2.21. ICMP

These log messages refer to the ICMP category.

2.21.1. [ID: 204] Bad ICMP message checksum

Log Categories
ICMP,VALIDATE,STATELESS
Log Message
Bad ICMP message checksum.
Default Log Severity
Notice
Parameters
type, code, chksum, calcchksum, pkt
Explanation
An ICMP message has a bad checksum.
Gateway Action
Allow
Action Description
Node
Proposed Action
A bad checksum is normally an indication that the packet data has been corrupted, something that will happen spontaneously when transferred over a physical network medium. This is only a concern when it happens in excess; in this case it may be a sign of broken hardware inside the network. Try to locate and isolate the misbehaving unit. The ICMPSettings:ICMPValidateChecksum setting can be changed to control the gateway's behavior regarding packets with broken ICMP checksum.

2.21.2. [ID: 387] Bad ICMP message checksum

Log Categories
ICMP,VALIDATE,STATELESS
Log Message
Bad ICMP message checksum.
Default Log Severity
Warning
Parameters
type, code, chksum, calcchksum, pkt
Explanation
An ICMP message has a bad checksum.
Gateway Action
Drop
Action Description
None
Proposed Action
A bad checksum is normally an indication that the packet data has been corrupted, something that will happen spontaneously when transferred over a physical network medium. This is only a concern when it happens in excess; in this case it may be a sign of broken hardware inside the network. Try to locate and isolate the misbehaving unit. The ICMPSettings:ICMPValidateChecksum setting can be changed to control the gateway's behavior regarding packets with broken ICMP checksum.

2.21.3. [ID: 365] ICMP error with embedded trailer

Log Categories
ICMP,STATELESS,VALIDATE
Log Message
ICMP error with embedded trailer.
Default Log Severity
Warning
Parameters
type, code, srcip, destip, paylen, encapproto, encapsrcip, encapdestip, encappaylen, encaptrailer
Explanation
The embedded IP message inside the ICMP error, was shorter than the full payload of the ICMP error. A portion of the ICMP payload therefore consisted of "undefined data".
Gateway Action
Strip
Action Description
The embedded trailer inside the ICMP payload has been zeroed out
Proposed Action
The ICMP error was likely generated as a response to a packet containing a trailer of the "undefined data", but the point is that "undefined data" is a potential information leak and almost exclusively a sign of incorrect network handling. Try to locate the node producing the trailers if this happens more than once, and see if it can be upgraded. This log message can be turned off by modifying the IPSettings:LayerSizeConsistency setting, but the current handling cannot be turned off.

2.21.4. [ID: 328] Length of embedded header in ICMP error is[...]

Log Categories
ICMP,STATELESS,VALIDATE
Log Message
Length of embedded header in ICMP error is invalid.
Default Log Severity
Warning
Parameters
type, code, srcip, destip, paylen, encaphdrver, encaphdrlen, encappaylen
Explanation
An ICMP error message encapsulated an IPv4 header that was too large to be fully contained inside the original message together with at least the beginning 8 bytes of an L4 header, meaning that the information to forward this message was never even contained in the original message.
Gateway Action
Drop
Action Description
None
Proposed Action
This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed packets. This log message can be disabled by the IPSettings:LayerSizeConsistency setting.

2.21.5. [ID: 450] ICMP error with incompatible IP version

Log Categories
ICMP,STATELESS,VALIDATE
Log Message
ICMP error with incompatible IP version.
Default Log Severity
Warning
Parameters
type, code, srcip, destip, encaphdrver, encapproto, encapsrcip, encapdestip
Explanation
An ICMP error message encapsulated a message with the incompatible IP version encaphdrver.
Gateway Action
Drop
Action Description
None
Proposed Action
This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed packets. This log message can be disabled by the IPSettings:LayerSizeConsistency setting.

2.21.6. [ID: 134] ICMP error with incompatible IP version

Log Categories
ICMP,STATELESS,VALIDATE
Log Message
ICMP error with incompatible IP version.
Default Log Severity
Warning
Parameters
type, code, srcip, destip, encaphdrver, encapproto, encapsrcip, encapdestip
Explanation
An ICMP error message encapsulated a message with the incompatible IP version encaphdrver.
Gateway Action
Drop
Action Description
None
Proposed Action
This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed packets. This log message can be disabled by the IPSettings:LayerSizeConsistency setting.

2.21.7. [ID: 600] ICMP error to fragment

Log Categories
ICMP,STATELESS,VALIDATE
Log Message
ICMP error to fragment.
Default Log Severity
Warning
Parameters
type, code, srcip, destip, encapproto, encapsrcip, encapdestip, encapfragid, encapfragoff
Explanation
An ICMP error message encapsulated a non-first IP fragment. Encapsulated non-first fragments are dropped since the protocol specific information required for forwarding does not exist.
Gateway Action
Drop
Action Description
None
Proposed Action
This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed packets. This log message can be disabled by the IPSettings:LayerSizeConsistency setting.

2.21.8. [ID: 296] Truncated embedded IP header in ICMPv4

Log Categories
ICMP,STATELESS,VALIDATE
Log Message
Truncated embedded IP header in ICMPv4.
Default Log Severity
Warning
Parameters
type, code, srcip, destip, paylen, encaphdrver, encaphdrlen
Explanation
An ICMP error message did not carry enough data to contain information required to forward the packet. The encapsulated IPv4 header was larger than an ordinary IPv4 header, and the ICMP error did not encapsulate the whole header.
Gateway Action
Drop
Action Description
None
Proposed Action
This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed packets. This log message can be disabled by the IPSettings:LayerSizeConsistency setting.

2.21.9. [ID: 476] Dropped ICMP error message

Log Categories
ICMP,VALIDATE,STATEFUL
Log Message
Dropped ICMP error message.
Default Log Severity
Warning
Parameters
type, code, srcip, destip, flow, rule, user, userid
Explanation
An ICMP error of type type and code code has been received by flow flow, but this ICMP error type is prohibited by the configuration.
Gateway Action
Drop
Action Description
None
Proposed Action
If you think the current behavior is incorrect, modify rule rule to use a service with an appropriate ICMP error filter.

2.21.10. [ID: 221] ICMP error to ICMP error

Log Categories
ICMP,STATELESS,VALIDATE
Log Message
ICMP error to ICMP error.
Default Log Severity
Warning
Parameters
type, code, srcip, destip, encaptype, encapcode, encapsrcip, encapdestip
Explanation
An ICMP error message was received, encapsulating another ICMP error. This is illegal according to RFC 792 (ICMPv4 spec) and RFC 2463 (ICMPv6 spec) because of the potential to cause a never-ending loop.
Gateway Action
Drop
Action Description
None
Proposed Action
Try to locate the node producing these errors, and see if it can be upgraded or replaced.

2.21.11. [ID: 376] Data in request differs from last request

Log Categories
ICMP,STATEFUL,VALIDATE
Log Message
Data in request differs from last request.
Default Log Severity
Information
Parameters
seqno, flow, pkt, user, userid
Explanation
The last seen ICMP ECHO REQUEST message did not contain the same data as the previous request message. This is legal but unexpected; "ping" requests are generally using statically defined data to test various network conditions. Some utilities will routinely use the first 8 bytes to contain a timestamp, so any change in the first 8 bytes since the last request have been ignored.
Gateway Action
Allow
Action Description
None
Proposed Action
The setting ICMPSettings:ICMP_DataTrack can be updated in order to modify how the firewall behaves with regards to the contents of the ICMP ECHO payload. Setting it to anything but "Ignore" will cause the firewall to inspect the entire payload of the ICMP packet and report when a difference has been detected between request and reply. This is mostly intended to aid tracking down some very special network anomalies. This event may be a false positive if a "flood ping" utility has been used (sending requests faster than replies are being received). In rare cases this can be a sign of hardware malfunction somewhere in the network, and in equally rare cases this may be an attempt to relay "secret" data using the ICMP "ping" protocol; Check the sender and destination to see if the traffic is legal. How to track down the kind of hardware malfunction that can give these symptoms is out of scope for this text, but as much can be said that the network hardware handles data as changes between ones and zeroes. Problems are more likely to arise with very few changes during a transfer (mostly ones or zeroes) or lots of changes (alternating ones and zeroes), so the suggestion would be to begin testing these bit-patterns.

2.21.12. [ID: 286] Data in request differs from last request

Log Categories
ICMP,STATEFUL,VALIDATE
Log Message
Data in request differs from last request.
Default Log Severity
Warning
Parameters
seqno, flow, pkt, user, userid
Explanation
The last seen ICMP ECHO REQUEST message did not contain the same data as the previous request message. This is legal but unexpected; "ping" requests are generally using statically defined data to test various network conditions. Some utilities will routinely use the first 8 bytes to contain a timestamp, so any change in the first 8 bytes since the last request have been ignored.
Gateway Action
Drop
Action Description
None
Proposed Action
The setting ICMPSettings:ICMP_DataTrack can be updated in order to modify how the firewall behaves with regards to the contents of the ICMP ECHO payload. Setting it to anything but "Ignore" will cause the firewall to inspect the entire payload of the ICMP packet and report when a difference has been detected between request and reply. This is mostly intended to aid tracking down some very special network anomalies. This event may be a false positive if a "flood ping" utility has been used (sending requests faster than replies are being received). In rare cases this can be a sign of hardware malfunction somewhere in the network, and in equally rare cases this may be an attempt to relay "secret" data using the ICMP "ping" protocol; Check the sender and destination to see if the traffic is legal. How to track down the kind of hardware malfunction that can give these symptoms is out of scope for this text, but as much can be said that the network hardware handles data as changes between ones and zeroes. Problems are more likely to arise with very few changes during a transfer (mostly ones or zeroes) or lots of changes (alternating ones and zeroes), so the suggestion would be to begin testing these bit-patterns.

2.21.13. [ID: 426] Invalid ICMP type

Log Categories
ICMP,STATELESS,VALIDATE
Log Message
Invalid ICMP type.
Default Log Severity
Warning
Parameters
type, code, pkt
Explanation
An ICMP message that is not allowed to setup stateful connections, tried to setup a stateful connection. The ICMP message in itself was allowed by the ruleset, but this particular message does not make sense to handle in a stateful manner.
Gateway Action
Drop
Action Description
None
Proposed Action
A rule to setup a stateful connection is apparently using a service that is not intended to handle a stateful connection. Either revise the ruleset, or split the used service in two: One for stateful traffic and one for traffic that is not stateful (allow, NAT and SAT rules are stateful, "fast forward" is non-stateful).

2.21.14. [ID: 496] Mismatching ICMP reply data

Log Categories
ICMP,STATEFUL,VALIDATE
Log Message
Mismatching ICMP reply data.
Default Log Severity
Notice
Parameters
seqno, flow, pkt, user, userid
Explanation
A received ICMP ECHO REPLY message did not contain the same data as the corresponding ICMP ECHO REQUEST message. This is not in compliance with the ICMP "ping" protocol.
Gateway Action
Allow
Action Description
None
Proposed Action
The setting ICMPSettings:ICMP_DataTrack can be updated in order to modify how the firewall behaves with regards to the contents of the ICMP ECHO payload. Setting it to anything but "Ignore" will cause the firewall to inspect the entire payload of the ICMP packet and report when a difference has been detected between request and reply. This is mostly intended to aid tracking down some very special network anomalies. This event may be a false positive if a "flood ping" utility has been used (sending requests faster than replies are being received). In rare cases this can be a sign of hardware malfunction somewhere in the network, and in equally rare cases this may be an attempt to relay "secret" data using the ICMP "ping" protocol; Check the sender and destination to see if the traffic is legal. How to track down the kind of hardware malfunction that can give these symptoms is out of scope for this text, but as much can be said that the network hardware handles data as changes between ones and zeroes. Problems are more likely to arise with very few changes during a transfer (mostly ones or zeroes) or lots of changes (alternating ones and zeroes), so the suggestion would be to begin testing these bit-patterns.

2.21.15. [ID: 555] Mismatching ICMP reply data

Log Categories
ICMP,STATEFUL,VALIDATE
Log Message
Mismatching ICMP reply data.
Default Log Severity
Warning
Parameters
seqno, flow, pkt, user, userid
Explanation
A received ICMP ECHO REPLY message did not contain the same data as the corresponding ICMP ECHO REQUEST message. This is not in compliance with the ICMP "ping" protocol.
Gateway Action
Drop
Action Description
None
Proposed Action
The setting ICMPSettings:ICMP_DataTrack can be updated in order to modify how the firewall behaves with regards to the contents of the ICMP ECHO payload. Setting it to anything but "Ignore" will cause the firewall to inspect the entire payload of the ICMP packet and report when a difference has been detected between request and reply. This is mostly intended to aid tracking down some very special network anomalies. This event may be a false positive if a "flood ping" utility has been used (sending requests faster than replies are being received). In rare cases this can be a sign of hardware malfunction somewhere in the network, and in equally rare cases this may be an attempt to relay "secret" data using the ICMP "ping" protocol; Check the sender and destination to see if the traffic is legal. How to track down the kind of hardware malfunction that can give these symptoms is out of scope for this text, but as much can be said that the network hardware handles data as changes between ones and zeroes. Problems are more likely to arise with very few changes during a transfer (mostly ones or zeroes) or lots of changes (alternating ones and zeroes), so the suggestion would be to begin testing these bit-patterns.

2.21.16. [ID: 1504] ICMP error response to multicast

Log Categories
ICMP,STATELESS,VALIDATE
Log Message
ICMP error response to multicast.
Default Log Severity
Warning
Parameters
type, code, srcip, destip, encaphdrver, encapproto, encapsrcip, encapdestip
Explanation
An ICMP error was made in response to a multicast message, or used an otherwise illegal combination of multicast and ICMP. Historically this has been used for amplification attacks, but is more frequently caused by devices misbehaving when exposed to multicast traffic.
Gateway Action
Drop
Action Description
None
Proposed Action
If this is a reoccurring issue, try to track down the sender of the ICMP error. The log message can also be disabled by IPSettings:LayerSizeConsistency, but even if there is no underlying malicious attempt, remember that software producing these messages may also be susceptible for the associated amplification attacks.

2.21.17. [ID: 1503] ICMP error response to multicast

Log Categories
ICMP,STATELESS,VALIDATE
Log Message
ICMP error response to multicast.
Default Log Severity
Notice
Parameters
type, code, srcip, destip, encaphdrver, encapproto, encapsrcip, encapdestip
Explanation
An ICMP error was made in response to a multicast message. Normally this is illegal, albeit this particular case this is considered legal. By nature it is a multicast reply, and needs tight control; without, it is a possible vector for amplification "attacks" against the multicast source.
Gateway Action
Allow
Action Description
None
Proposed Action
Normally nothing needs to be done. ICMP errors are rate limited with ICMPSettings:ICMPErrorPerSecLimit, ICMPSettings:ICMPMaxErrorsPerRule and ICMPSettings:ICMPMaxErrorsPerFlow. In some scenarios, blocking specific ICMP error messages may be an option: Consider using a more restrictive service and review the ICMP settings, in particular ICMPSettings:IP6PacketTooBig. This log message can be completely disabled by IPSettings:LayerSizeConsistency, but this will also disable many log messages that are of a more severe nature.

2.21.18. [ID: 301] Sequence number in reply is outside expected[...]

Log Categories
ICMP,STATEFUL,VALIDATE
Log Message
Sequence number in reply is outside expected range.
Default Log Severity
Notice
Parameters
min, max, seqno, flow, user, userid
Explanation
An ICMP reply had a sequence number outside the current window of expected sequence numbers. The sequence number seqno is below the lower bound min of the sequence window. This may occur if a stray message following a less efficient route or a duplicate message.
Gateway Action
Allow
Action Description
None
Proposed Action
When duplicate messages show up and/or messages are received out-of-order in abundance, the network should be examined for broken hardware or misconfigured equipment. Note that wireless networks often produce this kind of anomalies even when they are fully functional. The ICMPSettings:ICMP_SeqNoTrack setting can be changed to control the gateway's behavior regarding packets received out-of-order.

2.21.19. [ID: 273] Sequence number in reply is outside expected[...]

Log Categories
ICMP,STATEFUL,VALIDATE
Log Message
Sequence number in reply is outside expected range.
Default Log Severity
Warning
Parameters
min, max, seqno, flow, user, userid
Explanation
An ICMP reply had a sequence number outside the current window of expected sequence numbers. The sequence number seqno is below the lower bound min of the sequence window. This may occur if a stray message following a less efficient route or a duplicate message.
Gateway Action
Drop
Action Description
None
Proposed Action
When duplicate messages show up and/or messages are received out-of-order in abundance, the network should be examined for broken hardware or misconfigured equipment. Note that wireless networks often produce this kind of anomalies even when they are fully functional. The ICMPSettings:ICMP_SeqNoTrack setting can be changed to control the gateway's behavior regarding packets received out-of-order.

2.21.20. [ID: 288] Problem pointer outside of data

Log Categories
ICMP,STATELESS,VALIDATE
Log Message
Problem pointer outside of data.
Default Log Severity
Warning
Parameters
srcip, destip, paylen, encapproto, encapsrcip, encapdestip, encappaylen, ptr
Explanation
An ICMP "parameter problem" error message was received, but the "problem pointer" inside the error message did not point at any data contained in the packet.
Gateway Action
Drop
Action Description
None
Proposed Action
This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed packets. This log message can be disabled by the IPSettings:LayerSizeConsistency setting.

2.21.21. [ID: 507] Problem pointer outside of data

Log Categories
ICMP,STATELESS,VALIDATE
Log Message
Problem pointer outside of data.
Default Log Severity
Warning
Parameters
type, code, srcip, destip, paylen, encapproto, encapsrcip, encapdestip, encappaylen, ptr
Explanation
An ICMP "parameter problem" error message was received, but the "problem pointer" inside the error message did not point at any data contained in the packet.
Gateway Action
Drop
Action Description
None
Proposed Action
This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed packets. This log message can be disabled by the IPSettings:LayerSizeConsistency setting.

2.21.22. [ID: 612] Header length parameter problem

Log Categories
ICMP,STATELESS,VALIDATE
Log Message
Header length parameter problem.
Default Log Severity
Warning
Parameters
type, code, srcip, destip, paylen, encaphdrver, encaphdrlen, encappaylen
Explanation
An ICMP "parameter problem" message was received, pointing at the encapsulated IP headers length, total payload or possibly using the general "header length error" code. It appears as if the original packets IPv4 header was too large to be fully contained inside the original message itself. While this may be a legal ICMP error, the information needed to forward this packet was never even present in the original packet, and the firewall cannot forward it in an easy way.
Gateway Action
Drop
Action Description
None
Proposed Action
The encapsulated message inside the ICMP error is horribly broken. Judging from the information contained in the ICMP error, the node at srcip is the one that discovered the broken packet. The rest of the information is not reliable. Examine why this broken packet have been sent in the first place. If you need to forward this ICMP error, you need to setup a stateless ICMP rule that explicitly forwards it to its destination destip. You will also need to set the ICMPSettings:ICMPErrorPerSecToSPLimit to a non-null value. This log message itself can be disabled with the IPSettings:LayerSizeConsistency setting.

2.21.23. [ID: 164] IP header version parameter problem

Log Categories
ICMP,STATELESS,VALIDATE
Log Message
IP header version parameter problem.
Default Log Severity
Notice
Parameters
type, code, hdrver, srcip, destip, encaphdrver, encapproto, encapsrcip, encapdestip
Explanation
An ICMP "parameter problem" message was received, pointing at the encapsulated IP headers version. It appears as if an IP version hdrver only node is receiving IP traffic of version encaphdrver. While this may be a legal packet, the information needed to forward this packet is incompatible with the module that forwarded the original IP version encaphdrver packet, and the firewall cannot forward it in an easy way.
Gateway Action
None
Action Description
None
Proposed Action
Examine why IP version encaphdrver traffic is routed to the IP hdrver only node. If possible, upgrade or block IP version encaphdrver traffic to the node. If you need to forward this ICMP error, you need to setup a stateless ICMP rule that explicitly forwards it to its destination destip. You will also need to set the ICMPSettings:ICMPErrorPerSecToSPLimit to a non-null value. This log message itself can be disabled with the IPSettings:LayerSizeConsistency setting.

2.21.24. [ID: 807] Failed to allocate reassembly buffer

Log Categories
ICMP,FRAG
Log Message
Failed to allocate reassembly buffer.
Default Log Severity
Warning
Parameters
pktlen, pkt
Explanation
The received packet was fragmented and could not be reassembled because there were no free buffers available to hold the reassembled packet.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.21.25. [ID: 805] Reassembled packet exceeds allowed size

Log Categories
ICMP,FRAG
Log Message
Reassembled packet exceeds allowed size.
Default Log Severity
Warning
Parameters
maxlen, pkt
Explanation
The packet was fragmented and could not be reassembled because it exceeded the maximum allowed size.
Gateway Action
Drop
Action Description
None
Proposed Action
The FragSettings:LocalReass_MaxSize can be used to change the maximum allowed size for locally reassembled packets.

2.21.26. [ID: 806] Failed to reassemble packet

Log Categories
ICMP,FRAG
Log Message
Failed to reassemble packet.
Default Log Severity
Error
Parameters
pktlen, pkt
Explanation
The packet was fragmented and could not be reassembled.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.21.27. [ID: 533] Received ICMP error message

Log Categories
ICMP,VALIDATE,STATEFUL
Log Message
Received ICMP error message.
Default Log Severity
Notice
Parameters
type, code, srcip, destip, flow, rule, user, userid
Explanation
An ICMP error of type type and code code has been received by flow flow.
Gateway Action
Allow
Action Description
None
Proposed Action
If you think the current behavior is incorrect, modify rule rule to use a service with an appropriate ICMP error filter.

2.21.28. [ID: 553] Sequence number in reply is above expected[...]

Log Categories
ICMP,STATEFUL,VALIDATE
Log Message
Sequence number in reply is above expected window.
Default Log Severity
Notice
Parameters
min, max, seqno, flow, user, userid
Explanation
An ICMP reply had a sequence number above the current window of expected sequence numbers. The sequence number seqno is higher than the maximum value max in the sequence window (and at the same time closer to max than to the lower bound min of the window). Therefore this looks like an illegal reply to a message that hasn't been sent.
Gateway Action
Allow
Action Description
None
Proposed Action
When duplicate messages show up and/or messages are received out-of-order in abundance, the network should be examined for broken hardware or misconfigured equipment. Note that wireless networks often produce this kind of anomalies even when they are fully functional. The ICMPSettings:ICMP_SeqNoTrack setting can be changed to control the gateway's behavior regarding packets received out-of-order.

2.21.29. [ID: 422] Sequence number in reply is above expected[...]

Log Categories
ICMP,STATEFUL,VALIDATE
Log Message
Sequence number in reply is above expected window.
Default Log Severity
Warning
Parameters
min, max, seqno, flow, user, userid
Explanation
An ICMP reply had a sequence number above the current window of expected sequence numbers. The sequence number seqno is higher than the maximum value max in the sequence window (and at the same time closer to max than to the lower bound min of the window). Therefore this looks like an illegal reply to a message that hasn't been sent.
Gateway Action
Drop
Action Description
None
Proposed Action
When duplicate messages show up and/or messages are received out-of-order in abundance, the network should be examined for broken hardware or misconfigured equipment. Note that wireless networks often produce this kind of anomalies even when they are fully functional. The ICMPSettings:ICMP_SeqNoTrack setting can be changed to control the gateway's behavior regarding packets received out-of-order.

2.21.30. [ID: 513] Sequence number in request is decreasing

Log Categories
ICMP,STATEFUL,VALIDATE
Log Message
Sequence number in request is decreasing.
Default Log Severity
Information
Parameters
min, max, seqno, flow, user, userid
Explanation
The sequence numbers in ICMP requests are expected to be monotonically increasing. In this case the sequence number is lower than (or equal to) the highest sequence number max previously seen in the flow flow. While this is legal, it is still an odd and unexpected behavior. The most likely background is simply that the ICMP session has been restarted, but this can also be a sign of network disturbances.
Gateway Action
Allow
Action Description
None
Proposed Action
The ICMPSettings:ICMP_SeqNoTrack setting can be changed to control the gateway's behavior regarding packets received out-of-order.

2.21.31. [ID: 143] Sequence number in request is decreasing

Log Categories
ICMP,STATEFUL,VALIDATE
Log Message
Sequence number in request is decreasing.
Default Log Severity
Warning
Parameters
min, max, seqno, flow, user, userid
Explanation
The sequence numbers in ICMP requests are expected to be monotonically increasing. In this case the sequence number is lower than (or equal to) the highest sequence number max previously seen in the flow flow. While this is legal, it is still an odd and unexpected behavior. The most likely background is simply that the ICMP session has been restarted, but this can also be a sign of network disturbances.
Gateway Action
Drop
Action Description
None
Proposed Action
The ICMPSettings:ICMP_SeqNoTrack setting can be changed to control the gateway's behavior regarding packets received out-of-order.

2.21.32. [ID: 232] Truncated ICMPv4 payload

Log Categories
ICMP,STATELESS,VALIDATE
Log Message
Truncated ICMPv4 payload.
Default Log Severity
Warning
Parameters
type, code, srcip, destip, paylen
Explanation
An ICMPv4 error message did not carry enough data to encapsulate an IPv4 header.
Gateway Action
Drop
Action Description
None
Proposed Action
This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed packets. This log message can be disabled by the IPSettings:LayerSizeConsistency setting.

2.21.33. [ID: 497] Truncated ICMPv6 payload

Log Categories
ICMP,IPV6,STATELESS,VALIDATE
Log Message
Truncated ICMPv6 payload.
Default Log Severity
Warning
Parameters
type, code, srcip, destip, paylen
Explanation
An ICMPv6 error message did not carry enough data to encapsulate an IPv6 header.
Gateway Action
Drop
Action Description
None
Proposed Action
This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed packets. This log message can be disabled by the IPSettings:LayerSizeConsistency setting.

2.21.34. [ID: 536] ICMP error with truncated payload

Log Categories
ICMP,STATELESS,VALIDATE
Log Message
ICMP error with truncated payload.
Default Log Severity
Warning
Parameters
type, code, srcip, destip, paylen, encapproto, encapsrcip, encapdestip
Explanation
An ICMP error message did not carry enough data to encapsulate a minimal L4 header. The packet has been dropped since the protocol specific information required for forwarding does not exist.
Gateway Action
Drop
Action Description
None
Proposed Action
This packet is severely broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed packets. This log message can be disabled by the IPSettings:LayerSizeConsistency setting.