IPv6
extension headers payload.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets. This log message can be disabled by the IPSettings:LogNonIP4 setting.
2.28.67. [ID: 294] Header payload is truncated
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Header payload is truncated.
- Default Log Severity
- Warning
- Parameters
- exthdr, offset, hdrlen, pktlen, pkt
- Explanation
- The received message is too small to contain the full payload of an IPv6 extension header.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets. This log message can be disabled by the IPSettings:LogNonIP4 setting.
2.28.68. [ID: 415] Packet truncated at L4 header
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Packet truncated at L4 header.
- Default Log Severity
- Warning
- Parameters
- ipproto, offset, pktlen, pkt
- Explanation
- The received packet is too short to contain an L4 header of the protocol in question.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets. This log message can be disabled by the IPSettings:LogNonIP4 setting.
2.28.69. [ID: 523] IPv6 payload is truncated
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- IPv6 payload is truncated.
- Default Log Severity
- Warning
- Parameters
- paylen, size, pkt
- Explanation
- The IPv6 header claim that the packet is paylen bytes large (the value logged includes the size of the IPv6 header), but only size bytes of data have been received.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets. This log message can be disabled by the IPSettings:LogNonIP4 setting.
2.28.70. [ID: 1025] Unrecognized IPv6 next header
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Unrecognized IPv6 next header. Dropping.
- Default Log Severity
- Warning
- Parameters
- exthdr, offset, flow, pkt, user, userid
- Explanation
- A packet with unrecognized IPv6 Next Header was received and dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.28.71. [ID: 1024] Unrecognized IPv6 next header
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Unrecognized IPv6 next header. Rejecting.
- Default Log Severity
- Warning
- Parameters
- exthdr, offset, flow, pkt, user, userid
- Explanation
- A packet with unrecognized IPv6 Next Header was received and rejected.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- None
2.28.72. [ID: 511] Adjacent PAD option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Adjacent PAD option.
- Default Log Severity
- Warning
- Parameters
- exthdr, option, prevoption, flow, pkt, user, userid
- Explanation
- IPv6 extension headers and options are aligned by PAD fields to minimize the amount of CPU resources needed by network elements
to process IPv6 packets. Multiple adjacent PAD1 or PADN options can be used for denial-of-service attacks by forcing network
elements to process an unnecessary amount of PAD options.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IP6ValidateSyntax setting can be changed to control the gateway's validation of IPv6 headers.
2.28.73. [ID: 598] Unaligned IPv6 option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Unaligned IPv6 option.
- Default Log Severity
- Warning
- Parameters
- option, offset, flow, pkt, user, userid
- Explanation
- IPv6 extension headers and options should according to IPv6 specifications be aligned at certain offsets within a packet to
minimize the amount of CPU resources needed by network elements to process IPv6 packets. The option option was found not to be properly aligned.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IP6ValidateSyntax setting can be changed to control the gateway's validation of IPv6 headers.
2.28.74. [ID: 277] Fragment with invalid extension header
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Fragment with invalid extension header.
- Default Log Severity
- Warning
- Parameters
- exthdr, flow, pkt, user, userid
- Explanation
- According to the IPv6 specification, some extension headers are not allowed to be present in fragmented IPv6 packets.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IP6ValidateSyntax setting can be changed to control the gateway's validation of IPv6 headers.
2.28.75. [ID: 610] Out of scope option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Out of scope option.
- Default Log Severity
- Warning
- Parameters
- exthdr, option, flow, pkt, user, userid
- Explanation
- The IPv6 option found in the extension header is according to the IPv6 specification not allowed to be used within the processed
header.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If the packet sender is one of your network devices, investigate why the unit is sending malformed IP options.
2.28.76. [ID: 110] Repeated extension header
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Repeated extension header.
- Default Log Severity
- Warning
- Parameters
- exthdr, flow, pkt, user, userid
- Explanation
- Some extension headers are according to the IPv6 specifications only allowed to occur once within each IPv6 packet. The extension
header exthdr occurred more than once within this packet.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IP6ValidateSyntax setting can be changed to control the gateway's validation of IPv6 headers.
2.28.77. [ID: 311] Repeated option
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- Repeated option.
- Default Log Severity
- Warning
- Parameters
- option, flow, pkt, user, userid
- Explanation
- Some options are according to the IPv6 specifications only allowed to occur once within each IPv6 packet. The option option occurred more than once within this packet.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IP6ValidateSyntax setting can be changed to control the gateway's validation of IPv6 headers.
2.28.78. [ID: 567] IPv6 Too large PADN
- Log Categories
- IPV6,STATELESS,VALIDATE
- Log Message
- IPv6 Too large PADN.
- Default Log Severity
- Warning
- Parameters
- len, maxlen, flow, pkt, user, userid
- Explanation
- IPv6 extension headers and options are aligned by PAD fields to minimize the amount of CPU resources needed by network elements
to process IPv6 packets. It is however possible to overuse the PADN options with the purpose of consuming CPU resources.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The IPSettings:IP6ValidateSyntax setting can be changed to control the gateway's validation of IPv6 headers.
These log messages refer to the LICENSE category.
2.29.1. [ID: 1083] Remaining demo period
- Log Categories
- LICENSE,SYSTEM
- Log Message
- Remaining demo period.
- Default Log Severity
- Notice
- Parameters
- time
- Explanation
- Time left of demo period.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.29.2. [ID: 1084] Demo license expired
- Log Categories
- LICENSE,SYSTEM,CONFIG
- Log Message
- Demo license expired. System entering lockdown.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- Demo license expired.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Acquire a valid license.
2.29.3. [ID: 623] Failed to activate license
- Log Categories
- LICENSE,SYSTEM,CONFIG
- Log Message
- Failed to activate license.
- Default Log Severity
- Warning
- Parameters
- reason, user, userid
- Explanation
- The system failed to activate the license, and will continue to use the previous license.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check the configuration log.
2.29.4. [ID: 506] A new license has been activated
- Log Categories
- LICENSE,SYSTEM,CONFIG
- Log Message
- A new license has been activated.
- Default Log Severity
- Notice
- Parameters
- user, userid
- Explanation
- A new license has been successfully activated.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.29.5. [ID: 564] Lockdown is in effect due to invalid license
- Log Categories
- LICENSE,SYSTEM
- Log Message
- Lockdown is in effect due to invalid license.
- Default Log Severity
- Critical
- Parameters
- reason
- Explanation
- Lockdown is in effect because the license is invalid. Only access from admin nets to the firewall itself is allowed, everything
else is dropped.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Upload a valid license.
2.29.6. [ID: 310] Failed to remove license
- Log Categories
- LICENSE,SYSTEM,CONFIG
- Log Message
- Failed to remove license.
- Default Log Severity
- Warning
- Parameters
- user, userid
- Explanation
- The system failed to remove the existing license file, and will continue to run using the existing license.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check the configuration log.
2.29.7. [ID: 151] The license has been removed
- Log Categories
- LICENSE,SYSTEM,CONFIG
- Log Message
- The license has been removed.
- Default Log Severity
- Notice
- Parameters
- user, userid
- Explanation
- The license has been removed.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
These log messages refer to the MANAGEMENT category.
2.30.1. [ID: 1676] Centralized management control re-enabled
- Log Categories
- MANAGEMENT
- Log Message
- Centralized management control re-enabled.
- Default Log Severity
- Warning
- Parameters
-
- Explanation
- A logged in user rejected local configuration changes that were disabling centralized management control. The System is now
again under centralized management control.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Audit the system for changes and if needed re-export configuration from the centralized management system.
2.30.2. [ID: 1672] Centralized management control being disabled[...]
- Log Categories
- MANAGEMENT
- Log Message
- Centralized management control being disabled by user request.
- Default Log Severity
- Warning
- Parameters
-
- Explanation
- A user logged in via console issued the "localconfiguration -enable" command. Issuing this command will remove the node from
centralized management system, allowing for local configuration changes to be performed and not tracked by centralized management.
This may be a security breach.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify eventual configuration changes, determine if they are correct. The original state and configuration can be reset by
exporting the configuration from the centralized management system.
2.30.3. [ID: 1001] Centralized management control has been[...]
- Log Categories
- MANAGEMENT
- Log Message
- Centralized management control has been disabled.
- Default Log Severity
- Information
- Parameters
-
- Explanation
- Centralized management control has been disabled and user management has been enabled.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.30.4. [ID: 1000] Centralized management control has been[...]
- Log Categories
- MANAGEMENT
- Log Message
- Centralized management control has been enabled.
- Default Log Severity
- Information
- Parameters
-
- Explanation
- Centralized management control has been enabled and user management has been disabled.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- In order enable user management, use the CLI command usermanagement.
These log messages refer to the NATPOOL category.
2.31.1. [ID: 1091] Deterministic NATPool found no free ports for[...]
- Log Categories
- NATPOOL
- Log Message
- Deterministic NATPool found no free ports for IP.
- Default Log Severity
- Warning
- Parameters
- name, internalip, blocksizedet, blocksizedyn, reason
- Explanation
- Deterministic NATPool has no more free ports (deterministic or dynamic) to assign for the internal IP internalip.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Consider reviewing the configuration properties of the Deterministic NATPool.
2.31.2. [ID: 1120] Deterministic NATPool current configuration
- Log Categories
- NATPOOL
- Log Message
- Deterministic NATPool current configuration.
- Default Log Severity
- Information
- Parameters
- reason, name, compressionratio, internalnetwork, externalippool, dynamicpoolratio, maxdynamicblocks, blocksizedet, blocksizedyn,
reservedports
- Explanation
- The configuration of Deterministic NATPool can be used for calculating deterministic mapping.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.31.3. [ID: 1109] Deterministic NATPool deleted
- Log Categories
- NATPOOL
- Log Message
- Deterministic NATPool deleted.
- Default Log Severity
- Notice
- Parameters
- name
- Explanation
- A deterministic NATPool was deleted.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.31.4. [ID: 1087] Deterministic NATPool denied translation
- Log Categories
- NATPOOL
- Log Message
- Deterministic NATPool denied translation.
- Default Log Severity
- Warning
- Parameters
- name, internalip
- Explanation
- Deterministic NATPool denied a translation request for internal IP internalip outside the configured internal network.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Verify if the NATPool is configured to allow translating any IP.
2.31.5. [ID: 1098] Deterministic NATPool dynamic release
- Log Categories
- NATPOOL
- Log Message
- Deterministic NATPool dynamic release.
- Default Log Severity
- Notice
- Parameters
- name, internalip, externalip, port
- Explanation
- Deterministic NATPool has released a dynamic port block.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.31.6. [ID: 1121] Deterministic NATPool dynamic assignment
- Log Categories
- NATPOOL
- Log Message
- Deterministic NATPool dynamic assignment.
- Default Log Severity
- Notice
- Parameters
- name, internalip, externalip, port
- Explanation
- Deterministic NATPool has assigned a new dynamic port block.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.31.7. [ID: 984] Failed to map peer NAT flow translation on[...]
- Log Categories
- NATPOOL,FLOW
- Log Message
- Failed to map peer NAT flow translation on local NAT Pool.
- Default Log Severity
- Warning
- Parameters
- pool, srcip, newip
- Explanation
- A flow could not be synchronized to the inactive HA node since the configuration of the NAT Pool or the rules are not identical
on the two HA nodes.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- Change the configuration so that NAT Pools and rules are configured in the same way.
2.31.8. [ID: 985] Out of memory loading NAT Pool
- Log Categories
- NATPOOL
- Log Message
- Out of memory loading NAT Pool .
- Default Log Severity
- Critical
- Parameters
-
- Explanation
- The system could not allocate enough memory when installing a NAT Pool in dataplane.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- Modify the configuration to use less memory.
2.31.9. [ID: 1152] Unable to re-map flow translation in the new[...]
- Log Categories
- NATPOOL,FLOW
- Log Message
- Unable to re-map flow translation in the new NATPool.
- Default Log Severity
- Notice
- Parameters
- name, srcip, newip
- Explanation
- After the new configuration is activated, the system tries to re-map the old flow translation in the new NATPool, but is unable
to do so. The flow will be closed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.31.10. [ID: 989] Max NATPool states reached replacing active
- Log Categories
- NATPOOL
- Log Message
- Max NATPool states reached replacing active.
- Default Log Severity
- Error
- Parameters
- pool, max, replaced
- Explanation
- The maximum number of source-IP-to-NAT-IP states of a stateful NAT Pool has been reached. No lingering state was found so
an active state was chosen to be replaced. Since the system has not enough configured states to track all source-IP-to-NAT-IP
mappings, it is no longer guaranteed that flows from the same source IP always are mapped to the same NAT IP.
- Gateway Action
- Replace
- Action Description
- None
- Proposed Action
- Increase the pool's MaxStates setting to track more sources.
2.31.11. [ID: 988] Max NATPool states reached replacing lingering
- Log Categories
- NATPOOL
- Log Message
- Max NATPool states reached replacing lingering.
- Default Log Severity
- Warning
- Parameters
- pool, max, replaced
- Explanation
- The maximum number of source-IP-to-NAT-IP states of a stateful NAT Pool has been reached. A lingering state was found and
replaced. Since the system has not enough configured states to track all source-IP-to-NAT-IP mappings, it is no longer guaranteed
that flows from the same source IP always are mapped to the same NAT IP.
- Gateway Action
- Replace
- Action Description
- None
- Proposed Action
- Increase the pool's MaxStates setting to track more sources.
2.31.12. [ID: 986] Out of memory while allocating state in pool
- Log Categories
- NATPOOL
- Log Message
- Out of memory while allocating state in pool.
- Default Log Severity
- Critical
- Parameters
- pool
- Explanation
- The system failed to allocate memory when creating a new source-IP-to-NAT-IP state in a stateful NAT Pool.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Modify the configuration to use less memory.
These log messages refer to the NDP category.
2.32.1. [ID: 165] Advertisement delayed
- Log Categories
- NDP,SYSTEM
- Log Message
- Advertisement delayed.
- Default Log Severity
- Warning
- Parameters
- ip, destip, desthw, iface
- Explanation
- Replies to address resolution requests have been put under rate limit and an advertisement to destip has been put on hold. This may in the pathological case prevent new hosts from establishing communication with the firewall.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Review the NDSettings:NDMaxResolvReply setting and consider increasing it. Whether to log this event is controlled by the NDSettings:NDLogRatelimitDelay setting.
2.32.2. [ID: 184] Advertisement for static entry
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- Advertisement for static entry.
- Default Log Severity
- Warning
- Parameters
- knownhw, srchw, srcip, destip, targetip, iface, pkt
- Explanation
- A Neighbor Advertisement message for a statically configured IP has been received, but the message advertised a different
L2 address than what has been configured. Note that messages with the "override" flag cleared are not logged.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- First make sure that the statically configured L2 address is correct. If it is, then this is very likely an attack trying
to re-route network traffic. The attacker must have access to a machine attached to the network in question, so take note
of the srchw parameter. In order for traffic hijacking to work using this attack, this parameter must point at a compromised machine.
Denial of service can be achieved by using a non-existing address. Whether to log this event is controlled by the NDSettings:StaticNDChanges setting.
2.32.3. [ID: 1719] Anycast address ignored
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- Anycast address ignored.
- Default Log Severity
- Information
- Parameters
- knownhw, srchw, srcip, destip, targetip, iface, pkt
- Explanation
- While trying to resolve targetip, at least one anycast reply has been ignored.
- Gateway Action
- Ignore
- Action Description
- None
- Proposed Action
- None
2.32.4. [ID: 179] Unknown ICMP code
- Log Categories
- NDP,STATELESS,VALIDATE
- Log Message
- Unknown ICMP code.
- Default Log Severity
- Warning
- Parameters
- srchw, srcip, code, iface, pkt
- Explanation
- An ND message with an unknown ICMP code was received. The gateway is currently implementing ND according to RFC4861, and does
not know how to handle this type of message.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This log message can be turned off with the NDSettings:NDValidation setting.
2.32.5. [ID: 569] Illegal option size
- Log Categories
- NDP,STATELESS,VALIDATE
- Log Message
- Illegal option size.
- Default Log Severity
- Warning
- Parameters
- srchw, srcip, destip, targetip, type, expectlen, len, iface, pkt
- Explanation
- An ND message with a broken option has been received. The options size is incorrect for the given option type.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This log message can be turned off with the NDSettings:NDValidation setting.
2.32.6. [ID: 276] Forged reply
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- Forged reply.
- Default Log Severity
- Warning
- Parameters
- knownhw, srchw, srcip, destip, targetip, iface, pkt
- Explanation
- An ND message has been received with the "solicitation" and "override" flag set, but the gateway never asked for it (so it
is not solicited). Additionally it has got a new target HW address. This can be a lingering reply for something that we already
have resolved, but it is more likely a direct attempt to modify the neighbor cache.
- Gateway Action
- Drop
- Action Description
- The ND message has been dropped
- Proposed Action
- Take note of the srchw parameter. Identify that machine/user at the network and make sure that it is not compromised. Note that a seasoned attacker
would spoof the HW sender. The machine or user pointed out by the sender address may be "innocent" in the case of an attack.
Make sure that an appropriate value is used for the NDSettings:NDChanges setting.
2.32.7. [ID: 1714] Confusing reply
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- Confusing reply.
- Default Log Severity
- Warning
- Parameters
- knownhw, srchw, srcip, destip, targetip, iface, pkt
- Explanation
- The system has, during IP targetip address resolution, received multiple different replies with conflicting link-layer options within the span of NDSettings:NDVerifyTimer seconds. In other words, there is an address conflict in the local network. The link-layer information has been updated to
that of the second reply.
- Gateway Action
- Replace
- Action Description
- None
- Proposed Action
- Review the network. IPv6 allows multiple devices to share the same IP, but only when specifically configured for this purpose.
In this case not all devices appear to have been configured as such, though a possibility is also that a device has been replaced
or modified. Whether to log this event or not is controlled by NDSettings:NDValidation, but the actual decision to select either the first or the second conflicting reply is taken at random. This behavior can
be disabled by setting NDSettings:NDVerifyTimer to zero, in which case conflicting replies will be handled in accordance with the NDSettings:NDChanges setting.
2.32.8. [ID: 1720] Confusing reply
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- Confusing reply.
- Default Log Severity
- Warning
- Parameters
- knownhw, srchw, srcip, destip, targetip, iface, pkt
- Explanation
- The system has, during IP targetip address resolution, received multiple different replies with conflicting link-layer options within the span of NDSettings:NDVerifyTimer seconds. In other words, there is an address conflict in the local network. The link-layer information used is that of the
first reply.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Review the network. IPv6 allows multiple devices to share the same IP, but only when specifically configured for this purpose.
In this case not all devices appear to have been configured as such, though a possibility is also that a device has been replaced
or modified. Whether to log this event or not is controlled by NDSettings:NDValidation, but the actual decision to select either the first or the second conflicting reply is taken at random. This behavior can
be disabled by setting NDSettings:NDVerifyTimer to zero, in which case conflicting replies will be handled in accordance with the NDSettings:NDChanges setting.
2.32.9. [ID: 1718] Confusing solicitation HW address
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- Confusing solicitation HW address.
- Default Log Severity
- Warning
- Parameters
- knownhw, srchw, srcip, destip, targetip, iface, pkt
- Explanation
- The system has received a solicitation request with a conflicting link-layer option, for the address targetip. The conflict was seen either seen while performing address resolution (in which case we already have received advertisements
for the destination with a different link-layer address), while probing the address (in which case we have an old link-layer
destination known from the past), or while actively replying to dead-peer probes from another link-layer address (on behalf
of the same IP). The system deemed the old information to be more trustworthy than the one found in the solicitation, and
while a reply has been sent to the supplied link-layer addresses, no local information was been updated.
- Gateway Action
- Ignore
- Action Description
- None
- Proposed Action
- Apart from that the conflict has been seen in a very specific time interval (which may happen by coincidence), the event in
itself has a very limited relevans. Review the network if this is a reoccurring phenomenon, or if it happens in conjunction
with other suspicious activity. The behavior of the system is controlled by a combination of NDSettings:NDVerifyTimer and NDSettings:NDChanges. IPv6 allows multiple devices to share the same IP, but only when specifically configured for this purpose. In this case
not all devices appear to have been configured as such, though a possibility is also that a device has been replaced or modified.
2.32.10. [ID: 1717] Confusing solicitation HW address
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- Confusing solicitation HW address.
- Default Log Severity
- Warning
- Parameters
- knownhw, srchw, srcip, destip, targetip, iface, pkt
- Explanation
- The system has received a solicitation request with a conflicting link-layer option, for the address targetip. The system has been updated to use the supplied link-layer information. This only happens when NDSettings:NDChanges is set to accept all link-layer updates.
- Gateway Action
- Replace
- Action Description
- None
- Proposed Action
- Apart from that the conflict has been seen in a very specific time interval (which may happen by coincidence), the event in
itself has a very limited relevans. Review the network if this is a reoccurring phenomenon, or if it happens in conjunction
with other suspicious activity. The behavior of the system is controlled by a combination of NDSettings:NDVerifyTimer and NDSettings:NDChanges. IPv6 allows multiple devices to share the same IP, but only when specifically configured for this purpose. In this case
not all devices appear to have been configured as such, though a possibility is also that a device has been replaced or modified.
2.32.11. [ID: 226] DAD reply delayed
- Log Categories
- NDP,SYSTEM
- Log Message
- DAD reply delayed.
- Default Log Severity
- Warning
- Parameters
- ip, desthw, iface
- Explanation
- Replies to Duplicate Address probes have been put under rate limit. The system might not be able to prevent the IP ip to be used by desthw.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Review the NDSettings:NDMaxDupReply setting and consider increasing it. Whether to log this event is controlled by the NDSettings:NDLogRatelimitDelay setting.
2.32.12. [ID: 153] Received DAD probe
- Log Categories
- NDP
- Log Message
- Received DAD probe.
- Default Log Severity
- Information
- Parameters
- srchw, srcip, destip, targetip, iface, pkt
- Explanation
- Another host or server on the network is sending a Duplicate Address Probe to detect if the IP address targetip is not used by another device. The IP is used by the gateway and the probing host will be notified.
- Gateway Action
- None
- Action Description
- This message will not be used by the system, though an answer will be sent to the srchw address
- Proposed Action
- This log message can be turned off with the NDSettings:StaticNDChanges setting.
2.32.13. [ID: 462] Duplicated option
- Log Categories
- NDP,STATELESS,VALIDATE
- Log Message
- Duplicated option.
- Default Log Severity
- Warning
- Parameters
- srchw, srcip, destip, targetip, iface, pkt
- Explanation
- Two (or more) source link-layer options containing different data were found.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This log message can be turned off with the NDSettings:NDValidation setting.
2.32.14. [ID: 430] Duplicated option
- Log Categories
- NDP,STATELESS,VALIDATE
- Log Message
- Duplicated option.
- Default Log Severity
- Warning
- Parameters
- srchw, srcip, destip, targetip, iface, pkt
- Explanation
- Two (or more) target link-layer options containing different data were found.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This log message can be turned off with the NDSettings:NDValidation setting.
2.32.15. [ID: 552] ND hop limit reached
- Log Categories
- NDP,STATELESS,VALIDATE
- Log Message
- ND hop limit reached.
- Default Log Severity
- Warning
- Parameters
- srchw, srcip, destip, targetip, count, iface, pkt
- Explanation
- The hop-limit of an ND message is hardcoded to 255. The idea is to prevent these messages from being routed.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Make sure that no router in the network is accidentally forwarding ND messages.
2.32.16. [ID: 1715] HW source inconsistent with static IP
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- HW source inconsistent with static IP.
- Default Log Severity
- Warning
- Parameters
- knownhw, newhw, srcip, destip, targetip, iface, pkt
- Explanation
- This concerns a static IP entry. The system has received solicitation requests on behalf of srcip, but with conflicting source link-layer information. The solicitation is sent from newhw but the configuration expects this to be knownhw. This log message is not generated for solicitations from an anycast (alternative) IP.
- Gateway Action
- Ignore
- Action Description
- The system replied to the solicitation, but did not register srchw as the HW source of srcip.
- Proposed Action
- Review the network, the configuration may have to be updated.
2.32.17. [ID: 1723] HW source inconsistent with static IP
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- HW source inconsistent with static IP.
- Default Log Severity
- Warning
- Parameters
- knownhw, newhw, srcip, destip, targetip, iface, pkt
- Explanation
- This concerns a static IP entry. The system has received solicitation requests on behalf of srcip, but with conflicting source link-layer information. The solicitation is sent from newhw but the configuration expects this to be knownhw. This log message is not generated for solicitations from an anycast (alternative) IP.
- Gateway Action
- Drop
- Action Description
- The system will not process this solicitation any further, and no response will be sent.
- Proposed Action
- Review the network, the configuration may have to be updated.
2.32.18. [ID: 434] Linklayer option contains multicast address
- Log Categories
- NDP,STATELESS,VALIDATE
- Log Message
- Linklayer option contains multicast address.
- Default Log Severity
- Warning
- Parameters
- srchw, srcip, destip, targetip, type, hwaddr, iface, pkt
- Explanation
- At least one link-layer address option was found to contain a multicast address. This is illegal, and a known denial-of-service
attack.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Take note of the HW sender (the srchw parameter). Identify the machine/user at the network and make sure that it is not compromised. Note that a seasoned attacker
would spoof the HW sender (the machine or user pointed out by the sender address may be "innocent" in the case of an attack).
This log message can be turned off with the NDSettings:NDValidation setting.
2.32.19. [ID: 454] Dead peer probe answered with multicast[...]
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- Dead peer probe answered with multicast message.
- Default Log Severity
- Warning
- Parameters
- knownhw, srchw, srcip, destip, targetip, iface, pkt
- Explanation
- The system has sent a dead peer probe to a previously resolved IP, and received a multicast answer. This is an illegal response.
- Gateway Action
- Drop
- Action Description
- The packet has been dropped and will not be considered an answer for the dead peer probe
- Proposed Action
- Whether to log this event or not is controlled by the NDSettings:NDValidation setting. The packet is considered invalid, so it will be dropped regardless of the setting. Examine the network to see why
such a response was sent.
2.32.20. [ID: 619] Multicast target
- Log Categories
- NDP,STATELESS,VALIDATE
- Log Message
- Multicast target.
- Default Log Severity
- Warning
- Parameters
- srchw, srcip, destip, targetip, iface, pkt
- Explanation
- An ND message with a multicast target IP. This is illegal.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This log message can be turned off with the NDSettings:NDValidation setting.
2.32.21. [ID: 574] Neighbor cache updated with new HW address
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- Neighbor cache updated with new HW address.
- Default Log Severity
- Warning
- Parameters
- knownhw, newhw, srcip, destip, targetip, iface, pkt
- Explanation
- The L2 (hardware) address of the given target IP has been updated by an ND message. The setting NDSettings:NDChanges is currently in a mode to accept any advertised changes to L2 data, allowing data traffic to adjust very quickly to topological
changes of the network (at the expense of certain vulnerabilities).
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- Accepting any advertised changes to L2 data will open up for a number of exploits (including both crude denial-of-service,
eavesdropping and more sophisticated router hi-jacking attacks). Consider changing the NDSettings:NDChanges setting to FavourOld or FavourOldLog, to allow for a more moderate acceptance of new L2 information.
2.32.22. [ID: 330] New HW address advertised for resolved IP
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- New HW address advertised for resolved IP.
- Default Log Severity
- Warning
- Parameters
- knownhw, newhw, srcip, destip, targetip, iface, pkt
- Explanation
- An ND message tried to update the L2 (hardware) address of the given target IP. The packet have been dropped because the setting
NDSettings:NDChanges is currently in a mode to drop any such packet.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The current setting does not allow updates to known L2 information at all. This gives little extra security (and can in fact
be exploited for subtle denial-of-service attacks). Consider adding known L2 addresses as 'static' ND entries instead.
2.32.23. [ID: 418] New HW address advertised for resolved IP
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- New HW address advertised for resolved IP.
- Default Log Severity
- Notice
- Parameters
- knownhw, newhw, srcip, destip, targetip, iface, pkt
- Explanation
- An ND message tried to update the L2 (hardware) address of the given target IP. The old L2 address will be probed to see if
it is still alive, in which case the new L2 address will be discarded. If no answer is received, the new address will be accepted.
- Gateway Action
- Ignore
- Action Description
- The ND message has been acknowledged, but was not allowed to update the current L2 information
- Proposed Action
- If the current behavior is not desired, modify the NDSettings:NDChanges setting accordingly.
2.32.24. [ID: 211] Advertisement from the Unknown Address
- Log Categories
- NDP,STATELESS,VALIDATE
- Log Message
- Advertisement from the Unknown Address.
- Default Log Severity
- Warning
- Parameters
- srchw, srcip, destip, targetip, iface, pkt
- Explanation
- A neighbor advertisement message has been received from the "unknown address" (the all zeroes address). This is illegal.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Examine why this kind of advertisement has been sent. Whether to log this event or not is controlled by the NDSettings:NDValidation setting.
2.32.25. [ID: 195] No target route for packet
- Log Categories
- NDP,RULE
- Log Message
- No target route for packet.
- Default Log Severity
- Warning
- Parameters
- srchw, srcip, destip, targetip, iface, pkt
- Explanation
- An ND message targeted to the IP targetip was received via interface iface, but there is no route from this interface to to this address.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Make sure that the route is not disabled, or that it is not "shadowed" by a default route. Examine all dynamic values (in
all routes), including OSPF-managed routes, network prefixes from ND Router Advertisements and gateways from DHCP-leases.
This log message can be turned off with the NDSettings:NDValidation setting.
2.32.26. [ID: 599] No source route for packet
- Log Categories
- NDP,RULE
- Log Message
- No source route for packet.
- Default Log Severity
- Warning
- Parameters
- srchw, srcip, destip, targetip, iface, pkt
- Explanation
- An ND message was received from the source IP srcip via interface iface, but there is no route to this address via that interface.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Make sure that the route is not disabled, or that it is not "shadowed" by a default route. Examine all dynamic values (in
all routes), including OSPF-managed routes, network prefixes from ND Router Advertisements and gateways from DHCP-leases.
This log message can be turned off with the NDSettings:NDValidation setting.
2.32.27. [ID: 107] Reply without target link-layer option
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- Reply without target link-layer option.
- Default Log Severity
- Warning
- Parameters
- knownhw, srchw, srcip, destip, targetip, iface, pkt
- Explanation
- The system is trying to resolve targetip. An answer has been received, but the answer did not include an L2 address and was thus useless.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Examine why this kind of advertisement has been sent. Whether to log this event or not is controlled by the NDSettings:NDValidation setting.
2.32.28. [ID: 1716] Noisy reply
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- Noisy reply.
- Default Log Severity
- Warning
- Parameters
- knownhw, srchw, srcip, destip, targetip, iface, pkt
- Explanation
- While trying to resolve targetip, multiple non-anycast replies were received for the same L2 address knownhw within a short timespan. While not a problem in itself, it is considered suspicious behavior.
- Gateway Action
- Adjust
- Action Description
- None
- Proposed Action
- Examine where the duplicate advertisements are coming from. Ideally an ND solicitation should never result in duplicate advertisements
since the messages are link-local. A device could deliberately be sending multiple replies in order to try and direct address
resolution away from the ordinary source, either for malicious or valid purposes. An example of a valid use would be HA failover.
The NDSettings:NDNoiseThreshold defines how many replies (not counting anycast replies) that are required in order to be considered noisy, during the timespan
defined by NDSettings:NDVerifyTimer. Whether to log this event or not is controlled by the NDSettings:NDValidation setting.
2.32.29. [ID: 309] Linklayer option does not match HW sender
- Log Categories
- NDP,STATELESS,VALIDATE
- Log Message
- Linklayer option does not match HW sender.
- Default Log Severity
- Warning
- Parameters
- srchw, srcip, destip, targetip, option, iface, pkt
- Explanation
- An ND message was received with a link-layer address option that did not match the HW sender address found in the L2 header.
- Gateway Action
- Drop
- Action Description
- The packet has been dropped and will not be further processed
- Proposed Action
- The advanced setting NDSettings:NDMatchL2Sender can be adjusted in order to control how the gateway will respond to mismatched link-layer options and the address found in
the L2 header.
2.32.30. [ID: 120] Linklayer option does not match HW sender
- Log Categories
- NDP,STATELESS,VALIDATE
- Log Message
- Linklayer option does not match HW sender.
- Default Log Severity
- Notice
- Parameters
- srchw, srcip, destip, targetip, option, iface, pkt
- Explanation
- An ND message was received with a link-layer address option that did not match the HW sender address found in the L2 header.
- Gateway Action
- Allow
- Action Description
- The packet will be processed as if the link-layer address option would match that of the HW sender address found in the L2
header. The address found in the link-layer option will be used
- Proposed Action
- The advanced setting NDSettings:NDMatchL2Sender can be adjusted in order to control how the gateway will respond to mismatched link-layer options and the address found in
the L2 header.
2.32.31. [ID: 180] Neighbor entry lost
- Log Categories
- NDP,SYSTEM
- Log Message
- Neighbor entry lost.
- Default Log Severity
- Warning
- Parameters
- ip, knownhw, iface
- Explanation
- The system need to resolve an IP address, but the current virtual system is out of neighbor entries. The neighbor entry for
IP ip at interface iface has been freed in order to continue.
- Gateway Action
- Discard
- Action Description
- The system has been forced to discard one existing neighbor entry in use
- Proposed Action
- This log is commonly seen during some denial-of-service attacks. If you think that the system should be able to handle this
amount of active neighbors, review the NDSettings:NDCacheSizeEther setting and consider increasing it. Whether to log this event is controlled by the NDSettings:NDLogOutOfEntries setting.
2.32.32. [ID: 163] Probe from unknown host
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- Probe from unknown host.
- Default Log Severity
- Notice
- Parameters
- srchw, srcip, destip, targetip, iface, pkt
- Explanation
- Received a dead peer probe without source link-layer option, and there was no previous information about this IP in the neighbor
cache. One valid case where this can happen is when the gateway is required to keep track of more neighbors than the NDSettings:NDCacheSizeEther setting allow for.
- Gateway Action
- None
- Action Description
- The system will query for the IP srcip before the probe can be answered
- Proposed Action
- Whether to log this event is controlled by the NDSettings:NDValidation setting.
2.32.33. [ID: 1733] Probe from host with unexpected HW address
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- Probe from host with unexpected HW address.
- Default Log Severity
- Notice
- Parameters
- srchw, knownhw, srcip, destip, targetip, iface, pkt
- Explanation
- Received a dead peer probe for srcip from the HW address srchw, but the last known HW address was knownhw. A reply has been sent to srchw, but the last known HW address was not updated.
- Gateway Action
- None
- Action Description
- The system replied to the solicitation, but did not register srchw as the HW source of srcip.
- Proposed Action
- Whether to log this event is controlled by the NDSettings:NDValidation setting. The behavior (whether to reply and/or update the known HW address) is controlled by the NDSettings:NDChanges setting.
2.32.34. [ID: 1730] Probe from host with unexpected HW address
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- Probe from host with unexpected HW address.
- Default Log Severity
- Warning
- Parameters
- srchw, knownhw, srcip, destip, targetip, iface, pkt
- Explanation
- Received a dead peer probe for srcip from the HW address srchw, but the last known HW address was knownhw. The probe has therefore been dropped and no action was taken.
- Gateway Action
- Drop
- Action Description
- The system will not process this solicitation any further, and no response will be sent.
- Proposed Action
- Whether to log this event is controlled by the NDSettings:NDValidation setting. The behavior (whether to reply and/or update the known HW address) is controlled by the NDSettings:NDChanges setting.
2.32.35. [ID: 303] Dead Peer probe delayed
- Log Categories
- NDP,SYSTEM
- Log Message
- Dead Peer probe delayed.
- Default Log Severity
- Warning
- Parameters
- ip, knownhw, iface
- Explanation
- Dead Peer probes have been put under rate limit and a probe for the IP addresses ip have been put on hold. For the time being, the system will consider this address to be valid.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Review the NDSettings:NDMaxUnreachProbe setting. Whether to log this event is controlled by the NDSettings:NDLogRatelimitDelay setting.
2.32.36. [ID: 1729] Probe from host while resolving address
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- Probe from host while resolving address.
- Default Log Severity
- Information
- Parameters
- srchw, srcip, destip, targetip, iface, pkt
- Explanation
- Received a dead peer probe from srcip while waiting for address resolution to finish, so the HW address is technically unknown to us. The HW address srchw was supplied with the probe (and a reply was sent there), but this information has not been used to resolve the IP address.
- Gateway Action
- Ignore
- Action Description
- The system replied to the solicitation, but did not register srchw as the HW source of srcip.
- Proposed Action
- Whether to log this event is controlled by the NDSettings:NDValidation setting. The behavior (whether to reply and/or update the known HW address) is controlled by the NDSettings:NDChanges setting.
2.32.37. [ID: 1727] Probe from host while resolving address
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- Probe from host while resolving address.
- Default Log Severity
- Warning
- Parameters
- srchw, srcip, destip, targetip, iface, pkt
- Explanation
- Received a dead peer probe from srcip while waiting for address resolution to finish, so the HW address is technically unknown to us. The probe has therefore been
dropped and no action was taken.
- Gateway Action
- Drop
- Action Description
- The system replied to the solicitation, but did not register srchw as the HW source of srcip.
- Proposed Action
- Whether to log this event is controlled by the NDSettings:NDValidation setting. The behavior (whether to reply and/or update the known HW address) is controlled by the NDSettings:NDChanges setting.
2.32.38. [ID: 266] Reply to Dead Peer probe delayed
- Log Categories
- NDP,SYSTEM
- Log Message
- Reply to Dead Peer probe delayed.
- Default Log Severity
- Warning
- Parameters
- ip, destip, knownhw, iface
- Explanation
- Replies to Dead Peer probes have been put under rate limit and the reply to destip have been delayed. This may in the pathological case break ongoing communications between destip and the system.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Review the NDSettings:NDMaxUnreachReply setting and consider increasing it. Whether to log this event is controlled by the NDSettings:NDLogRatelimitDelay setting.
2.32.39. [ID: 338] NDP resolve timeout
- Log Categories
- NDP,STATEFUL
- Log Message
- NDP resolve timeout.
- Default Log Severity
- Notice
- Parameters
- localip, ip, iface, flow, pkt, user, userid
- Explanation
- The system failed to resolve IP ip at interface iface. The IP is not reachable via the local network; traffic to and from this address will be dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The "ndpsnoop" feature will allow realtime examination of the ND traffic at interface iface; use this to pinpoint the problem. Review the route configuration and the access rules, especially when seemingly valid Advertisements
are discarded. Verify whether is possible to route bidirectional traffic to and from IP ip at interface iface. Whether to log this event is controlled by the NDSettings:NDLogResolveFailure setting.
2.32.40. [ID: 445] Packet truncated at L4 header
- Log Categories
- NDP,STATELESS,VALIDATE
- Log Message
- Packet truncated at L4 header.
- Default Log Severity
- Warning
- Parameters
- srchw, srcip, pktlen, iface, pkt
- Explanation
- The message contains enough data for an ICMP header, and this header identifies the message as an ND message. There is however
not enough data for an ND message.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This log message can be turned off with the NDSettings:NDValidation setting.
2.32.41. [ID: 519] Option is truncated
- Log Categories
- NDP,STATELESS,VALIDATE
- Log Message
- Option is truncated.
- Default Log Severity
- Warning
- Parameters
- srchw, srcip, destip, targetip, type, offset, maxlen, len, iface, pkt
- Explanation
- The message is truncated in the middle of option type type at offset offset. The option is supposed to be len bytes long, but there is only enough data for maxlen bytes in the packet.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This log message can be turned off with the NDSettings:NDValidation setting.
2.32.42. [ID: 348] ND message allowed by access rule
- Log Categories
- NDP
- Log Message
- ND message allowed by access rule.
- Default Log Severity
- Notice
- Parameters
- srchw, srcip, destip, targetip, iface, pkt, rule
- Explanation
- The ND sender IP address srcip was verified and accepted by access rule rule in the access section.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- Modify the access rule accordingly, if the sender should not be allowed.
2.32.43. [ID: 127] ND message disallowed by access rule
- Log Categories
- NDP
- Log Message
- ND message disallowed by access rule.
- Default Log Severity
- Notice
- Parameters
- srchw, srcip, destip, targetip, recviface, pkt, rule
- Explanation
- Further processing of received ND packet is not allowed due to access rule rule did not allow the sender IP srcip.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If the decision to drop the packet was correct but you don't want any logs then either change the LogEnabled property on the
access rule (if the rule is an explicitly configured access rule), add an access rule to drop the packet silently or configure
a log message exception in the log receiver to ignore this message. If the decision to drop the packet was incorrect then
there are two cases: If the rule is an explicitly configured access rule then modify it, and possibly other, access rules
accordingly. Otherwise start by verifying that the routing is correctly configured for the sender's address since routes provide
automatic access rules. If that does not help, that is, in setups where packets arriving from the sender arrive on another
interface than where packets going to the sender are routed, then add an access rule accepting the sender's address on the
receive interface.
2.32.44. [ID: 1657] ND message disallowed by route to source IP
- Log Categories
- NDP,ROUTE,IPSPOOFING
- Log Message
- ND message disallowed by route to source IP.
- Default Log Severity
- Notice
- Parameters
- srchw, srcip, destip, targetip, recviface, srcroute, pkt
- Explanation
- Further processing of received ND packet is not allowed due to the source IP srcip not being routed over the receive interface recviface.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This is an effect of the automatic reverse path ingress filtering of the system based on the routes known to the system. The
default policy is basically "strict reverse path forwarding", that is, that a packet must be received on the interface where
packets to the source IP of the packet would be routed out, to be acceptable. In some scenarios, for instance, where asymmetric
routing is used, this is too strict. Exceptions can then be made by marking interfaces as security equvivalent or by adding
explicit access rules to allow packets from the source IP on this interface even tough packets to the source IP will be sent
over some other interface.
2.32.45. [ID: 212] Solicitation delayed
- Log Categories
- NDP,SYSTEM
- Log Message
- Solicitation delayed.
- Default Log Severity
- Warning
- Parameters
- ip, knownhw, iface
- Explanation
- Neighbor Solicitations have been put under rate limit and a solicitation for the IP addresses ip that the system it is supposed to resolve have been put on hold. Communication with this address will be impossible until
the rate limit has been lifted. This log is commonly seen during some denial-of-service attacks.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Review the NDSettings:NDMaxSolicitation setting. Whether to log this event is controlled by the NDSettings:NDLogRatelimitDelay setting.
2.32.46. [ID: 625] Solicitation from unknown host
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- Solicitation from unknown host.
- Default Log Severity
- Warning
- Parameters
- srchw, srcip, destip, targetip, iface, pkt
- Explanation
- Received a multicast neighbor solicitation without source link-layer option. This is illegal, and a possible denial-of-service
attack mentioned in RFC4861.
- Gateway Action
- Drop
- Action Description
- The system will not process this solicitation any further, and no response will be sent.
- Proposed Action
- Whether to log this event is controlled by the NDSettings:NDValidation setting.
2.32.47. [ID: 1725] Solicitation from host with unexpected HW[...]
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- Solicitation from host with unexpected HW address.
- Default Log Severity
- Notice
- Parameters
- srchw, knownhw, srcip, destip, targetip, iface, pkt
- Explanation
- Received a multicast neighbor solicitation from srcip using the HW address srchw, but the last known HW address was knownhw. The HW address srchw was supplied with the probe (and a reply has been sent there), but the last known HW address has not been updated.
- Gateway Action
- Ignore
- Action Description
- The system replied to the solicitation, but did not register srchw as the HW source of srcip
- Proposed Action
- Whether to log this event is controlled by the NDSettings:NDValidation setting. The behavior (whether to reply and/or update the known HW address) is controlled by the NDSettings:NDChanges setting.
2.32.48. [ID: 1735] Solicitation from host with unexpected HW[...]
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- Solicitation from host with unexpected HW address.
- Default Log Severity
- Warning
- Parameters
- srchw, knownhw, srcip, destip, targetip, iface, pkt
- Explanation
- Received a multicast neighbor solicitation from srcip using the HW address srchw, but the last known HW address was knownhw. The packet has been dropped and will not be further processed.
- Gateway Action
- Drop
- Action Description
- The system will not process this solicitation any further, and no response will be sent.
- Proposed Action
- Whether to log this event is controlled by the NDSettings:NDValidation setting. The behavior (whether to reply and/or update the known HW address) is controlled by the NDSettings:NDChanges setting.
2.32.49. [ID: 1734] Solicitation from host while resolving address
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- Solicitation from host while resolving address.
- Default Log Severity
- Information
- Parameters
- srchw, srcip, destip, targetip, iface, pkt
- Explanation
- Received a multicast neighbor solicitation from srcip while waiting for address resolution to finish, so the HW address is technically unknown to us. A reply has been sent to
srchw, but the last known HW address was not updated.
- Gateway Action
- Ignore
- Action Description
- The system replied to the solicitation, but did not register srchw as the HW source of srcip.
- Proposed Action
- Whether to log this event is controlled by the NDSettings:NDValidation setting. The behavior (whether to reply and/or update the known HW address) is controlled by the NDSettings:NDChanges setting.
2.32.50. [ID: 1722] Solicitation from host while resolving address
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- Solicitation from host while resolving address.
- Default Log Severity
- Notice
- Parameters
- srchw, srcip, destip, targetip, iface, pkt
- Explanation
- Received a multicast neighbor solicitation from srcip while waiting for address resolution to finish, so the HW address is technically unknown to us. The packet has been dropped
and will not be further processed.
- Gateway Action
- Drop
- Action Description
- The system will not process this solicitation any further, and no response will be sent.
- Proposed Action
- Whether to log this event is controlled by the NDSettings:NDValidation setting. The behavior (whether to reply and/or update the known HW address) is controlled by the NDSettings:NDChanges setting.
2.32.51. [ID: 316] Spoofed HW sender
- Log Categories
- NDP,STATELESS,VALIDATE
- Log Message
- Spoofed HW sender.
- Default Log Severity
- Warning
- Parameters
- srchw, srcip, destip, targetip, iface, pkt
- Explanation
- An ND message has been received. The message has got an L2 header attached to it, and the L2 sender address inside that header
belongs to the system. Either this is a forged message, or packets are leaking from one network into another.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Examine why these packets are being received. There are two possible sources: An active attack, or that the system is hearing
its own ND messages (the most common case is that one physical multicast-capable network have been partitioned into two or
more "logical" subnet). Check the receive mode for the receiving interface. An attacker can attempt to "impersonate" the firewall
by using a known address associated with the firewall, in order to "update" an unsecure host with false information. This
kind of attack is usually not directed to the firewall, and so the likeliness that the firewall will of detecting this is
very low for "normal" or "selective multicast" mode, and high for "promiscuous" or "all-multicast" mode. Whether to log this
event is controlled by the NDSettings:NDValidation setting.
2.32.52. [ID: 239] Dead peer probe answered from unknown HW[...]
- Log Categories
- NDP,STATEFUL,VALIDATE
- Log Message
- Dead peer probe answered from unknown HW sender.
- Default Log Severity
- Warning
- Parameters
- knownhw, srchw, srcip, destip, targetip, iface, pkt
- Explanation
- The system has sent a dead peer probe to a previously resolved IP, and received an answer with a different L2 address. This
is not expected to happen as the probe (from the system) was sent to the known address knownhw, and is an illegal response.
- Gateway Action
- Drop
- Action Description
- The packet has been dropped and will not be considered an answer for the dead peer probe
- Proposed Action
- Whether to log this event or not is controlled by the NDSettings:NDValidation setting. The packet is considered invalid, so it will be dropped regardless of the setting. Examine the network to see why
such a response was sent. It may be an attempt to hijack traffic, in which case srchw must be the address of a compromised machine.
2.32.53. [ID: 315] Spoofed IP sender
- Log Categories
- NDP,STATELESS,VALIDATE
- Log Message
- Spoofed IP sender.
- Default Log Severity
- Warning
- Parameters
- srchw, srcip, destip, targetip, iface, pkt
- Explanation
- An ND message has been received from one IP owned (or proxied) by the system. Either this is a forged message, or packets
are leaking from one network into another.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Examine why these packets are being received. There are two possible sources: An active attack, or that the system is hearing
its own ND messages (the most common case is that one physical multicast-capable network have been partitioned into two or
more "logical" subnet). Check the receive mode for the receiving interface. An attacker can attempt to "impersonate" the firewall
by using a known address associated with the firewall, in order to "update" an unsecure host with false information. This
kind of attack is usually not directed to the firewall, and so the likeliness that the firewall will of detecting this is
very low for "normal" or "selective multicast" mode, and high for "promiscuous" or "all-multicast" mode. Whether to log this
event is controlled by the NDSettings:NDValidation setting.
2.32.54. [ID: 271] Spoofed source linklayer option
- Log Categories
- NDP,STATELESS,VALIDATE
- Log Message
- Spoofed source linklayer option.
- Default Log Severity
- Warning
- Parameters
- srchw, srcip, destip, targetip, option, iface, pkt
- Explanation
- An ND message contained a source link-layer option with an L2 address that belongs to the system. Either this is a forged
message, or packets are leaking from one network into another.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Examine why these packets are being received. There are two possible sources: An active attack, or that the system is hearing
its own ND messages (the most common case is that one physical multicast-capable network have been partitioned into two or
more "logical" subnet). Check the receive mode for the receiving interface. An attacker can attempt to "impersonate" the firewall
by using a known address associated with the firewall, in order to "update" an unsecure host with false information. This
kind of attack is usually not directed to the firewall, and so the likeliness that the firewall will of detecting this is
very low for "normal" or "selective multicast" mode, and high for "promiscuous" or "all-multicast" mode. Whether to log this
event is controlled by the NDSettings:NDValidation setting.
2.32.55. [ID: 446] Spoofed IP target
- Log Categories
- NDP,STATELESS,VALIDATE
- Log Message
- Spoofed IP target.
- Default Log Severity
- Warning
- Parameters
- srchw, srcip, destip, targetip, iface, pkt
- Explanation
- An ND message has been received for one target IP that is owned (or proxied) by the system. Either this is a forged message,
or packets are leaking from one network into another.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Examine why these packets are being received. There are two possible sources: An active attack, or that the system is hearing
its own ND messages (the most common case is that one physical multicast-capable network have been partitioned into two or
more "logical" subnet). Check the receive mode for the receiving interface. An attacker can attempt to "impersonate" the firewall
by using a known address associated with the firewall, in order to "update" an unsecure host with false information. This
kind of attack is usually not directed to the firewall, and so the likeliness that the firewall will of detecting this is
very low for "normal" or "selective multicast" mode, and high for "promiscuous" or "all-multicast" mode. Whether to log this
event is controlled by the NDSettings:NDValidation setting.
2.32.56. [ID: 1160] IPv6 DNS was discovered
- Log Categories
- NDP
- Log Message
- IPv6 DNS was discovered.
- Default Log Severity
- Notice
- Parameters
- ip, iface
- Explanation
- IPv6 DNS has been discovered on the interface.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.32.57. [ID: 1136] IPv6 DNS has expired
- Log Categories
- NDP
- Log Message
- IPv6 DNS has expired.
- Default Log Severity
- Notice
- Parameters
- ip, iface
- Explanation
- IPv6 DNS has expired.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.32.58. [ID: 1139] Generated IPv6 address appear to be occupied
- Log Categories
- NDP
- Log Message
- Generated IPv6 address appear to be occupied.
- Default Log Severity
- Warning
- Parameters
- ip, iface
- Explanation
- Generated IPv6 address appear to be occupied.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- This could mean that there is identical hardware on the network since IP is generated based on MAC.
2.32.59. [ID: 1134] No routers were discovered
- Log Categories
- NDP
- Log Message
- No routers were discovered.
- Default Log Severity
- Warning
- Parameters
- iface
- Explanation
- No router advertisements were received.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.32.60. [ID: 1159] IPv6 prefix was discovered
- Log Categories
- NDP
- Log Message
- IPv6 prefix was discovered.
- Default Log Severity
- Notice
- Parameters
- network, iface
- Explanation
- IPv6 prefix has been discovered on the interface.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.32.61. [ID: 1151] IPv6 prefix has expired
- Log Categories
- NDP
- Log Message
- IPv6 prefix has expired.
- Default Log Severity
- Notice
- Parameters
- network, iface
- Explanation
- IPv6 prefix has expired.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.32.62. [ID: 1284] IPv6 prefix preferred lifetime exceeds valid[...]
- Log Categories
- NDP
- Log Message
- IPv6 prefix preferred lifetime exceeds valid lifetime.
- Default Log Severity
- Notice
- Parameters
- network, iface
- Explanation
- IPv6 prefix preferred lifetime exceeds valid lifetime.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- None
2.32.63. [ID: 1138] Router was discovered
- Log Categories
- NDP
- Log Message
- Router was discovered.
- Default Log Severity
- Notice
- Parameters
- ip, iface
- Explanation
- IPv6 router has been discovered on the interface.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.32.64. [ID: 1142] IPv6 router has expired
- Log Categories
- NDP
- Log Message
- IPv6 router has expired.
- Default Log Severity
- Notice
- Parameters
- ip, iface
- Explanation
- IPv6 router has expired.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
These log messages refer to the NETCON category.
2.33.1. [ID: 588] Netcon CLI instance closed
- Log Categories
- NETCON
- Log Message
- Netcon CLI instance closed.
- Default Log Severity
- Information
- Parameters
- ip, port
- Explanation
- The Netcon CLI session was closed.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.33.2. [ID: 305] Netcon CLI instance failed
- Log Categories
- NETCON
- Log Message
- Netcon CLI instance failed.
- Default Log Severity
- Error
- Parameters
- ip, port
- Explanation
- The Netcon CLI session could not be started.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.33.3. [ID: 620] Too many Netcon CLI instances
- Log Categories
- NETCON
- Log Message
- Too many Netcon CLI instances.
- Default Log Severity
- Notice
- Parameters
- ip, port
- Explanation
- The Netcon CLI session was denied because the maximum number of open sessions was reached.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.33.4. [ID: 501] Netcon CLI instance started
- Log Categories
- NETCON
- Log Message
- Netcon CLI instance started.
- Default Log Severity
- Information
- Parameters
- ip, port
- Explanation
- The Netcon CLI session was started.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.33.5. [ID: 608] Failed to open file for writing
- Log Categories
- NETCON
- Log Message
- Failed to open file for writing.
- Default Log Severity
- Error
- Parameters
- file, ip, port
- Explanation
- The file could not be upploaded because the target file could not be opened for writing.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.33.6. [ID: 346] New Netcon connection
- Log Categories
- NETCON
- Log Message
- New Netcon connection.
- Default Log Severity
- Notice
- Parameters
- ip, port
- Explanation
- The Netcon connection was opened.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.33.7. [ID: 243] Disconnecting Netcon peer
- Log Categories
- NETCON
- Log Message
- Disconnecting Netcon peer.
- Default Log Severity
- Notice
- Parameters
- ip, port
- Explanation
- The Netcon connection was closed.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.33.8. [ID: 539] Uploaded file could not be written to disk
- Log Categories
- NETCON,SYSTEM
- Log Message
- Uploaded file could not be written to disk.
- Default Log Severity
- Error
- Parameters
- file
- Explanation
- The file could not be uploaded because the target file could not be written to disk.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.33.9. [ID: 480] File transfer to host completed
- Log Categories
- NETCON
- Log Message
- File transfer to host completed.
- Default Log Severity
- Information
- Parameters
- file, filesize, ip, port
- Explanation
- The file was downloaded successfully.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.33.10. [ID: 349] File download requested by host failed
- Log Categories
- NETCON
- Log Message
- File download requested by host failed.
- Default Log Severity
- Error
- Parameters
- file, ip, port
- Explanation
- The file could not be downloaded over Netcon.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.33.11. [ID: 160] Could not open requested file
- Log Categories
- NETCON
- Log Message
- Could not open requested file.
- Default Log Severity
- Error
- Parameters
- file, ip, port
- Explanation
- The file could not be downloaded over Netcon because the file could not be opened.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.33.12. [ID: 201] File transfer to host started
- Log Categories
- NETCON
- Log Message
- File transfer to host started.
- Default Log Severity
- Information
- Parameters
- file, filesize, ip, port
- Explanation
- The file download over Netcon has been started.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.33.13. [ID: 550] File cannot be received since too many Netcon[...]
- Log Categories
- NETCON
- Log Message
- File cannot be received since too many Netcon peers are transferring files simultaneously.
- Default Log Severity
- Warning
- Parameters
- file, ip, port
- Explanation
- The file could not be uploaded over Netcon because the maximum number of simultanous file transfers was reached.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.33.14. [ID: 152] File cannot be sent since too many Netcon[...]
- Log Categories
- NETCON
- Log Message
- File cannot be sent since too many Netcon peers are transferring files simultaneously.
- Default Log Severity
- Warning
- Parameters
- file, ip, port
- Explanation
- The file could not be downloaded over Netcon because the maximum number of simultanous file transfers was reached.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.33.15. [ID: 112] Receiving file from host
- Log Categories
- NETCON
- Log Message
- Receiving file from host.
- Default Log Severity
- Information
- Parameters
- file, filesize, ip, port
- Explanation
- The file upload has been started.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.33.16. [ID: 1721] Invalid file name
- Log Categories
- NETCON
- Log Message
- Invalid file name.
- Default Log Severity
- Error
- Parameters
- file, ip, port
- Explanation
- The name of the file to upload did not specify a valid path.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.33.17. [ID: 441] A listening socket for Netcon could not be[...]
- Log Categories
- NETCON
- Log Message
- A listening socket for Netcon could not be set up.
- Default Log Severity
- Critical
- Parameters
- ip, port
- Explanation
- The socket for incomming Netcon connectins could not be set up during intitialization.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.33.18. [ID: 137] Netcon logger instance closed
- Log Categories
- NETCON
- Log Message
- Netcon logger instance closed.
- Default Log Severity
- Information
- Parameters
- ip, port
- Explanation
- The Netcon logger session was closed.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.33.19. [ID: 544] Netcon logger instance failed
- Log Categories
- NETCON
- Log Message
- Netcon logger instance failed.
- Default Log Severity
- Error
- Parameters
- ip, port
- Explanation
- The Netcon logger session could not be started.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.33.20. [ID: 368] Netcon logger instance started
- Log Categories
- NETCON
- Log Message
- Netcon logger instance started.
- Default Log Severity
- Information
- Parameters
- ip, port
- Explanation
- The Netcon logger session was started.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.33.21. [ID: 1731] Netcon login failed
- Log Categories
- NETCON
- Log Message
- Netcon login failed.
- Default Log Severity
- Notice
- Parameters
- ip, port
- Explanation
- A Netcon connection could not be logged in to the system due to an internal error.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.33.22. [ID: 1724] Netcon logout failed
- Log Categories
- NETCON
- Log Message
- Netcon logout failed.
- Default Log Severity
- Notice
- Parameters
- ip, port
- Explanation
- A Netcon connection could not be logged out from the system due to an internal error.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.33.23. [ID: 138] Insufficient RAM to start CLI session
- Log Categories
- NETCON,SYSTEM
- Log Message
- Insufficient RAM to start CLI session.
- Default Log Severity
- Error
- Parameters
-
- Explanation
- There was not enough free RAM to start a Netcon CLI session.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- None
2.33.24. [ID: 116] Insufficient RAM to initialize Netcon
- Log Categories
- NETCON,SYSTEM
- Log Message
- Insufficient RAM to initialize Netcon.
- Default Log Severity
- Critical
- Parameters
-
- Explanation
- There was not enough free RAM to start the Netcon service.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- None
2.33.25. [ID: 1732] Failed to validate Netcon proposal
- Log Categories
- NETCON
- Log Message
- Failed to validate Netcon proposal.
- Default Log Severity
- Error
- Parameters
- ip, port
- Explanation
- Netcon connection was denied due to issue(s) in the proposal.
- Gateway Action
- Deny
- Action Description
- None
- Proposed Action
- Ensure that the connecting peer is using supported client software and the correct key.
2.33.26. [ID: 502] File upload aborted by host
- Log Categories
- NETCON
- Log Message
- File upload aborted by host.
- Default Log Severity
- Information
- Parameters
- file, ip, port
- Explanation
- The file upload over Netcon was aborted.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.33.27. [ID: 255] File upload completed successfully
- Log Categories
- NETCON
- Log Message
- File upload completed successfully.
- Default Log Severity
- Information
- Parameters
- file, filesize, ip, port
- Explanation
- The file was successfully uploaded over Netcon.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.33.28. [ID: 542] File upload from host failed
- Log Categories
- NETCON
- Log Message
- File upload from host failed.
- Default Log Severity
- Error
- Parameters
- file, ip, port, reason
- Explanation
- The file upload over Netcon failed.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- None
These log messages refer to the OSPF category.
2.34.1. [ID: 848] Unable to send ACK
- Log Categories
- OSPF
- Log Message
- Unable to send ACK.
- Default Log Severity
- Critical
- Parameters
- recviface, rule
- Explanation
- Unable to send acknowledgment.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.34.2. [ID: 870] Failed to add route
- Log Categories
- OSPF
- Log Message
- Failed to add route.
- Default Log Severity
- Critical
- Parameters
- iprange, rule
- Explanation
- The OSPF process could not create a new route with range iprange. This is probably a result of not having enough free memory.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check memory consumption.
2.34.3. [ID: 861] Bad area
- Log Categories
- OSPF
- Log Message
- Bad area.
- Default Log Severity
- Warning
- Parameters
- area, iface, rule
- Explanation
- The received OSPF data was from a neighboring router within an area which does not match the area of the receive iface.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Make sure all locally attached OSPF routers are in the same area as the attaching interfaces.
2.34.4. [ID: 867] Authentication failed due to bad crypto digest
- Log Categories
- OSPF
- Log Message
- Authentication failed due to bad crypto digest.
- Default Log Severity
- Warning
- Parameters
- neighborid, iface, rule
- Explanation
- Authentication failed due to bad crypto digest.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Verify that the neighbor OSPF router neighborid connected on interface iface share the same crypto digest.
2.34.5. [ID: 851] Authentication failed due to bad crypto key[...]
- Log Categories
- OSPF
- Log Message
- Authentication failed due to bad crypto key ids.
- Default Log Severity
- Warning
- Parameters
- id, recvid, neighborid, iface, rule
- Explanation
- Authentication failed due to bad crypto key ids. The crypto id id, used by interface iface does not match the received crypto id recvid from neighbor neighborid.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Verify that the neighboring OSPF router share the same crypto key id.
2.34.6. [ID: 824] Bad authentication password
- Log Categories
- OSPF
- Log Message
- Bad authentication password.
- Default Log Severity
- Warning
- Parameters
- neighborid, iface, rule
- Explanation
- Authentication failed due to bad password. The authentication password used by interface iface does not match the password from neighbor neighborid.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Verify that the neighboring OSPF router share the same password.
2.34.7. [ID: 814] Authentication failed since received crypto[...]
- Log Categories
- OSPF
- Log Message
- Authentication failed since received crypto sequence number too low.
- Default Log Severity
- Warning
- Parameters
- seqno, recvseqno, neighborid, recviface, rule
- Explanation
- Authentication failed since the received crypto sequence number is too low.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.34.8. [ID: 854] Authentication type mismatch with neighbor[...]
- Log Categories
- OSPF
- Log Message
- Authentication type mismatch with neighbor router.
- Default Log Severity
- Warning
- Parameters
- auth, recvauth, neighborid, recviface, rule
- Explanation
- The authentication type on this and the neighboring OSPF router does not match.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Verify that the neighboring OSPF router have the same authentication type.
2.34.9. [ID: 855] Received OSPF packet with bad length
- Log Categories
- OSPF
- Log Message
- Received OSPF packet with bad length.
- Default Log Severity
- Warning
- Parameters
- len, iplen, type, rule
- Explanation
- The received OSPF packet had a bad length. The OSPF packet type was type, the packet IP length was iplen and the OSPF data length was len.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Verify that neighboring routers are correctly configured.
2.34.10. [ID: 868] Checksum error
- Log Categories
- OSPF
- Log Message
- Checksum error.
- Default Log Severity
- Warning
- Parameters
- chksum, recvchksum, neighborid, recviface, rule
- Explanation
- The received OSPF data had a bad checksum.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Check network equipment for problems.
2.34.11. [ID: 836] Neighbor implied AS-EXT on stub area
- Log Categories
- OSPF
- Log Message
- Neighbor implied AS-EXT on stub area.
- Default Log Severity
- Warning
- Parameters
- neighborid, rule
- Explanation
- A neighbor illegally implied AS-EXT on a stub area.
- Gateway Action
- Abort
- Action Description
- The current DD exchange is aborted and restarted
- Proposed Action
- Check the configuration on the neighboring OSPF router.
2.34.12. [ID: 856] Received LSA with bad max-age value
- Log Categories
- OSPF
- Log Message
- Received LSA with bad max-age value.
- Default Log Severity
- Warning
- Parameters
- neighborid, maxage, recvmaxage, rule
- Explanation
- Received LSA with bad max-age value.
- Gateway Action
- Abort
- Action Description
- The current DD exchange is aborted and restarted
- Proposed Action
- Check the configuration on the neighboring OSPF router.
2.34.13. [ID: 876] Received LSA with bad sequence number
- Log Categories
- OSPF
- Log Message
- Received LSA with bad sequence number.
- Default Log Severity
- Warning
- Parameters
- neighborid, seqno, rule
- Explanation
- The received LSA had a bad sequence number.
- Gateway Action
- Abort
- Action Description
- The current DD exchange is aborted and restarted
- Proposed Action
- None
2.34.14. [ID: 826] Neighbor replied with unexpected sequence[...]
- Log Categories
- OSPF
- Log Message
- Neighbor replied with unexpected sequence number.
- Default Log Severity
- Warning
- Parameters
- neighborid, recviface, rule
- Explanation
- The system received a DD exchange packet with an unexpected sequence number.
- Gateway Action
- Abort
- Action Description
- The current DD exchange is aborted and restarted
- Proposed Action
- None
2.34.15. [ID: 837] Neighbor DD packet has too high MTU
- Log Categories
- OSPF
- Log Message
- Neighbor DD packet has too high MTU.
- Default Log Severity
- Warning
- Parameters
- neighborid, mtu, recvmtu, recviface, rule
- Explanation
- The MTU in the received DD packet was too high. The MTU recvmtu in the data received on interface recviface from neighbor neighborid is higher than the MTU on the receive interface.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Lower the MTU on the neighboring OSPF router.
2.34.16. [ID: 825] Neighbor sent non-duplicate in wrong state
- Log Categories
- OSPF
- Log Message
- Neighbor sent non-duplicate in wrong state.
- Default Log Severity
- Warning
- Parameters
- neighborid, recviface, rule
- Explanation
- The system received a non-duplicate DD from a neighbor in a higher state than exchange.
- Gateway Action
- Abort
- Action Description
- The current DD exchange is aborted and restarted
- Proposed Action
- None
2.34.17. [ID: 871] Neighbor changed options during exchange phase
- Log Categories
- OSPF
- Log Message
- Neighbor changed options during exchange phase.
- Default Log Severity
- Warning
- Parameters
- neighborid, rule
- Explanation
- The system received a DD exchange packet indicating that the neighbor had changed options during the exchange.
- Gateway Action
- Abort
- Action Description
- The current DD exchange is aborted and restarted
- Proposed Action
- None
2.34.18. [ID: 815] Unknown LSA type
- Log Categories
- OSPF
- Log Message
- Unknown LSA type.
- Default Log Severity
- Warning
- Parameters
- neighborid, type, rule
- Explanation
- A neighbor described an unknown LSA type.
- Gateway Action
- Abort
- Action Description
- The current DD exchange is aborted and restarted
- Proposed Action
- Check the configuration on the neighboring OSPF router.
2.34.19. [ID: 835] Neighbor misused the I-flag
- Log Categories
- OSPF
- Log Message
- Neighbor misused the I-flag.
- Default Log Severity
- Warning
- Parameters
- neighborid, recviface, rule
- Explanation
- The system received a DD exchange packet in which the I-flag was set.
- Gateway Action
- Abort
- Action Description
- The current DD exchange is aborted and restarted
- Proposed Action
- None
2.34.20. [ID: 845] Neighbor M-MS mismatch
- Log Categories
- OSPF
- Log Message
- Neighbor M-MS mismatch.
- Default Log Severity
- Warning
- Parameters
- neighborid, recviface, rule
- Explanation
- The system received a DD exchange packet indicating that the neighbor got the M/MS (master/slave) role wrong.
- Gateway Action
- Abort
- Action Description
- The current DD exchange is aborted and restarted
- Proposed Action
- None
2.34.21. [ID: 853] Generic event
- Log Categories
- OSPF
- Log Message
- Generic event.
- Default Log Severity
- Debug
- Parameters
- type, loglevel, reason, rule
- Explanation
- A DDesc debug log event of level loglevel occurred. The event is described in the parameter reason. This log event can be enabled/disabled by configuring the OSPF process config object.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.34.22. [ID: 830] Generic event
- Log Categories
- OSPF
- Log Message
- Generic event.
- Default Log Severity
- Debug
- Parameters
- type, loglevel, reason, rule
- Explanation
- A EXCHANGE debug log event of level loglevel occurred. The event is described in the parameter reason. This log event can be enabled/disabled by configuring the OSPF process config object.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.34.23. [ID: 874] Cannot map PTP neighbor to local IP
- Log Categories
- OSPF
- Log Message
- Cannot map PTP neighbor to local IP.
- Default Log Severity
- Warning
- Parameters
- neighborid, ip, iface, rule
- Explanation
- Unable to map a configured PTP neighbor to the local IP at HA fail over.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check OSPF interface configuration.
2.34.24. [ID: 823] Generic event
- Log Categories
- OSPF
- Log Message
- Generic event.
- Default Log Severity
- Debug
- Parameters
- type, loglevel, reason, rule
- Explanation
- A HELLO debug log event of level loglevel occurred. The event is described in the parameter reason. This log event can be enabled/disabled by configuring the OSPF process config object.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.34.25. [ID: 817] Hello packet E-flag mismatch
- Log Categories
- OSPF
- Log Message
- Hello packet E-flag mismatch.
- Default Log Severity
- Warning
- Parameters
- flag, recvflag, iface, rule
- Explanation
- Received a HELLO packet on interface iface, which had a mismatching E-flag configuration. The system uses E-flag value flag which does not match the received flag recvflag. The E-Flag describes how AS-external-LSAs are flooded.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Check that all locally attached OSPF routers share the same E-flag configuration.
2.34.26. [ID: 832] Hello packet N-flag and E-flags are both set[...]
- Log Categories
- OSPF
- Log Message
- Hello packet N-flag and E-flags are both set which is illegal.
- Default Log Severity
- Warning
- Parameters
- iface, rule
- Explanation
- Received a HELLO packet on interface iface which has both the N and E flags set. This is illegal.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the configuration on the neighboring router.
2.34.27. [ID: 872] Hello packet interval mismatch
- Log Categories
- OSPF
- Log Message
- Hello packet interval mismatch.
- Default Log Severity
- Warning
- Parameters
- interval, recvinterval, iface, rule
- Explanation
- The HELLO interval property in the received HELLO packet, recvinterval does not match the HELLO interval configured on iface.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Check that all locally attached OSPF routers have the same hello interval.
2.34.28. [ID: 834] Hello packet N-flag mismatch
- Log Categories
- OSPF
- Log Message
- Hello packet N-flag mismatch.
- Default Log Severity
- Warning
- Parameters
- flag, recvflag, iface, rule
- Explanation
- Received a HELLO packet on interface iface, which had a mismatching N-flag configuration. The N-flag describes NSSA details.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Check that all locally attached OSPF routers share the same N-flag configuration.
2.34.29. [ID: 839] Hello packet netmask mismatch
- Log Categories
- OSPF
- Log Message
- Hello packet netmask mismatch.
- Default Log Severity
- Warning
- Parameters
- netmask, recvnetmask, iface, rule
- Explanation
- A OSPF data packet from a neighboring router had a network netmask recvnetmask, that differed from the netmask on the receive iface.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Verify that locally attached OSPF routers have the same netmask as the attaching interfaces.
2.34.30. [ID: 875] Hello packet router dead interval mismatch
- Log Categories
- OSPF
- Log Message
- Hello packet router dead interval mismatch.
- Default Log Severity
- Warning
- Parameters
- interval, recvinterval, iface, rule
- Explanation
- Received a HELLO packet which had a mismatching router dead interval. The interval configured on interface iface does not match the received interval, recvinterval.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Check that all locally attached OSPF routers have the same router dead interval.
2.34.31. [ID: 852] LSA internal checksum error
- Log Categories
- OSPF
- Log Message
- LSA internal checksum error.
- Default Log Severity
- Critical
- Parameters
- rule
- Explanation
- Internal LSA checksum error.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Restart the OSPF subsystem.
2.34.32. [ID: 865] Got ACK for mismatched LSA
- Log Categories
- OSPF
- Log Message
- Got ACK for mismatched LSA.
- Default Log Severity
- Warning
- Parameters
- type, lsaid, lsartr, rule
- Explanation
- Received acknowledge for mismatched LSA.
- Gateway Action
- Ignore
- Action Description
- The acknowledgment is ignored
- Proposed Action
- None
2.34.33. [ID: 864] Received AS-EXT LSA on stub
- Log Categories
- OSPF
- Log Message
- Received AS-EXT LSA on stub.
- Default Log Severity
- Warning
- Parameters
- neighborid, rule
- Explanation
- An AS external LSA was received which is illegal on a stub area.
- Gateway Action
- Discard
- Action Description
- The LSA was discarded
- Proposed Action
- None
2.34.34. [ID: 843] Received LSA with bad checksum
- Log Categories
- OSPF
- Log Message
- Received LSA with bad checksum.
- Default Log Severity
- Warning
- Parameters
- neighborid, rule
- Explanation
- The received LSA had an incorrect checksum.
- Gateway Action
- Discard
- Action Description
- The LSA was discarded
- Proposed Action
- Check network equipment for problems.
2.34.35. [ID: 840] Bad LSA sequence number
- Log Categories
- OSPF
- Log Message
- Bad LSA sequence number.
- Default Log Severity
- Warning
- Parameters
- neighborid, maxage, recvmaxage, rule
- Explanation
- A LSA with a bad max age was received.
- Gateway Action
- Discard
- Action Description
- The LSA was discarded
- Proposed Action
- None
2.34.36. [ID: 846] Bad LSA sequence number
- Log Categories
- OSPF
- Log Message
- Bad LSA sequence number.
- Default Log Severity
- Warning
- Parameters
- neighborid, seqno, rule
- Explanation
- The received LSA had a bad sequence number.
- Gateway Action
- Discard
- Action Description
- The LSA was discarded
- Proposed Action
- None
2.34.37. [ID: 819] Generic event
- Log Categories
- OSPF
- Log Message
- Generic event.
- Default Log Severity
- Debug
- Parameters
- type, loglevel, reason, rule
- Explanation
- A LSA debug log event of level loglevel occurred. The event is described in the parameter reason. This log event can be enabled/disabled by configuring the OSPF process config object.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.34.38. [ID: 857] Failed to prepare replacement LSA
- Log Categories
- OSPF
- Log Message
- Failed to prepare replacement LSA.
- Default Log Severity
- Critical
- Parameters
- type, lsaid, lsartr, rule
- Explanation
- Failed to create the LSA replacement for the existing LSA with id lsaid, type type and originating router lsartr.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.34.39. [ID: 863] Received LSA is older then DB copy
- Log Categories
- OSPF
- Log Message
- Received LSA is older then DB copy.
- Default Log Severity
- Warning
- Parameters
- type, lsaid, lsartr, rule
- Explanation
- The received LSA is older than the copy already in the database.
- Gateway Action
- Discard
- Action Description
- The received LSA will be discarded
- Proposed Action
- None
2.34.40. [ID: 827] REQ packet LSA size mismatch
- Log Categories
- OSPF
- Log Message
- REQ packet LSA size mismatch.
- Default Log Severity
- Warning
- Parameters
- rule
- Explanation
- The received OSPF REQ packet had a mismatching LSA size.
- Gateway Action
- Abort
- Action Description
- Parsing aborted
- Proposed Action
- None
2.34.41. [ID: 842] ACK packet LSA size mismatch
- Log Categories
- OSPF
- Log Message
- ACK packet LSA size mismatch.
- Default Log Severity
- Warning
- Parameters
- recviface, rule
- Explanation
- ACK packet LSA size mismatch.
- Gateway Action
- Abort
- Action Description
- Parsing aborted
- Proposed Action
- None
2.34.42. [ID: 821] Requested LSA size too large
- Log Categories
- OSPF
- Log Message
- Requested LSA size too large.
- Default Log Severity
- Warning
- Parameters
- size, rule
- Explanation
- Unable to create LSA since the size is too large.
- Gateway Action
- Abort
- Action Description
- Unable to create LSA
- Proposed Action
- None
2.34.43. [ID: 828] Received selforiginated LSA for unknown type
- Log Categories
- OSPF
- Log Message
- Received selforiginated LSA for unknown type.
- Default Log Severity
- Warning
- Parameters
- type, rule
- Explanation
- Received selforiginated LSA of unknown type.
- Gateway Action
- Drop
- Action Description
- The LSA will be flushed
- Proposed Action
- None
2.34.44. [ID: 858] UPD packet LSA size mismatch
- Log Categories
- OSPF
- Log Message
- UPD packet LSA size mismatch.
- Default Log Severity
- Warning
- Parameters
- rule
- Explanation
- The received OSPF UPD packet had a mismatching LSA size.
- Gateway Action
- Abort
- Action Description
- Parsing aborted
- Proposed Action
- None
2.34.45. [ID: 1442] Received malformed packet
- Log Categories
- OSPF
- Log Message
- Received malformed packet.
- Default Log Severity
- Warning
- Parameters
- neighborid, type, rule
- Explanation
- Received malformed OSPF packet. The OSPF packet was received from neighborid and were of the type type.
- Gateway Action
- Discard
- Action Description
- None
- Proposed Action
- Verify that neighboring routers are correctly configured.
2.34.46. [ID: 822] Unable to find VLINK transport area
- Log Categories
- OSPF
- Log Message
- Unable to find VLINK transport area.
- Default Log Severity
- Warning
- Parameters
- area, vlink, rule
- Explanation
- Unable to find transport area for the VLINK.
- Gateway Action
- Skip
- Action Description
- Interface is not included in router LSA
- Proposed Action
- Verify the configuration of the OSPF area.
2.34.47. [ID: 831] Neighbor died
- Log Categories
- OSPF
- Log Message
- Neighbor died.
- Default Log Severity
- Warning
- Parameters
- neighborid, iface, rule
- Explanation
- Lost connectivity with neighbor router.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check neighbor status and connectivity.
2.34.48. [ID: 820] AS disabled due to failed memory allocation
- Log Categories
- OSPF
- Log Message
- AS disabled due to failed memory allocation.
- Default Log Severity
- Critical
- Parameters
- rule
- Explanation
- An OSPF AS has been disabled due to memory allocation failure.
- Gateway Action
- Disable
- Action Description
- None
- Proposed Action
- Check memory consumption.
2.34.49. [ID: 850] Unable to allocate memory for LSA
- Log Categories
- OSPF
- Log Message
- Unable to allocate memory for LSA.
- Default Log Severity
- Critical
- Parameters
- rule
- Explanation
- The OSPF subsystem was unable to allocate additional memory needed for storing LSA information. The internal states of the
OSPF process might now not correspond to what the neighboring routers expect.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The OSPF subsystem is out of memory. Try increasing the amount of memory used by OSPF and/or modify the network topology surrounding
this OSPF router.
2.34.50. [ID: 866] Unable to allocate memory for LSA link states
- Log Categories
- OSPF
- Log Message
- Unable to allocate memory for LSA link states.
- Default Log Severity
- Critical
- Parameters
- rule
- Explanation
- The OSPF subsystem was unable to allocate additional memory needed for storing LSA information. The internal states of the
OSPF process might now not correspond to what the neighboring routers expect.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The OSPF subsystem is out of memory. Try increasing the amount of memory used by OSPF and/or modify the network topology surrounding
this OSPF router.
2.34.51. [ID: 841] Unable to allocate memory for LSA shell states
- Log Categories
- OSPF
- Log Message
- Unable to allocate memory for LSA shell states.
- Default Log Severity
- Critical
- Parameters
- rule
- Explanation
- The OSPF subsystem was unable to allocate additional memory needed for storing LSA information. The internal states of the
OSPF process might now not correspond to what the neighboring routers expect.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The OSPF subsystem is out of memory. Try increasing the amount of memory used by OSPF and/or modify the network topology surrounding
this OSPF router.
2.34.52. [ID: 873] Unable to allocate memory for router neighbor[...]
- Log Categories
- OSPF
- Log Message
- Unable to allocate memory for router neighbor states.
- Default Log Severity
- Critical
- Parameters
- rule
- Explanation
- The OSPF subsystem was unable to allocate additional memory needed for storing neighbor information. The internal states of
the OSPF process might now not correspond to the what the neighboring routers expect.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The OSPF subsystem is out of memory. Try increasing the amount of memory used by OSPF and/or modify the network topology surrounding
this OSPF router.
2.34.53. [ID: 829] Unable to allocate memory for SPF vertex[...]
- Log Categories
- OSPF
- Log Message
- Unable to allocate memory for SPF vertex states.
- Default Log Severity
- Critical
- Parameters
- rule
- Explanation
- The OSPF subsystem was unable to allocate additional memory needed for storing SPF vertex information. The internal states
of the OSPF process might now not correspond to the what the neighboring routers expect.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The OSPF subsystem is out of memory. Try increasing the amount of memory used by OSPF and/or modify the network topology surrounding
this OSPF router.
2.34.54. [ID: 818] Generic event
- Log Categories
- OSPF
- Log Message
- Generic event.
- Default Log Severity
- Debug
- Parameters
- type, loglevel, reason, rule
- Explanation
- A packet debug log event of level loglevel occurred. The event is described in the parameter reason. This log event can be enabled/disabled by configuring the OSPF process config object.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.34.55. [ID: 859] Generic event
- Log Categories
- OSPF
- Log Message
- Generic event.
- Default Log Severity
- Debug
- Parameters
- type, loglevel, reason, rule
- Explanation
- A route debug log event of level loglevel occurred. The event is described in the parameter reason. This log event can be enabled/disabled by configuring the OSPF process config object.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.34.56. [ID: 1053] Received Router LSA which contains mismatched[...]
- Log Categories
- OSPF
- Log Message
- Received Router LSA which contains mismatched Link State ID and Advertising Router.
- Default Log Severity
- Warning
- Parameters
- lsaid, lsartr, rule
- Explanation
- None
- Gateway Action
- Discard
- Action Description
- None
- Proposed Action
- None
2.34.57. [ID: 838] Generic event
- Log Categories
- OSPF
- Log Message
- Generic event.
- Default Log Severity
- Debug
- Parameters
- type, loglevel, reason, rule
- Explanation
- A SPF debug log event of level loglevel occurred. The event is described in the parameter reason. This log event can be enabled/disabled by configuring the OSPF process config object.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.34.58. [ID: 833] Unable to send data on interface
- Log Categories
- OSPF
- Log Message
- Unable to send data on interface.
- Default Log Severity
- Warning
- Parameters
- destip, iface, rule
- Explanation
- The interface iface could not send data to the specified address destip.
- Gateway Action
- None
- Action Description
-
- Proposed Action
- Verify that the interface is up and running and that is has link.
2.34.59. [ID: 849] Sender source IP not in interface range
- Log Categories
- OSPF
- Log Message
- Sender source IP not in interface range.
- Default Log Severity
- Warning
- Parameters
- srcip, iprange, iface, rule
- Explanation
- The source IP (srcip) on the received OSPF data is not within the receive interface iface range iprange.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Verify that all locally attached OSPF routes are on the same network.
2.34.60. [ID: 869] Too many neighbors on interface
- Log Categories
- OSPF
- Log Message
- Too many neighbors on interface.
- Default Log Severity
- Warning
- Parameters
- iface, rule
- Explanation
- There are too many OSPF routers on a directly connected network. Unable to maintain 2-way with all of them(hello packet).
- Gateway Action
- Skip
- Action Description
- Some neighbors are skipped and are not described in outgoing HELLO packets
- Proposed Action
- Reduce the number of OSPF routers on the network.
2.34.61. [ID: 862] Unknown LSA type
- Log Categories
- OSPF
- Log Message
- Unknown LSA type.
- Default Log Severity
- Warning
- Parameters
- neighborid, type, rule
- Explanation
- The received LSA was of unknown type.
- Gateway Action
- Discard
- Action Description
- The LSA was discarded
- Proposed Action
- Check the configuration on the neighboring OSPF router.
2.34.62. [ID: 860] Unknown neighbor
- Log Categories
- OSPF
- Log Message
- Unknown neighbor.
- Default Log Severity
- Warning
- Parameters
- neighborid, neighborip, iface, rule
- Explanation
- Unknown neighbor seen on PTP based interface.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify the configuration on the neighboring OSPF router.
2.34.63. [ID: 816] Unknown OSPF packet type
- Log Categories
- OSPF
- Log Message
- Unknown OSPF packet type.
- Default Log Severity
- Warning
- Parameters
- type, recviface, rule
- Explanation
- The received OSPF data was of an unknown type.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Check the configuration on the neighboring router.
2.34.64. [ID: 847] Packet version is not OSPFv2
- Log Categories
- OSPF
- Log Message
- Packet version is not OSPFv2.
- Default Log Severity
- Warning
- Parameters
- version, rule
- Explanation
- Packet version is not OSPFv2.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
These log messages refer to the PIPES category.
2.35.1. [ID: 1393] Out of non-uniform memory
- Log Categories
- PIPES,SYSTEM
- Log Message
- Out of non-uniform memory.
- Default Log Severity
- Alert
- Parameters
- pipe, memusageinactive, memusageactive, numinactive, numactive
- Explanation
- The system was running out of memory needed to honor the traffic shaping policy, likely due to a high number of groups becoming
active. Groups that were already active would continue functioning according to policy, but traffic belonging to new groups
was instead erroneously forwarded as non-grouped traffic.
- Gateway Action
- Ignore
- Action Description
- The system was running out of memory needed for traffic shaping. Traffic that should have been forwarded per group basis was
instead erroneously forwarded as non-grouped traffic
- Proposed Action
- Investigate why the system is low on RAM, though in this particular case it should be obvious that memory was used up by traffic
shaping. Complex configurations with many priority levels require more memory. Every active group will consume additional
memory, and inactive groups are allowed to keep memory during a grace period. The setting TrafficMgmtSettings:MaxPipesMemUsage can be decreased in order to limit the number of active groups. Also consider adjusting the configuration to lower the maximum
number of groups handled by traffic shaping, either by narrowing down the traffic that is grouped or by modifying the grouping
parameter. Note that the cost of each group is amplified by the number of precedence levels enabled by the pipe; try to make
the best use of the PrecedenceMin and PrecedenceMax parameters. Static group limits (such as UserLimitBpsTotal) also increase
the cost per group.
2.35.2. [ID: 1396] No longer out of non-uniform memory
- Log Categories
- PIPES,SYSTEM
- Log Message
- No longer out of non-uniform memory.
- Default Log Severity
- Information
- Parameters
- pipe, memusageinactive, memusageactive, numinactive, numactive
- Explanation
- The system is no longer out of memory. Traffic is once again forwarded according to traffic shaping policies.
- Gateway Action
- Ignore
- Action Description
- None
- Proposed Action
- None
2.35.3. [ID: 1416] Pipe memory limit reached
- Log Categories
- PIPES,SYSTEM
- Log Message
- Pipe memory limit reached.
- Default Log Severity
- Warning
- Parameters
- pipe, numselected, memusage, memusagelocal, memusageactive, memusageinactive, numactive, numinactive
- Explanation
- The system has reached the memory limit for traffic shaping; some (numselected) active groups of pipe pipe was demoted to inactive state in order to keep within the configured memory limits. Traffic shaping was at this point using
memusage bytes of memory, of which memusagelocal bytes were in use by this particular pipe.
- Gateway Action
- Ignore
- Action Description
- The system has reached the memory limit for traffic shaping. Traffic that should be forwarded per group basis may be erroneously
forwarded as non-grouped traffic
- Proposed Action
- This log message is normally caused by abnormal behavior such as D-DoS attacks or malfunctioning hardware that is flooding
the network with random credentials. In the case where this log is generated by legitimate network conditions, consider adjusting
TrafficMgmtSettings:MaxPipesMemUsage and make sure that statistics-per-group is not enabled by the pipe in question. The system will demote randomly selected
active groups to handle this situation. Note that the cost of each active group is amplified by the number of precedence levels
enabled by the pipe; try to make the best out of the PrecedenceMin and PrecedenceMax parameters. The system will assume that
inactive groups can be ignored with regards to memory consumption. The number of inactive groups is indirectly limited by
the number of flows, as inactive groups are removed when no flows are using them. Inactive groups can therefore be seen as
a property of the flows themselves, and the number of inactive groups can therefore only be decreased either by lowering the
number of open flows, or by configuring the pipes to use a more coarse grouping scheme.
These log messages refer to the PORTMGR category.
2.36.1. [ID: 410] Failed to allocate dynamic port
- Log Categories
- PORTMGR,SYSTEM
- Log Message
- Failed to allocate dynamic port.
- Default Log Severity
- Critical
- Parameters
- localip, destip
- Explanation
- The port manager could not find any available port. All ports for the source and destination IP pair localip-destip are allocated.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- Investigate why all ports for the specified source and destination IP pair are allocated. The specified source IP might be
under a denial-of-service attack.
2.36.2. [ID: 167] Switching to High Load Mode
- Log Categories
- PORTMGR,SYSTEM
- Log Message
- Switching to High Load Mode.
- Default Log Severity
- Warning
- Parameters
- localip, destip
- Explanation
- The port manager state for the specified source and destination IP is heavily used. The port manager switches to High Load
Mode for the specified addresses in order to increase performance.
- Gateway Action
- Adjust
- Action Description
- None
- Proposed Action
- Investigate why there are many flows between the specified source and destination IP. This is a normal condition that occur
in heavily used networks.
2.36.3. [ID: 170] Switching to Low Load Mode
- Log Categories
- PORTMGR,SYSTEM
- Log Message
- Switching to Low Load Mode.
- Default Log Severity
- Notice
- Parameters
- localip, destip
- Explanation
- The port manager state for the specified source and destination IP is returning to normal mode. The port manager switches
to Low Load Mode for the specified addresses in order to free up memory resources.
- Gateway Action
- Adjust
- Action Description
- None
- Proposed Action
- None
2.36.4. [ID: 421] Out of memory when allocating dynamic port
- Log Categories
- PORTMGR,SYSTEM
- Log Message
- Out of memory when allocating dynamic port.
- Default Log Severity
- Alert
- Parameters
- localip, destip
- Explanation
- Memory allocation failed while allocating a dynamic port. The port allocation attempt for the source and destination IP pair
was aborted. The system was out of RAM.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- Investigate why the system is low on RAM. Review the configuration and try to free more RAM.
2.36.5. [ID: 451] Out of memory while switching to High Load[...]
- Log Categories
- PORTMGR,SYSTEM
- Log Message
- Out of memory while switching to High Load Mode.
- Default Log Severity
- Critical
- Parameters
- localip, destip
- Explanation
- The port manager could not switch to High Load Mode for the specified source and destination IP pair since the system is low
on RAM. The IP pair will remain in Low Load Mode with decreased performance.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- Investigate why the system is low on RAM. Review the configuration and try to free more RAM.
2.36.6. [ID: 432] Out of memory initializing port manager
- Log Categories
- PORTMGR,SYSTEM
- Log Message
- Out of memory initializing port manager.
- Default Log Severity
- Critical
- Parameters
-
- Explanation
- There was not enough RAM to allocate a port manager. The port manager is a vital part of the system and is required for Network
Address Translation and managing sockets.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- Investigate why the system is low on RAM. Review the configuration and try to free more RAM.
These log messages refer to the RADIUS category.
2.37.1. [ID: 666] Access-Accept packet received from RADIUS[...]
- Log Categories
- RADIUS
- Log Message
- Access-Accept packet received from RADIUS server.
- Default Log Severity
- Notice
- Parameters
- radiusserver, id
- Explanation
- An Access-Accept packet was received from a RADIUS server.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.37.2. [ID: 1667] Access-Challenge packet received from RADIUS[...]
- Log Categories
- RADIUS
- Log Message
- Access-Challenge packet received from RADIUS server.
- Default Log Severity
- Notice
- Parameters
- radiusserver, id
- Explanation
- An Access-Challenge packet was received from a RADIUS server.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.37.3. [ID: 678] Access-Reject packet received from RADIUS[...]
- Log Categories
- RADIUS
- Log Message
- Access-Reject packet received from RADIUS server.
- Default Log Severity
- Notice
- Parameters
- radiusserver, id
- Explanation
- An Access-Reject packet was received from a RADIUS server.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- If the response was not expected, verify that user name and password as well as RADIUS server shared secret are correct.
2.37.4. [ID: 691] Access-Request packet sent to RADIUS server
- Log Categories
- RADIUS
- Log Message
- Access-Request packet sent to RADIUS server.
- Default Log Severity
- Notice
- Parameters
- user, radiusserver, id
- Explanation
- An Access-Request packet was sent to a RADIUS server.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.37.5. [ID: 771] RADIUS challenge expired
- Log Categories
- RADIUS
- Log Message
- RADIUS challenge expired.
- Default Log Severity
- Warning
- Parameters
- user, radiusserver, id
- Explanation
- The client using RADIUS failed to respond to the challenge within the specified timeout.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify that the timeout, if received from the RADIUS server, is correct.
2.37.6. [ID: 675] Non-responding RADIUS server
- Log Categories
- RADIUS
- Log Message
- Non-responding RADIUS server.
- Default Log Severity
- Warning
- Parameters
- user, radiusserver, id
- Explanation
- A RADIUS server did not answer to a Access Request after sending all configured resends.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify that the RADIUS server configuration is correct.
2.37.7. [ID: 1075] Failed to initiate connection with RADIUS[...]
- Log Categories
- RADIUS
- Log Message
- Failed to initiate connection with RADIUS server.
- Default Log Severity
- Warning
- Parameters
- radiusserver, code
- Explanation
- It was not possible to create a connection to the RADIUS server.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify that the configuration of the connection to the RADIUS server is correct.
2.37.8. [ID: 664] Failed to parse incoming RADIUS packet
- Log Categories
- RADIUS
- Log Message
- Failed to parse incoming RADIUS packet.
- Default Log Severity
- Warning
- Parameters
- pktlen, srcip, radiusserver, id, reason
- Explanation
- Failed to parse an incoming RADIUS packet.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.37.9. [ID: 791] Access-Request packet could not be created
- Log Categories
- RADIUS
- Log Message
- Access-Request packet could not be created.
- Default Log Severity
- Warning
- Parameters
- user, radiusserver, id, value, reason
- Explanation
- An Access-Request packet could not be created and sent to the configured RADIUS server.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify that the authenticating client is configured correctly.
2.37.10. [ID: 683] Access-Request packet could not be sent to[...]
- Log Categories
- RADIUS
- Log Message
- Access-Request packet could not be sent to RADIUS server.
- Default Log Severity
- Warning
- Parameters
- user, radiusserver, id, reason
- Explanation
- An Access-Request packet could not be sent to the configured RADIUS server.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
These log messages refer to the ROUTE category.
2.38.1. [ID: 1064] Monitored host treated as reachable due to[...]
- Log Categories
- ROUTE
- Log Message
- Monitored host treated as reachable due to low latency.
- Default Log Severity
- Notice
- Parameters
- hostip, table, network, gwip, metric, iface
- Explanation
- A monitored host on the route is now considered unreachable due to high latency.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Find and resolve the source of the high latency by checking the connection to the host.
2.38.2. [ID: 1067] Monitored host treated as unreachable due to[...]
- Log Categories
- ROUTE
- Log Message
- Monitored host treated as unreachable due to high latency.
- Default Log Severity
- Notice
- Parameters
- hostip, table, network, gwip, metric, iface
- Explanation
- A monitored host on the route is now considered reachable due to lowered latency.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.38.3. [ID: 1063] Monitored host reachable
- Log Categories
- ROUTE
- Log Message
- Monitored host reachable.
- Default Log Severity
- Notice
- Parameters
- hostip, table, network, gwip, metric, iface
- Explanation
- A monitored host on the route is now reachable (after being unreachable).
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.38.4. [ID: 1066] Monitored host unreachable
- Log Categories
- ROUTE
- Log Message
- Monitored host unreachable.
- Default Log Severity
- Notice
- Parameters
- hostip, table, network, gwip, metric, iface
- Explanation
- A monitored host on the route is now unreachable.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Find and resolve the source of the host being unreachable by checking the connection to the host.
2.38.5. [ID: 1068] Monitored route disabled
- Log Categories
- ROUTE
- Log Message
- Monitored route disabled.
- Default Log Severity
- Error
- Parameters
- table, network, gwip, metric, method, iface
- Explanation
- The monitoring method (method) triggered a monitored route to be disabled.
- Gateway Action
- Disable
- Action Description
- None
- Proposed Action
- Unless the link of the monitored route is actually malfunctioning, check for connectivity problems with the interface and/or
monitored hosts.
2.38.6. [ID: 1065] Monitored route enabled
- Log Categories
- ROUTE
- Log Message
- Monitored route enabled.
- Default Log Severity
- Notice
- Parameters
- table, network, gwip, metric, method, iface
- Explanation
- The monitoring method (method) triggered a monitored route to be enabled.
- Gateway Action
- Enable
- Action Description
- None
- Proposed Action
- None
2.38.7. [ID: 652] Dynamic route added
- Log Categories
- ROUTE
- Log Message
- Dynamic route added.
- Default Log Severity
- Notice
- Parameters
- id, table, network, gwip, metric, originator, iface
- Explanation
- A dynamic route have been added to routing table.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.38.8. [ID: 654] Dynamic route removed
- Log Categories
- ROUTE
- Log Message
- Dynamic route removed.
- Default Log Severity
- Notice
- Parameters
- id, table, network, gwip, metric, originator, iface
- Explanation
- A dynamic route have been removed from routing table.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
These log messages refer to the RULE category.
2.39.1. [ID: 1230] IPC error managing dynamic rules
- Log Categories
- RULE
- Log Message
- IPC error managing dynamic rules.
- Default Log Severity
- Error
- Parameters
- module, error
- Explanation
- An unexpected and, hence, unhandled error occurred while managing dynamic rules. This may result in leaked rules remaining
in the system after they should have been removed or reduced functionality if it was inserting new rules that failed.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The device might need to be manually restarted to get full functionality. This should be reported to the vendor of the device.
2.39.2. [ID: 1240] Dynamic rules leaked
- Log Categories
- RULE
- Log Message
- Dynamic rules leaked.
- Default Log Severity
- Error
- Parameters
- module, count
- Explanation
- The system failed to remove rules that where dynamically set up by the module. Leaking/leaving unwanted dynamic rules in place
is a last resort when all attempts to removed them has failed.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The device might need to be manually restarted to get rid of those unwanted rules. This should be reported to the vendor of
the device.
2.39.3. [ID: 1133] Blacklist rule added
- Log Categories
- RULE,BLACKLIST
- Log Message
- Blacklist rule added.
- Default Log Severity
- Information
- Parameters
- srcip, destip, proto, recviface
- Explanation
- A new blacklist rule has been added.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.39.4. [ID: 1164] Blacklist rule table size set to
- Log Categories
- RULE,BLACKLIST
- Log Message
- Blacklist rule table size set to.
- Default Log Severity
- Information
- Parameters
- size
- Explanation
- Maximum number of simultaneous blacklist entries changed/set to.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.39.5. [ID: 1141] Blacklist rule removed
- Log Categories
- RULE,BLACKLIST
- Log Message
- Blacklist rule removed.
- Default Log Severity
- Information
- Parameters
- srcip, destip, proto, recviface
- Explanation
- A blacklist rule has been removed either because it timed out or because the user manually removed it via the cli.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.39.6. [ID: 1165] Blacklist rule replaced
- Log Categories
- RULE,BLACKLIST
- Log Message
- Blacklist rule replaced.
- Default Log Severity
- Information
- Parameters
- srcip, destip, proto, srcip, destip, proto, recviface, recviface
- Explanation
- Random blacklist rule has been replaced with another rule.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.39.7. [ID: 649] Flow HA sync disallowed by access rule
- Log Categories
- RULE,FLOW,HA
- Log Message
- Flow HA sync disallowed by access rule.
- Default Log Severity
- Notice
- Parameters
- srcip, destip, recviface, matchkey, rule
- Explanation
- The access rules on the inactive HA node did not allow this flow to be installed.
- Gateway Action
- Skip
- Action Description
- None
- Proposed Action
- This event can be caused by having different configurations on the HA nodes. Running a cluster with different configurations
on the nodes is not recommended, consider synchronizing the configurations.
2.39.8. [ID: 643] Flow HA sync failed due to address[...]
- Log Categories
- RULE,FLOW,HA
- Log Message
- Flow HA sync failed due to address translation mismatch.
- Default Log Severity
- Notice
- Parameters
- matchkey, rule
- Explanation
- The flow could not be installed on the inactive node due to that the rules on the inactive node specified different address
translation than the rules on the active node.
- Gateway Action
- Skip
- Action Description
- None
- Proposed Action
- This event can be caused by having different configurations on the HA nodes. Running a cluster with different configurations
on the nodes is not recommended, consider synchronizing the configurations.
2.39.9. [ID: 1150] Flow HA sync disallowed by blacklist rule
- Log Categories
- RULE,FLOW,HA,BLACKLIST
- Log Message
- Flow HA sync disallowed by blacklist rule.
- Default Log Severity
- Notice
- Parameters
- srcip, destip, recviface, matchkey, rule
- Explanation
- The blacklist rules on the inactive HA node did not allow this flow to be installed.
- Gateway Action
- Skip
- Action Description
- None
- Proposed Action
- This event can be caused by having different blacklist rules on the HA nodes. Running a cluster with different blacklist rules
on the nodes is not recommended, consider synchronizing the blacklist rules.
2.39.10. [ID: 1662] Source IP not routed on receive interface
- Log Categories
- RULE,FLOW,HA
- Log Message
- Source IP not routed on receive interface.
- Default Log Severity
- Notice
- Parameters
- srcip, destip, recviface, matchkey, srcroute
- Explanation
- The flow could not be installed on the inactive node due to the source IP of the flow not being routed over the receive interface
of the flow according to the inactive node's configuration.
- Gateway Action
- Skip
- Action Description
- None
- Proposed Action
- This event can be caused by having different configurations on the HA nodes. Running a cluster with different configurations
on the nodes is not recommended, consider synchronizing the configurations.
2.39.11. [ID: 647] Flow HA sync failed due to no route to[...]
- Log Categories
- RULE,FLOW,HA
- Log Message
- Flow HA sync failed due to no route to destination.
- Default Log Severity
- Notice
- Parameters
- destip, iface, matchkey
- Explanation
- The flow could not be installed on the inactive node due to no route to the destination.
- Gateway Action
- Skip
- Action Description
- None
- Proposed Action
- This event can be caused by having different configurations on the HA nodes. Running a cluster with different configurations
on the nodes is not recommended, consider synchronizing the configurations.
2.39.12. [ID: 659] Flow HA sync failed due to no route to source
- Log Categories
- RULE,FLOW,HA
- Log Message
- Flow HA sync failed due to no route to source.
- Default Log Severity
- Notice
- Parameters
- srcip, iface, matchkey
- Explanation
- The flow could not be installed on the inactive node due to no route to the source.
- Gateway Action
- Skip
- Action Description
- None
- Proposed Action
- This event can be caused by having different configurations on the HA nodes. Running a cluster with different configurations
on the nodes is not recommended, consider synchronizing the configurations.
2.39.13. [ID: 1738] Flow HA sync disallowed by the ruleset
- Log Categories
- RULE,FLOW,HA
- Log Message
- Flow HA sync disallowed by the ruleset.
- Default Log Severity
- Notice
- Parameters
- matchkey, geoip, rule
- Explanation
- The flow could not be installed on the inactive node since the flow was disallowed by the inactive node's ruleset.
- Gateway Action
- Skip
- Action Description
- None
- Proposed Action
- This event can be caused by having different configurations on the HA nodes. Running a cluster with different configurations
on the nodes is not recommended, consider synchronizing the configurations.
2.39.14. [ID: 1739] Flow HA sync failed due to configuration[...]
- Log Categories
- RULE,FLOW,HA
- Log Message
- Flow HA sync failed due to configuration mismatch.
- Default Log Severity
- Notice
- Parameters
- matchkey, rule
- Explanation
- The flow could not be installed on the inactive node since the packets on the flow should be processed in a different way
according to the inactive node's ruleset.
- Gateway Action
- Skip
- Action Description
- None
- Proposed Action
- This event can be caused by having different configurations or licenses on the HA nodes. Running a cluster with different
configurations or licenses on the nodes is not recommended, consider synchronizing the configurations and using identical
licenses. Comparing rulesnoop output for the affected flow between the nodes might help to pin-point what the difference is.
2.39.15. [ID: 1741] Flow HA sync failed due to HA sync status[...]
- Log Categories
- RULE,FLOW,HA
- Log Message
- Flow HA sync failed due to HA sync status mismatch.
- Default Log Severity
- Notice
- Parameters
- matchkey, rule
- Explanation
- The flow could not be installed on the inactive node since according to the inactive node's ruleset this flow should not be
HA synced.
- Gateway Action
- Skip
- Action Description
- None
- Proposed Action
- This event can be caused by having different configurations on the HA nodes. Running a cluster with different configurations
on the nodes is not recommended, consider synchronizing the configurations.
2.39.16. [ID: 1395] Source address matches translation prefix
- Log Categories
- RULE,NAT64
- Log Message
- Source address matches translation prefix.
- Default Log Severity
- Notice
- Parameters
- prefix, matchkey, rule
- Explanation
- A packet with a source address matching the prefix used in protocol translation has been dropped. This is done to prevent
hairpinning loops.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.39.17. [ID: 1088] Max sessions reached on ALG
- Log Categories
- RULE,FTPALG,SIPALG,DNSALG,GTPINSPECTION
- Log Message
- Max sessions reached on ALG.
- Default Log Severity
- Warning
- Parameters
- profile, type, max, pkt, rule, ruletype, ruleorigin
- Explanation
- The amount of sessions on an ALG has reached the limit configured in the profile used.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If the MaxSessions limit is reached under normal usage patterns, try increasing the MaxSessions on the profile used to allow
more sessions through.
2.39.18. [ID: 109] Packet received open
- Log Categories
- RULE
- Log Message
- Packet received open.
- Default Log Severity
- Notice
- Parameters
- flow, rule, user, userid
- Explanation
- Packet that is allowed to be forwarded according to setting is received. The traffic is configured to be allowed according
to the rule set.
- Gateway Action
- Open
- Action Description
- None
- Proposed Action
- None
2.39.19. [ID: 431] Packet received reject
- Log Categories
- RULE
- Log Message
- Packet received reject.
- Default Log Severity
- Notice
- Parameters
- flow, rule, user, userid
- Explanation
- Packet that is allowed to be forwarded according to setting is received. The traffic is configured to be rejected according
to the rule set.
- Gateway Action
- Open
- Action Description
- None
- Proposed Action
- None
2.39.20. [ID: 1209] Unsupported protocol combination for ALG
- Log Categories
- RULE,FTPALG,SIPALG,DNSALG,GTPINSPECTION
- Log Message
- Unsupported protocol combination for ALG.
- Default Log Severity
- Notice
- Parameters
- type, proto, pkt, rule, ruletype, ruleorigin
- Explanation
- The matching rule specified to use an Application Layer Gateway (ALG) to process the traffic but the selected ALG does not
support the protocols used by the packet.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.39.21. [ID: 238] Allowed by access rule
- Log Categories
- RULE
- Log Message
- Allowed by access rule.
- Default Log Severity
- Notice
- Parameters
- pkt, rule
- Explanation
- The sender IP address was verified and accepted by an access rule in the access section.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- Modify the access rule accordingly, if the sender should not be allowed.
2.39.22. [ID: 242] Disallowed by access rule
- Log Categories
- RULE
- Log Message
- Disallowed by access rule.
- Default Log Severity
- Notice
- Parameters
- srcip, destip, recviface, pkt, rule
- Explanation
- The packet was dropped since the configuration, that is, access rules, does not allow packets from this sender to arrive at
that interface.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If the decision to drop the packet was correct but you don't want any logs then either change the LogEnabled property on the
access rule (if the rule is an explicitly configured access rule), add an access rule to drop the packet silently or configure
a log message exception in the log receiver to ignore this message. If the decision to drop the packet was incorrect then
there are two cases: If the rule is an explicitly configured access rule then modify it, and possibly other, access rules
accordingly. Otherwise start by verifying that the routing is correctly configured for the sender's address since routes provide
automatic access rules. If that does not help, that is, in setups where packets arriving from the sender arrive on another
interface than where packets going to the sender are routed, then add an access rule accepting the sender's address on the
receive interface.
2.39.23. [ID: 1661] Source IP not routed on receive interface
- Log Categories
- RULE,ROUTE,IPSPOOFING
- Log Message
- Source IP not routed on receive interface.
- Default Log Severity
- Notice
- Parameters
- srcip, destip, recviface, srcroute, pkt
- Explanation
- The packet was dropped since the source IP of the packet is not routed over the receive interface of the packet. This event
could indicate that someone is trying to use a spoofed IP address.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This is an effect of the automatic reverse path ingress filtering of the system based on the routes known to the system. The
default policy is basically "strict reverse path forwarding", that is, that a packet must be received on the interface where
packets to the source IP of the packet would be routed out, to be acceptable. In some scenarios, for instance, where asymmetric
routing is used, this is too strict. Exceptions can then be made by marking interfaces as security equvivalent or by adding
explicit access rules to allow packets from the source IP on this interface even tough packets to the source IP will be sent
over some other interface.
2.39.24. [ID: 1653] Receive sub interface id mismatch with route[...]
- Log Categories
- RULE,ROUTE,IPSPOOFING
- Log Message
- Receive sub interface id mismatch with route to source IP.
- Default Log Severity
- Notice
- Parameters
- srcip, destip, recviface, srcroute, pkt
- Explanation
- The packet was dropped since the source IP is routed on another sub interface id (belongs to another client) than the packet
was received from. This event could indicate that someone is trying to use a spoofed IP address.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This is an effect of the automatic reverse path ingress filtering of the system based on the routes known to the system. The
default policy is basically "strict reverse path forwarding", that is, that a packet must be received on the interface where
packets to the source IP of the packet would be routed out, to be acceptable. In some scenarios, for instance, where asymmetric
routing is used, this is too strict. Exceptions can then be made by marking interfaces as security equvivalent or by adding
explicit access rules to allow packets from the source IP on this interface even tough packets to the source IP will be sent
over some other interface.
2.39.25. [ID: 394] Local Undelivered
- Log Categories
- RULE
- Log Message
- Local Undelivered.
- Default Log Severity
- Warning
- Parameters
- pkt
- Explanation
- Packet destined for the firewall itself was not picked up by any local service.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Verify the configuration of the corresponding service if the packet should be processed.
2.39.26. [ID: 471] No route to destination
- Log Categories
- RULE
- Log Message
- No route to destination.
- Default Log Severity
- Warning
- Parameters
- destip, iface, pkt
- Explanation
- Further processing of received packet is not allowed due to no route coverage for the destination address.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Configure route support for the destination if it should be allowed.
2.39.27. [ID: 129] No route to source
- Log Categories
- RULE
- Log Message
- No route to source.
- Default Log Severity
- Warning
- Parameters
- srcip, iface, pkt
- Explanation
- Further processing of received packet is not allowed due to no route coverage for the source address.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Configure route support for the source if it should be allowed.
2.39.28. [ID: 1737] Denied by the ruleset
- Log Categories
- RULE
- Log Message
- Denied by the ruleset.
- Default Log Severity
- Notice
- Parameters
- matchkey, geoip, rule
- Explanation
- A rule lookup, other than to set up a new flow for a packet, matched a deny rule. An example of such rule lookups is the reevaluation
of existing flows after rule changes.
- Gateway Action
- Deny
- Action Description
- None
- Proposed Action
- Modify the ruleset accordingly, if the traffic should be allowed.
2.39.29. [ID: 514] Packet dropped by the ruleset
- Log Categories
- RULE
- Log Message
- Packet dropped by the ruleset.
- Default Log Severity
- Warning
- Parameters
- pkt, geoip, rule
- Explanation
- Further processing of received packet is not allowed due to matched drop rule policy of the ruleset.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Modify the ruleset accordingly, if the traffic should be allowed.
2.39.30. [ID: 384] Non-NATable IP protocol
- Log Categories
- RULE,SYSTEM,PORTMGR
- Log Message
- Non-NATable IP protocol.
- Default Log Severity
- Warning
- Parameters
- proto, localip, destip, rule
- Explanation
- Network Address Translation (NAT) is only fully supported for TCP, UDP and ICMP flows. Address translation will still be applied
to flows with IP protocol number proto, but it is only possible to have one such flow open between the source and destination IP pair localip-destip.
- Gateway Action
- Ignore
- Action Description
- None
- Proposed Action
- Modify the rule rule to only include NATable protocols.
2.39.31. [ID: 520] Could not allocate NAT port
- Log Categories
- RULE,SYSTEM,PORTMGR
- Log Message
- Could not allocate NAT port.
- Default Log Severity
- Error
- Parameters
- localip, destip, rule
- Explanation
- A NAT flow could not be opened since dynamic port allocation failed for the source and destination IP pair localip-destip.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The system might be low on RAM or all ports for the specified source and destination IP pair might be allocated.
2.39.32. [ID: 987] Could not allocate NAT IP from NATPool
- Log Categories
- RULE,SYSTEM,NATPOOL
- Log Message
- Could not allocate NAT IP from NATPool.
- Default Log Severity
- Critical
- Parameters
- pool, srcip, rule
- Explanation
- The system failed to setup a new flow since allocation of a dynamic NAT IP from a NAT Pool failed.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Review NAT Pool related log messages for an indication why this event occurred.
2.39.33. [ID: 1158] Whitelist prevents blacklist action from[...]
- Log Categories
- RULE,THRESHOLD,FLOW,BLACKLIST
- Log Message
- Whitelist prevents blacklist action from being executed.
- Default Log Severity
- Warning
- Parameters
- conflictrule, thresholdset, matchkey, rule
- Explanation
- A flow setup attempt triggered the given thresholdset in threshold rule conflictrule: The flow setup attempt should have been blocked and blacklisted, but this was overruled by the whitelist rule rule. The flow setup attempt has therefore been allowed.
- Gateway Action
- Ignore
- Action Description
- A threshold blacklist action was prevented from being executed by a whitelist rule
- Proposed Action
- Investigate why the threshold rules are triggered by whitelisted traffic. Normally this should never happen; it may signify
that network resources have been compromised.
These log messages refer to the SCTP category.
2.40.1. [ID: 1335] IP address outside IP rule filter
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- IP address outside IP rule filter.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, ip, pkt, assoc, rule
- Explanation
- The packet contains an alternative transport address that does not comply with the IP rule. Traffic to and from addresses
that don't match the IP rule, will not be allowed once the association has been established for stateful SCTP inspection since
that would cause problems to an association's state tracking in case the traffic is using paths that do not pass through the
firewall. By disallowing this kind of addresses, the association is narrowed down to match that of the IP rule.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- None
2.40.2. [ID: 1350] IP address outside IP rule filter
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- IP address outside IP rule filter.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, ip, pkt, assoc, rule
- Explanation
- The packet contains an alternative transport address that does not comply with the IP rule. Traffic to and from addresses
that don't match the IP rule, will not be allowed once the association has been established for stateful SCTP inspection since
that would cause problems to an association's state tracking in case the traffic is using paths that do not pass through the
firewall. By disallowing this kind of addresses, the association is narrowed down to match that of the IP rule.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- None
2.40.3. [ID: 1371] ABORT bundled with DATA chunk
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- ABORT bundled with DATA chunk.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt
- Explanation
- An abort message was bundled with DATA chunks.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This log message is controlled by SCTPSettings:SCTPLogFormatError.
2.40.4. [ID: 1216] Advertised receiver window credit too low
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Advertised receiver window credit too low.
- Default Log Severity
- Warning
- Parameters
- value, pkt
- Explanation
- This log message indicates that the advertised window credit during association setup is too low. Normally this is the maximum
window credit for the entire lifetime of the association. Not only does this affect the data transfer rate, but also the maximum
user message size in bytes. This log message is indirectly controlled by SCTPSettings:SCTPMinInitWindowCredit.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.5. [ID: 1324] Association abort
- Log Categories
- SCTP,STATEFUL
- Log Message
- Association abort.
- Default Log Severity
- Warning
- Parameters
- pkt, assoc, rule
- Explanation
- The association was aborted by a peer.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- None
2.40.6. [ID: 1361] Established association exists
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Established association exists.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
- Explanation
- The association the current control chunk is trying to establish already exists.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.7. [ID: 1367] Association established
- Log Categories
- SCTP,STATEFUL
- Log Message
- Association established.
- Default Log Severity
- Information
- Parameters
- pkt, assoc, rule
- Explanation
- An SCTP association handshake has been completed, and a new association has been established.
- Gateway Action
- Enable
- Action Description
- None
- Proposed Action
- None
2.40.8. [ID: 1658] Association establishment clash
- Log Categories
- SCTP,STATEFUL
- Log Message
- Association establishment clash.
- Default Log Severity
- Warning
- Parameters
- pkt, assoc, rule
- Explanation
- The association failed to establish because it tried to claim a combination of ports and IP addresses that is already in use
by another association.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- The system may contain lingering associations that have been silently abandoned for one reason or another (there is also a
known attack with these symptoms). Verify that the existing associations are valid; by default SCTP has a very long idle timeout
and abandoned associations may need to be manually removed.
2.40.9. [ID: 1689] Association no longer allowed
- Log Categories
- SCTP,STATEFUL
- Log Message
- Association no longer allowed.
- Default Log Severity
- Warning
- Parameters
- assoc, rule
- Explanation
- The system policy has been updated, and as a consequence the association assoc was no longer allowed. The association has been forcefully closed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Verify that the endpoints are aware that the association has been closed.
2.40.10. [ID: 1362] Association closed due to idle timeout
- Log Categories
- SCTP,STATEFUL
- Log Message
- Association closed due to idle timeout.
- Default Log Severity
- Information
- Parameters
- assoc, rule
- Explanation
- An SCTP association was closed due to idle timeout. An SCTP association is considered "idle" if it has no flows.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Strictly following RFC 4960, an established SCTP association should never time out. Examine the hosts involved if this is
a reoccurring problem. The idle lifetime can also be adjusted using the setting SCTPSettings:SCTPIdleLifetime.
2.40.11. [ID: 1359] Handshake random replace
- Log Categories
- SCTP,STATEFUL
- Log Message
- Handshake random replace.
- Default Log Severity
- Warning
- Parameters
- assoc, rule
- Explanation
- There are too many concurrent SCTP handshakes and a randomly chosen handshake attempt has been discarded.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- The maximum number of concurrent SCTP handshakes can be adjusted with SCTPSettings:SCTPMaxHandshake. Configure the system to support more simultaneous handshakes, or try to track down the host(s) that overloads the network.
2.40.12. [ID: 1326] Association handshake timeout
- Log Categories
- SCTP,STATEFUL
- Log Message
- Association handshake timeout.
- Default Log Severity
- Warning
- Parameters
- assoc, rule
- Explanation
- An SCTP association handshake timed out. No association was ever established. Larger amounts of "handshake timeouts" may be
caused by port scanning.
- Gateway Action
- Close
- Action Description
- No association has been setup
- Proposed Action
- The maximum lifetime of an handshake can be adjusted using the setting SCTPSettings:SCTPHandshakeLifetime.
2.40.13. [ID: 1332] Association handshake initiated
- Log Categories
- SCTP,STATEFUL
- Log Message
- Association handshake initiated.
- Default Log Severity
- Notice
- Parameters
- pkt, assoc, rule
- Explanation
- An SCTP init message was received. This is the first part of an SCTP association handshake.
- Gateway Action
- Open
- Action Description
- Allowed by the configuration
- Proposed Action
- None; normally a log message that the association has been established should follow.
2.40.14. [ID: 1639] Association handshake restart
- Log Categories
- SCTP,STATEFUL
- Log Message
- Association handshake restart.
- Default Log Severity
- Notice
- Parameters
- pkt, assoc, rule
- Explanation
- An SCTP init message was received by an established association. This is an anomalous event that can happen, say if either
of the end-points has lost their state (crashed or rebooted).
- Gateway Action
- Reopen
- Action Description
- None
- Proposed Action
- None; normally a log message that the association has been established should follow.
2.40.15. [ID: 1659] Association restart clash
- Log Categories
- SCTP,STATEFUL
- Log Message
- Association restart clash.
- Default Log Severity
- Warning
- Parameters
- pkt, assoc, rule
- Explanation
- A failed attempt was made to restart an SCTP association, leaving the old association unaffected. The attempt failed to establish
the new association because the new association tried to claim a combination of ports and IP addresses that is already in
use by other existing associations.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- The system may contain lingering associations that have been silently abandoned for one reason or another (there is also a
known attack with these symptoms). Verify that the existing associations are valid; by default SCTP has a very long idle timeout
and abandoned associations may need to be manually removed.
2.40.16. [ID: 1329] Association restart initiated
- Log Categories
- SCTP,STATEFUL
- Log Message
- Association restart initiated.
- Default Log Severity
- Notice
- Parameters
- newinitvtag, newrespvtag, assoc, rule
- Explanation
- An SCTP init message, matching an existing association, was received. This might be an association restart, in which case
it should be followed by an "association restarted" log message.
- Gateway Action
- Open
- Action Description
- None
- Proposed Action
- None
2.40.17. [ID: 1384] Association restart initiated
- Log Categories
- SCTP,STATEFUL
- Log Message
- Association restart initiated.
- Default Log Severity
- Notice
- Parameters
- newinitip, newrespip, newinitvtag, newrespvtag, assoc, rule
- Explanation
- An SCTP init message, matching an existing association, was received. This might be an association restart, in which case
it should be followed by an "association restarted" log message.
- Gateway Action
- Open
- Action Description
- None
- Proposed Action
- None
2.40.18. [ID: 1339] Association restarted
- Log Categories
- SCTP,STATEFUL
- Log Message
- Association restarted.
- Default Log Severity
- Information
- Parameters
- pkt, assoc, rule
- Explanation
- An SCTP association was successfully restarted.
- Gateway Action
- Reopen
- Action Description
- The effect is the same as if the old association had been closed, and a new one has been negotiated
- Proposed Action
- None
2.40.19. [ID: 1347] Association random replace
- Log Categories
- SCTP,STATEFUL
- Log Message
- Association random replace.
- Default Log Severity
- Warning
- Parameters
- assoc, rule
- Explanation
- There are too many concurrent established SCTP associations and a randomly chosen association has been discarded. More correctly;
the currently established SCTP associations are using too many resources and one association has been selected. The selection
is made randomly, but associations using more resources are more likely to be chosen.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- The maximum number of concurrent SCTP associations can be (indirectly) adjusted with SCTPSettings:SCTPMaxAssocLinks. Configure the system to support more simultaneous associations, or try to track down the host(s) that overloads the network.
Note that the setting counts the number of IP combinations that can be made within the associations; with the maximum supported
IP addresses (32 per endpoint) the setting should be given a value that is 1024 (32 x 32) times larger than the maximum concurrent
associations.
2.40.20. [ID: 1327] Association timeout on shutdown
- Log Categories
- SCTP,STATEFUL
- Log Message
- Association timeout on shutdown.
- Default Log Severity
- Warning
- Parameters
- assoc, rule
- Explanation
- An SCTP association was forcibly closed since the shutdown sequence timed out.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Strictly following RFC 4960, an SCTP association should never time out during the shutdown sequence. Examine the hosts involved
if this is a reoccurring problem. The maximum lifetime of the shutdown sequence can be adjusted using the setting SCTPSettings:SCTPHandshakeLifetime.
2.40.21. [ID: 1358] Association closed
- Log Categories
- SCTP,STATEFUL
- Log Message
- Association closed.
- Default Log Severity
- Notice
- Parameters
- pkt, assoc, rule
- Explanation
- The association has been gracefully closed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.40.22. [ID: 1343] Association shutdown received
- Log Categories
- SCTP,STATEFUL
- Log Message
- Association shutdown received.
- Default Log Severity
- Information
- Parameters
- pkt, assoc, rule
- Explanation
- An SCTP association has begun a shutdown sequence.
- Gateway Action
- Allow
- Action Description
- The association is now effectively closed, but will linger until the peer has acknowledged the shutdown
- Proposed Action
- None
2.40.23. [ID: 1640] Association linger timeout
- Log Categories
- SCTP,STATEFUL
- Log Message
- Association linger timeout.
- Default Log Severity
- Critical
- Parameters
- assoc, rule
- Explanation
- The system failed to synchronize the shutdown of an SCTP association over the HA cluster, and could not recover the necessary
information to retry. This may have left the association open in the established state, even though it should have been closed.
Such associations will eventually timeout, but may be possible to exploit in the meantime.
- Gateway Action
- Discard
- Action Description
- Timeout while waiting for HA peer to acknowledge deletion of closed association
- Proposed Action
- Check if the association (identified as assoc) has been left open (verify that there are no log messages saying that it has been "restarted" or that a new one has been
opened with the same network parameters); manually close it if so.
2.40.24. [ID: 1357] PPID blacklisted
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- PPID blacklisted.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, ppid, pkt, assoc, rule
- Explanation
- The Payload Protocol Identifier of a DATA chunk was blacklisted by the SCTP service that is used by the IP rule that allows
the traffic.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Exclude the Payload Protocol Identifier from the blacklist of the SCTP service used if you want to allow it.
2.40.25. [ID: 1239] Bundled singular chunk type
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Bundled singular chunk type.
- Default Log Severity
- Warning
- Parameters
- chunktype, count, pkt
- Explanation
- Certain chunks are not allowed to be mixed with other chunks in the same packet; in fact only one such chunk is allowed per
packet. In this case a packet was found to not honor this restriction.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets.
2.40.26. [ID: 1377] Unexpected cookie ack from initiator of[...]
- Log Categories
- SCTP,STATEFUL
- Log Message
- Unexpected cookie ack from initiator of restart.
- Default Log Severity
- Warning
- Parameters
- pkt, assoc, rule
- Explanation
- A COOKIE ACK was received from the initiator of a restart instead of the responder.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.27. [ID: 1375] Unexpected cookie echo from responder of[...]
- Log Categories
- SCTP,STATEFUL
- Log Message
- Unexpected cookie echo from responder of restart.
- Default Log Severity
- Warning
- Parameters
- pkt, assoc, rule
- Explanation
- A COOKIE ECHO was received from the responder of a restart instead of the initiator.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.28. [ID: 1298] Chunk length includes padding at end
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Chunk length includes padding at end.
- Default Log Severity
- Notice
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, padlen, pkt
- Explanation
- The length parameter of a chunk includes the padding at the end.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- This log message is controlled by SCTPSettings:SCTPLogFormatError.
2.40.29. [ID: 1660] Cookie echoed
- Log Categories
- SCTP,STATEFUL
- Log Message
- Cookie echoed.
- Default Log Severity
- Debug
- Parameters
- pkt, assoc, rule
- Explanation
- An SCTP cookie-echo message was received. This is the third part of an SCTP association handshake, consisting of the initiator
returning the responder "cookie".
- Gateway Action
- Accept
- Action Description
- Part of association handshake.
- Proposed Action
- None; normally a log message that the association has been established should follow.
2.40.30. [ID: 1439] Stripped DATA chunk from packet containing[...]
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Stripped DATA chunk from packet containing SHUTDOWN.
- Default Log Severity
- Information
- Parameters
- chunktype, chunkindex, chunkoffset, chunklen, pkt
- Explanation
- DATA chunk found after SHUTDOWN chunk.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- None
2.40.31. [ID: 1363] Destination port mismatch
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Destination port mismatch.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, destport, pkt, assoc, rule
- Explanation
- The destination port of an SCTP packet sent by the initiator of an association does not match the destination port of the
association the packet belongs to.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.32. [ID: 1369] Unexpected DATA from shutdown initiator
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Unexpected DATA from shutdown initiator.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
- Explanation
- A DATA chunk has been received for an SCTP association by the initiator of the shutdown.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.33. [ID: 1352] Initial vtag changed
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Initial vtag changed.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, newvtag, pkt, assoc, rule
- Explanation
- During an SCTP association establishment this is not the first INIT_ACK chunk that has been seen and it contains a different
initiate tag than the first INIT_ACK chunk sent.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.34. [ID: 1345] No init seen
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- No init seen.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
- Explanation
- No former INIT chunk was encountered that justifies the receipt of the current chunk.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.35. [ID: 1386] Restart changed initiator IP address number
- Log Categories
- SCTP,STATEFUL
- Log Message
- Restart changed initiator IP address number.
- Default Log Severity
- Warning
- Parameters
- old, new, pkt, assoc, rule
- Explanation
- An INIT chunk was received for a restart of an association. The number of IP addresses between the original association and
the restart is bigger.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Make sure a restart does not contain more IP addresses that the original association.
2.40.36. [ID: 1376] Restart added initiator IP address
- Log Categories
- SCTP,STATEFUL
- Log Message
- Restart added initiator IP address.
- Default Log Severity
- Warning
- Parameters
- ip, pkt, assoc, rule
- Explanation
- A restart was issued which added a new ip address for the initiator of an SCTP association.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Make sure a restart does not add IP addresses that do not exist to the initiator of the original association.
2.40.37. [ID: 1383] Restart added responder IP address
- Log Categories
- SCTP,STATEFUL
- Log Message
- Restart added responder IP address.
- Default Log Severity
- Warning
- Parameters
- ip, pkt, assoc, rule
- Explanation
- A restart was issued which added a new ip address for the responder of an SCTP association.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Make sure a restart does not add IP addresses that do not exist to the responder of the original association.
2.40.38. [ID: 1387] Restart changed responder IP address number
- Log Categories
- SCTP,STATEFUL
- Log Message
- Restart changed responder IP address number.
- Default Log Severity
- Warning
- Parameters
- old, new, pkt, assoc, rule
- Explanation
- An INIT-ACK chunk was received for a restart of an association. The number of IP addresses between the original association
and the restart is bigger.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Make sure a restart does not contain more IP addresses that the original association.
2.40.39. [ID: 1338] Wrong association restart state
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Wrong association restart state.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
- Explanation
- A COOKIE_ACK has been received for a restart of an association which is not in the COOKIE_ECHOED or ESTABLISHED state.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.40. [ID: 1368] Shutdown during establishment
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Shutdown during establishment.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
- Explanation
- Received a shutdown related control chunk during the establishment of an association.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.41. [ID: 1355] Expired restart period
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Expired restart period.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
- Explanation
- The period for an association to be restarted has been expired.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.42. [ID: 1333] Too many shutdown requests
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Too many shutdown requests.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
- Explanation
- More than one SHUTDOWN or ABORT chunks have been received for the association within two seconds.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.43. [ID: 1346] Unexpected COOKIE ACK
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Unexpected COOKIE ACK.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
- Explanation
- A COOKIE_ACK chunk has been received while the current association is neither in the expected COOKIE_ECHOED state or in the
ESTABLISHED state with the potential for a possible restart.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.44. [ID: 1331] Unexpected COOKIE ECHO
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Unexpected COOKIE ECHO.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
- Explanation
- A stray COOKIE_ECHO chunk has been received while the association has either received only an INIT chunk or is shutting down.
Possibly a stale packet that was used to establish the present association or a past association that is no longer in existence.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.45. [ID: 1656] Unexpected DATA from initiator
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Unexpected DATA from initiator.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
- Explanation
- A DATA chunk from the initiator was seen, before having received a valid COOKIE-ECHO from the initiator. The packet has been
dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.46. [ID: 1654] Unexpected DATA from responder
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Unexpected DATA from responder.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
- Explanation
- A DATA chunk from the responder was seen, before having received the (Cookie) Echo-Ack from the responder. The packet has
been dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.47. [ID: 1342] Unexpected shutdown chunk
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Unexpected shutdown chunk.
- Default Log Severity
- Warning
- Parameters
- iplen, state, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
- Explanation
- Received a shutdown related control chunk while the association was in the wrong state.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.48. [ID: 1288] Empty state cookie parameter found
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Empty state cookie parameter found.
- Default Log Severity
- Warning
- Parameters
- chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, pkt
- Explanation
- A state cookie parameter with no value was found within an INIT_ACK chunk.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is invalid. If the packet sender is one of your network devices, investigate why the unit is sending empty state
cookie parameters within INIT_ACK chunks.
2.40.49. [ID: 1686] Clash
- Log Categories
- SCTP,STATEFUL,HA
- Log Message
- Clash.
- Default Log Severity
- Critical
- Parameters
- srcport, srcip, destport, destip, srciface, assoc, rule
- Explanation
- Cannot synchronize assoc; an incompatible SCTP association exists at this node.
- Gateway Action
- Abort
- Action Description
- Synchronization failed and the system now has two different SCTP associations that at least partially respond to the same
traffic
- Proposed Action
- Identify the two mutually exclusive associations, and manually resolve the situation. The peer is likely to have additional
log messages. Consider rebooting one of the HA nodes.
2.40.50. [ID: 1685] Clash
- Log Categories
- SCTP,STATEFUL,HA
- Log Message
- Clash.
- Default Log Severity
- Warning
- Parameters
- srcport, srcip, destport, destip, srciface, assoc, rule
- Explanation
- Synchronization encountered an incompatible SCTP association at the current node. This was resolved by discarding the existing
association without notifying the endpoints, as it (assoc) did not appear to have been in use for some time. More specifically, it had not been forwarding any traffic for a time exceeding
the one given by FlowTimeoutSettings:FlowLifetimeSCTPStateful.
- Gateway Action
- Discard
- Action Description
- Synchronization encountered an unexpected situation involving two mutually exclusive SCTP associations. However, as one of
the associations had been unused (not forwarding traffic) for a time of at least FlowTimeoutSettings:FlowLifetimeSCTPStateful, the assoc was discarded in favour of the one synchronized
- Proposed Action
- Verify that the discarded association indeed was right to discard.
2.40.51. [ID: 1684] Disallowed
- Log Categories
- SCTP,STATEFUL,HA
- Log Message
- Disallowed.
- Default Log Severity
- Warning
- Parameters
- srcport, srcip, destport, destip, srciface
- Explanation
- Disallowed by policies at the current node, but allowed by the peer node. This sometimes happen when associations are being
setup at the same time that the HA node is booting up, or when the configuration has been updated at the HA peer but not at
the current node.
- Gateway Action
- Ignore
- Action Description
- The association will not be synchronized; at least not for the moment
- Proposed Action
- Usually the association is synchronized once the HA peer has been updated, but it is still advised to verify that the relevant
association has been properly synchronized.
2.40.52. [ID: 1170] Host name address detected
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Host name address detected.
- Default Log Severity
- Notice
- Parameters
- name, offset, datalen, pkt
- Explanation
- The packet contains a Host Name address parameter; an alternative address using the DNS format. Note that the host name will
be resolved by a, potentially compromised, external entity. Therefore it has the potential to circumvent the IP policy (but
not the routes). Whether this will incur a security risk depends on the network layout, but it does increase the target area.
This log message is controlled by SCTPSettings:SCTPHostNameAddressParam.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- None
2.40.53. [ID: 1189] Host name address detected
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Host name address detected.
- Default Log Severity
- Information
- Parameters
- name, offset, datalen, pkt
- Explanation
- The packet contains a Host Name address parameter; an alternative address using the DNS format. Note that the host name will
be resolved by a, potentially compromised, external entity. Therefore it has the potential to circumvent the IP policy (but
not the routes). Whether this will incur a security risk depends on the network layout, but it does increase the target area.
This log message is controlled by SCTPSettings:SCTPHostNameAddressParam.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- None
2.40.54. [ID: 1374] Host name address detected
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Host name address detected.
- Default Log Severity
- Warning
- Parameters
- name, offset, datalen, pkt, assoc, rule
- Explanation
- For stateful inspection of SCTP traffic, a Host Name Address parameter always gets stripped from a chunk.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- None
2.40.55. [ID: 1381] Wrong initiator primary IP
- Log Categories
- SCTP,STATEFUL
- Log Message
- Wrong initiator primary IP.
- Default Log Severity
- Warning
- Parameters
- ip, pkt, assoc, rule
- Explanation
- A packet with an INIT ACK chunk was received for a restart which did not use as destination IP the primary IP that the initiator
of the restart declared on the previous INIT chunk he sent.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.56. [ID: 1379] Wrong responder primary IP
- Log Categories
- SCTP,STATEFUL
- Log Message
- Wrong responder primary IP.
- Default Log Severity
- Warning
- Parameters
- ip, pkt, assoc, rule
- Explanation
- A packet with an INIT ACK chunk was received for a restart which did not use as source IP the destination IP that the initiator
of the restart used on the previous INIT chunk he sent.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.57. [ID: 1373] IP address inside IP rule filter
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- IP address inside IP rule filter.
- Default Log Severity
- Warning
- Parameters
- ip, pkt
- Explanation
- Although the IP address parameter encountered in an SCTP chunk is within the IP rule filter, the setting SCTPSettings:SCTPMultihoming does not allow it.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- None
2.40.58. [ID: 1198] IP address outside IP rule filter
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- IP address outside IP rule filter.
- Default Log Severity
- Information
- Parameters
- ip, pkt
- Explanation
- The packet contains an alternative transport address that does not comply with the IP rule. This log message, as well as how
these addresses are treated by the system, is controlled by SCTPSettings:SCTPMultihoming. Allowing the association to use this transport address will result in a loosened IP policy; traffic to and from addresses
that don't match the IP rule, will be allowed once the association has been established. By disallowing this kind of addresses,
the association is narrowed down to match that of the IP rule.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- None
2.40.59. [ID: 1177] IP address outside IP rule filter
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- IP address outside IP rule filter.
- Default Log Severity
- Notice
- Parameters
- ip, pkt
- Explanation
- The packet contains an alternative transport address that does not comply with the IP rule. This log message, as well as how
these addresses are treated by the system, is controlled by SCTPSettings:SCTPMultihoming. Allowing the association to use this transport address will result in a loosened IP policy; traffic to and from addresses
that don't match the IP rule, will be allowed once the association has been established. By disallowing this kind of addresses,
the association is narrowed down to match that of the IP rule.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- None
2.40.60. [ID: 1348] Source IP disallowed by association
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Source IP disallowed by association.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
- Explanation
- The initiator of an association has sent an SCTP packet using an IP that does not exist in the list of its IP addresses.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.61. [ID: 1385] IP disallowed by initiator of restart
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- IP disallowed by initiator of restart.
- Default Log Severity
- Warning
- Parameters
- ip, iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
- Explanation
- A packet with a COOKIE ECHO chunk has been received for a restart using an IP address that is used by the peer for the original
association but was not included to be used for the restart as well.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.62. [ID: 1336] Destination IP disallowed by association
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Destination IP disallowed by association.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
- Explanation
- The initiator of an association has sent an SCTP packet using as destination IP an IP that does not exist in the list of the
responder's IP addresses.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.63. [ID: 1378] IP disallowed by responder of restart
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- IP disallowed by responder of restart.
- Default Log Severity
- Warning
- Parameters
- ip, iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
- Explanation
- A packet with a COOKIE ACK chunk has been received for a restart using an IP address that is used by the peer for the original
association but was not included to be used for the restart as well.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.64. [ID: 1294] SCTP padding with illegal length
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- SCTP padding with illegal length.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
- Explanation
- An SCTP chunk contained more than 3 bytes of padding; padlen bytes of padding. According to the RFC 4960 padding MUST not exceed 3 bytes in total. The illegal padding is located at offset
offset (relative the SCTP header), inside the chunk with index chunkindex. This may also be a severely malformed packet, whose content is impossible to interpret.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets.
2.40.65. [ID: 1271] SCTP mis-aligned by padding
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- SCTP mis-aligned by padding.
- Default Log Severity
- Warning
- Parameters
- offset, padlen, pkt
- Explanation
- What looks like mis-aligned padding was found at the end of the SCTP packet. The padding in itself was not a problem; this
padding caused the end of the packet to be mis-aligned. Padding to a mis-aligned offset is not only pointless, but it is also
a telltale sign of something broken.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets.
2.40.66. [ID: 1277] SCTP chunk end mis-aligned by padding
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- SCTP chunk end mis-aligned by padding.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
- Explanation
- What looks like mis-aligned padding was found at the end of a chunk inside the SCTP packet; this padding caused the end of
the chunk to be mis-aligned. Padding to a mis-aligned offset is not only pointless, but it is also a telltale sign of something
broken.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets.
- Proposed Action
- This packet is broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets.
2.40.67. [ID: 1291] Address type illegal with Host Name Address[...]
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Address type illegal with Host Name Address option.
- Default Log Severity
- Warning
- Parameters
- paramtype, pkt
- Explanation
- An SCTP message that combines the Host Name Address parameter with an address parameter of type paramtype. RCF4960 explicitly forbids the Host Name Address option to be combined with address parameters of any other address type.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is invalid. If the packet sender is one of your network devices, investigate why the unit is trying to use both
static address and host name address parameters.
2.40.68. [ID: 1663] Init-ack seen
- Log Categories
- SCTP,STATEFUL
- Log Message
- Init-ack seen.
- Default Log Severity
- Debug
- Parameters
- pkt, assoc, rule
- Explanation
- An SCTP init-ack message was received. This is the second part of an SCTP association handshake, and the first reply from
the responder. The message contains a "cookie" that the initiator is supposed to return unchanged.
- Gateway Action
- Accept
- Action Description
- Part of association handshake.
- Proposed Action
- None; normally a log message that the association has been established should follow.
2.40.69. [ID: 1382] Association restart from initiator failed
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Association restart from initiator failed.
- Default Log Severity
- Warning
- Parameters
- pkt, assoc, rule
- Explanation
- The initiator of an association issued a restart using a different primary IP and possibly interface but no matching IP rule
was found to allow it.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Configure an IP rule that allows the initiator to issue a restart using the new primary IP and interface.
2.40.70. [ID: 1366] Initiator vtag mismatch
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Initiator vtag mismatch.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, vtag, pkt, assoc, rule
- Explanation
- The verification tag of an SCTP common header sent by the responder of an SCTP association does not match the verification
tag of the initiator.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.71. [ID: 1176] Invalid SCTP checksum
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Invalid SCTP checksum.
- Default Log Severity
- Notice
- Parameters
- chksum, calcchksum, pkt
- Explanation
- The checksum of the SCTP message was incorrect.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- Set SCTPSettings:SCTPValidateChecksum to change the behavior for SCTP checksum validation.
2.40.72. [ID: 1242] Invalid SCTP checksum
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Invalid SCTP checksum.
- Default Log Severity
- Warning
- Parameters
- chksum, calcchksum, pkt
- Explanation
- The checksum of the SCTP message was incorrect.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Set SCTPSettings:SCTPValidateChecksum to change the behavior for SCTP checksum validation.
2.40.73. [ID: 1178] Invalid SCTP chunk length
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Invalid SCTP chunk length.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt
- Explanation
- The chunk length exceeded the SCTP message length, or the length did not match the length specified for that chunk type.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets.
2.40.74. [ID: 1174] Invalid SCTP destination port
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Invalid SCTP destination port.
- Default Log Severity
- Notice
- Parameters
- matchkey
- Explanation
- The destination port of the SCTP message was zero.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.75. [ID: 1337] Invalid destination route
- Log Categories
- SCTP,ROUTE,STATEFUL,VALIDATE
- Log Message
- Invalid destination route.
- Default Log Severity
- Warning
- Parameters
- destiface, iface, flow, assoc, rule, user, userid
- Explanation
- The destination IP was routed via an interface destiface that is not security equivalent with the corresponding interface iface used when the association was setup. From the moment the association is setup, the initiator is assumed to be reached via
the interface from which the INIT message was received, or one that is security equivalent with it. Similarly the responder
is assumed to be reached via the original destination interface of the INIT message, or one that is security equivalent with
it. This log message is generated when the assumption is violated by the traffic.
- Gateway Action
- Drop
- Action Description
- The system prevented an SCTP flow from being opened because the destination route is deemed not to be security equivalent
with those used during association setup
- Proposed Action
- Establish whether the IP address is routed via the correct interface. Verify whether the IP address is valid for the association.
Review whether the destination interface destiface should be security equivalent with the corresponding interface iface used at the association setup.
2.40.76. [ID: 1194] Invalid SCTP error cause length
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Invalid SCTP error cause length.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, code, offset, datalen, pkt
- Explanation
- The length of the error cause exceeded the SCTP ERROR chunk length, or the length did not match the length specified for that
error cause type.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets.
2.40.77. [ID: 1273] Invalid SCTP heartbeat information
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Invalid SCTP heartbeat information.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, type, datalen, pkt
- Explanation
- The information of a HEARTBEAT or HEARTBEAT ACK chunk chunktype was of the wrong type type. This log is controlled by SCTPSettings:SCTPLogFormatError.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.78. [ID: 1187] Invalid Host Name address format
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Invalid Host Name address format.
- Default Log Severity
- Warning
- Parameters
- iplen, offset, datalen, pkt
- Explanation
- A badly formatted Host Name address parameter was found. This log is controlled by SCTPSettings:SCTPLogFormatError.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets.
2.40.79. [ID: 1353] Invalid stream ID
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Invalid stream ID.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, streamid, max, pkt, assoc, rule
- Explanation
- The stream ID of an SCTP DATA chunk was larger than the maximum inbound stream ID of the association.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.80. [ID: 1258] Illegal initiate tag
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Illegal initiate tag.
- Default Log Severity
- Warning
- Parameters
- value, pkt
- Explanation
- The initiate tag of the SCTP INIT chunk was zero which is not allowed.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.81. [ID: 1257] Invalid number of streams
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Invalid number of streams.
- Default Log Severity
- Warning
- Parameters
- inbound, outbound, pkt
- Explanation
- The number of inbound or outbound streams in an INIT chunk was zero.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.82. [ID: 1188] Invalid number of mandatory SCTP parameters
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Invalid number of mandatory SCTP parameters.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, code, offset, datalen, value, pkt
- Explanation
- A chunk was missing mandatory parameters. This log is controlled by SCTPSettings:SCTPLogFormatError.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets.
2.40.83. [ID: 1325] Invalid stream ID
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Invalid stream ID.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, streamid, max, pkt, assoc, rule
- Explanation
- The stream ID of an SCTP DATA chunk was larger than the maximum outbound stream ID of the association.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.84. [ID: 1296] Invalid pad parameter inside chunk
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Invalid pad parameter inside chunk.
- Default Log Severity
- Warning
- Parameters
- chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, padlen, pkt
- Explanation
- A padding parameter according to RFC4820 was found within a chunk that is not an INIT chunk. According to RFC4820, apart from
an INIT chunk, the padding parameter must not be included in any other chunk.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is invalid. If the packet sender is one of your network devices, investigate why the unit is sending packets with
padding parameters included in other chunks than an INIT chunk.
2.40.85. [ID: 1195] Invalid SCTP chunk parameter length
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Invalid SCTP chunk parameter length.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, pkt
- Explanation
- The parameter length exceeded the SCTP chunk length, or the parameter length did not match the length specified for that parameter
type.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed
packets.
2.40.86. [ID: 1354] Invalid source interface
- Log Categories
- SCTP,ROUTE,STATEFUL,VALIDATE
- Log Message
- Invalid source interface.
- Default Log Severity
- Warning
- Parameters
- recviface, iface, flow, assoc, rule, user, userid
- Explanation
- The source IP was received by interface recviface that is not security equivalent with the corresponding interface iface that was used when the association was setup. From the moment the association is setup, the initiator is assumed to be reached
via the interface from which the INIT message was received, or one that is security equivalent with it. Similarly the responder
is assumed to be reached via the original destination interface of the INIT message, or one that is security equivalent with
it. This log message is generated when the assumption is violated by the traffic.
- Gateway Action
- Drop
- Action Description
- The system prevented an SCTP flow from being opened because the source route is deemed not to be security equivalent with
those used during association setup
- Proposed Action
- Establish whether the IP address was received by the correct interface. Verify whether the IP address is valid for the association.
Review whether the receive interface recviface should be security equivalent with the corresponding interface iface used at the association setup.
2.40.87. [ID: 1167] Invalid SCTP source port
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Invalid SCTP source port.
- Default Log Severity
- Notice
- Parameters
- matchkey
- Explanation
- The source port of the SCTP message was zero.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.88. [ID: 1181] Invalid SCTP verification tag
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Invalid SCTP verification tag.
- Default Log Severity
- Notice
- Parameters
- vtag, pkt
- Explanation
- The SCTP verification tag was zero for an INIT message.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.89. [ID: 1301] Chunk length includes the padding of the last[...]
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Chunk length includes the padding of the last parameter.
- Default Log Severity
- Notice
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, padlen, pkt
- Explanation
- The length parameter of a chunk includes tha padding of the chunk's last parameter.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- This log message is controlled by SCTPSettings:SCTPLogFormatError.
2.40.90. [ID: 1340] Max IP addresses exceeded
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Max IP addresses exceeded.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, max, ip, pkt, assoc, rule
- Explanation
- Maximum number of IP addresses allowed for a peer of an association was reached. The IP address will be stripped from the
packet.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- None
2.40.91. [ID: 1370] Max control chunks exceeded
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Max control chunks exceeded.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, count, max, pkt
- Explanation
- The configured maximum number of allowed SCTP control chunks for an SCTP packet per service used has been reached.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If the maximum number of allowed SCTP control chunks for an SCTP packet per SCTP service is too low, increase it.
2.40.92. [ID: 1364] Max DATA chunks exceeded
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Max DATA chunks exceeded.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, count, max, pkt
- Explanation
- The configured maximum number of allowed SCTP DATA chunks for an SCTP packet per service used has been reached.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If the maximum number of allowed SCTP DATA chunks for an SCTP packet per SCTP service is too low, increase it.
2.40.93. [ID: 1360] Max inbound streams adjusted
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Max inbound streams adjusted.
- Default Log Severity
- Notice
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, instreams, max, pkt, assoc, rule
- Explanation
- The maximum number of inbound streams in an INIT or INIT_ACK chunk was reduced due to the setting of the maximum allowed inbound
streams set on the SCTP service used by the IP rule allowing the traffic in the case of an INIT chunk or because of the setting
of the maximum allowed outbound streams in the case of an INIT_ACK chunk.
- Gateway Action
- Adjust
- Action Description
- None
- Proposed Action
- Increment the maximum inbound streams setting on the SCTP service used by the IP rule in case of an INIT chunk or the maximum
outbound streams setting in case of an INIT_ACK chunk.
2.40.94. [ID: 1356] Max outbound streams adjusted
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Max outbound streams adjusted.
- Default Log Severity
- Notice
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, outstreams, max, pkt, assoc, rule
- Explanation
- The maximum number of outbound streams in an INIT or INIT_ACK chunk was reduced either due to the setting of the maximum allowed
outbound streams set on the SCTP service used by the IP rule allowing the traffic in the case of an INIT chunk or because
of the setting of the maximum allowed inbound streams in the case of an INIT_ACK chunk.
- Gateway Action
- Adjust
- Action Description
- None
- Proposed Action
- Increment the maximum outbound streams setting on the SCTP service used by the IP rule in case of an INIT chunk or the maximum
inbound streams setting in case of an INIT_ACK chunk.
2.40.95. [ID: 1299] Missing SCTP chunk padding
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Missing SCTP chunk padding.
- Default Log Severity
- Warning
- Parameters
- chunktype, chunkindex, chunkoffset, chunklen, pkt
- Explanation
- A packet with a chunk that is not padded to a multiple of four was detected.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This log message is controlled by SCTPSettings:SCTPLogFormatError. This packet is invalid. If the packet sender is one of your network devices, investigate why the unit is sending packets
containing chunks not padded to a multiple of four.
2.40.96. [ID: 1285] Missing mandatory SCTP parameter from a chunk
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Missing mandatory SCTP parameter from a chunk.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, paramtype, pkt
- Explanation
- A mandatory parameter is missing from a chunk.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is invalid. If the packet sender is one of your network devices, investigate why the unit is sending SCTP packets
with chunks that are missing mandatory parameters.
2.40.97. [ID: 1168] Missing SCTP cookie
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Missing SCTP cookie.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt
- Explanation
- The SCTP message contained an COOKIE ECHO chunk without cookie data.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.98. [ID: 1330] No association found
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- No association found.
- Default Log Severity
- Warning
- Parameters
- iplen, vtag, chunktype, chunkindex, chunkoffset, chunklen, pkt
- Explanation
- No association was found for a received SCTP chunk.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.99. [ID: 1688] No valid association found
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- No valid association found.
- Default Log Severity
- Notice
- Parameters
- pkt
- Explanation
- An SCTP packet was dropped even though a matching association had been found. This is related to policy updates and can either
mean that the association ended up being forcefully closed, or it indicates a temporary condition where the system was unable
to verify that the association conformed with the system policy.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.100. [ID: 1341] No whitelisted PPIDs
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- No whitelisted PPIDs.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, ppid, pkt, assoc, rule
- Explanation
- Whitelist of Payload Protocol Identifiers is used in the SCTP service configured without any members. All Payload Protocol
Identifiers are disallowed.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Include the Payload Protocol Identifiers you want to be allowed to the whitelist list of the SCTP service used by the IP rule
that allows the traffic.
2.40.101. [ID: 1349] No possible association restart
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- No possible association restart.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
- Explanation
- An established association which has not previously encountered chunks that justify an association restart, receives a chunk
that could be valid only if there was an ongoing possible restart.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.102. [ID: 1292] Non-zero SCTP chunk padding inside chunk
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Non-zero SCTP chunk padding inside chunk.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
- Explanation
- The SCTP chunk contained a padding parameter, a padding chunk, a padding trailer inside the chunk or some other non-standard
padding construct beginning. The padding is located at offset offset (relative the SCTP header), inside the chunk with index chunkindex. The padding contains non-zero data; most likely unintentionally leaked data. This may also be a severely malformed packet,
whose content is impossible to interpret.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- Investigate why non-standard padding is leaking data; try to locate the source. Padding chunks (chunktype equals 132) and padding parameters (only possible when chunktype equals 1) are likely an attempt by network appliance to disable a specific SCTP feature without a need to rewrite the packet.
Non-zero padding inside error chunks (chunktype equals 9) is probably caused by the SCTP end point leaking internal data from network handling. The setting SCTPSettings:SCTPPaddingInsideChunk can be modified to change the handling of padding parameters, padding chunks and padding trailers. The setting SCTPSettings:SCTPNonZeroPadding can be modified to change the general handling of non-zero padding data.
2.40.103. [ID: 1297] Non-zero SCTP chunk padding inside chunk
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Non-zero SCTP chunk padding inside chunk.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
- Explanation
- The SCTP chunk contained a padding parameter, a padding chunk, a padding trailer inside the chunk or some other non-standard
padding construct beginning. The padding is located at offset offset (relative the SCTP header), inside the chunk with index chunkindex. The padding contains non-zero data; most likely unintentionally leaked data. This may also be a severely malformed packet,
whose content is impossible to interpret.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Investigate why non-standard padding is leaking data; try to locate the source. Padding chunks (chunktype equals 132) and padding parameters (only possible when chunktype equals 1) are likely an attempt by network appliance to disable a specific SCTP feature without a need to rewrite the packet.
Non-zero padding inside error chunks (chunktype equals 9) is probably caused by the SCTP end point leaking internal data from network handling. The setting SCTPSettings:SCTPPaddingInsideChunk can be modified to change the handling of padding parameters, padding chunks and padding trailers. The setting SCTPSettings:SCTPNonZeroPadding can be modified to change the general handling of non-zero padding data.
2.40.104. [ID: 1289] Non-zero SCTP chunk padding inside chunk
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Non-zero SCTP chunk padding inside chunk.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
- Explanation
- The SCTP chunk contained a padding parameter, a padding chunk, a padding trailer inside the chunk or some other non-standard
padding construct beginning. The padding is located at offset offset (relative the SCTP header), inside the chunk with index chunkindex. The padding contains non-zero data; most likely unintentionally leaked data. This may also be a severely malformed packet,
whose content is impossible to interpret.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- Investigate why non-standard padding is leaking data; try to locate the source. Padding chunks (chunktype equals 132) and padding parameters (only possible when chunktype equals 1) are likely an attempt by network appliance to disable a specific SCTP feature without a need to rewrite the packet.
Non-zero padding inside error chunks (chunktype equals 9) is probably caused by the SCTP end point leaking internal data from network handling. The setting SCTPSettings:SCTPPaddingInsideChunk can be modified to change the handling of padding parameters, padding chunks and padding trailers. The setting SCTPSettings:SCTPNonZeroPadding can be modified to change the general handling of non-zero padding data.
2.40.105. [ID: 1197] SCTP chunk padding inside chunk
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- SCTP chunk padding inside chunk.
- Default Log Severity
- Notice
- Parameters
- chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
- Explanation
- The SCTP chunk contained a padding parameter, a padding trailer inside the chunk or some other valid, but more or less non-standard
padding construct. The system did not investigate whether the padding data is non-zero or not, because of the current setting
of SCTPSettings:SCTPNonZeroPadding. RFC 4820 describes the purpose of padding parameters and padding chunks as a mean to enlarge SCTP INIT chunks and SCTP packets,
respectively. Another (more likely) usage is that firewalls can use padding parameters and padding chunks to remove features
from an SCTP packet without affecting the packet layout.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- Set SCTPSettings:SCTPPaddingInsideChunk to change the handling of padding parameters, padding chunks and padding trailers. The setting SCTPSettings:SCTPNonZeroPadding can be modified to change the general handling of non-zero padding data.
2.40.106. [ID: 1290] SCTP chunk padding inside chunk
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- SCTP chunk padding inside chunk.
- Default Log Severity
- Information
- Parameters
- chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
- Explanation
- The SCTP chunk contained a padding parameter, a padding trailer inside the chunk or some other valid, but more or less non-standard
padding construct. This log message will only be generated for valid padding; data consisting of all zeroes. RFC 4820 describes
the purpose of padding parameters and padding chunks as a mean to enlarge SCTP INIT chunks and SCTP packets, respectively.
Another (more likely) usage is that firewalls can use padding parameters and padding chunks to remove features from an SCTP
packet without affecting the packet layout.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- Set SCTPSettings:SCTPPaddingInsideChunk to change the handling of padding parameters, padding chunks and padding trailers. The setting SCTPSettings:SCTPNonZeroPadding can be modified to change the general handling of non-zero padding data.
2.40.107. [ID: 1282] SCTP chunk padding inside chunk
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- SCTP chunk padding inside chunk.
- Default Log Severity
- Warning
- Parameters
- chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
- Explanation
- The SCTP chunk contained a padding parameter, a padding trailer inside the chunk or some other valid, but more or less non-standard
padding construct. The system did not investigate whether the padding data is non-zero or not, because of the current setting
of SCTPSettings:SCTPPaddingInsideChunk. RFC 4820 describes the purpose of padding parameters and padding chunks as a mean to enlarge SCTP INIT chunks and SCTP packets,
respectively. Another (more likely) usage is that firewalls can use padding parameters and padding chunks to remove features
from an SCTP packet without affecting the packet layout.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Set SCTPSettings:SCTPPaddingInsideChunk to change the handling of padding parameters, padding chunks and padding trailers. The setting SCTPSettings:SCTPNonZeroPadding can be modified to change the general handling of non-zero padding data.
2.40.108. [ID: 1281] SCTP chunk padding inside chunk
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- SCTP chunk padding inside chunk.
- Default Log Severity
- Warning
- Parameters
- chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
- Explanation
- The SCTP chunk contained a padding parameter, a padding trailer inside the chunk or some other valid, but more or less non-standard
padding construct. The system did not investigate whether the padding data is non-zero or not, because of the current setting
of SCTPSettings:SCTPPaddingInsideChunk. RFC 4820 describes the purpose of padding parameters and padding chunks as a mean to enlarge SCTP INIT chunks and SCTP packets,
respectively. Another (more likely) usage is that firewalls can use padding parameters and padding chunks to remove features
from an SCTP packet without affecting the packet layout.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- Set SCTPSettings:SCTPPaddingInsideChunk to change the handling of padding parameters, padding chunks and padding trailers. The setting SCTPSettings:SCTPNonZeroPadding can be modified to change the general handling of non-zero padding data.
2.40.109. [ID: 1190] Non-zero SCTP chunk padding
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Non-zero SCTP chunk padding.
- Default Log Severity
- Notice
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, padlen, pkt
- Explanation
- The padding for an SCTP chunk (after the chunk) contained non-zero data. This is most likely unintentionally leaked internal
data, remaining from packet handling.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- Set SCTPSettings:SCTPNonZeroPadding to change the handling of non-zero padding.
2.40.110. [ID: 1278] Non-zero SCTP chunk padding
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Non-zero SCTP chunk padding.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, padlen, pkt
- Explanation
- The padding for an SCTP chunk (after the chunk) contained non-zero data. This is most likely unintentionally leaked internal
data, remaining from packet handling.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Set SCTPSettings:SCTPNonZeroPadding to change the handling of non-zero padding.
2.40.111. [ID: 1279] Non-zero SCTP chunk padding
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Non-zero SCTP chunk padding.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, padlen, pkt
- Explanation
- The padding for an SCTP chunk (after the chunk) contained non-zero data. This is most likely unintentionally leaked internal
data, remaining from packet handling.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- Set SCTPSettings:SCTPNonZeroPadding to change the handling of non-zero padding.
2.40.112. [ID: 1173] Non-zero reserved field in SCTP error cause
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Non-zero reserved field in SCTP error cause.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, code, offset, datalen, pkt
- Explanation
- The SCTP message contained an error cause with a reserved field that was not zero. This log is controlled by SCTPSettings:SCTPLogFormatError.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.113. [ID: 1269] Non-zero SCTP chunk parameter padding
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Non-zero SCTP chunk parameter padding.
- Default Log Severity
- Notice
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, paramoffset, paramlen, padlen, pkt
- Explanation
- The padding after an SCTP parameter (inside a chunk) contained non-zero data. This is most likely unintentionally leaked internal
data, remaining from packet handling.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- Set SCTPSettings:SCTPNonZeroPadding to change the handling of non-zero padding.
2.40.114. [ID: 1268] Non-zero SCTP chunk parameter padding
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Non-zero SCTP chunk parameter padding.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, paramoffset, paramlen, padlen, pkt
- Explanation
- The padding after an SCTP parameter (inside a chunk) contained non-zero data. This is most likely unintentionally leaked internal
data, remaining from packet handling.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Set SCTPSettings:SCTPNonZeroPadding to change the handling of non-zero padding.
2.40.115. [ID: 1196] Non-zero SCTP chunk parameter padding
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Non-zero SCTP chunk parameter padding.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, paramoffset, paramlen, padlen, pkt
- Explanation
- The padding after an SCTP parameter (inside a chunk) contained non-zero data. This is most likely unintentionally leaked internal
data, remaining from packet handling.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- Set SCTPSettings:SCTPNonZeroPadding to change the handling of non-zero padding.
2.40.116. [ID: 1344] Non-first SCTP cookie ack
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Non-first SCTP cookie ack.
- Default Log Severity
- Warning
- Parameters
- chunktype, chunkindex, chunkoffset, chunklen, offset, pkt
- Explanation
- A COOKIE ACK chunk was found that was not the first chunk in the packet.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.117. [ID: 1295] Non-first SCTP cookie
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Non-first SCTP cookie.
- Default Log Severity
- Warning
- Parameters
- chunktype, chunkindex, chunkoffset, chunklen, offset, pkt
- Explanation
- A COOKIE ECHO chunk was found that was not the first chunk in the packet.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.118. [ID: 1365] PPID not whitelisted
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- PPID not whitelisted.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, ppid, pkt, assoc, rule
- Explanation
- The Payload Protocol Identifier of a DATA chunk was not whitelisted by the SCTP service that is used by the IP rule that allows
the traffic.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Include the Payload Protocol Identifier in the whitelist of the SCTP service used if you want to allow it.
2.40.119. [ID: 1441] SCTP padding chunk
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- SCTP padding chunk.
- Default Log Severity
- Notice
- Parameters
- chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
- Explanation
- The SCTP contained a padding chunk. The system did not investigate whether the padding data is non-zero or not, because of
the current setting of SCTPSettings:SCTPNonZeroPadding. RFC 4820 describes the purpose of padding parameters and padding chunks as a mean to enlarge SCTP INIT chunks and SCTP packets,
respectively. Another (more likely) usage is that firewalls can use padding parameters and padding chunks to remove features
from an SCTP packet without affecting the packet layout.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- Set SCTPSettings:SCTPPaddingChunk to change the handling of chunks. The setting SCTPSettings:SCTPNonZeroPadding can be modified to change the general handling of non-zero padding data.
2.40.120. [ID: 1438] SCTP padding chunk
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- SCTP padding chunk.
- Default Log Severity
- Information
- Parameters
- chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
- Explanation
- The SCTP contained a padding chunk. This log message will only be generated for valid padding; data consisting of all zeroes.
RFC 4820 describes the purpose of padding parameters and padding chunks as a mean to enlarge SCTP INIT chunks and SCTP packets,
respectively. Another (more likely) usage is that firewalls can use padding parameters and padding chunks to remove features
from an SCTP packet without affecting the packet layout.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- Set SCTPSettings:SCTPPaddingChunk to change the handling of padding chunks. The setting SCTPSettings:SCTPNonZeroPadding can be modified to change the general handling of non-zero padding data.
2.40.121. [ID: 1440] SCTP padding chunk
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- SCTP padding chunk.
- Default Log Severity
- Warning
- Parameters
- chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
- Explanation
- The SCTP chunk contained a padding chunk. The system did not investigate whether the padding data is non-zero or not, because
of the current setting of SCTPSettings:SCTPPaddingChunk. RFC 4820 describes the purpose of padding parameters and padding chunks as a mean to enlarge SCTP INIT chunks and SCTP packets,
respectively. Another (more likely) usage is that firewalls can use padding parameters and padding chunks to remove features
from an SCTP packet without affecting the packet layout.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Set SCTPSettings:SCTPPaddingChunk to change the handling of chunks. The setting SCTPSettings:SCTPNonZeroPadding can be modified to change the general handling of non-zero padding data.
2.40.122. [ID: 1437] SCTP padding chunk
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- SCTP padding chunk.
- Default Log Severity
- Notice
- Parameters
- chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
- Explanation
- The SCTP contained a padding chunk. The system did not investigate whether the padding data is non-zero or not, because of
the current setting of SCTPSettings:SCTPNonZeroPadding. RFC 4820 describes the purpose of padding parameters and padding chunks as a mean to enlarge SCTP INIT chunks and SCTP packets,
respectively. Another (more likely) usage is that firewalls can use padding parameters and padding chunks to remove features
from an SCTP packet without affecting the packet layout.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- Set SCTPSettings:SCTPPaddingChunk to change the handling of chunks. The setting SCTPSettings:SCTPNonZeroPadding can be modified to change the general handling of non-zero padding data.
2.40.123. [ID: 1380] Association restart from responder failed
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Association restart from responder failed.
- Default Log Severity
- Warning
- Parameters
- pkt, assoc, rule
- Explanation
- The responder of an association issued a restart but no matching IP rule was found to allow it.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Configure an IP rule that allows the restart from the responder.
2.40.124. [ID: 1328] Responder vtag mismatch
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Responder vtag mismatch.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, vtag, pkt, assoc, rule
- Explanation
- The verification tag of an SCTP common header sent by the initiator of an SCTP association does not match the verification
tag of the responder.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.125. [ID: 1351] Source port mismatch
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- Source port mismatch.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, srcport, pkt, assoc, rule
- Explanation
- The source port of an SCTP packet sent by the initiator of an association does not match the source port of the association
the packet belongs to.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.126. [ID: 1270] Stateful SCTP is not supported
- Log Categories
- SCTP,STATEFUL
- Log Message
- Stateful SCTP is not supported. Packets will be dropped.
- Default Log Severity
- Warning
- Parameters
- matchkey
- Explanation
- A stateful IP rule has matched SCTP traffic. Stateful SCTP traffic will be dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- In order to forward the SCTP traffic, configure the IP rule as 'stateless'. SCTP support can also be turned off with SCTPSettings:SCTPEnabled, in which case SCTP will be forwarded as the 'unknown' IP protocol 132.
2.40.127. [ID: 1283] Too many occurrences of SCTP parameter
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Too many occurrences of SCTP parameter.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, paramtype, count, max, pkt
- Explanation
- The SCTP chunk chunktype contained too many parameters of type paramtype.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.128. [ID: 1334] Unexpected state cookie
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Unexpected state cookie.
- Default Log Severity
- Warning
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt
- Explanation
- A state cookie parameter was discovered outside of an INIT-ACK chunk.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.40.129. [ID: 1280] Unknown mandatory chunk type
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Unknown mandatory chunk type.
- Default Log Severity
- Warning
- Parameters
- chunktype, flags, chunkindex, chunkoffset, chunklen, pkt
- Explanation
- An unknown "mandatory" chunk type has been encountered; what RFC 4960 mentions as "highest-order bit types" 00 and 01 in Section
3.2, and roughly translates into "when unknown, ignore the remaining chunks of this packet". While unknown, these types are
typically used to modify the general actions an SCTP endpoint should take when acting upon chunks. The effect is likely limited
to a single packet, and only those chunks following it.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- This log message is controlled by SCTPSettings:SCTPLogUnknownMandChunk. How to handle these types of unknown chunks is controlled by SCTPSettings:SCTPUnknownMandChunk and SCTPSettings:SCTPUnknownMandChunkNotify.
2.40.130. [ID: 1184] Unknown mandatory chunk type
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Unknown mandatory chunk type.
- Default Log Severity
- Notice
- Parameters
- chunktype, flags, chunkindex, chunkoffset, chunklen, pkt
- Explanation
- An unknown "mandatory" chunk type has been encountered; what RFC 4960 mentions as "highest-order bit types" 00 and 01 in Section
3.2, and roughly translates into "when unknown, ignore the remaining chunks of this packet". While unknown, these types are
typically used to modify the general actions an SCTP endpoint should take when acting upon chunks. The effect is likely limited
to a single packet, and only those chunks following it.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- This log message is controlled by SCTPSettings:SCTPLogUnknownMandChunk. How to handle these types of unknown chunks is controlled by SCTPSettings:SCTPUnknownMandChunk and SCTPSettings:SCTPUnknownMandChunkNotify.
2.40.131. [ID: 1193] Unknown mandatory chunk type
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Unknown mandatory chunk type.
- Default Log Severity
- Warning
- Parameters
- chunktype, flags, chunkindex, chunkoffset, chunklen, pkt
- Explanation
- An unknown "mandatory" chunk type has been encountered; what RFC 4960 mentions as "highest-order bit types" 00 and 01 in Section
3.2, and roughly translates into "when unknown, ignore the remaining chunks of this packet". While unknown, these types are
typically used to modify the general actions an SCTP endpoint should take when acting upon chunks. The effect is likely limited
to a single packet, and only those chunks following it.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This log message is controlled by SCTPSettings:SCTPLogUnknownMandChunk. How to handle these types of unknown chunks is controlled by SCTPSettings:SCTPUnknownMandChunk and SCTPSettings:SCTPUnknownMandChunkNotify.
2.40.132. [ID: 1191] Unknown mandatory chunk type
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Unknown mandatory chunk type.
- Default Log Severity
- Warning
- Parameters
- chunktype, flags, chunkindex, chunkoffset, chunklen, pkt
- Explanation
- An unknown "mandatory" chunk type has been encountered; what RFC 4960 mentions as "highest-order bit types" 00 and 01 in Section
3.2, and roughly translates into "when unknown, ignore the remaining chunks of this packet". While unknown, these types are
typically used to modify the general actions an SCTP endpoint should take when acting upon chunks. The effect is likely limited
to a single packet, and only those chunks following it.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- This log message is controlled by SCTPSettings:SCTPLogUnknownMandChunk. How to handle these types of unknown chunks is controlled by SCTPSettings:SCTPUnknownMandChunk and SCTPSettings:SCTPUnknownMandChunkNotify.
2.40.133. [ID: 1236] Unknown mandatory parameter type
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Unknown mandatory parameter type.
- Default Log Severity
- Warning
- Parameters
- chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, pkt
- Explanation
- An unknown "mandatory" parameter type has been encountered; what RFC 4960 mentions as "highest-order bit types" 00 and 01
in Section 3.2.1, and roughly translates into "when unknown, ignore the remaining parameters of this chunk". While unknown,
these types are typically carrying instructions to modify the interpretation of other parameters inside the same chunk.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- This log message is controlled by SCTPSettings:SCTPLogUnknownMandParam. How to handle these types of unknown parameters is controlled by SCTPSettings:SCTPUnknownMandParam and SCTPSettings:SCTPUnknownMandParamNotify.
2.40.134. [ID: 1171] Unknown mandatory parameter type
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Unknown mandatory parameter type.
- Default Log Severity
- Notice
- Parameters
- chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, pkt
- Explanation
- An unknown "mandatory" parameter type has been encountered; what RFC 4960 mentions as "highest-order bit types" 00 and 01
in Section 3.2.1, and roughly translates into "when unknown, ignore the remaining parameters of this chunk". While unknown,
these types are typically carrying instructions to modify the interpretation of other parameters inside the same chunk.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- This log message is controlled by SCTPSettings:SCTPLogUnknownMandParam. How to handle these types of unknown parameters is controlled by SCTPSettings:SCTPUnknownMandParam and SCTPSettings:SCTPUnknownMandParamNotify.
2.40.135. [ID: 1166] Unknown mandatory parameter type
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Unknown mandatory parameter type.
- Default Log Severity
- Warning
- Parameters
- chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, pkt
- Explanation
- An unknown "mandatory" parameter type has been encountered; what RFC 4960 mentions as "highest-order bit types" 00 and 01
in Section 3.2.1, and roughly translates into "when unknown, ignore the remaining parameters of this chunk". While unknown,
these types are typically carrying instructions to modify the interpretation of other parameters inside the same chunk.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This log message is controlled by SCTPSettings:SCTPLogUnknownMandParam. How to handle these types of unknown parameters is controlled by SCTPSettings:SCTPUnknownMandParam and SCTPSettings:SCTPUnknownMandParamNotify.
2.40.136. [ID: 1186] Unknown mandatory parameter type
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Unknown mandatory parameter type.
- Default Log Severity
- Warning
- Parameters
- chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, pkt
- Explanation
- An unknown "mandatory" parameter type has been encountered; what RFC 4960 mentions as "highest-order bit types" 00 and 01
in Section 3.2.1, and roughly translates into "when unknown, ignore the remaining parameters of this chunk". While unknown,
these types are typically carrying instructions to modify the interpretation of other parameters inside the same chunk.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- This log message is controlled by SCTPSettings:SCTPLogUnknownMandParam. How to handle these types of unknown parameters is controlled by SCTPSettings:SCTPUnknownMandParam and SCTPSettings:SCTPUnknownMandParamNotify.
2.40.137. [ID: 1248] Unknown optional chunk type
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Unknown optional chunk type.
- Default Log Severity
- Warning
- Parameters
- chunktype, flags, chunkindex, chunkoffset, chunklen, pkt
- Explanation
- An unknown "optional" chunk type has been encountered; what RFC 4960 mentions as "highest-order bit types" 10 and 11 in Section
3.2, and roughly translates into "when unknown, ignore chunk". While unknown, these types are typically carrying instructions
to modify the SCTP association. Usually these instructions are not critical for the functionality of the association, though
"type 11" is more likely to be of importance.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- This log message is controlled by SCTPSettings:SCTPLogUnknownOptChunk. How to handle these types of unknown chunks is controlled by SCTPSettings:SCTPUnknownOptChunk and SCTPSettings:SCTPUnknownOptChunkNotify.
2.40.138. [ID: 1180] Unknown optional chunk type
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Unknown optional chunk type.
- Default Log Severity
- Notice
- Parameters
- chunktype, flags, chunkindex, chunkoffset, chunklen, pkt
- Explanation
- An unknown "optional" chunk type has been encountered; what RFC 4960 mentions as "highest-order bit types" 10 and 11 in Section
3.2, and roughly translates into "when unknown, ignore chunk". While unknown, these types are typically carrying instructions
to modify the SCTP association. Usually these instructions are not critical for the functionality of the association, though
"type 11" is more likely to be of importance.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- This log message is controlled by SCTPSettings:SCTPLogUnknownOptChunk. How to handle these types of unknown chunks is controlled by SCTPSettings:SCTPUnknownOptChunk and SCTPSettings:SCTPUnknownOptChunkNotify.
2.40.139. [ID: 1172] Unknown optional chunk type
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Unknown optional chunk type.
- Default Log Severity
- Warning
- Parameters
- chunktype, flags, chunkindex, chunkoffset, chunklen, pkt
- Explanation
- An unknown "optional" chunk type has been encountered; what RFC 4960 mentions as "highest-order bit types" 10 and 11 in Section
3.2, and roughly translates into "when unknown, ignore chunk". While unknown, these types are typically carrying instructions
to modify the SCTP association. Usually these instructions are not critical for the functionality of the association, though
"type 11" is more likely to be of importance.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This log message is controlled by SCTPSettings:SCTPLogUnknownOptChunk. How to handle these types of unknown chunks is controlled by SCTPSettings:SCTPUnknownOptChunk and SCTPSettings:SCTPUnknownOptChunkNotify.
2.40.140. [ID: 1175] Unknown optional chunk type
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Unknown optional chunk type.
- Default Log Severity
- Warning
- Parameters
- chunktype, flags, chunkindex, chunkoffset, chunklen, pkt
- Explanation
- An unknown "optional" chunk type has been encountered; what RFC 4960 mentions as "highest-order bit types" 10 and 11 in Section
3.2, and roughly translates into "when unknown, ignore chunk". While unknown, these types are typically carrying instructions
to modify the SCTP association. Usually these instructions are not critical for the functionality of the association, though
"type 11" is more likely to be of importance.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- This log message is controlled by SCTPSettings:SCTPLogUnknownOptChunk. How to handle these types of unknown chunks is controlled by SCTPSettings:SCTPUnknownOptChunk and SCTPSettings:SCTPUnknownOptChunkNotify.
2.40.141. [ID: 1214] Unknown optional parameter type
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Unknown optional parameter type.
- Default Log Severity
- Warning
- Parameters
- chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, pkt
- Explanation
- An unknown "optional" parameter type has been encountered; what RFC 4960 mentions as "highest-order bit types" 10 and 11 in
Section 3.2.1, and roughly translates into "when unknown, ignore this parameter". While unknown, these types are typically
carrying non-vital options for a chunk.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- This log message is controlled by SCTPSettings:SCTPLogUnknownOptParam. How to handle these types of unknown parameters is controlled by SCTPSettings:SCTPUnknownOptParam and SCTPSettings:SCTPUnknownOptParamNotify.
2.40.142. [ID: 1185] Unknown optional parameter type
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Unknown optional parameter type.
- Default Log Severity
- Notice
- Parameters
- chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, pkt
- Explanation
- An unknown "optional" parameter type has been encountered; what RFC 4960 mentions as "highest-order bit types" 10 and 11 in
Section 3.2.1, and roughly translates into "when unknown, ignore this parameter". While unknown, these types are typically
carrying non-vital options for a chunk.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- This log message is controlled by SCTPSettings:SCTPLogUnknownOptParam. How to handle these types of unknown parameters is controlled by SCTPSettings:SCTPUnknownOptParam and SCTPSettings:SCTPUnknownOptParamNotify.
2.40.143. [ID: 1182] Unknown optional parameter type
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Unknown optional parameter type.
- Default Log Severity
- Warning
- Parameters
- chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, pkt
- Explanation
- An unknown "optional" parameter type has been encountered; what RFC 4960 mentions as "highest-order bit types" 10 and 11 in
Section 3.2.1, and roughly translates into "when unknown, ignore this parameter". While unknown, these types are typically
carrying non-vital options for a chunk.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This log message is controlled by SCTPSettings:SCTPLogUnknownOptParam. How to handle these types of unknown parameters is controlled by SCTPSettings:SCTPUnknownOptParam and SCTPSettings:SCTPUnknownOptParamNotify.
2.40.144. [ID: 1192] Unknown optional parameter type
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Unknown optional parameter type.
- Default Log Severity
- Warning
- Parameters
- chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, pkt
- Explanation
- An unknown "optional" parameter type has been encountered; what RFC 4960 mentions as "highest-order bit types" 10 and 11 in
Section 3.2.1, and roughly translates into "when unknown, ignore this parameter". While unknown, these types are typically
carrying non-vital options for a chunk.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- This log message is controlled by SCTPSettings:SCTPLogUnknownOptParam. How to handle these types of unknown parameters is controlled by SCTPSettings:SCTPUnknownOptParam and SCTPSettings:SCTPUnknownOptParamNotify.
2.40.145. [ID: 1169] Unknown supported address type
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Unknown supported address type.
- Default Log Severity
- Warning
- Parameters
- paramtype, pkt
- Explanation
- An unknown address type was found in the "supported address types" parameter. The packet may be broken.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- Unknown address types will be allowed if and only if SCTPSettings:SCTPUnknownAddressType allow this.
2.40.146. [ID: 1286] Unknown supported address type
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Unknown supported address type.
- Default Log Severity
- Warning
- Parameters
- paramtype, pkt
- Explanation
- An unknown address type was found in the "supported address types" parameter. The packet may be broken.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Unknown address types will be allowed if and only if SCTPSettings:SCTPUnknownAddressType allow this.
2.40.147. [ID: 1179] Unknown supported address type
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Unknown supported address type.
- Default Log Severity
- Warning
- Parameters
- paramtype, pkt
- Explanation
- An unknown address type was found in the "supported address types" parameter. The packet may be broken.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- Unknown address types will be allowed if and only if SCTPSettings:SCTPUnknownAddressType allow this.
2.40.148. [ID: 1183] Unkown SCTP error cause
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Unkown SCTP error cause.
- Default Log Severity
- Notice
- Parameters
- iplen, offset, code, pkt
- Explanation
- The system does not recognize an error cause in the SCTP message. The body of the error cause will not be validated.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- None
2.40.149. [ID: 1747] Unresolved clash
- Log Categories
- SCTP,STATEFUL,HA
- Log Message
- Unresolved clash.
- Default Log Severity
- Critical
- Parameters
- assoc, rule
- Explanation
- The peer already has an existing association that partially overlaps the association assoc. The two associations have both been established in accordance with the policy of respective HA node, but the combination
of the two over the HA cluster is not valid.
- Gateway Action
- Abort
- Action Description
- The node will try again
- Proposed Action
- Identify the two mutually exclusive associations, and manually resolve the situation. The peer is likely to have additional
log messages. Consider rebooting one of the HA nodes.
2.40.150. [ID: 1745] Unresolved inconsistency
- Log Categories
- SCTP,STATEFUL,HA
- Log Message
- Unresolved inconsistency.
- Default Log Severity
- Notice
- Parameters
- assoc, rule
- Explanation
- Disallowed by peer, but allowed by the current node. This could occur temporarily when dynamic routes are involved.
- Gateway Action
- Ignore
- Action Description
- The node will try again
- Proposed Action
- None
2.40.151. [ID: 1746] Unresolved memory problem
- Log Categories
- SCTP,STATEFUL,HA
- Log Message
- Unresolved memory problem.
- Default Log Severity
- Warning
- Parameters
- assoc, rule
- Explanation
- Peer reported being unable to handle the synchronization attempt, likely because memory shortage.
- Gateway Action
- Ignore
- Action Description
- The node will try again, with decreased frequency
- Proposed Action
- Investigare the memory usage of the peer node, as well as periferal settings such as cache sizes. The peer is likely to have
additional log messages. Consider making configuration changes in order to decrease the load.
2.40.152. [ID: 1744] Unresolved policies
- Log Categories
- SCTP,STATEFUL,HA
- Log Message
- Unresolved policies.
- Default Log Severity
- Warning
- Parameters
- assoc, rule
- Explanation
- Disallowed by peer, but allowed by the current node. The problem appears to be persistent.
- Gateway Action
- Ignore
- Action Description
- The node will try again, with decreased frequency
- Proposed Action
- Verify the the peer's configuration, and log messages.
2.40.153. [ID: 1208] Not supported address type
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- Not supported address type.
- Default Log Severity
- Notice
- Parameters
- paramtype, pkt
- Explanation
- An unsupported address type was found in the "supported address types" parameter.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- Whether an address type is considered unsupported or not depends primarily on the IP rule; address types used by the IP rule
are supported, others are not. Any action on behalf of the unsupported address types will depend on SCTPSettings:SCTPMultihoming. The "host name address" type is a special case that is considered supported if and only if SCTPSettings:SCTPHostNameAddressParam is set to "Allow" this address type.
2.40.154. [ID: 1372] PPID whitelisted
- Log Categories
- SCTP,STATEFUL,VALIDATE
- Log Message
- PPID whitelisted.
- Default Log Severity
- Notice
- Parameters
- iplen, chunktype, chunkindex, chunkoffset, chunklen, ppid, pkt, assoc, rule
- Explanation
- The Payload Protocol Identifier of a DATA chunk is whitelisted by the SCTP service that is used by the IP rule that allows
the traffic.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- Exclude the Payload Protocol Identifier from the whitelist of the SCTP service used if you want to disallow it.
2.40.155. [ID: 1300] State cookie parameter has zero for value
- Log Categories
- SCTP,STATELESS,VALIDATE
- Log Message
- State cookie parameter has zero for value.
- Default Log Severity
- Warning
- Parameters
- chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, pkt
- Explanation
- A state cookie parameter with zero for value was found within an INIT_ACK chunk.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This packet is invalid. If the packet sender is one of your network devices, investigate why the unit is sending state cookie
parameters with zero for value within INIT_ACK chunks.
These log messages refer to the SIPALG category.
2.41.1. [ID: 1206] SIP ALG call leg deleted
- Log Categories
- SIPALG
- Log Message
- SIP ALG call leg deleted.
- Default Log Severity
- Notice
- Parameters
- method, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- The call leg for the identified method request was deleted.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.41.2. [ID: 1229] SIP ALG call leg state updated
- Log Categories
- SIPALG
- Log Message
- SIP ALG call leg state updated.
- Default Log Severity
- Debug
- Parameters
- state, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- The SIP ALG call leg state was updated to the identified state.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- None
2.41.3. [ID: 1260] Failed to create call leg
- Log Categories
- SIPALG
- Log Message
- Failed to create call leg.
- Default Log Severity
- Error
- Parameters
- method, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- The SIP ALG failed to create call leg for the identified method request.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.4. [ID: 1266] Failed to create new transaction
- Log Categories
- SIPALG
- Log Message
- Failed to create new transaction.
- Default Log Severity
- Error
- Parameters
- method, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- The SIP ALG failed to create transaction.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.5. [ID: 1267] Failed to do dns resolve
- Log Categories
- SIPALG
- Log Message
- Failed to do dns resolve.
- Default Log Severity
- Critical
- Parameters
- reason
- Explanation
- An attempt to resolve dns failed.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Check if the dns servers are configured and reachable by the firewall.
2.41.6. [ID: 1247] Failed to create SIP ALG session
- Log Categories
- SIPALG
- Log Message
- Failed to create SIP ALG session.
- Default Log Severity
- Error
- Parameters
- method, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- A new SIP ALG session request could not be created.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.7. [ID: 1262] Failed to find SIP ALG session
- Log Categories
- SIPALG
- Log Message
- Failed to find SIP ALG session.
- Default Log Severity
- Error
- Parameters
- reason, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- Failed to find SIP ALG session.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.8. [ID: 1259] Unsuccessful registration
- Log Categories
- SIPALG
- Log Message
- Unsuccessful registration.
- Default Log Severity
- Warning
- Parameters
- reason, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- The user failed to register.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.9. [ID: 1221] Failed unregistration
- Log Categories
- SIPALG
- Log Message
- Failed unregistration.
- Default Log Severity
- Notice
- Parameters
- reason, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- The user failed to unregister.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.10. [ID: 1210] Failed to find call leg
- Log Categories
- SIPALG
- Log Message
- Failed to find call leg.
- Default Log Severity
- Warning
- Parameters
- method, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- Failed to find call leg for identified method request.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.11. [ID: 1219] Failed to find role
- Log Categories
- SIPALG
- Log Message
- Failed to find role.
- Default Log Severity
- Error
- Parameters
- method, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- Failed to find role for the identified method request.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.12. [ID: 1202] Failed to find transaction
- Log Categories
- SIPALG
- Log Message
- Failed to find transaction.
- Default Log Severity
- Warning
- Parameters
- method, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- Failed to find transaction.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.13. [ID: 1213] Flow failed
- Log Categories
- SIPALG
- Log Message
- Flow failed.
- Default Log Severity
- Notice
- Parameters
- reason, originator, flow, rule
- Explanation
- An error occurred that caused the SIP flow to be aborted.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- None
2.41.14. [ID: 1224] Failed to get free NAT port pair for the[...]
- Log Categories
- SIPALG
- Log Message
- Failed to get free NAT port pair for the given host.
- Default Log Severity
- Critical
- Parameters
- reason, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- Failed to get free NAT port pair for the given host.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Failure on getting a NAT port pair may result from a heavy loaded system/port range. Revision of NAT configuration parameters
and system wide load is advisable.
2.41.15. [ID: 1322] Failed to install HA synced object
- Log Categories
- SIPALG
- Log Message
- Failed to install HA synced object.
- Default Log Severity
- Notice
- Parameters
- type, reason, matchkey
- Explanation
- The SIP ALG failed to install an object on the inactive node.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.41.16. [ID: 1323] Failed to apply HA update to object
- Log Categories
- SIPALG
- Log Message
- Failed to apply HA update to object.
- Default Log Severity
- Notice
- Parameters
- type, reason, matchkey
- Explanation
- The SIP ALG on the inactive HA node failed to update an object with the new parameters synced from the active node.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.41.17. [ID: 1205] Invalid SIP UDP packet received
- Log Categories
- SIPALG
- Log Message
- Invalid SIP UDP packet received.
- Default Log Severity
- Error
- Parameters
-
- Explanation
- The SIP ALG received an invalid UDP packet. The packet will be dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.18. [ID: 1211] Invalid session state change
- Log Categories
- SIPALG
- Log Message
- Invalid session state change.
- Default Log Severity
- Error
- Parameters
- state, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- Invalid session state found.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.41.19. [ID: 1237] Maximum number of transaction per session has[...]
- Log Categories
- SIPALG
- Log Message
- Maximum number of transaction per session has been reached.
- Default Log Severity
- Warning
- Parameters
- sessions, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- The configured maximum number of concurrent SIP sessions per SIP service has been reached.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- If the maximum number of SIP ALG sessions per SIP service is too low, increase it.
2.41.20. [ID: 1203] Maximum number of sessions per SIP URI has[...]
- Log Categories
- SIPALG
- Log Message
- Maximum number of sessions per SIP URI has been reached.
- Default Log Severity
- Warning
- Parameters
- sessions, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- The configured maximum number of concurrent SIP sessions per SIP URI has been reached.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- If the maximum number of SIP ALG sessions per SIP URI is too low, increase it.
2.41.21. [ID: 1220] Maximum number of sessions per Service has[...]
- Log Categories
- SIPALG
- Log Message
- Maximum number of sessions per Service has been reached.
- Default Log Severity
- Warning
- Parameters
- sessions, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- The configured maximum number of transactions per SIP session has been reached.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.41.22. [ID: 1223] Failed to parse media
- Log Categories
- SIPALG
- Log Message
- Failed to parse media.
- Default Log Severity
- Error
- Parameters
- method, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- Failed to parse media for the request.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.23. [ID: 1274] Media stream rules created
- Log Categories
- SIPALG
- Log Message
- Media stream rules created.
- Default Log Severity
- Information
- Parameters
- fromuri, touri, srcip, srcport, destip, destport, proto
- Explanation
- The system has created rules to allow a media stream negotiated using the SIP protocol.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.41.24. [ID: 1272] Failed to create media stream rules
- Log Categories
- SIPALG
- Log Message
- Failed to create media stream rules.
- Default Log Severity
- Warning
- Parameters
- fromuri, touri, srcip, srcport, destip, destport, proto
- Explanation
- The system failed to create rules to allow a media stream negotiated using the SIP protocol.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- There are several possible reasons for the failure. If NAT is used it could relate to NAT port allocation, so, search for
logs in the categories PORTMGR and/or NATPOOL.
2.41.25. [ID: 1204] Out of memory
- Log Categories
- SIPALG
- Log Message
- Out of memory.
- Default Log Severity
- Emergency
- Parameters
- reason
- Explanation
- Memory allocation failed while processing SIP message.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change configuration to free up more RAM.
2.41.26. [ID: 1245] Expire value modified in registration request
- Log Categories
- SIPALG
- Log Message
- Expire value modified in registration request.
- Default Log Severity
- Notice
- Parameters
- time, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- The SIP ALG modified the requested registration time since it exceeds the configured maximum registration time value.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- None
2.41.27. [ID: 1199] Failed to modify contact tag in message
- Log Categories
- SIPALG
- Log Message
- Failed to modify contact tag in message.
- Default Log Severity
- Error
- Parameters
- reason, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- Failed to modify the contact tag in SIP message.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.28. [ID: 1235] Failed to modify FROM tag in message
- Log Categories
- SIPALG
- Log Message
- Failed to modify FROM tag in message.
- Default Log Severity
- Error
- Parameters
- method, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- Failed to modify the FROM tag in message for the identified method request.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.29. [ID: 1263] Failed to modify request URI in message
- Log Categories
- SIPALG
- Log Message
- Failed to modify request URI in message.
- Default Log Severity
- Error
- Parameters
- method, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- Failed to modify the request URI in message for the identified method request.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.30. [ID: 1200] Failed to modify the request
- Log Categories
- SIPALG
- Log Message
- Failed to modify the request.
- Default Log Severity
- Error
- Parameters
- method, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- Failed to modify the topology info in the identified method request.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.31. [ID: 1251] Failed to modify the response
- Log Categories
- SIPALG
- Log Message
- Failed to modify the response.
- Default Log Severity
- Error
- Parameters
- method, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- Failed to modify the topology info in the identified method response.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.32. [ID: 1231] Failed to modify SDP message
- Log Categories
- SIPALG
- Log Message
- Failed to modify SDP message.
- Default Log Severity
- Error
- Parameters
- reason, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- Failed to modify SDP part of message.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.33. [ID: 1238] Failed to modify the SAT request
- Log Categories
- SIPALG
- Log Message
- Failed to modify the SAT request.
- Default Log Severity
- Error
- Parameters
- method, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- Failed to modify request ip to SAT destination IP in the identified method request.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.34. [ID: 1207] Call leg created
- Log Categories
- SIPALG
- Log Message
- Call leg created.
- Default Log Severity
- Notice
- Parameters
- method, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- SIP ALG call leg created for identified method request.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- None
2.41.35. [ID: 1232] New SIP ALG session created
- Log Categories
- SIPALG
- Log Message
- New SIP ALG session created.
- Default Log Severity
- Notice
- Parameters
- method, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- New SIP ALG session request created.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- None
2.41.36. [ID: 1234] New transaction created
- Log Categories
- SIPALG
- Log Message
- New transaction created.
- Default Log Severity
- Notice
- Parameters
- method, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- New SIP ALG transaction created.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- None
2.41.37. [ID: 1261] Failed to find route for given host
- Log Categories
- SIPALG
- Log Message
- Failed to find route for given host.
- Default Log Severity
- Error
- Parameters
- reason, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- No route information found for the given host.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.38. [ID: 1256] General Error
- Log Categories
- SIPALG
- Log Message
- General Error.
- Default Log Severity
- Warning
- Parameters
- reason, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- General error while processing message.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.39. [ID: 1217] Registration hijack attempt detected
- Log Categories
- SIPALG
- Log Message
- Registration hijack attempt detected.
- Default Log Severity
- Alert
- Parameters
- count, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- The number of registration attempts has been exceeded.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Check with the user, why he is using false authentication to register.
2.41.40. [ID: 1246] Successful Registration
- Log Categories
- SIPALG
- Log Message
- Successful Registration.
- Default Log Severity
- Notice
- Parameters
- user, contact
- Explanation
- User registered.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.41.41. [ID: 1264] SDP message parsing failed
- Log Categories
- SIPALG
- Log Message
- SDP message parsing failed.
- Default Log Severity
- Error
- Parameters
- reason, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- SDP part of message failed parsing due to malformed message.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Examine why client or server is sending a malformed SDP message.
2.41.42. [ID: 1243] SDP message validation failed
- Log Categories
- SIPALG
- Log Message
- SDP message validation failed.
- Default Log Severity
- Error
- Parameters
- reason, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- SDP part of message failed validation due to malformed message.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Examine why client or server is sending a malformed SDP message.
2.41.43. [ID: 1227] SIP ALG packet reception error
- Log Categories
- SIPALG
- Log Message
- SIP ALG packet reception error.
- Default Log Severity
- Error
- Parameters
- reason
- Explanation
- Packet without data received.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Take needed steps to understand how SIP ALG received NULL SIP packet.
2.41.44. [ID: 1265] SIP message parsing failed
- Log Categories
- SIPALG
- Log Message
- SIP message parsing failed.
- Default Log Severity
- Error
- Parameters
- reason, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- SIP part of message failed parsing due to malformed message.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Examine why client or server is sending a malformed SIP message.
2.41.45. [ID: 1254] SIP message validation failed due to[...]
- Log Categories
- SIPALG
- Log Message
- SIP message validation failed due to malformed message.
- Default Log Severity
- Error
- Parameters
- reason, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- SIP part of message failed validation due to malformed message.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Examine why client or server is sending a malformed SIP message.
2.41.46. [ID: 1212] SIP request-response timeout
- Log Categories
- SIPALG
- Log Message
- SIP request-response timeout.
- Default Log Severity
- Warning
- Parameters
- method, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- SIP request-response timeout for the session. The session will be deleted.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- If the configured SIP Request-Response timeout value is too low, increase it.
2.41.47. [ID: 1255] SIP signal timeout
- Log Categories
- SIPALG
- Log Message
- SIP signal timeout.
- Default Log Severity
- Warning
- Parameters
- method, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- SIP signal timeout for session. The session will be deleted.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- If the configured SIP signal timeout value is too low, increase it.
2.41.48. [ID: 1233] SIP ALG session deleted
- Log Categories
- SIPALG
- Log Message
- SIP ALG session deleted.
- Default Log Severity
- Information
- Parameters
- method, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- SIP ALG session deleted.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.41.49. [ID: 1201] SIP ALG session state updated
- Log Categories
- SIPALG
- Log Message
- SIP ALG session state updated.
- Default Log Severity
- Debug
- Parameters
- state, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- The SIP ALG session state was updated.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- None
2.41.50. [ID: 1250] Block third party SIP request
- Log Categories
- SIPALG
- Log Message
- Block third party SIP request.
- Default Log Severity
- Warning
- Parameters
- reason, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- The SIP ALG has detected a SIP/SDP message involving third party IP address.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.51. [ID: 1244] Transaction state updated
- Log Categories
- SIPALG
- Log Message
- Transaction state updated.
- Default Log Severity
- Debug
- Parameters
- state, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- A SIP ALG transaction state has been updated to the identified state.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- None
2.41.52. [ID: 1253] SIP ALG transaction deleted
- Log Categories
- SIPALG
- Log Message
- SIP ALG transaction deleted.
- Default Log Severity
- Notice
- Parameters
- method, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- The transaction for the identified method request is deleted.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.41.53. [ID: 1226] Invalid transaction state change
- Log Categories
- SIPALG
- Log Message
- Invalid transaction state change.
- Default Log Severity
- Error
- Parameters
- state, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- Invalid transaction state found.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.41.54. [ID: 1252] Successful unregistration
- Log Categories
- SIPALG
- Log Message
- Successful unregistration.
- Default Log Severity
- Notice
- Parameters
- user, contact
- Explanation
- User unregistered successfully.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- None
2.41.55. [ID: 1222] Method not supported
- Log Categories
- SIPALG
- Log Message
- Method not supported.
- Default Log Severity
- Warning
- Parameters
- method, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- The identified method is not supported.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.56. [ID: 1249] Failed to update call leg
- Log Categories
- SIPALG
- Log Message
- Failed to update call leg.
- Default Log Severity
- Warning
- Parameters
- method, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- Failed to update call leg for identified method request.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.57. [ID: 1225] Failed to update contact
- Log Categories
- SIPALG
- Log Message
- Failed to update contact.
- Default Log Severity
- Error
- Parameters
- method, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- Failed to update contact into session for the identified method request.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.58. [ID: 1241] Failed to update port information
- Log Categories
- SIPALG
- Log Message
- Failed to update port information.
- Default Log Severity
- Error
- Parameters
- method, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- Failed to update port into session for identified method request.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.59. [ID: 1228] Registration entry not found
- Log Categories
- SIPALG
- Log Message
- Registration entry not found.
- Default Log Severity
- Warning
- Parameters
- reason, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- The specified user could not be found in the register table.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.41.60. [ID: 1215] Failed to modify via in message
- Log Categories
- SIPALG
- Log Message
- Failed to modify via in message.
- Default Log Severity
- Error
- Parameters
- reason, fromuri, touri, srcip, srcport, destip, destport
- Explanation
- Failed to modify the via header in message for the identified method request.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
These log messages refer to the SNMP category.
2.42.1. [ID: 478] SNMP access
- Log Categories
- SNMP
- Log Message
- SNMP access.
- Default Log Severity
- Notice
- Parameters
- srcip, destip
- Explanation
- A SNMP packet was received.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.42.2. [ID: 1506] SNMP authentication failure
- Log Categories
- SNMP
- Log Message
- SNMP authentication failure.
- Default Log Severity
- Warning
- SNMP Trap Category
- SNMP
- SNMP Trap MIB name
- authenticationFailure
- SNMP Trap MIB OID
- 1.3.6.1.6.3.1.1.5.5 (SNMPv2-MIB, RFC3418)
- Parameters
- srcip, destip
- Explanation
- The system has received a protocol message that is not properly authenticated. The packet was thus silently dropped.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check the configured authentication items. If the problem persist check for abnormal traffic.
2.42.3. [ID: 1505] Max restart counter
- Log Categories
- SNMP
- Log Message
- Max restart counter.
- Default Log Severity
- Alert
- Parameters
-
- Explanation
- The restart counter has reached the maximum allowed value. SNMPv3 traps and responses will not be sent until the RemoteMgmtSettings:SNMPv3EngineId advanced setting has been changed. This is required to prevent eavesdropping adversaries from decrypting SNMPv3 messages.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Set a new Engine Id in RemoteMgmtSettings:SNMPv3EngineId advanced setting.
2.42.4. [ID: 1680] SNMP not in time window
- Log Categories
- SNMP
- Log Message
- SNMP not in time window.
- Default Log Severity
- Notice
- Parameters
- srcip, destip
- Explanation
- The SNMP3 client made a request outside the current time window (request contains values that have been deprecated, typically
a time value that is off by more than 150 seconds). The original request has been dropped, and a notification has been sent
to the client with the correct time window to use (as specified by RFC3414 this is done by returning the value of the usmStatsNotInTimeWindows
counter without encryption).
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- Normally nothing needs to be done. A valid SNMP3 client will automatically adjust its time window with the supplied information.
Make sure that the client is using the correct authentication credentials if it is continuing to use faulty values.
2.42.5. [ID: 763] SNMP unexpected version
- Log Categories
- SNMP
- Log Message
- SNMP unexpected version.
- Default Log Severity
- Warning
- Parameters
- srcip, destip
- Explanation
- A packet was received for a not supported SNMP version.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Make sure your SNMP client is using a supported SNMP version.
2.42.6. [ID: 1681] SNMP unknown engine ID
- Log Categories
- SNMP
- Log Message
- SNMP unknown engine ID.
- Default Log Severity
- Warning
- Parameters
- srcip, destip
- Explanation
- The SNMP3 client made a request for, what appears to be, another system. It is impossible for the system to validate the authenticity
of an SNMP3 request using an unknown engine ID, and so (the system) replied with an error message. Normal SNMP clients will
close the connection with an error upon receiving this reply.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- None
These log messages refer to the SSHCLIENT category.
2.43.1. [ID: 1703] SSH client error
- Log Categories
- SSHCLIENT
- Log Message
- SSH client error.
- Default Log Severity
- Error
- Parameters
- msg
- Explanation
- An error occured for a SSH client connection.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.43.2. [ID: 1704] SSH client fatal error
- Log Categories
- SSHCLIENT
- Log Message
- SSH client fatal error.
- Default Log Severity
- Critical
- Parameters
- msg
- Explanation
- A fatal error occured for a SSH client connection.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.43.3. [ID: 1702] SSH client info
- Log Categories
- SSHCLIENT
- Log Message
- SSH client info.
- Default Log Severity
- Information
- Parameters
- msg
- Explanation
- Information about a SSH client connection.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.43.4. [ID: 1701] SSH client notice
- Log Categories
- SSHCLIENT
- Log Message
- SSH client notice.
- Default Log Severity
- Notice
- Parameters
- msg
- Explanation
- The state of a SSH client connection changed.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
These log messages refer to the SSHD category.
2.44.1. [ID: 370] Administrative user logged in
- Log Categories
- SSHD
- Log Message
- Administrative user logged in.
- Default Log Severity
- Notice
- Parameters
- user, method, accesslevel, profile, clientip
- Explanation
- An administrative user has logged in.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.44.2. [ID: 297] Incorrect user name or insufficient[...]
- Log Categories
- SSHD
- Log Message
- Incorrect user name or insufficient credentials.
- Default Log Severity
- Warning
- Parameters
- user, method, accesslevel, profile, clientip, sshserver
- Explanation
- Administrative user login have been aborted. This is due to user not existing or having insufficient privileges.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Increase user privileges or change the access level of the SSH server.
2.44.3. [ID: 186] Administrative user failed to login because[...]
- Log Categories
- SSHD
- Log Message
- Administrative user failed to login because of bad credentials.
- Default Log Severity
- Warning
- Parameters
- user, method, accesslevel, profile, clientip
- Explanation
- An administrative user failed to log in to configuration system. This is most likely due to an invalid entered username or
password, or incorrect public key authentication.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.44.4. [ID: 455] Administrative user logged out
- Log Categories
- SSHD
- Log Message
- Administrative user logged out.
- Default Log Severity
- Notice
- Parameters
- user, method, accesslevel, profile, clientip
- Explanation
- An administrative user has logged out.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.44.5. [ID: 1287] Fatal sshd error
- Log Categories
- SSHD
- Log Message
- Fatal sshd error.
- Default Log Severity
- Warning
- Parameters
- clientip, sshserver, reason
- Explanation
- The connection attempt was aborted due to internal error.
- Gateway Action
- Close
- Action Description
- Nonen
- Proposed Action
- None
2.44.6. [ID: 877] Failed to get traffic parameters from[...]
- Log Categories
- SSHD
- Log Message
- Failed to get traffic parameters from dataplane.
- Default Log Severity
- Notice
- Parameters
- clientip, sshserver
- Explanation
- This is a problem with the internal communication within the system.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.44.7. [ID: 474] SSH session inactivity time limit has been[...]
- Log Categories
- SSHD
- Log Message
- SSH session inactivity time limit has been reached.
- Default Log Severity
- Warning
- Parameters
- time, clientip, sshserver
- Explanation
- The connect client has been inactive for too long, and is forcibly logged out.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Increase the inactive session timeout value if it is set too low.
2.44.8. [ID: 448] Username change
- Log Categories
- SSHD
- Log Message
- Username change.
- Default Log Severity
- Warning
- Parameters
- service, old, clientip
- Explanation
- User changed the service between two authentication phases, which is not allowed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.44.9. [ID: 256] Invalid service request received
- Log Categories
- SSHD
- Log Message
- Invalid service request received.
- Default Log Severity
- Warning
- Parameters
- clientip, service
- Explanation
- A invalid service request was received.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Investigate why the SSH client is sending a invalid service request.
2.44.10. [ID: 576] Username change
- Log Categories
- SSHD
- Log Message
- Username change.
- Default Log Severity
- Warning
- Parameters
- user, old, clientip
- Explanation
- User changed the username between two authentication phases, which is not allowed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.44.11. [ID: 425] SSH Login grace timeout expired
- Log Categories
- SSHD
- Log Message
- SSH Login grace timeout expired.
- Default Log Severity
- Warning
- Parameters
- time, clientip
- Explanation
- The client failed to login within the given login grace time.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Increase the grace timeout value if it is set too low.
2.44.12. [ID: 554] Maximum number of authentication retries[...]
- Log Categories
- SSHD
- Log Message
- Maximum number of authentication retries reached.
- Default Log Severity
- Error
- Parameters
- user, clientip
- Explanation
- User failed to authenticate within the maximum allowed number of tries.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.44.13. [ID: 225] The maximum number of simultaneously[...]
- Log Categories
- SSHD
- Log Message
- The maximum number of simultaneously connected SSH clients has been reached.
- Default Log Severity
- Warning
- Parameters
- max, clientip, sshserver
- Explanation
- The maximum number of simultaneously connected SSH clients has been reached. Denying access for this attempt, and closing
the connection.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Wait until an existing connection has closed or increase the number of allowed connections.
2.44.14. [ID: 406] The maximum number of connection attempts[...]
- Log Categories
- SSHD
- Log Message
- The maximum number of connection attempts reached.
- Default Log Severity
- Warning
- Parameters
- max, clientip, sshserver
- Explanation
- The maximum number of connection attempts have been reached.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Wait until an existing connection has closed or increase the number of allowed connections.
2.44.15. [ID: 640] Incompatible encryption
- Log Categories
- SSHD
- Log Message
- Incompatible encryption.
- Default Log Severity
- Warning
- Parameters
- clientip, sshserver, reason
- Explanation
- The connection attempt was aborted due to incompatible ciphers between server and client.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Ensure that client and server are using compatible ciphers.
2.44.16. [ID: 1293] Incompatible key exchange algorithm
- Log Categories
- SSHD
- Log Message
- Incompatible key exchange algorithm.
- Default Log Severity
- Warning
- Parameters
- clientip, sshserver, reason
- Explanation
- The connection attempt was aborted due to incompatible key exchange algorithms between server and client.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Ensure that client and server are using compatible key exchange algorithm.
2.44.17. [ID: 639] Incompatible mac
- Log Categories
- SSHD
- Log Message
- Incompatible mac.
- Default Log Severity
- Warning
- Parameters
- clientip, sshserver, reason
- Explanation
- The connection attempt was aborted due to incompatible macs between server and client.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Ensure that client and server are using compatible macs.
2.44.18. [ID: 996] Request to copy file
- Log Categories
- SSHD
- Log Message
- Request to copy file.
- Default Log Severity
- Information
- Parameters
-
- Explanation
- Request to copy files was successful.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.44.19. [ID: 995] Request to copy file failed
- Log Categories
- SSHD
- Log Message
- Request to copy file failed.
- Default Log Severity
- Warning
- Parameters
-
- Explanation
- Request to copy file failed.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.44.20. [ID: 994] Request to copy file successful
- Log Categories
- SSHD
- Log Message
- Request to copy file successful.
- Default Log Severity
- Information
- Parameters
-
- Explanation
- Request to copy a file.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.44.21. [ID: 624] SSH connection is no longer valid
- Log Categories
- SSHD
- Log Message
- SSH connection is no longer valid.
- Default Log Severity
- Notice
- Parameters
- clientip, sshserver
- Explanation
- The SSH connection is no longer valid. The might be a result of the SSH management object being changed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.44.22. [ID: 997] Closing session for subsystem
- Log Categories
- SSHD
- Log Message
- Closing session for subsystem.
- Default Log Severity
- Information
- Parameters
- subsystem
- Explanation
- Closing the session for subsystem.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.44.23. [ID: 993] Creating session for subsystem request
- Log Categories
- SSHD
- Log Message
- Creating session for subsystem request.
- Default Log Severity
- Information
- Parameters
- subsystem
- Explanation
- Creating a session for the requested subsystem.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
These log messages refer to the SSLINSPECTION category.
2.45.1. [ID: 1460] Abnormal close
- Log Categories
- SSLINSPECTION
- Log Message
- Abnormal close.
- Default Log Severity
- Information
- Parameters
- sessionid, profile, reason, flow, user, userid
- Explanation
- The SSL Inspection connection was discovered to be broken.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.45.2. [ID: 1462] Error accepting client connection
- Log Categories
- SSLINSPECTION
- Log Message
- Error accepting client connection.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, failure, flow, user, userid
- Explanation
- An error occurred during initialization of SSL connection with client.
- Gateway Action
- Reject
- Action Description
- SSL connection attempt from client was rejected
- Proposed Action
- None
2.45.3. [ID: 1480] Session allocation failure
- Log Categories
- SSLINSPECTION
- Log Message
- Session allocation failure.
- Default Log Severity
- Critical
- Parameters
- profile, flow, user, userid
- Explanation
- Allocating memory to do SSL inspection failed.
- Gateway Action
- Reject
- Action Description
- SSL connection attempt from client was rejected
- Proposed Action
- Change configuration to free up more RAM.
2.45.4. [ID: 1485] Certificate error
- Log Categories
- SSLINSPECTION
- Log Message
- Certificate error.
- Default Log Severity
- Error
- Parameters
- sessionid, profile, failure, flow, user, userid
- Explanation
- There was a problem with the certificate.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- Make sure the configured certificate is valid.
2.45.5. [ID: 1495] Client cipher suites mismatch
- Log Categories
- SSLINSPECTION
- Log Message
- Client cipher suites mismatch.
- Default Log Severity
- Notice
- Parameters
- sessionid, profile, flow, user, userid
- Explanation
- SSL inspection does not support any of the client's suggested cipher suites.
- Gateway Action
- Reject
- Action Description
- SSL connection attempt from client was rejected
- Proposed Action
- Investigate if additional cipher suites should be enabled.
2.45.6. [ID: 1500] Client TLS version error
- Log Categories
- SSLINSPECTION
- Log Message
- Client TLS version error.
- Default Log Severity
- Notice
- Parameters
- sessionid, profile, flow, user, userid
- Explanation
- Client's TLS version is not allowed.
- Gateway Action
- Reject
- Action Description
- SSL connection attempt from client was rejected
- Proposed Action
- Investigate if TLS version of client should be enabled.
2.45.7. [ID: 1466] Error connecting to server
- Log Categories
- SSLINSPECTION
- Log Message
- Error connecting to server.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, failure, flow, user, userid
- Explanation
- An error occurred during initialization of SSL connection with server.
- Gateway Action
- Reject
- Action Description
- SSL connection attempt to the server was rejected
- Proposed Action
- None
2.45.8. [ID: 1498] Flow failed
- Log Categories
- SSLINSPECTION
- Log Message
- Flow failed.
- Default Log Severity
- Warning
- Parameters
- reason, flow, user, userid
- Explanation
- Initialization of the TCP connection failed before a SSL Inspection connection was properly initiated.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.45.9. [ID: 1447] Failed to forward SNI
- Log Categories
- SSLINSPECTION
- Log Message
- Failed to forward SNI.
- Default Log Severity
- Warning
- Parameters
- profile, sni, flow, user, userid
- Explanation
- The system could not forward the Server Name Indication (SNI) from the client to the protected server. This may cause the
SSL connection to the server to fail.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.45.10. [ID: 1502] Handshake timeout with
- Log Categories
- SSLINSPECTION
- Log Message
- Handshake timeout with.
- Default Log Severity
- Warning
- Parameters
- direction, flow, user, userid
- Explanation
- SSL handshake was taking too long.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.45.11. [ID: 1490] IPS protection closed connection
- Log Categories
- SSLINSPECTION
- Log Message
- IPS protection closed connection.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, flow, user, userid
- Explanation
- IPS detected a problem and decided to close the connection.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- None
2.45.12. [ID: 1474] No server matched SNI
- Log Categories
- SSLINSPECTION
- Log Message
- No server matched SNI.
- Default Log Severity
- Notice
- Parameters
- profile, sni, flow, user, userid
- Explanation
- The Server Name Indication (SNI) received from the client did not match any of the configured server patterns.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Review the server configuration of the given SSL inspection profile if the problem persists.
2.45.13. [ID: 1483] Error reading data from client
- Log Categories
- SSLINSPECTION
- Log Message
- Error reading data from client.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, failure, flow, user, userid
- Explanation
- An error occurred while trying to read data from the client.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- None
2.45.14. [ID: 1450] Error reading data from server
- Log Categories
- SSLINSPECTION
- Log Message
- Error reading data from server.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, failure, flow, user, userid
- Explanation
- An error occurred while trying to read data from the server.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- None
2.45.15. [ID: 1492] Received SNI from client
- Log Categories
- SSLINSPECTION
- Log Message
- Received SNI from client.
- Default Log Severity
- Information
- Parameters
- profile, sni, flow, user, userid
- Explanation
- A client sent a Server Name Indication (SNI) to indicate which host it attempts to connect to.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.45.16. [ID: 1484] Server cipher suites mismatch
- Log Categories
- SSLINSPECTION
- Log Message
- Server cipher suites mismatch.
- Default Log Severity
- Notice
- Parameters
- sessionid, profile, flow, user, userid
- Explanation
- SSL inspection does not support any of the server's suggested cipher suites.
- Gateway Action
- Reject
- Action Description
- SSL connection attempt to the server was rejected
- Proposed Action
- Investigate if additional cipher suites should be enabled.
2.45.17. [ID: 1481] Server TLS version error
- Log Categories
- SSLINSPECTION
- Log Message
- Server TLS version error.
- Default Log Severity
- Notice
- Parameters
- sessionid, profile, flow, user, userid
- Explanation
- Server's TLS version is not allowed.
- Gateway Action
- Reject
- Action Description
- SSL connection attempt to server was rejected
- Proposed Action
- Investigate if TLS version of server should be enabled.
2.45.18. [ID: 1487] Session closed
- Log Categories
- SSLINSPECTION
- Log Message
- Session closed.
- Default Log Severity
- Information
- Parameters
- sessionid, profile, flow, user, userid
- Explanation
- None
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.45.19. [ID: 1456] Connection established
- Log Categories
- SSLINSPECTION
- Log Message
- Connection established.
- Default Log Severity
- Information
- Parameters
- sessionid, profile, type, clienttlsver, clientcipher, servertlsver, servercipher, flow, user, userid
- Explanation
- SSL connection successfully established.
- Gateway Action
- Open
- Action Description
- None
- Proposed Action
- None
2.45.20. [ID: 1494] Session opened
- Log Categories
- SSLINSPECTION
- Log Message
- Session opened.
- Default Log Severity
- Information
- Parameters
- sessionid, profile, flow, user, userid
- Explanation
- A connection has been initiated.
- Gateway Action
- Open
- Action Description
- None
- Proposed Action
- None
2.45.21. [ID: 1444] Error writing data to client
- Log Categories
- SSLINSPECTION
- Log Message
- Error writing data to client.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, failure, flow, user, userid
- Explanation
- An error occurred while trying to write data to the client.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- None
2.45.22. [ID: 1499] Error writing data to client
- Log Categories
- SSLINSPECTION
- Log Message
- Error writing data to client.
- Default Log Severity
- Warning
- Parameters
- sessionid, profile, failure, flow, user, userid
- Explanation
- An error occurred while trying to write data to the server.
- Gateway Action
- Reject
- Action Description
- None
- Proposed Action
- None
These log messages refer to the SSLVPN category.
2.46.1. [ID: 1491] Allocated client IP
- Log Categories
- SSLVPN
- Log Message
- Allocated client IP.
- Default Log Severity
- Information
- Parameters
- ip, iface, matchkey
- Explanation
- The connected client was allocated an IP address from the pool.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.46.2. [ID: 1448] Client certificate verification failed
- Log Categories
- SSLVPN
- Log Message
- Client certificate verification failed.
- Default Log Severity
- Notice
- Parameters
- reason, certcn, iface, matchkey
- Explanation
- Verification of the client certificate certcn failed. The specific error is described by reason.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.46.3. [ID: 1459] Client certificate verification successful
- Log Categories
- SSLVPN
- Log Message
- Client certificate verification successful.
- Default Log Severity
- Information
- Parameters
- certcn, iface, matchkey
- Explanation
- The client certificate was successfully verified.
- Gateway Action
- Accept
- Action Description
- None
- Proposed Action
- None
2.46.4. [ID: 1471] Verification of client options failed
- Log Categories
- SSLVPN
- Log Message
- Verification of client options failed.
- Default Log Severity
- Notice
- Parameters
- reason, iface, matchkey
- Explanation
- The options the client sent during the key exchange did not match the allowed values.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Reconfigure the client software.
2.46.5. [ID: 1461] Closed TLS session due to unacknowledged[...]
- Log Categories
- SSLVPN
- Log Message
- Closed TLS session due to unacknowledged message.
- Default Log Severity
- Notice
- Parameters
- keyid, iface, matchkey
- Explanation
- After several retries an outbound message was not acknowledged by peer, thus the TLS session was closed. A TLS session for
another Key ID might still be active.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.46.6. [ID: 1451] Connected SSLVPN client
- Log Categories
- SSLVPN
- Log Message
- Connected SSLVPN client.
- Default Log Severity
- Information
- Parameters
- iface, matchkey
- Explanation
- An client connected to the SSLVPN server.
- Gateway Action
- Accept
- Action Description
- None
- Proposed Action
- None
2.46.7. [ID: 1467] Could not allocate client IP
- Log Categories
- SSLVPN
- Log Message
- Could not allocate client IP.
- Default Log Severity
- Warning
- Parameters
- iface, matchkey
- Explanation
- Allocating an IP address to the client failed. The pool could be depleted.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Try increasing size of pool.
2.46.8. [ID: 1457] Internal error when decrypting packet
- Log Categories
- SSLVPN
- Log Message
- Internal error when decrypting packet.
- Default Log Severity
- Error
- Parameters
- flow, user, userid
- Explanation
- There was an internal error while decrypting a packet on the data channel.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.46.9. [ID: 1465] Decryption failed for data channel packet
- Log Categories
- SSLVPN
- Log Message
- Decryption failed for data channel packet.
- Default Log Severity
- Notice
- Parameters
- flow, user, userid
- Explanation
- There was an error decrypting a data channel packet.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.46.10. [ID: 1443] Disconnected SSLVPN client
- Log Categories
- SSLVPN
- Log Message
- Disconnected SSLVPN client.
- Default Log Severity
- Information
- Parameters
- iface, matchkey
- Explanation
- A client disconnected from the SSLVPN server.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.46.11. [ID: 1496] Data packet before negotiated data channel
- Log Categories
- SSLVPN
- Log Message
- Data packet before negotiated data channel.
- Default Log Severity
- Notice
- Parameters
- flow, user, userid
- Explanation
- A client sent a data channel packet before the data channel was negotiated.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.46.12. [ID: 1464] Encryption failed for data channel packet
- Log Categories
- SSLVPN
- Log Message
- Encryption failed for data channel packet.
- Default Log Severity
- Error
- Parameters
- flow, user, userid
- Explanation
- Encryption failed for a packet on the data channel.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.46.13. [ID: 1455] Encrypted packet did not fit packet buffer
- Log Categories
- SSLVPN
- Log Message
- Encrypted packet did not fit packet buffer.
- Default Log Severity
- Error
- Parameters
- flow, user, userid
- Explanation
- After encryption and addition of SSL VPN headers, the packet was too big to fit the packet buffer.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.46.14. [ID: 1482] Failed to send packet to control plane
- Log Categories
- SSLVPN
- Log Message
- Failed to send packet to control plane.
- Default Log Severity
- Notice
- Parameters
- flow, user, userid
- Explanation
- The system failed to forward a control channel packet to the submodule in control plane.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.46.15. [ID: 1486] Failed to set encryption key for packet
- Log Categories
- SSLVPN
- Log Message
- Failed to set encryption key for packet.
- Default Log Severity
- Error
- Parameters
- flow, user, userid
- Explanation
- There was an internal error when setting the key used for encrypting the data channel packet.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.46.16. [ID: 1473] Failed to write encrypted packet
- Log Categories
- SSLVPN
- Log Message
- Failed to write encrypted packet.
- Default Log Severity
- Error
- Parameters
- flow, user, userid
- Explanation
- There was an internal error when writing the encrypted data channel packet to the packet buffer.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.46.17. [ID: 1668] Failed to get server
- Log Categories
- SSLVPN
- Log Message
- Failed to get server.
- Default Log Severity
- Error
- Parameters
- user, profile, crstate, iface, matchkey
- Explanation
- No SSLVPN server session could be found for a client request.
- Gateway Action
- Deny
- Action Description
- None
- Proposed Action
- None
2.46.18. [ID: 1669] Failed to get session
- Log Categories
- SSLVPN
- Log Message
- Failed to get session.
- Default Log Severity
- Error
- Parameters
- user, profile, crstate, iface, matchkey
- Explanation
- No SSLVPN session could be found for a client request.
- Gateway Action
- Deny
- Action Description
- None
- Proposed Action
- None
2.46.19. [ID: 1678] Failed to get user session
- Log Categories
- SSLVPN
- Log Message
- Failed to get user session.
- Default Log Severity
- Error
- Parameters
- user, profile, crstate, iface, matchkey
- Explanation
- No user session could be found for a client request.
- Gateway Action
- Deny
- Action Description
- None
- Proposed Action
- None
2.46.20. [ID: 1463] TLS handshake timed out
- Log Categories
- SSLVPN
- Log Message
- TLS handshake timed out.
- Default Log Severity
- Notice
- Parameters
- keyid, iface, matchkey
- Explanation
- The handshake with the client timed out.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.46.21. [ID: 1478] Integrity check failed during decryption
- Log Categories
- SSLVPN
- Log Message
- Integrity check failed during decryption.
- Default Log Severity
- Notice
- Parameters
- flow, user, userid
- Explanation
- The integrity check failed when decrypting a packet on the data channel. This might be due to data corruption or due to deliberate
tampering with the packet.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.46.22. [ID: 1472] Maximum number of authenticated SSLVPN[...]
- Log Categories
- SSLVPN
- Log Message
- Maximum number of authenticated SSLVPN sessions allowed by license exceeded.
- Default Log Severity
- Warning
- Parameters
- maxsessions
- Explanation
- Incoming SSLVPN requests exceeded license limitation for maximum number of allowed concurrent SSLVPN sessions.
- Gateway Action
- Deny
- Action Description
- None
- Proposed Action
- Add more hardware devices or extend your license to support more SSLVPN sessions to secure that all incoming SSLVPN requests
can be properly established.
2.46.23. [ID: 1446] Number of authenticated SSLVPN sessions[...]
- Log Categories
- SSLVPN
- Log Message
- Number of authenticated SSLVPN sessions reached 90 percent of max SSLVPN sessions allowed by license.
- Default Log Severity
- Warning
- Parameters
- sessions, maxsessions
- Explanation
- Incoming SSLVPN requests exceeded 90 percent of the allowed number of concurrent SSLVPN sessions (license limitation).
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Add more hardware devices or extend your license to support more SSLVPN sessions to secure that all incoming SSLVPN requests
can be properly established.
2.46.24. [ID: 1453] Malformed packet on data channel
- Log Categories
- SSLVPN
- Log Message
- Malformed packet on data channel.
- Default Log Severity
- Notice
- Parameters
- flow, user, userid
- Explanation
- The system failed to parse a packet on the data channel.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.46.25. [ID: 1673] Failed to read challenge text from[...]
- Log Categories
- SSLVPN
- Log Message
- Failed to read challenge text from configuration.
- Default Log Severity
- Error
- Parameters
- user, profile, crstate, iface, matchkey
- Explanation
- No challenge text could be found for a client request.
- Gateway Action
- Deny
- Action Description
- None
- Proposed Action
- None
2.46.26. [ID: 1679] Peer did not send client certificate
- Log Categories
- SSLVPN
- Log Message
- Peer did not send client certificate.
- Default Log Severity
- Information
- Parameters
- iface, matchkey
- Explanation
- The peer did not send a client certificate.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.46.27. [ID: 1674] Failed to find server configuration
- Log Categories
- SSLVPN
- Log Message
- Failed to find server configuration.
- Default Log Severity
- Error
- Parameters
- user, profile, crstate, iface, matchkey
- Explanation
- No SSLVPN server configuration could be found for a client request.
- Gateway Action
- Deny
- Action Description
- None
- Proposed Action
- None
2.46.28. [ID: 1476] Non active key ID on data channel
- Log Categories
- SSLVPN
- Log Message
- Non active key ID on data channel.
- Default Log Severity
- Notice
- Parameters
- keyid, flow, user, userid
- Explanation
- A packet was received on data channel using a key id that had not been negotiated.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.46.29. [ID: 1470] Verification of client peer info failed
- Log Categories
- SSLVPN
- Log Message
- Verification of client peer info failed.
- Default Log Severity
- Notice
- Parameters
- reason, iface, matchkey
- Explanation
- The peer info the client sent during the key exchange did not match the allowed values.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Reconfigure the client software or upgrade to newer version.
2.46.30. [ID: 1493] Rate limit exceeded
- Log Categories
- SSLVPN
- Log Message
- Rate limit exceeded.
- Default Log Severity
- Warning
- Parameters
- flow, user, userid
- Explanation
- The rate limit of control channel messages was exceeded on the flow.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Investigate if system is under attack.
2.46.31. [ID: 1469] Released client IP
- Log Categories
- SSLVPN
- Log Message
- Released client IP.
- Default Log Severity
- Information
- Parameters
- ip, iface, matchkey
- Explanation
- The client IP address was released back to the pool.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.46.32. [ID: 1452] Key renegotiation failed
- Log Categories
- SSLVPN
- Log Message
- Key renegotiation failed.
- Default Log Severity
- Notice
- Parameters
- keyid, iface, matchkey
- Explanation
- Key renegotiation for the data channel failed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.46.33. [ID: 1475] Key renegotiation successful
- Log Categories
- SSLVPN
- Log Message
- Key renegotiation successful.
- Default Log Severity
- Information
- Parameters
- keyid, iface, matchkey
- Explanation
- Key renegotiation for the data channel was successful.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.46.34. [ID: 1449] Replay check failed on data channel
- Log Categories
- SSLVPN
- Log Message
- Replay check failed on data channel.
- Default Log Severity
- Warning
- Parameters
- keyid, packetid, flow, user, userid
- Explanation
- A packet was dropped due to failed packet replay check. Either the packet was seen before or it is older than the packet replay
window allows.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Investigate if the session is under attack.
2.46.35. [ID: 1670] Failed to send challenge to client
- Log Categories
- SSLVPN
- Log Message
- Failed to send challenge to client.
- Default Log Severity
- Error
- Parameters
- user, profile, crstate, iface, matchkey
- Explanation
- The system could not forward a challenge request from the authentication source to the SSLVPN client.
- Gateway Action
- Deny
- Action Description
- None
- Proposed Action
- None
2.46.36. [ID: 1677] Failed to send challenge response
- Log Categories
- SSLVPN
- Log Message
- Failed to send challenge response.
- Default Log Severity
- Error
- Parameters
- user, profile, crstate, iface, matchkey
- Explanation
- The system could not forward a challenge response from the SSLVPN client to the authentication source.
- Gateway Action
- Deny
- Action Description
- None
- Proposed Action
- None
2.46.37. [ID: 1489] Server reset from client
- Log Categories
- SSLVPN
- Log Message
- Server reset from client.
- Default Log Severity
- Notice
- Parameters
- flow, user, userid
- Explanation
- A client sent a packet to the service that is only sent from server to client.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.46.38. [ID: 1477] TLS handshake error
- Log Categories
- SSLVPN
- Log Message
- TLS handshake error.
- Default Log Severity
- Notice
- Parameters
- reason, certcn, iface, matchkey
- Explanation
- TLS handshake with the client was aborted due to an error, and the TLS session is closed. The specific error is described
by reason.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.46.39. [ID: 1497] Too short packet payload
- Log Categories
- SSLVPN
- Log Message
- Too short packet payload.
- Default Log Severity
- Notice
- Parameters
- paylen, flow, user, userid
- Explanation
- A client sent a packet with a too short payload.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.46.40. [ID: 1501] Unacknowledged control channel message
- Log Categories
- SSLVPN
- Log Message
- Unacknowledged control channel message.
- Default Log Severity
- Notice
- Parameters
- packetid, keyid, iface, matchkey
- Explanation
- An outbound message to peer was not acknowledged after several retries, and was thus dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.46.41. [ID: 1488] Received ACK for unknown packet id
- Log Categories
- SSLVPN
- Log Message
- Received ACK for unknown packet id.
- Default Log Severity
- Notice
- Parameters
- packetid, keyid, iface, matchkey
- Explanation
- The peer sent an ACK for a packet ID the system never sent out, or a packet ID that was already acknowledged. The ACK was
ignored.
- Gateway Action
- Discard
- Action Description
- None
- Proposed Action
- None
2.46.42. [ID: 1479] Unknown protocol opcode
- Log Categories
- SSLVPN
- Log Message
- Unknown protocol opcode.
- Default Log Severity
- Notice
- Parameters
- code, flow, user, userid
- Explanation
- A client sent a protocol message containing an unknown opcode.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.46.43. [ID: 1671] Unprintable characters in challenge text
- Log Categories
- SSLVPN
- Log Message
- Unprintable characters in challenge text.
- Default Log Severity
- Warning
- Parameters
- user, profile, crstate, iface, matchkey
- Explanation
- The challenge text for an SSLVPN session contained unprintable characters, which is not allowed.
- Gateway Action
- Deny
- Action Description
- None
- Proposed Action
- Change the challenge text on the authentication source or the overriden value in the local configuration.
2.46.44. [ID: 1454] Unsupported key exchange method v1
- Log Categories
- SSLVPN
- Log Message
- Unsupported key exchange method v1.
- Default Log Severity
- Notice
- Parameters
- flow, user, userid
- Explanation
- A client sent a client reset using key exchange method 1, which is unsupported.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Upgrade client software to more recent version.
2.46.45. [ID: 1445] User failed to log in to SSLVPN
- Log Categories
- SSLVPN
- Log Message
- User failed to log in to SSLVPN.
- Default Log Severity
- Warning
- Parameters
- user, profile, crstate, iface, matchkey
- Explanation
- The client failed authentication trying to log in.
- Gateway Action
- Deny
- Action Description
- None
- Proposed Action
- None
2.46.46. [ID: 1458] User logged in to SSLVPN
- Log Categories
- SSLVPN
- Log Message
- User logged in to SSLVPN.
- Default Log Severity
- Information
- Parameters
- user, profile, crstate, iface, matchkey
- Explanation
- The client was successfully logged in.
- Gateway Action
- Accept
- Action Description
- None
- Proposed Action
- None
2.46.47. [ID: 1468] User logged out from SSLVPN by authentication[...]
- Log Categories
- SSLVPN
- Log Message
- User logged out from SSLVPN by authentication system.
- Default Log Severity
- Notice
- Parameters
- user, iface, matchkey
- Explanation
- The user connected to the SSLVPN server was logged out through the authentication system, and thus the session was closed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.46.48. [ID: 1675] Username not allowed to change
- Log Categories
- SSLVPN
- Log Message
- Username not allowed to change.
- Default Log Severity
- Warning
- Parameters
- user, profile, crstate, iface, matchkey
- Explanation
- The user name for an SSLVPN session changed, which is not allowed.
- Gateway Action
- Deny
- Action Description
- None
- Proposed Action
- Change the configuration of the SSLVPN client to use the same user name throughout the entire session.
These log messages refer to the STATISTICS category.
2.47.1. [ID: 1432] Failed to add statistical values for BGP peer
- Log Categories
- STATISTICS,BGP
- Log Message
- Failed to add statistical values for BGP peer.
- Default Log Severity
- Warning
- Parameters
- ip
- Explanation
- Configuration error.
- Gateway Action
- None
- Action Description
-
- Proposed Action
- None
2.47.2. [ID: 1428] Failed to remove statistical values of BGP[...]
- Log Categories
- STATISTICS,BGP
- Log Message
- Failed to remove statistical values of BGP peer.
- Default Log Severity
- Warning
- Parameters
- ip
- Explanation
- Configuration error.
- Gateway Action
- None
- Action Description
-
- Proposed Action
- None
2.47.3. [ID: 1436] Failed to create AgentX talker thread
- Log Categories
- STATISTICS,BGP
- Log Message
- Failed to create AgentX talker thread.
- Default Log Severity
- Warning
- Parameters
-
- Explanation
-
- Gateway Action
- None
- Action Description
- Failed to start AgentX protocol communication
- Proposed Action
- None
2.47.4. [ID: 1431] Failed to parse AgentX message
- Log Categories
- STATISTICS,BGP
- Log Message
- Failed to parse AgentX message.
- Default Log Severity
- Debug
- Parameters
-
- Explanation
- Unexpected or corrupted AgentX message.
- Gateway Action
- None
- Action Description
-
- Proposed Action
- None
2.47.5. [ID: 1433] No support for IPv6 peer identifiers
- Log Categories
- STATISTICS,BGP
- Log Message
- No support for IPv6 peer identifiers.
- Default Log Severity
- Notice
- Parameters
- ip
- Explanation
- No statistics support for BGP peers identified with IPv6 address.
- Gateway Action
- None
- Action Description
-
- Proposed Action
- None
2.47.6. [ID: 1429] AgentX session closed
- Log Categories
- STATISTICS,BGP
- Log Message
- AgentX session closed.
- Default Log Severity
- Debug
- Parameters
- id, id, code
- Explanation
- An AgentX session with an internal process was closed.
- Gateway Action
- None
- Action Description
-
- Proposed Action
- None
2.47.7. [ID: 1434] AgentX session opened
- Log Categories
- STATISTICS,BGP
- Log Message
- AgentX session opened.
- Default Log Severity
- Debug
- Parameters
- id, id, code
- Explanation
- An AgentX session with an internal process was established.
- Gateway Action
- None
- Action Description
-
- Proposed Action
- None
2.47.8. [ID: 1430] Failed to setup listening socket
- Log Categories
- STATISTICS,BGP
- Log Message
- Failed to setup listening socket.
- Default Log Severity
- Warning
- Parameters
- port
- Explanation
- Failed to setup socket for AgentX protocol.
- Gateway Action
- None
- Action Description
-
- Proposed Action
- None
2.47.9. [ID: 1435] Update of statistics value failed
- Log Categories
- STATISTICS,BGP
- Log Message
- Update of statistics value failed.
- Default Log Severity
- Debug
- Parameters
- id
- Explanation
- Failed to update statistical value received via AgentX protocol.
- Gateway Action
- None
- Action Description
-
- Proposed Action
- None
These log messages refer to the SYSLOGALG category.
2.48.1. [ID: 1707] Failed to create new session
- Log Categories
- SYSLOGALG
- Log Message
- Failed to create new session.
- Default Log Severity
- Error
- Parameters
-
- Explanation
- An attempt to create a new Syslog ALG session failed, because the unit is out of memory.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- Decrease the maximum allowed Syslog ALG sessions, or try to free some of the RAM used.
2.48.2. [ID: 1711] Flow failed
- Log Categories
- SYSLOGALG
- Log Message
- Flow failed.
- Default Log Severity
- Notice
- Parameters
- reason, originator, sessionid, flow, rule
- Explanation
- An error occurred that caused the Syslog flow to be aborted.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- None
2.48.3. [ID: 1710] Session closed
- Log Categories
- SYSLOGALG
- Log Message
- Session closed.
- Default Log Severity
- Information
- Parameters
- sessionid, profile, flow
- Explanation
- A session using the Syslog ALG was closed.
- Gateway Action
- Close
- Action Description
- None
- Proposed Action
- None
2.48.4. [ID: 1706] Session opened
- Log Categories
- SYSLOGALG
- Log Message
- Session opened.
- Default Log Severity
- Information
- Parameters
- sessionid, profile, flow
- Explanation
- A session using the Syslog ALG was opened.
- Gateway Action
- Open
- Action Description
- None
- Proposed Action
- None
2.48.5. [ID: 1708] Too large syslog packet received
- Log Categories
- SYSLOGALG
- Log Message
- Too large syslog packet received.
- Default Log Severity
- Error
- Parameters
- sessionid, profile, size, max, flow
- Explanation
- Syslog packet rejected due to being larger than the configuration allows.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If required, change the configuration to allow syslog packets with this size.
2.48.6. [ID: 1705] Syslog packet rejected
- Log Categories
- SYSLOGALG
- Log Message
- Syslog packet rejected.
- Default Log Severity
- Information
- Parameters
- sessionid, profile, reason, flow
- Explanation
- A Syslog packet was rejected by the ALG.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Verify that the Syslog clients are correctly configured.
2.48.7. [ID: 1712] Prohibited keyword detected in syslog data
- Log Categories
- SYSLOGALG
- Log Message
- Prohibited keyword detected in syslog data.
- Default Log Severity
- Error
- Parameters
- sessionid, profile, keyword, flow
- Explanation
- Syslog packet rejected due to presence of a prohibited keyword.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Change the configuration to allow syslog packets with this keyword.
2.48.8. [ID: 1709] Reverse traffic detected on syslog flow
- Log Categories
- SYSLOGALG
- Log Message
- Reverse traffic detected on syslog flow.
- Default Log Severity
- Error
- Parameters
- sessionid, profile, flow
- Explanation
- The Syslog ALG detected data packets sent in the reverse direction i.e. from the server towards the client. The session is
closed.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Investigate why the packets are sent in the reverse direction of the syslog connection.
These log messages refer to the SYSTEM category.
2.49.1. [ID: 641] A new kernel exception report was generated
- Log Categories
- SYSTEM
- Log Message
- A new kernel exception report was generated.
- Default Log Severity
- Emergency
- Parameters
- file
- Explanation
- The system encountered a serious error. A report describing the exception has been generated and saved.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Contact customer support and provide the exception report.
2.49.2. [ID: 235] Out of memory initializing data plane[...]
- Log Categories
- SYSTEM
- Log Message
- Out of memory initializing data plane processing units.
- Default Log Severity
- Emergency
- Parameters
-
- Explanation
- A memory allocation attempt failed when allocating memory for a critical subsystem within data plane. Normal operation cannot
be guaranteed.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- Investigate why the system is low on RAM. Review the configuration and try to free more RAM.
2.49.3. [ID: 583] All systems shutdown
- Log Categories
- SYSTEM,CONFIG
- Log Message
- All systems shutdown.
- Default Log Severity
- Notice
- Parameters
- reason
- Explanation
- Shutdown of all virtual systems.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.49.4. [ID: 313] Aborted shutdown of all systems
- Log Categories
- SYSTEM,CONFIG
- Log Message
- Aborted shutdown of all systems.
- Default Log Severity
- Notice
- Parameters
- reason
- Explanation
- Shutdown of all virtual system has been aborted.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.49.5. [ID: 231] All systems shutdown notice
- Log Categories
- SYSTEM,CONFIG
- Log Message
- All systems shutdown notice.
- Default Log Severity
- Notice
- Parameters
- time, reason
- Explanation
- Shutdown of all virtual systems will begin at the specified time.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.49.6. [ID: 392] Failed to create backup file
- Log Categories
- SYSTEM
- Log Message
- Failed to create backup file.
- Default Log Severity
- Alert
- Parameters
- file, reason
- Explanation
- Attempt to create a backup failed.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Make sure there is enough memory on the disk.
2.49.7. [ID: 193] Backup file created
- Log Categories
- SYSTEM
- Log Message
- Backup file created.
- Default Log Severity
- Notice
- Parameters
- file
- Explanation
- A backup file was created.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.49.8. [ID: 1073] Leaving Daylight Saving Time
- Log Categories
- SYSTEM
- Log Message
- Leaving Daylight Saving Time.
- Default Log Severity
- Information
- Parameters
-
- Explanation
- Daylight Saving Time change, DST is not in use.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.49.9. [ID: 1074] Entering Daylight Saving Time
- Log Categories
- SYSTEM
- Log Message
- Entering Daylight Saving Time.
- Default Log Severity
- Information
- Parameters
-
- Explanation
- Daylight Saving Time change, DST is in use.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.49.10. [ID: 390] Exception report generated
- Log Categories
- SYSTEM
- Log Message
- Exception report generated.
- Default Log Severity
- Emergency
- Parameters
- file
- Explanation
- The system ended up in an unrecoverable erroneous state and had to be restarted. A report describing the exception has been
generated and saved.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Contact customer support and provide the exception report.
2.49.11. [ID: 1072] System time set
- Log Categories
- SYSTEM
- Log Message
- System time set.
- Default Log Severity
- Information
- Parameters
-
- Explanation
- New system time was set with CLI time command (admin).
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.49.12. [ID: 404] PKG file was successfully applied
- Log Categories
- SYSTEM
- Log Message
- PKG file was successfully applied.
- Default Log Severity
- Notice
- Parameters
- file
- Explanation
- PKG file was successfully applied.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.49.13. [ID: 244] Failed to apply PKG file
- Log Categories
- SYSTEM
- Log Message
- Failed to apply PKG file.
- Default Log Severity
- Alert
- Parameters
- file, reason
- Explanation
- PKG file could no be applied.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify that the file is compatible with the system.
2.49.14. [ID: 190] Failed to validate PKG file
- Log Categories
- SYSTEM
- Log Message
- Failed to validate PKG file.
- Default Log Severity
- Warning
- Parameters
- file, reason
- Explanation
- PKG file was not considered valid.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify that file is compatible with the system.
2.49.15. [ID: 786] Process exited with non-zero status code
- Log Categories
- SYSTEM
- Log Message
- Process exited with non-zero status code.
- Default Log Severity
- Error
- Parameters
- module, code, reason
- Explanation
- A process exited unexpectedly with a status code that indicates that an error occurred.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.49.16. [ID: 785] Process exited because of signal
- Log Categories
- SYSTEM
- Log Message
- Process exited because of signal.
- Default Log Severity
- Error
- Parameters
- module, code
- Explanation
- A process exited unexpectedly due to a signal, which indicates that an error occurred.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.49.17. [ID: 794] Generating crashdump report
- Log Categories
- SYSTEM
- Log Message
- Generating crashdump report.
- Default Log Severity
- Error
- Parameters
- module
- Explanation
- Process malfunctioned, and a crashdump report is being generated.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Earlier log messages may give additional information about the reason of the malfunction.
2.49.18. [ID: 800] Killing process that did not exit in time
- Log Categories
- SYSTEM
- Log Message
- Killing process that did not exit in time.
- Default Log Severity
- Error
- Parameters
- module, code
- Explanation
- Process was instructed to shut down and exit, but failed to do so in time. Terminating it with a signal, specified by the
code parameter.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.49.19. [ID: 798] Process is not responding
- Log Categories
- SYSTEM
- Log Message
- Process is not responding.
- Default Log Severity
- Warning
- Parameters
- module, count
- Explanation
- The process is not responding, the count parameter specifies the number of times the process has failed to respond.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.49.20. [ID: 799] Removing unresponsive process
- Log Categories
- SYSTEM
- Log Message
- Removing unresponsive process. Sending signal.
- Default Log Severity
- Error
- Parameters
- module, code
- Explanation
- Process was unresponsive and it will be terminated by sending a signal. The code parameter specifies the signal number.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.49.21. [ID: 797] Restarting process
- Log Categories
- SYSTEM
- Log Message
- Restarting process.
- Default Log Severity
- Notice
- Parameters
- module
- Explanation
- Process was restarted.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Look for prior log messages to find the reason for why the process was restarted.
2.49.22. [ID: 796] Process did not exit in time
- Log Categories
- SYSTEM
- Log Message
- Process did not exit in time. Sending signal.
- Default Log Severity
- Error
- Parameters
- module, code
- Explanation
- Process was instructed to shut down and exit, but failed to do so in time. Terminating it with a signal, specified by the
code parameter.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.49.23. [ID: 1058] Process exited unexpectedly
- Log Categories
- SYSTEM
- Log Message
- Process exited unexpectedly.
- Default Log Severity
- Error
- Parameters
- module, code
- Explanation
- A process exited unexpectedly.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.49.24. [ID: 990] Configuration has been reset to factory[...]
- Log Categories
- SYSTEM
- Log Message
- Configuration has been reset to factory default.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- Configuration has been reset to factory default.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.49.25. [ID: 991] System has been reset to factory default
- Log Categories
- SYSTEM
- Log Message
- System has been reset to factory default.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- System has been reset to factory default.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.49.26. [ID: 459] Revert has been applied
- Log Categories
- SYSTEM
- Log Message
- Revert has been applied.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- System has been reverted to state prior latest perform config/system restore.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.49.27. [ID: 558] Failed to revert
- Log Categories
- SYSTEM
- Log Message
- Failed to revert.
- Default Log Severity
- Emergency
- Parameters
- reason
- Explanation
- System could not be reverted to Last Known Good.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Uploading and apply a backup file. If not resolved perform a reset to factory default.
2.49.28. [ID: 361] System shutting down
- Log Categories
- SYSTEM,CONFIG
- Log Message
- System shutting down.
- Default Log Severity
- Notice
- SNMP Trap Category
- SHUTDOWN
- SNMP Trap MIB name
- ssmShutdown
- SNMP Trap MIB OID
- 1.3.6.1.4.1.5089.3.0.2020.0.1005 (STREAM-TRAPS-MIB)
- Parameters
- reason
- Explanation
- System shutting down.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.49.29. [ID: 1023] Preparing to shut down
- Log Categories
- SYSTEM,CONFIG
- Log Message
- Preparing to shut down.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- The system is preparing to shutdown and will take down connections to other hosts. E.g. IKE/IPsec SAs.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.49.30. [ID: 427] System started
- Log Categories
- SYSTEM,CONFIG
- Log Message
- System started.
- Default Log Severity
- Notice
- SNMP Trap Category
- STARTUP
- SNMP Trap MIB name
- coldStart
- SNMP Trap MIB OID
- 1.3.6.1.6.3.1.1.5.1 (SNMPv2-MIB, RFC3418)
- Parameters
- name, version
- Explanation
- The system has started and loaded the configuration.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.49.31. [ID: 1002] System could not be rebooted using the[...]
- Log Categories
- SYSTEM
- Log Message
- System could not be rebooted using the content of upgrade package and has been reverted.
- Default Log Severity
- Emergency
- Parameters
- reason
- Explanation
- System could not be rebooted using the content of upgrade package and has been reverted.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify that the upgrade package is intact.
2.49.32. [ID: 992] System could not be reconfigured using the[...]
- Log Categories
- SYSTEM
- Log Message
- System could not be reconfigured using the content of upgrade package and will be reverted.
- Default Log Severity
- Emergency
- Parameters
-
- Explanation
- System could not be reconfigured using the content of upgrade package and will be reverted.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Verify that the upgrade package is intact.
2.49.33. [ID: 1003] System was successfully upgraded
- Log Categories
- SYSTEM
- Log Message
- System was successfully upgraded.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- System has been upgraded using the upgrade package.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.49.34. [ID: 382] Out of memory setting up virtual system
- Log Categories
- SYSTEM
- Log Message
- Out of memory setting up virtual system.
- Default Log Severity
- Emergency
- Parameters
-
- Explanation
- A memory allocation attempt failed when allocating memory needed to initialize a virtual system. The virtual system failed
to initialize.
- Gateway Action
- Abort
- Action Description
- None
- Proposed Action
- Investigate why the system is low on RAM. Review the configuration and try to free more RAM.
2.49.35. [ID: 290] Module was restarted
- Log Categories
- SYSTEM
- Log Message
- Module was restarted.
- Default Log Severity
- Critical
- Parameters
- module
- Explanation
- The monitored module was restarted by the system.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check that the module have been restarted and examine the cause of the restart.
2.49.36. [ID: 318] Failed to start module
- Log Categories
- SYSTEM
- Log Message
- Failed to start module. Restarting system.
- Default Log Severity
- Critical
- Parameters
- module
- Explanation
- A monitored module could not be started which lead to a restart of the complete system.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Examine why the module could not be started and, in case of a re-start attempt, the cause of the initial failure.
These log messages refer to the TCP category.
2.50.1. [ID: 102] Ambiguous MSS announcement
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Ambiguous MSS announcement.
- Default Log Severity
- Warning
- Parameters
- old, new, effective, tcpopt, flow, user, userid
- Explanation
- The gateway has received several packets with the SYN flag set, on this flow. Not all of these packets announced the same
Maximum Segment Size (MSS). The gateway will act as if the value of the parameter effective was announced in all packets that had the SYN flag set on this flow.
- Gateway Action
- Accept
- Action Description
- The gateway accepted the new MSS announcement as the new effective MSS for the flow
- Proposed Action
- None
2.50.2. [ID: 189] TCP MSS too high
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- TCP MSS too high.
- Default Log Severity
- Notice
- Parameters
- mss, max, tcpopt, setting, flow, pkt, user, userid
- Explanation
- The TCP packet announced a Maximum Segment Size (MSS) larger than the configured limit.
- Gateway Action
- Adjust
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPMSSOnHigh controls how the gateway handles packets that announce a Maximum Segment Size (MSS) larger than the configured limit. The
limit is configured in the setting TCPSettings:TCPMSSMax.
2.50.3. [ID: 393] TCP MSS too low
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- TCP MSS too low.
- Default Log Severity
- Notice
- Parameters
- mss, min, tcpopt, setting, flow, pkt, user, userid
- Explanation
- The TCP packet announced a Maximum Segment Size (MSS) less than the configured limit.
- Gateway Action
- Adjust
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPMSSOnLow controls how the gateway handles packets that announce a Maximum Segment Size (MSS) less than the configured limit. The limit
is configured in the setting TCPSettings:TCPMSSMin.
2.50.4. [ID: 591] Oversized TCP window
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Oversized TCP window.
- Default Log Severity
- Information
- Parameters
- windowsize, max, state, flow, pkt, user, userid
- Explanation
- The packet's announced receive window exceeded the configured limit. This event is only logged once per flow.
- Gateway Action
- Adjust
- Action Description
- The size of the announced receive window was lowered below the configured limit
- Proposed Action
- Window size limitation is controlled by two settings. The setting TCPSettings:TCPMaxWindow sets the actual limit and the setting TCPSettings:TCPOversizedWindow control's the action of the gateway when the limit is exceeded.
2.50.5. [ID: 416] Ambiguous SACK permission announced
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Ambiguous SACK permission announced.
- Default Log Severity
- Warning
- Parameters
- tcpopt, flow, user, userid
- Explanation
- The gateway has received several packets with the SYN flag set, on this flow. Some, but not all, of these packets granted
the peer permission to send SACK options.
- Gateway Action
- Allow
- Action Description
- The gateway will allow packets with the SACK option from the peer on this flow-pair
- Proposed Action
- None
2.50.6. [ID: 307] Ambiguous SACK permission announced
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Ambiguous SACK permission announced.
- Default Log Severity
- Warning
- Parameters
- tcpopt, flow, user, userid
- Explanation
- The gateway has received several packets with the SYN flag set, on this flow. Some, but not all, of these packets granted
the peer permission to send SACK options.
- Gateway Action
- Deny
- Action Description
- The gateway will drop packets with the SACK option from the peer on this flow-pair
- Proposed Action
- If this seems to cause problems, for instance, through packet drops generating "not negotiated option" logs pointing at the
SACK option, then changing the setting TCPSettings:TCPOPT_SACK so that the gateway will strip the SACK option and there by disabling the use of SACK options could be used as a workaround.
2.50.7. [ID: 246] Ambiguous window scale negotiation
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Ambiguous window scale negotiation.
- Default Log Severity
- Warning
- Parameters
- tcpopt, flow, user, userid
- Explanation
- The gateway has received several packets with the SYN flag set, on this flow. Some, but not all, of these packets has proposed
to use the window scale option.
- Gateway Action
- Disable
- Action Description
- The gateway will act as if the negotiation of window scale failed on this flow-pair. This means that it will not apply any
shift count when processing the window information in subsequent packets. This will also affect the validation of sequence
numbers since that depends on the window information
- Proposed Action
- If this seems to cause problems, for instance, with the sequence number validation, then changing the setting TCPSettings:TCPOPT_WSOPT so that the gateway will strip the Window Scale option and there by disabling the use of Window Scale options could be used
as a workaround.
2.50.8. [ID: 551] Ambiguous window scale negotiation
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Ambiguous window scale negotiation.
- Default Log Severity
- Warning
- Parameters
- tcpopt, flow, user, userid
- Explanation
- The gateway has received several packets with the SYN flag set, on this flow. Some, but not all, of these packets has proposed
to use the window scale option.
- Gateway Action
- Enable
- Action Description
- The gateway will act as if window scale was successfully negotiated on this flow-pair. This means that it will use the announced
shift counts when processing the window information in subsequent packets. This will also affect the validation of sequence
numbers since that depends on the window information
- Proposed Action
- None
2.50.9. [ID: 565] SACK block with invalid range
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- SACK block with invalid range.
- Default Log Severity
- Warning
- Parameters
- sackblock, tcpopt, flow, pkt, user, userid
- Explanation
- The TCP packet had a SACK option containing a block with an empty or inverted range, that is, a range that runs from a higher
sequence number to a lower sequence number.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Investigate the source of this erroneous packet.
2.50.10. [ID: 411] Resent SYN with mismatching window scale[...]
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Resent SYN with mismatching window scale proposal.
- Default Log Severity
- Warning
- Parameters
- new, effective, tcpopt, flow, pkt, user, userid
- Explanation
- The gateway has received a retransmission of a packet with the SYN flag set. The retransmitted packet announced a different
Window Scale shift count than the original packet and is therefore dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If this seems to cause problems, then changing the setting TCPSettings:TCPOPT_WSOPT so that the gateway will strip the Window Scale option and there by disabling the use of Window Scale options could be used
as a workaround.
2.50.11. [ID: 545] Disallowed flag set
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Disallowed flag set.
- Default Log Severity
- Warning
- Parameters
- flag, setting, flow, pkt, user, userid
- Explanation
- The TCP packet had an uncommon, unusual or poorly standardized flag set.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Investigate the source of this strange packet. If the problem can't be fixed at the source then the gateway can be configured
to either silently take action on such packets or just ignore them all together by modifying one of the settings TCPSettings:TCPUrg, TCPSettings:TCPECN or TCPSettings:TCPRF, depending on the flag in question. The parameter setting shows which of the settings that was applied to the packet.
2.50.12. [ID: 202] Bad TCP option length
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Bad TCP option length.
- Default Log Severity
- Warning
- Parameters
- tcpopt, len, expectlen, setting, flow, pkt, user, userid
- Explanation
- While parsing the TCP header an option with an invalid length, for that specific option type, was found.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Investigate the source of this erroneous packet. If the problem can't be fixed at the source then the gateway's response to
this event can be changed through the setting TCPSettings:TCPBadOptionLengths.
2.50.13. [ID: 596] TCP segment exceeds previous FIN
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- TCP segment exceeds previous FIN.
- Default Log Severity
- Warning
- Parameters
- seqno, max, flags, state, flow, pkt, user, userid
- Explanation
- The TCP packet ended at a higher sequence number than the sequence number assigned to the FIN flag by a previous packet. Since
the FIN flag signals the end of the data stream, packets with higher sequence numbers should not occur. The parameter seqno contains the last sequence number transported in the segment and the parameter max contains the sequence number immediately before the previously received FIN.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPSeqNumValidationMode controls how strictly the gateway validates sequence numbers.
2.50.14. [ID: 547] TCP FIN flag set without the ACK flag
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- TCP FIN flag set without the ACK flag.
- Default Log Severity
- Warning
- Parameters
- setting, flow, pkt, user, userid
- Explanation
- The TCP packet had the FIN flag set but the ACK flag cleared. This combination is normally invalid.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPFinNoAck controls how the gateway handles packets with this flag combination.
2.50.15. [ID: 113] Disallowed flag combination
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Disallowed flag combination.
- Default Log Severity
- Warning
- Parameters
- goodflag, badflag, setting, flow, pkt, user, userid
- Explanation
- The TCP packet had an unusual, and normally invalid, flag combination set.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Investigate the source of this erroneous packet. If the problem can't be fixed at the source then the gateway can be configured
to either silently take action on such packets or just ignore them all together by modifying one of the settings TCPSettings:TCPSynUrg, TCPSettings:TCPSynPsh, TCPSettings:TCPSynRst, TCPSettings:TCPSynFin, TCPSettings:TCPRstFin or TCPSettings:TCPFinUrg, depending on which flag combination the packet had. The parameter setting shows which of the settings that was applied to the packet.
2.50.16. [ID: 388] Invalid TCP checksum
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Invalid TCP checksum.
- Default Log Severity
- Warning
- Parameters
- setting, flow, pkt, user, userid
- Explanation
- The packet's TCP checksum was invalid.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- TCP checksum verification is controlled by the setting TCPSettings:TCPChecksumVerification.
2.50.17. [ID: 359] Invalid TCP option length
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Invalid TCP option length.
- Default Log Severity
- Warning
- Parameters
- tcpopt, len, setting, flow, pkt, user, userid
- Explanation
- A TCP option with explicit length had an invalid length. No option with explicit length can be shorter than two bytes (one
byte to indicate the kind of option and one byte to indicate the length).
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Investigate the source of this erroneous packet. If the problem can't be fixed at the source then the gateway's response to
this event can be changed through the setting TCPSettings:TCPBadOptionLengths.
2.50.18. [ID: 139] Invalid reset sequence number in state SYN[...]
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Invalid reset sequence number in state SYN RECVD.
- Default Log Severity
- Warning
- Parameters
- seqno, min, max, flow, pkt, user, userid
- Explanation
- A reset packet was received from the originator of the connection before any SYN-ACK was received from the terminator side.
Resets under these conditions are required to have a sequence number in close proximity to the sequence number of the SYN
packet to be considered valid.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Configuring the TCP sequence number validation in audit mode using the setting TCPSettings:TCPSeqNumValidationMode can be used as a workaround.
2.50.19. [ID: 187] TCP MSS too high
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- TCP MSS too high.
- Default Log Severity
- Warning
- Parameters
- mss, max, tcpopt, setting, flow, pkt, user, userid
- Explanation
- The TCP packet announced a Maximum Segment Size (MSS) larger than the configured limit.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPMSSOnHigh controls how the gateway handles packets that announce a Maximum Segment Size (MSS) larger than the configured limit. The
limit is configured in the setting TCPSettings:TCPMSSMax.
2.50.20. [ID: 312] TCP MSS too low
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- TCP MSS too low.
- Default Log Severity
- Warning
- Parameters
- mss, min, tcpopt, setting, flow, pkt, user, userid
- Explanation
- The TCP packet announced a Maximum Segment Size (MSS) less than the configured limit.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPMSSOnLow controls how the gateway handles packets that announce a Maximum Segment Size (MSS) less than the configured limit. The limit
is configured in the setting TCPSettings:TCPMSSMin.
2.50.21. [ID: 571] New acknowledgment in ICMP message
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- New acknowledgment in ICMP message.
- Default Log Severity
- Warning
- Parameters
- ackseqno, max, state, flow, pkt, user, userid
- Explanation
- The acknowledgment in an ICMP encapsulated TCP packet was higher than any acknowledgment processed on the flow.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The gateway's response to this event is configured through the setting TCPSettings:TCPSeqNumValidationMode.
2.50.22. [ID: 375] Not forwarded sequence number in ICMP message
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Not forwarded sequence number in ICMP message.
- Default Log Severity
- Warning
- Parameters
- seqno, len, max, flow, pkt, user, userid
- Explanation
- The sequence number in an ICMP encapsulated TCP packet was higher than any sequence number processed on the flow.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The gateway's response to this event is configured through the setting TCPSettings:TCPSeqNumValidationMode.
2.50.23. [ID: 456] Non-zero header padding
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Non-zero header padding.
- Default Log Severity
- Warning
- Parameters
- setting, flow, pkt, user, userid
- Explanation
- The padding between the option field and the end of the header was found to be non-zero. It is recommended to at least strip
this information from the packet to prevent unfiltered data from being tunneled within the padding.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPNonZeroHeaderPadding controls the gateway's behavior when non-zero header padding is found.
2.50.24. [ID: 493] SACK block announced data not sent
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- SACK block announced data not sent.
- Default Log Severity
- Warning
- Parameters
- sackblock, max, tcpopt, setting, flow, pkt, user, userid
- Explanation
- The SACK option in the packet announced that data not yet sent by the peer already had been received.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The gateway's reaction to this event is controlled by the setting TCPSettings:TCPInconsistentSACK.
2.50.25. [ID: 447] TCP NULL packet
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- TCP NULL packet.
- Default Log Severity
- Warning
- Parameters
- setting, flow, pkt, user, userid
- Explanation
- The TCP packet had none of the flags SYN, FIN, RST or ACK set.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Investigate the source of the packet and try to fix the problem there. Secondly, review the setting TCPSettings:TCPNULL which controls the gateway's behavior when receiving such packets.
2.50.26. [ID: 449] Non-first SACK block announced acknowledged[...]
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Non-first SACK block announced acknowledged data.
- Default Log Severity
- Warning
- Parameters
- sackblock, ackseqno, tcpopt, setting, flow, pkt, user, userid
- Explanation
- A non-first SACK block acknowledged data already acknowledged by the standard acknowledgment field in the header. Only the
first SACK block is allowed to do that.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The gateway's reaction to this event is controlled by the setting TCPSettings:TCPInconsistentSACK.
2.50.27. [ID: 437] Disallowed TCP option
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Disallowed TCP option.
- Default Log Severity
- Warning
- Parameters
- tcpopt, setting, flow, pkt, user, userid
- Explanation
- The packet contained an option of the kind indicated by the parameter tcpopt.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The gateway's action when it finds an option of this type is controlled by the setting indicated by the parameter setting.
2.50.28. [ID: 173] SYN only option in non-SYN segment
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- SYN only option in non-SYN segment.
- Default Log Severity
- Warning
- Parameters
- tcpopt, setting, flow, pkt, user, userid
- Explanation
- A TCP option that only should occur in packets with the SYN flag set was found in a packet with the SYN flag cleared.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Investigate the source of the packet and try to fix the problem there. If that is not possible then the gateway's behavior
can be adjusted through the setting TCPSettings:TCPSynOptInNonSyn.
2.50.29. [ID: 373] TCP option length missing
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- TCP option length missing.
- Default Log Severity
- Warning
- Parameters
- tcpopt, setting, flow, pkt, user, userid
- Explanation
- A TCP option with explicit length was found at a position in the header such that the length information fell outside of the
header.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Investigate the source of this erroneous packet. If the problem can't be fixed at the source then the gateway's response to
this event can be changed through the setting TCPSettings:TCPBadOptionLengths.
2.50.30. [ID: 182] Oversized TCP segment
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Oversized TCP segment.
- Default Log Severity
- Warning
- Parameters
- mss, datalen, hdrlen, state, flow, pkt, user, userid
- Explanation
- The packet exceeded the Maximum Segment Size (MSS) announced by the peer. If no MSS has been announced, an MSS of 536/1220
is assumed for TCP over IPv4/IPv6.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPOversizedSegment controls if the gateway should check that the MSS is obeyed and what actions it should take when the MSS is exceeded.
2.50.31. [ID: 369] Oversized TCP window in ICMP message
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Oversized TCP window in ICMP message.
- Default Log Severity
- Warning
- Parameters
- windowsize, max, state, flow, pkt, user, userid
- Explanation
- The TCP window in the ICMP encapsulated packet exceeded the maximal window limit. This is erroneous since no packet that exceeded
the limit has been forwarded.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Window size limitation is controlled by two settings. The setting TCPSettings:TCPMaxWindow sets the actual limit and the setting TCPSettings:TCPOversizedWindow control's the action of the gateway when the limit is exceeded.
2.50.32. [ID: 227] TCP option does not fit in the header
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- TCP option does not fit in the header.
- Default Log Severity
- Warning
- Parameters
- tcpopt, len, avail, setting, flow, pkt, user, userid
- Explanation
- A TCP option with a length that exceeded the remaining part of the header was found in the packet.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Investigate the source of this erroneous packet. If the problem can't be fixed at the source then the gateway's response to
this event can be changed through the setting TCPSettings:TCPBadOptionLengths.
2.50.33. [ID: 200] Too high TCP sequence number
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Too high TCP sequence number.
- Default Log Severity
- Warning
- Parameters
- seqno, len, min, max, windowsize, gap, flags, state, flow, pkt, user, userid
- Explanation
- The sequence number in the TCP packet was above the receive window announced by the receiver of the packet. This is normally
invalid and should not occur, however, there are a few exceptions, the primary exception being if the receiver recently has
reduced it receive window.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The gateway's response to this event is controlled by the setting TCPSettings:TCPSeqNumValidationMode.
2.50.34. [ID: 463] Too low FIN sequence number
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Too low FIN sequence number.
- Default Log Severity
- Warning
- Parameters
- seqno, min, state, flow, pkt, user, userid
- Explanation
- The packet had the FIN flag set but a sequence number that had already been used for data. The FIN flag is logically located
at the end of the data stream and should have a previously unused sequence number.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If this event occurs frequently and causes problems then configuring a non-strict sequence number validation mode in the setting
TCPSettings:TCPSeqNumValidationMode can be used as a workaround.
2.50.35. [ID: 168] Too low TCP sequence number
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Too low TCP sequence number.
- Default Log Severity
- Warning
- Parameters
- seqno, len, min, max, windowsize, gap, flags, state, loglevel, value, flow, pkt, user, userid
- Explanation
- The sequence number in the TCP packet was below the receive window announced by the receiver of the packet. The reason for
why this event occurs can be as simple as timing. When a receiver of a data stream receives the next part of the stream it
will move its receive window forward. Gateways on the path between the sender and the receiver of the data stream will pick
up this information before it reaches the sender. This mean that when the sender retransmits a segment it may fall within
the receive window known to the sender but if the original segment in fact was received by the receiver then a new receive
window announcement, that does not include the segment, may be on the way from the receiver to the sender. A gateway that
picks up the new receive window announcement before the retransmitted segment will come to the conclusion that the segment's
sequence number is too low.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPSeqTooLowLogLevel is the tool that can be used to filter out normal/expected occurrences of this event. The configured log level is shown in
the parameter loglevel and the parameter value holds the corresponding value for this packet. The gateway's response to this event is also controlled by the setting TCPSettings:TCPSeqNumValidationMode.
2.50.36. [ID: 103] Too low sequence number in ICMP message
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Too low sequence number in ICMP message.
- Default Log Severity
- Warning
- Parameters
- seqno, min, max, loglevel, value, flow, pkt, user, userid
- Explanation
- The sequence number in the TCP packet encapsulated in an ICMP message was below the receive window announced by the intended
receiver of the encapsulated packet. Either the sequence number had already been acknowledged or it had never been used at
all.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPSeqNumValidationMode is the primary control of the gateway's response to this event. To filter out event caused by network conditions the setting
TCPSettings:TCPSeqTooLowLogLevel also applies. The configured log level is shown in the parameter loglevel and the parameter value holds the corresponding value for this packet.
2.50.37. [ID: 145] Truncated TCP header encapsulated in ICMP[...]
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Truncated TCP header encapsulated in ICMP message.
- Default Log Severity
- Warning
- Parameters
- avail, hdrlen, setting, flow, pkt, user, userid
- Explanation
- Only a part of encapsulated packet's TCP header was available in the ICMP packet. The parameter avail shows how much of the encapsulated packet's IP payload that was available and the hdrlen holds the length of the TCP header.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPTruncHeaderInICMP controls how the gateway handles ICMP packets with a truncated TCP header in the encapsulated packet.
2.50.38. [ID: 210] Too high TCP acknowledgment
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Too high TCP acknowledgment.
- Default Log Severity
- Warning
- Parameters
- ackseqno, max, gap, state, flow, pkt, user, userid
- Explanation
- The TCP acknowledgment in the packet announced that data not yet sent by the peer already had been received.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The gateway's response to this event is configured through the setting TCPSettings:TCPSeqNumValidationMode.
2.50.39. [ID: 444] Unacceptable initial TCP acknowledgment
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Unacceptable initial TCP acknowledgment.
- Default Log Severity
- Warning
- Parameters
- ackseqno, min, max, state, flow, pkt, user, userid
- Explanation
- The first TCP acknowledgment received on the flow did not match the sequence numbers of the packets sent in the other direction.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The gateway's response to this event is configured through the setting TCPSettings:TCPSeqNumValidationMode.
2.50.40. [ID: 217] Unused non-zero ACK
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Unused non-zero ACK.
- Default Log Severity
- Warning
- Parameters
- setting, flow, pkt, user, userid
- Explanation
- The acknowledgment field in the packet was set even though the ACK flag was cleared. It is recommended to at least strip this
information from the packet to prevent unfiltered data from being tunneled within the acknowledgment field. Also, some operating
systems reveal sequence number information this way, which can make it easier for intruders wanting to hijack established
connections.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPUnusedNonZeroAckField controls the gateway's behavior when an unused non-zero acknowledgment field is found.
2.50.41. [ID: 527] Unused non-zero urgent pointer
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Unused non-zero urgent pointer.
- Default Log Severity
- Warning
- Parameters
- setting, flow, pkt, user, userid
- Explanation
- The urgent pointer field in the packet was set even though the URG flag was cleared. It is recommended to at least strip this
information from the packet to prevent unfiltered data from being tunneled within the urgent pointer field.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPUnusedNonZeroUrgField controls the gateway's behavior when an unused non-zero urgent pointer field is found.
2.50.42. [ID: 538] Fragmented TCP header encapsulated in ICMP[...]
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Fragmented TCP header encapsulated in ICMP message.
- Default Log Severity
- Warning
- Parameters
- flow, pkt, user, userid
- Explanation
- An ICMP packet encapsulating a TCP packet was received. The TCP header in the encapsulated packet was split into several parts
due to IP fragmentation. Either the ICMP packet was fragmented or the encapsulated TCP packet was a fragment. Either way,
the fragmentation had to target an unreasonable low MTU for that to occur so the packet was considered invalid.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.50.43. [ID: 267] TCP header length exceeds IP payload length
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- TCP header length exceeds IP payload length.
- Default Log Severity
- Warning
- Parameters
- hdrlen, iplen, flow, pkt, user, userid
- Explanation
- The TCP header claimed to be larger than the size of the IP payload that it was contained within.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Investigate the source of the packet and try to fix the problem there. If the problem can't be fixed at the source then the
log message can be turned off by configuring the log receivers or turning the setting TCPSettings:TCPLogInvalidHeaderLen off.
2.50.44. [ID: 299] Ambiguous MSS announcement
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Ambiguous MSS announcement.
- Default Log Severity
- Warning
- Parameters
- old, new, effective, tcpopt, flow, user, userid
- Explanation
- The gateway has received several packets with the SYN flag set, on this flow. Not all of these packets announced the same
Maximum Segment Size (MSS). The gateway will act as if the value of the parameter effective was announced in all packets that had the SYN flag set on this flow.
- Gateway Action
- Ignore
- Action Description
- The gateway ignored the new MSS announcement
- Proposed Action
- None
2.50.45. [ID: 258] Unexpected invalid FIN
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Unexpected invalid FIN.
- Default Log Severity
- Warning
- Parameters
- state, flow, pkt, user, userid
- Explanation
- A packet classified (internally) as having an unreliable sequence number also had the FIN flag set. This combination is not
allowed in strict sequence number validation mode.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If this event occurs frequently and causes problems then configuring a non-strict sequence number validation mode in the setting
TCPSettings:TCPSeqNumValidationMode can be used as a workaround.
2.50.46. [ID: 561] Invalid TCP header length
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Invalid TCP header length.
- Default Log Severity
- Warning
- Parameters
- hdrlen, flow, pkt, user, userid
- Explanation
- The TCP packet's header length field claimed that the header was shorter than the minimal 20 bytes.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Investigate the source of the packet and try to fix the problem there. If the problem can't be fixed at the source then the
log message can be turned off by configuring the log receivers or turning the setting TCPSettings:TCPLogInvalidHeaderLen off.
2.50.47. [ID: 399] Window scale shift count exceeds 14
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Window scale shift count exceeds 14.
- Default Log Severity
- Warning
- Parameters
- value, tcpopt, flow, pkt, user, userid
- Explanation
- The packet was dropped since it contained a Window Scale option specifying an invalid (too large) shift count.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.50.48. [ID: 342] Suspicious flag set
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Suspicious flag set.
- Default Log Severity
- Notice
- Parameters
- flag, setting, flow, pkt, user, userid
- Explanation
- The TCP packet had an uncommon, unusual or poorly standardized flag set.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Investigate the source of this strange packet. If the problem can't be fixed at the source then the gateway can be configured
to either silently take action on such packets or just ignore them all together by modifying one of the settings TCPSettings:TCPUrg, TCPSettings:TCPECN or TCPSettings:TCPRF, depending on the flag in question. The parameter setting shows which of the settings that was applied to the packet.
2.50.49. [ID: 320] TCP segment exceeds previous FIN
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- TCP segment exceeds previous FIN.
- Default Log Severity
- Notice
- Parameters
- seqno, max, flags, state, flow, pkt, user, userid
- Explanation
- The TCP packet ended at a higher sequence number than the sequence number assigned to the FIN flag by a previous packet. Since
the FIN flag signals the end of the data stream, packets with higher sequence numbers should not occur. The parameter seqno contains the last sequence number transported in the segment and the parameter max contains the sequence number immediately before the previously received FIN.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPSeqNumValidationMode controls how strictly the gateway validates sequence numbers.
2.50.50. [ID: 468] TCP FIN flag set without the ACK flag
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- TCP FIN flag set without the ACK flag.
- Default Log Severity
- Notice
- Parameters
- setting, flow, pkt, user, userid
- Explanation
- The TCP packet had the FIN flag set but the ACK flag cleared. This combination is normally invalid.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPFinNoAck controls how the gateway handles packets with this flag combination.
2.50.51. [ID: 504] Suspicious flag combination
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Suspicious flag combination.
- Default Log Severity
- Notice
- Parameters
- goodflag, badflag, setting, flow, pkt, user, userid
- Explanation
- The TCP packet had an unusual, and normally invalid, flag combination set.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Investigate the source of this erroneous packet. If the problem can't be fixed at the source then the gateway can be configured
to either silently take action on such packets or just ignore them all together by modifying one of the settings TCPSettings:TCPSynUrg, TCPSettings:TCPSynPsh, TCPSettings:TCPSynRst, TCPSettings:TCPSynFin, TCPSettings:TCPRstFin or TCPSettings:TCPFinUrg, depending on which flag combination the packet had. The parameter setting shows which of the settings that was applied to the packet.
2.50.52. [ID: 218] TCP MSS exceeds log level
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- TCP MSS exceeds log level.
- Default Log Severity
- Notice
- Parameters
- mss, loglevel, tcpopt, setting, flow, pkt, user, userid
- Explanation
- The TCP packet announced a Maximum Segment Size (MSS) larger than the configured log level.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The log level is configured in the setting TCPSettings:TCPMSSLogLevel.
2.50.53. [ID: 270] Invalid TCP checksum
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Invalid TCP checksum.
- Default Log Severity
- Notice
- Parameters
- setting, flow, pkt, user, userid
- Explanation
- The packet's TCP checksum was invalid.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- TCP checksum verification is controlled by the setting TCPSettings:TCPChecksumVerification.
2.50.54. [ID: 147] Invalid reset sequence number in state SYN[...]
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Invalid reset sequence number in state SYN RECVD.
- Default Log Severity
- Notice
- Parameters
- seqno, min, max, flow, pkt, user, userid
- Explanation
- A reset packet was received from the originator of the connection before any SYN-ACK was received from the terminator side.
Resets under these conditions are required to have a sequence number in close proximity to the sequence number of the SYN
packet to be considered valid.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Logging of this event can be configured with the setting TCPSettings:TCPSeqNumValidationMode.
2.50.55. [ID: 209] TCP MSS too high
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- TCP MSS too high.
- Default Log Severity
- Notice
- Parameters
- mss, max, tcpopt, setting, flow, pkt, user, userid
- Explanation
- The TCP packet announced a Maximum Segment Size (MSS) larger than the configured limit.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPMSSOnHigh controls how the gateway handles packets that announce a Maximum Segment Size (MSS) larger than the configured limit. The
limit is configured in the setting TCPSettings:TCPMSSMax.
2.50.56. [ID: 215] TCP MSS too low
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- TCP MSS too low.
- Default Log Severity
- Notice
- Parameters
- mss, min, tcpopt, setting, flow, pkt, user, userid
- Explanation
- The TCP packet announced a Maximum Segment Size (MSS) less than the configured limit.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPMSSOnLow controls how the gateway handles packets that announce a Maximum Segment Size (MSS) less than the configured limit. The limit
is configured in the setting TCPSettings:TCPMSSMin.
2.50.57. [ID: 592] New acknowledgment in ICMP message
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- New acknowledgment in ICMP message.
- Default Log Severity
- Notice
- Parameters
- ackseqno, max, state, flow, pkt, user, userid
- Explanation
- The acknowledgment in an ICMP encapsulated TCP packet was higher than any acknowledgment processed on the flow.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The gateway's response to this event is configured through the setting TCPSettings:TCPSeqNumValidationMode.
2.50.58. [ID: 353] Not forwarded sequence number in ICMP message
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Not forwarded sequence number in ICMP message.
- Default Log Severity
- Notice
- Parameters
- seqno, len, max, flow, pkt, user, userid
- Explanation
- The sequence number in an ICMP encapsulated TCP packet was higher than any sequence number processed on the flow.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The gateway's response to this event is configured through the setting TCPSettings:TCPSeqNumValidationMode.
2.50.59. [ID: 169] Non-zero header padding
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Non-zero header padding.
- Default Log Severity
- Notice
- Parameters
- setting, flow, pkt, user, userid
- Explanation
- The padding between the option field and the end of the header was found to be non-zero. It is recommended to at least strip
this information from the packet to prevent unfiltered data from being tunneled within the padding.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPNonZeroHeaderPadding controls the gateway's behavior when non-zero header padding is found.
2.50.60. [ID: 484] SACK block announced data not sent
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- SACK block announced data not sent.
- Default Log Severity
- Notice
- Parameters
- sackblock, max, tcpopt, setting, flow, pkt, user, userid
- Explanation
- The SACK option in the packet announced that data not yet sent by the peer already had been received.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The gateway's reaction to this event is controlled by the setting TCPSettings:TCPInconsistentSACK.
2.50.61. [ID: 257] TCP NULL packet
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- TCP NULL packet.
- Default Log Severity
- Notice
- Parameters
- setting, flow, pkt, user, userid
- Explanation
- The TCP packet had none of the flags SYN, FIN, RST or ACK set.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Investigate the source of the packet and try to fix the problem there. Secondly, review the setting TCPSettings:TCPNULL which controls the gateway's behavior when receiving such packets.
2.50.62. [ID: 345] Non-first SACK block announced acknowledged[...]
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Non-first SACK block announced acknowledged data.
- Default Log Severity
- Notice
- Parameters
- sackblock, ackseqno, tcpopt, setting, flow, pkt, user, userid
- Explanation
- A non-first SACK block acknowledged data already acknowledged by the standard acknowledgment field in the header. Only the
first SACK block is allowed to do that.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The gateway's reaction to this event is controlled by the setting TCPSettings:TCPInconsistentSACK.
2.50.63. [ID: 614] TCP option
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- TCP option.
- Default Log Severity
- Notice
- Parameters
- tcpopt, setting, flow, pkt, user, userid
- Explanation
- The packet contained an option of the kind indicated by the parameter tcpopt.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The gateway's action when it finds an option of this type is controlled by the setting indicated by the parameter setting.
2.50.64. [ID: 366] SYN only option in non-SYN segment
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- SYN only option in non-SYN segment.
- Default Log Severity
- Notice
- Parameters
- tcpopt, setting, flow, pkt, user, userid
- Explanation
- A TCP option that only should occur in packets with the SYN flag set was found in a packet with the SYN flag cleared.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Investigate the source of the packet and try to fix the problem there. If that is not possible then the gateway's behavior
can be adjusted through the setting TCPSettings:TCPSynOptInNonSyn.
2.50.65. [ID: 181] Oversized TCP segment
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Oversized TCP segment.
- Default Log Severity
- Notice
- Parameters
- mss, datalen, hdrlen, state, flow, pkt, user, userid
- Explanation
- The packet exceeded the Maximum Segment Size (MSS) announced by the peer. If no MSS has been announced, an MSS of 536/1220
is assumed for TCP over IPv4/IPv6.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPOversizedSegment controls if the gateway should check that the MSS is obeyed and what actions it should take when the MSS is exceeded.
2.50.66. [ID: 199] Oversized TCP window
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Oversized TCP window.
- Default Log Severity
- Information
- Parameters
- windowsize, max, state, flow, pkt, user, userid
- Explanation
- The packet's announced receive window exceeded the configured limit. This event is only logged once per flow.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Window size limitation is controlled by two settings. The setting TCPSettings:TCPMaxWindow sets the actual limit and the setting TCPSettings:TCPOversizedWindow control's the action of the gateway when the limit is exceeded.
2.50.67. [ID: 461] Too high TCP sequence number
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Too high TCP sequence number.
- Default Log Severity
- Notice
- Parameters
- seqno, len, min, max, windowsize, gap, flags, state, flow, pkt, user, userid
- Explanation
- The sequence number in the TCP packet was above the receive window announced by the receiver of the packet. This is normally
invalid and should not occur, however, there are a few exceptions, the primary exception being if the receiver recently has
reduced it receive window.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The gateway's response to this event is controlled by the setting TCPSettings:TCPSeqNumValidationMode.
2.50.68. [ID: 207] Too low FIN sequence number
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Too low FIN sequence number.
- Default Log Severity
- Notice
- Parameters
- seqno, min, state, flow, pkt, user, userid
- Explanation
- The packet had the FIN flag set but a sequence number that had already been used for data. The FIN flag is logically located
at the end of the data stream and should have a previously unused sequence number.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- If this event occurs frequently and causes problems then configuring a non-strict sequence number validation mode in the setting
TCPSettings:TCPSeqNumValidationMode can be used as a workaround.
2.50.69. [ID: 420] Too low TCP sequence number
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Too low TCP sequence number.
- Default Log Severity
- Notice
- Parameters
- seqno, len, min, max, windowsize, gap, flags, state, loglevel, value, flow, pkt, user, userid
- Explanation
- The sequence number in the TCP packet was below the receive window announced by the receiver of the packet. The reason for
why this event occurs can be as simple as timing. When a receiver of a data stream receives the next part of the stream it
will move its receive window forward. Gateways on the path between the sender and the receiver of the data stream will pick
up this information before it reaches the sender. This mean that when the sender retransmits a segment it may fall within
the receive window known to the sender but if the original segment in fact was received by the receiver then a new receive
window announcement, that does not include the segment, may be on the way from the receiver to the sender. A gateway that
picks up the new receive window announcement before the retransmitted segment will come to the conclusion that the segment's
sequence number is too low.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPSeqTooLowLogLevel is the tool that can be used to filter out normal/expected occurrences of this event. The configured log level is shown in
the parameter loglevel and the parameter value holds the corresponding value for this packet. The gateway's response to this event is also controlled by the setting TCPSettings:TCPSeqNumValidationMode.
2.50.70. [ID: 601] Too low sequence number in ICMP message
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Too low sequence number in ICMP message.
- Default Log Severity
- Notice
- Parameters
- seqno, min, max, loglevel, value, flow, pkt, user, userid
- Explanation
- The sequence number in the TCP packet encapsulated in an ICMP message was below the receive window announced by the intended
receiver of the encapsulated packet. Either the sequence number had already been acknowledged or it had never been used at
all.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPSeqNumValidationMode is the primary control of the gateway's response to this event. To filter out event caused by network conditions the setting
TCPSettings:TCPSeqTooLowLogLevel also applies. The configured log level is shown in the parameter loglevel and the parameter value holds the corresponding value for this packet.
2.50.71. [ID: 560] Truncated TCP header encapsulated in ICMP[...]
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Truncated TCP header encapsulated in ICMP message.
- Default Log Severity
- Notice
- Parameters
- avail, hdrlen, setting, flow, pkt, user, userid
- Explanation
- Only a part of encapsulated packet's TCP header was available in the ICMP packet. The parameter avail shows how much of the encapsulated packet's IP payload that was available and the hdrlen holds the length of the TCP header.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPTruncHeaderInICMP controls how the gateway handles ICMP packets with a truncated TCP header in the encapsulated packet.
2.50.72. [ID: 498] Too high TCP acknowledgment
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Too high TCP acknowledgment.
- Default Log Severity
- Notice
- Parameters
- ackseqno, max, gap, state, flow, pkt, user, userid
- Explanation
- The TCP acknowledgment in the packet announced that data not yet sent by the peer already had been received.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The gateway's response to this event is configured through the setting TCPSettings:TCPSeqNumValidationMode.
2.50.73. [ID: 479] Unacceptable initial TCP acknowledgment
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Unacceptable initial TCP acknowledgment.
- Default Log Severity
- Notice
- Parameters
- ackseqno, min, max, state, flow, pkt, user, userid
- Explanation
- The first TCP acknowledgment received on the flow did not match the sequence numbers of the packets sent in the other direction.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The gateway's response to this event is configured through the setting TCPSettings:TCPSeqNumValidationMode.
2.50.74. [ID: 541] Unused non-zero ACK
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Unused non-zero ACK.
- Default Log Severity
- Notice
- Parameters
- setting, flow, pkt, user, userid
- Explanation
- The acknowledgment field in the packet was set even though the ACK flag was cleared. It is recommended to at least strip this
information from the packet to prevent unfiltered data from being tunneled within the acknowledgment field. Also, some operating
systems reveal sequence number information this way, which can make it easier for intruders wanting to hijack established
connections.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPUnusedNonZeroAckField controls the gateway's behavior when an unused non-zero acknowledgment field is found.
2.50.75. [ID: 337] Unused non-zero urgent pointer
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Unused non-zero urgent pointer.
- Default Log Severity
- Notice
- Parameters
- setting, flow, pkt, user, userid
- Explanation
- The urgent pointer field in the packet was set even though the URG flag was cleared. It is recommended to at least strip this
information from the packet to prevent unfiltered data from being tunneled within the urgent pointer field.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPUnusedNonZeroUrgField controls the gateway's behavior when an unused non-zero urgent pointer field is found.
2.50.76. [ID: 335] Multiple TCP options of the same kind
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Multiple TCP options of the same kind.
- Default Log Severity
- Warning
- Parameters
- tcpopt, flow, pkt, user, userid
- Explanation
- The packet contained more than one TCP option of a type that should not occur more than once in a packet.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.50.77. [ID: 250] No new flow for this packet
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- No new flow for this packet.
- Default Log Severity
- Notice
- Parameters
- pkt
- Explanation
- No flow matched the TCP packet and the packet was not a plain-SYN so it was not allowed to setup a new flow.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.50.78. [ID: 252] TCP option not negotiated
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- TCP option not negotiated.
- Default Log Severity
- Warning
- Parameters
- tcpopt, flow, pkt, user, userid
- Explanation
- Some TCP options must be negotiated during the handshake before they can be used. The dropped packet contained such an option,
as indicated by the parameter tcpopt, but that option had not been negotiated on the flow.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If this event is triggered frequently then the gateway can be configured to silently strip the type of option that is causing
the problem as a workaround while the problem is investigated and resolved. Stripping options is controlled the TCPOPT_* settings.
2.50.79. [ID: 381] SACK option without the ACK flag set
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- SACK option without the ACK flag set.
- Default Log Severity
- Warning
- Parameters
- tcpopt, flow, pkt, user, userid
- Explanation
- The packet contained a SACK option without having the ACK flag set.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.50.80. [ID: 1011] New TCP flow denied
- Log Categories
- TCP,STATELESS,FLOW
- Log Message
- New TCP flow denied.
- Default Log Severity
- Notice
- Parameters
- pkt
- Explanation
- The configured stateless IP rule does only allow existing TCP streams to setup new flows.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- To allow new TCP streams, the IP rule's StatelessAllowNewTCP setting must be changed.
2.50.81. [ID: 208] Disallowed flag set
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Disallowed flag set.
- Default Log Severity
- Notice
- Parameters
- flag, setting, flow, pkt, user, userid
- Explanation
- The TCP packet had an uncommon, unusual or poorly standardized flag set.
- Gateway Action
- Strip
- Action Description
- The flag indicated by the parameter flag was stripped from the packet
- Proposed Action
- Investigate the source of this strange packet. If the problem can't be fixed at the source then the gateway can be configured
to either silently take action on such packets or just ignore them all together by modifying one of the settings TCPSettings:TCPUrg, TCPSettings:TCPECN or TCPSettings:TCPRF, depending on the flag in question. The parameter setting shows which of the settings that was applied to the packet.
2.50.82. [ID: 491] Bad TCP option length
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Bad TCP option length.
- Default Log Severity
- Notice
- Parameters
- tcpopt, len, expectlen, setting, flow, pkt, user, userid
- Explanation
- While parsing the TCP header an option with an invalid length, for that specific option type, was found.
- Gateway Action
- Strip
- Action Description
- The broken option and any other options following the broken option were removed from the packet
- Proposed Action
- Investigate the source of this erroneous packet. If the problem can't be fixed at the source then the gateway's response to
this event can be changed through the setting TCPSettings:TCPBadOptionLengths.
2.50.83. [ID: 322] Disallowed flag combination
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Disallowed flag combination.
- Default Log Severity
- Notice
- Parameters
- goodflag, badflag, setting, flow, pkt, user, userid
- Explanation
- The TCP packet had an unusual, and normally invalid, flag combination set.
- Gateway Action
- Strip
- Action Description
- The flag indicated by badflag was stripped from the packet
- Proposed Action
- Investigate the source of this erroneous packet. If the problem can't be fixed at the source then the gateway can be configured
to either silently take action on such packets or just ignore them all together by modifying one of the settings TCPSettings:TCPSynUrg, TCPSettings:TCPSynPsh, TCPSettings:TCPSynRst, TCPSettings:TCPSynFin, TCPSettings:TCPRstFin or TCPSettings:TCPFinUrg, depending on which flag combination the packet had. The parameter setting shows which of the settings that was applied to the packet.
2.50.84. [ID: 329] Invalid TCP option length
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Invalid TCP option length.
- Default Log Severity
- Notice
- Parameters
- tcpopt, len, setting, flow, pkt, user, userid
- Explanation
- A TCP option with explicit length had an invalid length. No option with explicit length can be shorter than two bytes (one
byte to indicate the kind of option and one byte to indicate the length).
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- Investigate the source of this erroneous packet. If the problem can't be fixed at the source then the gateway's response to
this event can be changed through the setting TCPSettings:TCPBadOptionLengths.
2.50.85. [ID: 241] Non-zero header padding
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Non-zero header padding.
- Default Log Severity
- Notice
- Parameters
- setting, flow, pkt, user, userid
- Explanation
- The padding between the option field and the end of the header was found to be non-zero. It is recommended to at least strip
this information from the packet to prevent unfiltered data from being tunneled within the padding.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- The setting TCPSettings:TCPNonZeroHeaderPadding controls the gateway's behavior when non-zero header padding is found.
2.50.86. [ID: 352] SACK block announced data not sent
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- SACK block announced data not sent.
- Default Log Severity
- Notice
- Parameters
- sackblock, max, tcpopt, setting, flow, pkt, user, userid
- Explanation
- The SACK option in the packet announced that data not yet sent by the peer already had been received.
- Gateway Action
- Strip
- Action Description
- The whole SACK option is removed from the packet
- Proposed Action
- The gateway's reaction to this event is controlled by the setting TCPSettings:TCPInconsistentSACK.
2.50.87. [ID: 581] Non-first SACK block announced acknowledged[...]
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Non-first SACK block announced acknowledged data.
- Default Log Severity
- Notice
- Parameters
- sackblock, ackseqno, tcpopt, setting, flow, pkt, user, userid
- Explanation
- A non-first SACK block acknowledged data already acknowledged by the standard acknowledgment field in the header. Only the
first SACK block is allowed to do that.
- Gateway Action
- Strip
- Action Description
- The whole SACK option is removed from the packet
- Proposed Action
- The gateway's reaction to this event is controlled by the setting TCPSettings:TCPInconsistentSACK.
2.50.88. [ID: 253] Disallowed TCP option
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Disallowed TCP option.
- Default Log Severity
- Notice
- Parameters
- tcpopt, setting, flow, pkt, user, userid
- Explanation
- The packet contained an option of the kind indicated by the parameter tcpopt.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- The gateway's action when it finds an option of this type is controlled by the setting indicated by the parameter setting.
2.50.89. [ID: 391] SYN only option in non-SYN segment
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- SYN only option in non-SYN segment.
- Default Log Severity
- Notice
- Parameters
- tcpopt, setting, flow, pkt, user, userid
- Explanation
- A TCP option that only should occur in packets with the SYN flag set was found in a packet with the SYN flag cleared.
- Gateway Action
- Strip
- Action Description
- None
- Proposed Action
- Investigate the source of the packet and try to fix the problem there. If that is not possible then the gateway's behavior
can be adjusted through the setting TCPSettings:TCPSynOptInNonSyn.
2.50.90. [ID: 194] TCP option length missing
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- TCP option length missing.
- Default Log Severity
- Notice
- Parameters
- tcpopt, setting, flow, pkt, user, userid
- Explanation
- A TCP option with explicit length was found at a position in the header such that the length information fell outside of the
header.
- Gateway Action
- Strip
- Action Description
- The broken option was removed from the packet
- Proposed Action
- Investigate the source of this erroneous packet. If the problem can't be fixed at the source then the gateway's response to
this event can be changed through the setting TCPSettings:TCPBadOptionLengths.
2.50.91. [ID: 351] TCP option does not fit in the header
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- TCP option does not fit in the header.
- Default Log Severity
- Notice
- Parameters
- tcpopt, len, avail, setting, flow, pkt, user, userid
- Explanation
- A TCP option with a length that exceeded the remaining part of the header was found in the packet.
- Gateway Action
- Strip
- Action Description
- The broken option was removed from the packet.
- Proposed Action
- Investigate the source of this erroneous packet. If the problem can't be fixed at the source then the gateway's response to
this event can be changed through the setting TCPSettings:TCPBadOptionLengths.
2.50.92. [ID: 429] Unused non-zero ACK
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Unused non-zero ACK.
- Default Log Severity
- Notice
- Parameters
- setting, flow, pkt, user, userid
- Explanation
- The acknowledgment field in the packet was set even though the ACK flag was cleared. It is recommended to at least strip this
information from the packet to prevent unfiltered data from being tunneled within the acknowledgment field. Also, some operating
systems reveal sequence number information this way, which can make it easier for intruders wanting to hijack established
connections.
- Gateway Action
- Strip
- Action Description
- The acknowledgment field was set to zero
- Proposed Action
- The setting TCPSettings:TCPUnusedNonZeroAckField controls the gateway's behavior when an unused non-zero acknowledgment field is found.
2.50.93. [ID: 245] Unused non-zero urgent pointer
- Log Categories
- TCP,STATELESS,VALIDATE
- Log Message
- Unused non-zero urgent pointer.
- Default Log Severity
- Notice
- Parameters
- setting, flow, pkt, user, userid
- Explanation
- The urgent pointer field in the packet was set even though the URG flag was cleared. It is recommended to at least strip this
information from the packet to prevent unfiltered data from being tunneled within the urgent pointer field.
- Gateway Action
- Strip
- Action Description
- The urgent pointer field was set to zero
- Proposed Action
- The setting TCPSettings:TCPUnusedNonZeroUrgField controls the gateway's behavior when an unused non-zero urgent pointer field is found.
2.50.94. [ID: 188] Unexpected TCP flags
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Unexpected TCP flags.
- Default Log Severity
- Warning
- Parameters
- flags, state, flow, pkt, user, userid
- Explanation
- The TCP packet had a TCP flag set that is not expected to be set in the current state of the TCP connection.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- This log message can be turned off by the setting TCPSettings:TCPLogStateViolations.
2.50.95. [ID: 433] Unexpected SYN packet
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- Unexpected SYN packet.
- Default Log Severity
- Warning
- Parameters
- seqno, origseqno, flags, offset, state, flow, pkt, user, userid
- Explanation
- The TCP packet's combination of sequence number and SYN flag or the mere existence of the SYN flag was unexpected in the current
state of the TCP connection. There are several reasons why this event can occur. The first is that a handshake packet has
be retransmitted even though it was not necessary to establish the connection and then been delayed more than most other packets
on the connection. In this case the parameters seqno and origseqno should match. If the ACK flag is not set, according to the flags parameter, then it could be an attempt to setup a new connection before the flow state belonging to a previous connection
has timed out. Such an attempt is only valid if either the old connection has been torn down or if it never was properly established.
The parameter state should give an indication of the state of the old connection. SYN_RECVD, FIN_RCVD and TIME_WAIT are valid connection states
for reopening the flow state. The packet could also be an indication of a broken device or be a part of some network scan
or some other malicious activity.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If this appears to be an attempt to setup a new connection while the flow state of a previous connection still exists then
consider changing the setting TCPSettings:TCPAllowReopen to allow the flow state to be reopened/reused. The parameter offset is intended as an aid in deciding whether to allow any sequence number to reopen the flow state or just those that are higher
than the sequence numbers used on the old connection. If the offset is greater than zero then it should be sufficient to only
allow higher sequence numbers otherwise any sequence number must be allowed, to have the intended effect. If allowing flow
states to be reopened is not an option then an alternative solution is to reduce the idle lifetime for TCP flow states during
setup and/or tear-down to make it less likely that the same connection will be reused before the flow state has timed out.
However, reducing the idle lifetimes too much can cause other problems, for instance, with connection establishment. This
log message can be turned off by the setting TCPSettings:TCPLogStateViolations.
2.50.96. [ID: 510] TCP state tracking requires stricter[...]
- Log Categories
- TCP,STATEFUL
- Log Message
- TCP state tracking requires stricter validation.
- Default Log Severity
- Error
- Parameters
- setting, min
- Explanation
- The implementation of the TCP state tracking assumes that certain strange packets are handled during validation. The current
configuration breaks that assumption and is therefore not supported.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Change the configuration to comply and report this error to the vendor's support organization. If you need to use the current
settings then TCP state tracking must be disabled and the traffic forwarded using only some lighter validation.
2.50.97. [ID: 293] TCP window shrinking
- Log Categories
- TCP,STATEFUL,VALIDATE
- Log Message
- TCP window shrinking.
- Default Log Severity
- Information
- Parameters
- old, new, gap, flags, ackseqno, state, flow, pkt, user, userid
- Explanation
- A new receive window was announced on the flow. However, the previous receive window announcement accepted higher sequence
numbers than the new one. This means that the sender of this segment has revoked previous claims that it is willing to accept
a certain range of sequence numbers. This is discouraged behavior and could be causing packet drops due to too high sequence
number. The parameter gap contains the size of the sequence number range which is no longer announced as part of the receive window.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
These log messages refer to the THRESHOLD category.
2.51.1. [ID: 1115] Threshold notice
- Log Categories
- THRESHOLD,FLOW
- Log Message
- Threshold notice.
- Default Log Severity
- Dynamic
- Parameters
- thresholdset, matchkey, rule
- Explanation
- A flow setup attempt triggered the given thresholdset in threshold rule rule: The flow setup was allowed to continue.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- None
2.51.2. [ID: 1085] Threshold blacklist
- Log Categories
- THRESHOLD,FLOW,BLACKLIST
- Log Message
- Threshold blacklist.
- Default Log Severity
- Dynamic
- Parameters
- thresholdset, matchkey, rule
- Explanation
- A flow setup attempt triggered the given thresholdset in threshold rule rule: The attempt has been blocked and the source is now blacklisted.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Contact the owner of the blacklisted source.
2.51.3. [ID: 1128] Threshold block flow
- Log Categories
- THRESHOLD,FLOW
- Log Message
- Threshold block flow.
- Default Log Severity
- Dynamic
- Parameters
- thresholdset, matchkey, rule
- Explanation
- A flow setup attempt triggered the given thresholdset in threshold rule rule: This particular attempt was blocked.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.51.4. [ID: 1147] Threshold reject flow
- Log Categories
- THRESHOLD,FLOW
- Log Message
- Threshold reject flow.
- Default Log Severity
- Dynamic
- Parameters
- thresholdset, matchkey, rule
- Explanation
- A flow setup attempt triggered the given thresholdset in threshold rule rule: This particular attempt was rejected.
- Gateway Action
- Reject
- Action Description
- Reject is a polite way of denying access to a protected service, by sending an error message back to the source
- Proposed Action
- Carefully consider the security implications created by using the reject action.
2.51.5. [ID: 1123] Threshold tag flow
- Log Categories
- THRESHOLD,FLOW
- Log Message
- Threshold tag flow.
- Default Log Severity
- Dynamic
- Parameters
- thresholdset, matchkey, rule
- Explanation
- A flow setup attempt triggered the given thresholdset in threshold rule rule: The flow setup was allowed to continue, but the flow has been tagged for later analysis. The tag will not affect the functionality
of the forwarded traffic in any way, but some functionality can apply the tag as a filter (notably CLI commands and log messages).
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- Review the tagged flows.
2.51.6. [ID: 1126] Threshold definition is no longer exceeded
- Log Categories
- THRESHOLD
- Log Message
- Threshold definition is no longer exceeded.
- Default Log Severity
- Information
- Parameters
- definition, group, threshold, interval, value, time, lifetime
- Explanation
- The specific threshold group group no longer exceeds the corresponding threshold definition (with the configured threshold over the configured interval seconds): The group measurement is currently value over a period of time seconds. Before this event happened, the group did exceed the threshold for lifetime seconds.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.51.7. [ID: 1107] Threshold definition is exceeded
- Log Categories
- THRESHOLD
- Log Message
- Threshold definition is exceeded.
- Default Log Severity
- Dynamic
- Parameters
- definition, group, threshold, interval, value, time, lifetime
- Explanation
- The specific threshold group group now exceeds the corresponding threshold definition (with the configured threshold over the configured interval seconds): The group measurement is currently value over a period of time seconds. Before this event happened, the group did spend lifetime seconds without being exceeded.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.51.8. [ID: 1130] Random group replacement
- Log Categories
- THRESHOLD
- Log Message
- Random group replacement.
- Default Log Severity
- Warning
- Parameters
- group
- Explanation
- There was a shortage of free threshold group instances and therefore, one randomly selected active threshold group instance
was removed. This only happens when there are excessive flow open requests coming from many different sources (assuming the
grouping is per source). Threshold rules that contain rate-based thresholds with a long configured interval are prone to this
during distributed denial-of-service attacks since old group instances cannot be sensibly discarded until activity has ceased
for a whole configured interval. The impact of losing an active group instance is that the system will forget information
that could have been used to identify traffic that should have trigged a threshold action. This can potentially be used as
an attempt to mask another more "stealthy" attack.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Review the threshold rules; length of intervals, grouping parameters and actions. Consider to use grouping by network segments
rather than individual IP addresses, as this will decrease the maximum possible number of groups that an attack can cause
to be setup. As a last resort, the setting TrafficMgmtSettings:MaxThresholdMemUsage can be adjusted to support more simultaneous threshold groups.
These log messages refer to the TIMESYNC category.
2.52.1. [ID: 772] An internal error has occurred
- Log Categories
- TIMESYNC
- Log Message
- An internal error has occurred.
- Default Log Severity
- Alert
- Parameters
- value
- Explanation
- An internal error has occurred and the NTP daemon will be restarted.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
2.52.2. [ID: 634] Time synchronization prevented due to[...]
- Log Categories
- TIMESYNC
- Log Message
- Time synchronization prevented due to negative delay in received packet.
- Default Log Severity
- Notice
- Parameters
-
- Explanation
- A received time from a timeserver has a negative delay.
- Gateway Action
- None
- Action Description
- The received time is discarded
- Proposed Action
- None
2.52.3. [ID: 635] Time synchronization prevented due to[...]
- Log Categories
- TIMESYNC
- Log Message
- Time synchronization prevented due to security validation.
- Default Log Severity
- Warning
- Parameters
-
- Explanation
- A received packet from a timeserver did not pass security validation.
- Gateway Action
- None
- Action Description
- The received time is discarded
- Proposed Action
- None
2.52.4. [ID: 386] Communication with server has failed
- Log Categories
- TIMESYNC
- Log Message
- Communication with server has failed.
- Default Log Severity
- Warning
- Parameters
- serverip, reason
- Explanation
- Communication with a server has failed and cannot be used for time synchronization.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check configuration settings for time synchronization.
2.52.5. [ID: 524] Time synchronization is currently impossible
- Log Categories
- TIMESYNC
- Log Message
- Time synchronization is currently impossible.
- Default Log Severity
- Error
- Parameters
-
- Explanation
- No communication can be established with any timeservers, making time synchronization impossible.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- Check configuration settings for time synchronization.
2.52.6. [ID: 385] The clock has drifted so much that it is not[...]
- Log Categories
- TIMESYNC
- Log Message
- The clock has drifted so much that it is not within the maximum allowed correction interval. The clock will not be updated.
- Default Log Severity
- Notice
- Parameters
- offset, max
- Explanation
- A received time from a timeserver was outside of the maximum allowed time adjustment setting.
- Gateway Action
- Discard
- Action Description
- The received time is discarded
- Proposed Action
- None
2.52.7. [ID: 529] Time has been synchronized
- Log Categories
- TIMESYNC
- Log Message
- Time has been synchronized.
- Default Log Severity
- Notice
- Parameters
- time, old, serverip, name
- Explanation
- Time has been synchronized.
- Gateway Action
- None
- Action Description
- None
- Proposed Action
- None
These log messages refer to the UDP category.
2.53.1. [ID: 482] Mismatching UDP IP payload length
- Log Categories
- UDP,STATELESS,VALIDATE
- Log Message
- Mismatching UDP IP payload length.
- Default Log Severity
- Warning
- Parameters
- len, iplen, flow, pkt, user, userid
- Explanation
- The length field in the UDP header does not match the payload length specified by the IP header.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If the packet sender is one of your network devices, investigate why the unit is sending malformed UDP packets. This log event
can be disabled by the IPSettings:LayerSizeConsistency setting.
2.53.2. [ID: 573] Bad UDP checksum
- Log Categories
- UDP,STATELESS,VALIDATE
- Log Message
- Bad UDP checksum.
- Default Log Severity
- Notice
- Parameters
- chksum, calcchksum, flow, pkt, user, userid
- Explanation
- The packet's UDP checksum was incorrect. A bad checksum is normally an indication that the packet data has been corrupted,
something that will happen spontaneously when transferred over a physical network medium. This is only a concern when it happens
in excess; in this case it may be a sign of broken hardware inside the network.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- The settings UDPSettings:UDP4ChecksumVerification and UDPSettings:UDP6ChecksumVerification can be changed to control the gateways behavior for analyzing the checksum of UDP packets.
2.53.3. [ID: 119] Bad UDP checksum
- Log Categories
- UDP,STATELESS,VALIDATE
- Log Message
- Bad UDP checksum.
- Default Log Severity
- Warning
- Parameters
- chksum, calcchksum, flow, pkt, user, userid
- Explanation
- The packet's UDP checksum was incorrect. A bad checksum is normally an indication that the packet data has been corrupted,
something that will happen spontaneously when transferred over a physical network medium. This is only a concern when it happens
in excess; in this case it may be a sign of broken hardware inside the network.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- The settings UDPSettings:UDP4ChecksumVerification and UDPSettings:UDP6ChecksumVerification can be changed to control the gateways behavior for analyzing the checksum of UDP packets.
2.53.4. [ID: 602] Bad UDP checksum
- Log Categories
- UDP,STATELESS,VALIDATE
- Log Message
- Bad UDP checksum.
- Default Log Severity
- Warning
- Parameters
- chksum, calcchksum, pkt
- Explanation
- The packet's' UDP checksum was found to be incorrect while performing an important operation e.g. updating a flow state. A
bad checksum is normally an indication that the packet data has been corrupted, something that will happen spontaneously when
transferred over a physical network medium. This is only a concern when it happens in excess; in this case it may be a sign
of broken hardware inside the network.
- Gateway Action
- Allow
- Action Description
- None
- Proposed Action
- Some packets are considered important and must be verified to be valid before they are allowed to pass through the system.
Thus, UDP checksum verification cannot be disabled for these key packets.
2.53.5. [ID: 1076] Bad UDP checksum
- Log Categories
- UDP,STATELESS,VALIDATE
- Log Message
- Bad UDP checksum.
- Default Log Severity
- Warning
- Parameters
- chksum, calcchksum, pkt
- Explanation
- The packet's' UDP checksum was found to be incorrect while performing an important operation e.g. updating a flow state. A
bad checksum is normally an indication that the packet data has been corrupted, something that will happen spontaneously when
transferred over a physical network medium. This is only a concern when it happens in excess; in this case it may be a sign
of broken hardware inside the network.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- Some packets are considered important and must be verified to be valid before they are allowed to pass through the system.
Thus, UDP checksum verification cannot be disabled for these key packets.
2.53.6. [ID: 374] Invalid jumbogram UDP header length
- Log Categories
- UDP,STATELESS,VALIDATE
- Log Message
- Invalid jumbogram UDP header length.
- Default Log Severity
- Warning
- Parameters
- len, expectlen, flow, pkt, user, userid
- Explanation
- The length field in the UDP header must be zero for IPv6 jumbograms.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If the packet sender is one of your network devices, investigate why the unit is sending malformed UDP packets. This log event
can be disabled by the IPSettings:LayerSizeConsistency setting.
2.53.7. [ID: 292] Truncated UDP header
- Log Categories
- UDP,STATELESS,VALIDATE
- Log Message
- Truncated UDP header.
- Default Log Severity
- Warning
- Parameters
- len, minlen, flow, pkt, user, userid
- Explanation
- The length field in the UDP header was smaller then the minimum allowed length of 8 bytes.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- If the packet sender is one of your network devices, investigate why the unit is sending malformed UDP packets. This log event
can be disabled by the IPSettings:LayerSizeConsistency setting.
These log messages refer to the VLAN category.
2.54.1. [ID: 879] VLAN packet with CFI set
- Log Categories
- VLAN,STATELESS,VALIDATE
- Log Message
- VLAN packet with CFI set.
- Default Log Severity
- Notice
- Parameters
- pkt
- Explanation
- A VLAN packet with the CFI (Canonical Format Indicator) set was received. Such packets should not occur on an Ethernet network.
The packet was dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.54.2. [ID: 880] Packet is too small to contain VLAN header
- Log Categories
- VLAN,STATELESS,VALIDATE
- Log Message
- Packet is too small to contain VLAN header.
- Default Log Severity
- Warning
- Parameters
- pkt
- Explanation
- The end of packet data was encountered while parsing VLAN headers. The packet must be truncated and was dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None
2.54.3. [ID: 878] VLAN packet with unknown VLAN id
- Log Categories
- VLAN,STATELESS,VALIDATE
- Log Message
- VLAN packet with unknown VLAN id.
- Default Log Severity
- Notice
- Parameters
- vlanid, vlantype, iface, pkt
- Explanation
- The VLAN id of a received packet has not been configured on any interface, hence, there is no interface to receive the packet
on, so, the packet was dropped.
- Gateway Action
- Drop
- Action Description
- None
- Proposed Action
- None