2.32. NDP

These log messages refer to the NDP category.

2.32.1. [ID: 165] Advertisement delayed

Log Categories
NDP,SYSTEM
Log Message
Advertisement delayed.
Default Log Severity
Warning
Parameters
ip, destip, desthw, iface
Explanation
Replies to address resolution requests have been put under rate limit and an advertisement to destip has been put on hold. This may in the pathological case prevent new hosts from establishing communication with the firewall.
Gateway Action
None
Action Description
None
Proposed Action
Review the NDSettings:NDMaxResolvReply setting and consider increasing it. Whether to log this event is controlled by the NDSettings:NDLogRatelimitDelay setting.

2.32.2. [ID: 184] Advertisement for static entry

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
Advertisement for static entry.
Default Log Severity
Warning
Parameters
knownhw, srchw, srcip, destip, targetip, iface, pkt
Explanation
A Neighbor Advertisement message for a statically configured IP has been received, but the message advertised a different L2 address than what has been configured. Note that messages with the "override" flag cleared are not logged.
Gateway Action
Drop
Action Description
None
Proposed Action
First make sure that the statically configured L2 address is correct. If it is, then this is very likely an attack trying to re-route network traffic. The attacker must have access to a machine attached to the network in question, so take note of the srchw parameter. In order for traffic hijacking to work using this attack, this parameter must point at a compromised machine. Denial of service can be achieved by using a non-existing address. Whether to log this event is controlled by the NDSettings:StaticNDChanges setting.

2.32.3. [ID: 1719] Anycast address ignored

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
Anycast address ignored.
Default Log Severity
Information
Parameters
knownhw, srchw, srcip, destip, targetip, iface, pkt
Explanation
While trying to resolve targetip, at least one anycast reply has been ignored.
Gateway Action
Ignore
Action Description
None
Proposed Action
None

2.32.4. [ID: 179] Unknown ICMP code

Log Categories
NDP,STATELESS,VALIDATE
Log Message
Unknown ICMP code.
Default Log Severity
Warning
Parameters
srchw, srcip, code, iface, pkt
Explanation
An ND message with an unknown ICMP code was received. The gateway is currently implementing ND according to RFC4861, and does not know how to handle this type of message.
Gateway Action
Drop
Action Description
None
Proposed Action
This log message can be turned off with the NDSettings:NDValidation setting.

2.32.5. [ID: 569] Illegal option size

Log Categories
NDP,STATELESS,VALIDATE
Log Message
Illegal option size.
Default Log Severity
Warning
Parameters
srchw, srcip, destip, targetip, type, expectlen, len, iface, pkt
Explanation
An ND message with a broken option has been received. The options size is incorrect for the given option type.
Gateway Action
Drop
Action Description
None
Proposed Action
This log message can be turned off with the NDSettings:NDValidation setting.

2.32.6. [ID: 276] Forged reply

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
Forged reply.
Default Log Severity
Warning
Parameters
knownhw, srchw, srcip, destip, targetip, iface, pkt
Explanation
An ND message has been received with the "solicitation" and "override" flag set, but the gateway never asked for it (so it is not solicited). Additionally it has got a new target HW address. This can be a lingering reply for something that we already have resolved, but it is more likely a direct attempt to modify the neighbor cache.
Gateway Action
Drop
Action Description
The ND message has been dropped
Proposed Action
Take note of the srchw parameter. Identify that machine/user at the network and make sure that it is not compromised. Note that a seasoned attacker would spoof the HW sender. The machine or user pointed out by the sender address may be "innocent" in the case of an attack. Make sure that an appropriate value is used for the NDSettings:NDChanges setting.

2.32.7. [ID: 1714] Confusing reply

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
Confusing reply.
Default Log Severity
Warning
Parameters
knownhw, srchw, srcip, destip, targetip, iface, pkt
Explanation
The system has, during IP targetip address resolution, received multiple different replies with conflicting link-layer options within the span of NDSettings:NDVerifyTimer seconds. In other words, there is an address conflict in the local network. The link-layer information has been updated to that of the second reply.
Gateway Action
Replace
Action Description
None
Proposed Action
Review the network. IPv6 allows multiple devices to share the same IP, but only when specifically configured for this purpose. In this case not all devices appear to have been configured as such, though a possibility is also that a device has been replaced or modified. Whether to log this event or not is controlled by NDSettings:NDValidation, but the actual decision to select either the first or the second conflicting reply is taken at random. This behavior can be disabled by setting NDSettings:NDVerifyTimer to zero, in which case conflicting replies will be handled in accordance with the NDSettings:NDChanges setting.

2.32.8. [ID: 1720] Confusing reply

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
Confusing reply.
Default Log Severity
Warning
Parameters
knownhw, srchw, srcip, destip, targetip, iface, pkt
Explanation
The system has, during IP targetip address resolution, received multiple different replies with conflicting link-layer options within the span of NDSettings:NDVerifyTimer seconds. In other words, there is an address conflict in the local network. The link-layer information used is that of the first reply.
Gateway Action
Drop
Action Description
None
Proposed Action
Review the network. IPv6 allows multiple devices to share the same IP, but only when specifically configured for this purpose. In this case not all devices appear to have been configured as such, though a possibility is also that a device has been replaced or modified. Whether to log this event or not is controlled by NDSettings:NDValidation, but the actual decision to select either the first or the second conflicting reply is taken at random. This behavior can be disabled by setting NDSettings:NDVerifyTimer to zero, in which case conflicting replies will be handled in accordance with the NDSettings:NDChanges setting.

2.32.9. [ID: 1718] Confusing solicitation HW address

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
Confusing solicitation HW address.
Default Log Severity
Warning
Parameters
knownhw, srchw, srcip, destip, targetip, iface, pkt
Explanation
The system has received a solicitation request with a conflicting link-layer option, for the address targetip. The conflict was seen either seen while performing address resolution (in which case we already have received advertisements for the destination with a different link-layer address), while probing the address (in which case we have an old link-layer destination known from the past), or while actively replying to dead-peer probes from another link-layer address (on behalf of the same IP). The system deemed the old information to be more trustworthy than the one found in the solicitation, and while a reply has been sent to the supplied link-layer addresses, no local information was been updated.
Gateway Action
Ignore
Action Description
None
Proposed Action
Apart from that the conflict has been seen in a very specific time interval (which may happen by coincidence), the event in itself has a very limited relevans. Review the network if this is a reoccurring phenomenon, or if it happens in conjunction with other suspicious activity. The behavior of the system is controlled by a combination of NDSettings:NDVerifyTimer and NDSettings:NDChanges. IPv6 allows multiple devices to share the same IP, but only when specifically configured for this purpose. In this case not all devices appear to have been configured as such, though a possibility is also that a device has been replaced or modified.

2.32.10. [ID: 1717] Confusing solicitation HW address

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
Confusing solicitation HW address.
Default Log Severity
Warning
Parameters
knownhw, srchw, srcip, destip, targetip, iface, pkt
Explanation
The system has received a solicitation request with a conflicting link-layer option, for the address targetip. The system has been updated to use the supplied link-layer information. This only happens when NDSettings:NDChanges is set to accept all link-layer updates.
Gateway Action
Replace
Action Description
None
Proposed Action
Apart from that the conflict has been seen in a very specific time interval (which may happen by coincidence), the event in itself has a very limited relevans. Review the network if this is a reoccurring phenomenon, or if it happens in conjunction with other suspicious activity. The behavior of the system is controlled by a combination of NDSettings:NDVerifyTimer and NDSettings:NDChanges. IPv6 allows multiple devices to share the same IP, but only when specifically configured for this purpose. In this case not all devices appear to have been configured as such, though a possibility is also that a device has been replaced or modified.

2.32.11. [ID: 226] DAD reply delayed

Log Categories
NDP,SYSTEM
Log Message
DAD reply delayed.
Default Log Severity
Warning
Parameters
ip, desthw, iface
Explanation
Replies to Duplicate Address probes have been put under rate limit. The system might not be able to prevent the IP ip to be used by desthw.
Gateway Action
None
Action Description
None
Proposed Action
Review the NDSettings:NDMaxDupReply setting and consider increasing it. Whether to log this event is controlled by the NDSettings:NDLogRatelimitDelay setting.

2.32.12. [ID: 153] Received DAD probe

Log Categories
NDP
Log Message
Received DAD probe.
Default Log Severity
Information
Parameters
srchw, srcip, destip, targetip, iface, pkt
Explanation
Another host or server on the network is sending a Duplicate Address Probe to detect if the IP address targetip is not used by another device. The IP is used by the gateway and the probing host will be notified.
Gateway Action
None
Action Description
This message will not be used by the system, though an answer will be sent to the srchw address
Proposed Action
This log message can be turned off with the NDSettings:StaticNDChanges setting.

2.32.13. [ID: 462] Duplicated option

Log Categories
NDP,STATELESS,VALIDATE
Log Message
Duplicated option.
Default Log Severity
Warning
Parameters
srchw, srcip, destip, targetip, iface, pkt
Explanation
Two (or more) source link-layer options containing different data were found.
Gateway Action
Drop
Action Description
None
Proposed Action
This log message can be turned off with the NDSettings:NDValidation setting.

2.32.14. [ID: 430] Duplicated option

Log Categories
NDP,STATELESS,VALIDATE
Log Message
Duplicated option.
Default Log Severity
Warning
Parameters
srchw, srcip, destip, targetip, iface, pkt
Explanation
Two (or more) target link-layer options containing different data were found.
Gateway Action
Drop
Action Description
None
Proposed Action
This log message can be turned off with the NDSettings:NDValidation setting.

2.32.15. [ID: 552] ND hop limit reached

Log Categories
NDP,STATELESS,VALIDATE
Log Message
ND hop limit reached.
Default Log Severity
Warning
Parameters
srchw, srcip, destip, targetip, count, iface, pkt
Explanation
The hop-limit of an ND message is hardcoded to 255. The idea is to prevent these messages from being routed.
Gateway Action
Drop
Action Description
None
Proposed Action
Make sure that no router in the network is accidentally forwarding ND messages.

2.32.16. [ID: 1715] HW source inconsistent with static IP

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
HW source inconsistent with static IP.
Default Log Severity
Warning
Parameters
knownhw, newhw, srcip, destip, targetip, iface, pkt
Explanation
This concerns a static IP entry. The system has received solicitation requests on behalf of srcip, but with conflicting source link-layer information. The solicitation is sent from newhw but the configuration expects this to be knownhw. This log message is not generated for solicitations from an anycast (alternative) IP.
Gateway Action
Ignore
Action Description
The system replied to the solicitation, but did not register srchw as the HW source of srcip.
Proposed Action
Review the network, the configuration may have to be updated.

2.32.17. [ID: 1723] HW source inconsistent with static IP

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
HW source inconsistent with static IP.
Default Log Severity
Warning
Parameters
knownhw, newhw, srcip, destip, targetip, iface, pkt
Explanation
This concerns a static IP entry. The system has received solicitation requests on behalf of srcip, but with conflicting source link-layer information. The solicitation is sent from newhw but the configuration expects this to be knownhw. This log message is not generated for solicitations from an anycast (alternative) IP.
Gateway Action
Drop
Action Description
The system will not process this solicitation any further, and no response will be sent.
Proposed Action
Review the network, the configuration may have to be updated.

2.32.18. [ID: 434] Linklayer option contains multicast address

Log Categories
NDP,STATELESS,VALIDATE
Log Message
Linklayer option contains multicast address.
Default Log Severity
Warning
Parameters
srchw, srcip, destip, targetip, type, hwaddr, iface, pkt
Explanation
At least one link-layer address option was found to contain a multicast address. This is illegal, and a known denial-of-service attack.
Gateway Action
Drop
Action Description
None
Proposed Action
Take note of the HW sender (the srchw parameter). Identify the machine/user at the network and make sure that it is not compromised. Note that a seasoned attacker would spoof the HW sender (the machine or user pointed out by the sender address may be "innocent" in the case of an attack). This log message can be turned off with the NDSettings:NDValidation setting.

2.32.19. [ID: 454] Dead peer probe answered with multicast[...]

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
Dead peer probe answered with multicast message.
Default Log Severity
Warning
Parameters
knownhw, srchw, srcip, destip, targetip, iface, pkt
Explanation
The system has sent a dead peer probe to a previously resolved IP, and received a multicast answer. This is an illegal response.
Gateway Action
Drop
Action Description
The packet has been dropped and will not be considered an answer for the dead peer probe
Proposed Action
Whether to log this event or not is controlled by the NDSettings:NDValidation setting. The packet is considered invalid, so it will be dropped regardless of the setting. Examine the network to see why such a response was sent.

2.32.20. [ID: 619] Multicast target

Log Categories
NDP,STATELESS,VALIDATE
Log Message
Multicast target.
Default Log Severity
Warning
Parameters
srchw, srcip, destip, targetip, iface, pkt
Explanation
An ND message with a multicast target IP. This is illegal.
Gateway Action
Drop
Action Description
None
Proposed Action
This log message can be turned off with the NDSettings:NDValidation setting.

2.32.21. [ID: 574] Neighbor cache updated with new HW address

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
Neighbor cache updated with new HW address.
Default Log Severity
Warning
Parameters
knownhw, newhw, srcip, destip, targetip, iface, pkt
Explanation
The L2 (hardware) address of the given target IP has been updated by an ND message. The setting NDSettings:NDChanges is currently in a mode to accept any advertised changes to L2 data, allowing data traffic to adjust very quickly to topological changes of the network (at the expense of certain vulnerabilities).
Gateway Action
Allow
Action Description
None
Proposed Action
Accepting any advertised changes to L2 data will open up for a number of exploits (including both crude denial-of-service, eavesdropping and more sophisticated router hi-jacking attacks). Consider changing the NDSettings:NDChanges setting to FavourOld or FavourOldLog, to allow for a more moderate acceptance of new L2 information.

2.32.22. [ID: 330] New HW address advertised for resolved IP

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
New HW address advertised for resolved IP.
Default Log Severity
Warning
Parameters
knownhw, newhw, srcip, destip, targetip, iface, pkt
Explanation
An ND message tried to update the L2 (hardware) address of the given target IP. The packet have been dropped because the setting NDSettings:NDChanges is currently in a mode to drop any such packet.
Gateway Action
Drop
Action Description
None
Proposed Action
The current setting does not allow updates to known L2 information at all. This gives little extra security (and can in fact be exploited for subtle denial-of-service attacks). Consider adding known L2 addresses as 'static' ND entries instead.

2.32.23. [ID: 418] New HW address advertised for resolved IP

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
New HW address advertised for resolved IP.
Default Log Severity
Notice
Parameters
knownhw, newhw, srcip, destip, targetip, iface, pkt
Explanation
An ND message tried to update the L2 (hardware) address of the given target IP. The old L2 address will be probed to see if it is still alive, in which case the new L2 address will be discarded. If no answer is received, the new address will be accepted.
Gateway Action
Ignore
Action Description
The ND message has been acknowledged, but was not allowed to update the current L2 information
Proposed Action
If the current behavior is not desired, modify the NDSettings:NDChanges setting accordingly.

2.32.24. [ID: 211] Advertisement from the Unknown Address

Log Categories
NDP,STATELESS,VALIDATE
Log Message
Advertisement from the Unknown Address.
Default Log Severity
Warning
Parameters
srchw, srcip, destip, targetip, iface, pkt
Explanation
A neighbor advertisement message has been received from the "unknown address" (the all zeroes address). This is illegal.
Gateway Action
Drop
Action Description
None
Proposed Action
Examine why this kind of advertisement has been sent. Whether to log this event or not is controlled by the NDSettings:NDValidation setting.

2.32.25. [ID: 195] No target route for packet

Log Categories
NDP,RULE
Log Message
No target route for packet.
Default Log Severity
Warning
Parameters
srchw, srcip, destip, targetip, iface, pkt
Explanation
An ND message targeted to the IP targetip was received via interface iface, but there is no route from this interface to to this address.
Gateway Action
Drop
Action Description
None
Proposed Action
Make sure that the route is not disabled, or that it is not "shadowed" by a default route. Examine all dynamic values (in all routes), including OSPF-managed routes, network prefixes from ND Router Advertisements and gateways from DHCP-leases. This log message can be turned off with the NDSettings:NDValidation setting.

2.32.26. [ID: 599] No source route for packet

Log Categories
NDP,RULE
Log Message
No source route for packet.
Default Log Severity
Warning
Parameters
srchw, srcip, destip, targetip, iface, pkt
Explanation
An ND message was received from the source IP srcip via interface iface, but there is no route to this address via that interface.
Gateway Action
Drop
Action Description
None
Proposed Action
Make sure that the route is not disabled, or that it is not "shadowed" by a default route. Examine all dynamic values (in all routes), including OSPF-managed routes, network prefixes from ND Router Advertisements and gateways from DHCP-leases. This log message can be turned off with the NDSettings:NDValidation setting.

2.32.27. [ID: 107] Reply without target link-layer option

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
Reply without target link-layer option.
Default Log Severity
Warning
Parameters
knownhw, srchw, srcip, destip, targetip, iface, pkt
Explanation
The system is trying to resolve targetip. An answer has been received, but the answer did not include an L2 address and was thus useless.
Gateway Action
Drop
Action Description
None
Proposed Action
Examine why this kind of advertisement has been sent. Whether to log this event or not is controlled by the NDSettings:NDValidation setting.

2.32.28. [ID: 1716] Noisy reply

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
Noisy reply.
Default Log Severity
Warning
Parameters
knownhw, srchw, srcip, destip, targetip, iface, pkt
Explanation
While trying to resolve targetip, multiple non-anycast replies were received for the same L2 address knownhw within a short timespan. While not a problem in itself, it is considered suspicious behavior.
Gateway Action
Adjust
Action Description
None
Proposed Action
Examine where the duplicate advertisements are coming from. Ideally an ND solicitation should never result in duplicate advertisements since the messages are link-local. A device could deliberately be sending multiple replies in order to try and direct address resolution away from the ordinary source, either for malicious or valid purposes. An example of a valid use would be HA failover. The NDSettings:NDNoiseThreshold defines how many replies (not counting anycast replies) that are required in order to be considered noisy, during the timespan defined by NDSettings:NDVerifyTimer. Whether to log this event or not is controlled by the NDSettings:NDValidation setting.

2.32.29. [ID: 309] Linklayer option does not match HW sender

Log Categories
NDP,STATELESS,VALIDATE
Log Message
Linklayer option does not match HW sender.
Default Log Severity
Warning
Parameters
srchw, srcip, destip, targetip, option, iface, pkt
Explanation
An ND message was received with a link-layer address option that did not match the HW sender address found in the L2 header.
Gateway Action
Drop
Action Description
The packet has been dropped and will not be further processed
Proposed Action
The advanced setting NDSettings:NDMatchL2Sender can be adjusted in order to control how the gateway will respond to mismatched link-layer options and the address found in the L2 header.

2.32.30. [ID: 120] Linklayer option does not match HW sender

Log Categories
NDP,STATELESS,VALIDATE
Log Message
Linklayer option does not match HW sender.
Default Log Severity
Notice
Parameters
srchw, srcip, destip, targetip, option, iface, pkt
Explanation
An ND message was received with a link-layer address option that did not match the HW sender address found in the L2 header.
Gateway Action
Allow
Action Description
The packet will be processed as if the link-layer address option would match that of the HW sender address found in the L2 header. The address found in the link-layer option will be used
Proposed Action
The advanced setting NDSettings:NDMatchL2Sender can be adjusted in order to control how the gateway will respond to mismatched link-layer options and the address found in the L2 header.

2.32.31. [ID: 180] Neighbor entry lost

Log Categories
NDP,SYSTEM
Log Message
Neighbor entry lost.
Default Log Severity
Warning
Parameters
ip, knownhw, iface
Explanation
The system need to resolve an IP address, but the current virtual system is out of neighbor entries. The neighbor entry for IP ip at interface iface has been freed in order to continue.
Gateway Action
Discard
Action Description
The system has been forced to discard one existing neighbor entry in use
Proposed Action
This log is commonly seen during some denial-of-service attacks. If you think that the system should be able to handle this amount of active neighbors, review the NDSettings:NDCacheSizeEther setting and consider increasing it. Whether to log this event is controlled by the NDSettings:NDLogOutOfEntries setting.

2.32.32. [ID: 163] Probe from unknown host

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
Probe from unknown host.
Default Log Severity
Notice
Parameters
srchw, srcip, destip, targetip, iface, pkt
Explanation
Received a dead peer probe without source link-layer option, and there was no previous information about this IP in the neighbor cache. One valid case where this can happen is when the gateway is required to keep track of more neighbors than the NDSettings:NDCacheSizeEther setting allow for.
Gateway Action
None
Action Description
The system will query for the IP srcip before the probe can be answered
Proposed Action
Whether to log this event is controlled by the NDSettings:NDValidation setting.

2.32.33. [ID: 1733] Probe from host with unexpected HW address

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
Probe from host with unexpected HW address.
Default Log Severity
Notice
Parameters
srchw, knownhw, srcip, destip, targetip, iface, pkt
Explanation
Received a dead peer probe for srcip from the HW address srchw, but the last known HW address was knownhw. A reply has been sent to srchw, but the last known HW address was not updated.
Gateway Action
None
Action Description
The system replied to the solicitation, but did not register srchw as the HW source of srcip.
Proposed Action
Whether to log this event is controlled by the NDSettings:NDValidation setting. The behavior (whether to reply and/or update the known HW address) is controlled by the NDSettings:NDChanges setting.

2.32.34. [ID: 1730] Probe from host with unexpected HW address

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
Probe from host with unexpected HW address.
Default Log Severity
Warning
Parameters
srchw, knownhw, srcip, destip, targetip, iface, pkt
Explanation
Received a dead peer probe for srcip from the HW address srchw, but the last known HW address was knownhw. The probe has therefore been dropped and no action was taken.
Gateway Action
Drop
Action Description
The system will not process this solicitation any further, and no response will be sent.
Proposed Action
Whether to log this event is controlled by the NDSettings:NDValidation setting. The behavior (whether to reply and/or update the known HW address) is controlled by the NDSettings:NDChanges setting.

2.32.35. [ID: 303] Dead Peer probe delayed

Log Categories
NDP,SYSTEM
Log Message
Dead Peer probe delayed.
Default Log Severity
Warning
Parameters
ip, knownhw, iface
Explanation
Dead Peer probes have been put under rate limit and a probe for the IP addresses ip have been put on hold. For the time being, the system will consider this address to be valid.
Gateway Action
None
Action Description
None
Proposed Action
Review the NDSettings:NDMaxUnreachProbe setting. Whether to log this event is controlled by the NDSettings:NDLogRatelimitDelay setting.

2.32.36. [ID: 1729] Probe from host while resolving address

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
Probe from host while resolving address.
Default Log Severity
Information
Parameters
srchw, srcip, destip, targetip, iface, pkt
Explanation
Received a dead peer probe from srcip while waiting for address resolution to finish, so the HW address is technically unknown to us. The HW address srchw was supplied with the probe (and a reply was sent there), but this information has not been used to resolve the IP address.
Gateway Action
Ignore
Action Description
The system replied to the solicitation, but did not register srchw as the HW source of srcip.
Proposed Action
Whether to log this event is controlled by the NDSettings:NDValidation setting. The behavior (whether to reply and/or update the known HW address) is controlled by the NDSettings:NDChanges setting.

2.32.37. [ID: 1727] Probe from host while resolving address

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
Probe from host while resolving address.
Default Log Severity
Warning
Parameters
srchw, srcip, destip, targetip, iface, pkt
Explanation
Received a dead peer probe from srcip while waiting for address resolution to finish, so the HW address is technically unknown to us. The probe has therefore been dropped and no action was taken.
Gateway Action
Drop
Action Description
The system replied to the solicitation, but did not register srchw as the HW source of srcip.
Proposed Action
Whether to log this event is controlled by the NDSettings:NDValidation setting. The behavior (whether to reply and/or update the known HW address) is controlled by the NDSettings:NDChanges setting.

2.32.38. [ID: 266] Reply to Dead Peer probe delayed

Log Categories
NDP,SYSTEM
Log Message
Reply to Dead Peer probe delayed.
Default Log Severity
Warning
Parameters
ip, destip, knownhw, iface
Explanation
Replies to Dead Peer probes have been put under rate limit and the reply to destip have been delayed. This may in the pathological case break ongoing communications between destip and the system.
Gateway Action
None
Action Description
None
Proposed Action
Review the NDSettings:NDMaxUnreachReply setting and consider increasing it. Whether to log this event is controlled by the NDSettings:NDLogRatelimitDelay setting.

2.32.39. [ID: 338] NDP resolve timeout

Log Categories
NDP,STATEFUL
Log Message
NDP resolve timeout.
Default Log Severity
Notice
Parameters
localip, ip, iface, flow, pkt, user, userid
Explanation
The system failed to resolve IP ip at interface iface. The IP is not reachable via the local network; traffic to and from this address will be dropped.
Gateway Action
Drop
Action Description
None
Proposed Action
The "ndpsnoop" feature will allow realtime examination of the ND traffic at interface iface; use this to pinpoint the problem. Review the route configuration and the access rules, especially when seemingly valid Advertisements are discarded. Verify whether is possible to route bidirectional traffic to and from IP ip at interface iface. Whether to log this event is controlled by the NDSettings:NDLogResolveFailure setting.

2.32.40. [ID: 445] Packet truncated at L4 header

Log Categories
NDP,STATELESS,VALIDATE
Log Message
Packet truncated at L4 header.
Default Log Severity
Warning
Parameters
srchw, srcip, pktlen, iface, pkt
Explanation
The message contains enough data for an ICMP header, and this header identifies the message as an ND message. There is however not enough data for an ND message.
Gateway Action
Drop
Action Description
None
Proposed Action
This log message can be turned off with the NDSettings:NDValidation setting.

2.32.41. [ID: 519] Option is truncated

Log Categories
NDP,STATELESS,VALIDATE
Log Message
Option is truncated.
Default Log Severity
Warning
Parameters
srchw, srcip, destip, targetip, type, offset, maxlen, len, iface, pkt
Explanation
The message is truncated in the middle of option type type at offset offset. The option is supposed to be len bytes long, but there is only enough data for maxlen bytes in the packet.
Gateway Action
Drop
Action Description
None
Proposed Action
This log message can be turned off with the NDSettings:NDValidation setting.

2.32.42. [ID: 348] ND message allowed by access rule

Log Categories
NDP
Log Message
ND message allowed by access rule.
Default Log Severity
Notice
Parameters
srchw, srcip, destip, targetip, iface, pkt, rule
Explanation
The ND sender IP address srcip was verified and accepted by access rule rule in the access section.
Gateway Action
Allow
Action Description
None
Proposed Action
Modify the access rule accordingly, if the sender should not be allowed.

2.32.43. [ID: 127] ND message disallowed by access rule

Log Categories
NDP
Log Message
ND message disallowed by access rule.
Default Log Severity
Notice
Parameters
srchw, srcip, destip, targetip, recviface, pkt, rule
Explanation
Further processing of received ND packet is not allowed due to access rule rule did not allow the sender IP srcip.
Gateway Action
Drop
Action Description
None
Proposed Action
If the decision to drop the packet was correct but you don't want any logs then either change the LogEnabled property on the access rule (if the rule is an explicitly configured access rule), add an access rule to drop the packet silently or configure a log message exception in the log receiver to ignore this message. If the decision to drop the packet was incorrect then there are two cases: If the rule is an explicitly configured access rule then modify it, and possibly other, access rules accordingly. Otherwise start by verifying that the routing is correctly configured for the sender's address since routes provide automatic access rules. If that does not help, that is, in setups where packets arriving from the sender arrive on another interface than where packets going to the sender are routed, then add an access rule accepting the sender's address on the receive interface.

2.32.44. [ID: 1657] ND message disallowed by route to source IP

Log Categories
NDP,ROUTE,IPSPOOFING
Log Message
ND message disallowed by route to source IP.
Default Log Severity
Notice
Parameters
srchw, srcip, destip, targetip, recviface, srcroute, pkt
Explanation
Further processing of received ND packet is not allowed due to the source IP srcip not being routed over the receive interface recviface.
Gateway Action
Drop
Action Description
None
Proposed Action
This is an effect of the automatic reverse path ingress filtering of the system based on the routes known to the system. The default policy is basically "strict reverse path forwarding", that is, that a packet must be received on the interface where packets to the source IP of the packet would be routed out, to be acceptable. In some scenarios, for instance, where asymmetric routing is used, this is too strict. Exceptions can then be made by marking interfaces as security equvivalent or by adding explicit access rules to allow packets from the source IP on this interface even tough packets to the source IP will be sent over some other interface.

2.32.45. [ID: 212] Solicitation delayed

Log Categories
NDP,SYSTEM
Log Message
Solicitation delayed.
Default Log Severity
Warning
Parameters
ip, knownhw, iface
Explanation
Neighbor Solicitations have been put under rate limit and a solicitation for the IP addresses ip that the system it is supposed to resolve have been put on hold. Communication with this address will be impossible until the rate limit has been lifted. This log is commonly seen during some denial-of-service attacks.
Gateway Action
None
Action Description
None
Proposed Action
Review the NDSettings:NDMaxSolicitation setting. Whether to log this event is controlled by the NDSettings:NDLogRatelimitDelay setting.

2.32.46. [ID: 625] Solicitation from unknown host

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
Solicitation from unknown host.
Default Log Severity
Warning
Parameters
srchw, srcip, destip, targetip, iface, pkt
Explanation
Received a multicast neighbor solicitation without source link-layer option. This is illegal, and a possible denial-of-service attack mentioned in RFC4861.
Gateway Action
Drop
Action Description
The system will not process this solicitation any further, and no response will be sent.
Proposed Action
Whether to log this event is controlled by the NDSettings:NDValidation setting.

2.32.47. [ID: 1725] Solicitation from host with unexpected HW[...]

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
Solicitation from host with unexpected HW address.
Default Log Severity
Notice
Parameters
srchw, knownhw, srcip, destip, targetip, iface, pkt
Explanation
Received a multicast neighbor solicitation from srcip using the HW address srchw, but the last known HW address was knownhw. The HW address srchw was supplied with the probe (and a reply has been sent there), but the last known HW address has not been updated.
Gateway Action
Ignore
Action Description
The system replied to the solicitation, but did not register srchw as the HW source of srcip
Proposed Action
Whether to log this event is controlled by the NDSettings:NDValidation setting. The behavior (whether to reply and/or update the known HW address) is controlled by the NDSettings:NDChanges setting.

2.32.48. [ID: 1735] Solicitation from host with unexpected HW[...]

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
Solicitation from host with unexpected HW address.
Default Log Severity
Warning
Parameters
srchw, knownhw, srcip, destip, targetip, iface, pkt
Explanation
Received a multicast neighbor solicitation from srcip using the HW address srchw, but the last known HW address was knownhw. The packet has been dropped and will not be further processed.
Gateway Action
Drop
Action Description
The system will not process this solicitation any further, and no response will be sent.
Proposed Action
Whether to log this event is controlled by the NDSettings:NDValidation setting. The behavior (whether to reply and/or update the known HW address) is controlled by the NDSettings:NDChanges setting.

2.32.49. [ID: 1734] Solicitation from host while resolving address

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
Solicitation from host while resolving address.
Default Log Severity
Information
Parameters
srchw, srcip, destip, targetip, iface, pkt
Explanation
Received a multicast neighbor solicitation from srcip while waiting for address resolution to finish, so the HW address is technically unknown to us. A reply has been sent to srchw, but the last known HW address was not updated.
Gateway Action
Ignore
Action Description
The system replied to the solicitation, but did not register srchw as the HW source of srcip.
Proposed Action
Whether to log this event is controlled by the NDSettings:NDValidation setting. The behavior (whether to reply and/or update the known HW address) is controlled by the NDSettings:NDChanges setting.

2.32.50. [ID: 1722] Solicitation from host while resolving address

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
Solicitation from host while resolving address.
Default Log Severity
Notice
Parameters
srchw, srcip, destip, targetip, iface, pkt
Explanation
Received a multicast neighbor solicitation from srcip while waiting for address resolution to finish, so the HW address is technically unknown to us. The packet has been dropped and will not be further processed.
Gateway Action
Drop
Action Description
The system will not process this solicitation any further, and no response will be sent.
Proposed Action
Whether to log this event is controlled by the NDSettings:NDValidation setting. The behavior (whether to reply and/or update the known HW address) is controlled by the NDSettings:NDChanges setting.

2.32.51. [ID: 316] Spoofed HW sender

Log Categories
NDP,STATELESS,VALIDATE
Log Message
Spoofed HW sender.
Default Log Severity
Warning
Parameters
srchw, srcip, destip, targetip, iface, pkt
Explanation
An ND message has been received. The message has got an L2 header attached to it, and the L2 sender address inside that header belongs to the system. Either this is a forged message, or packets are leaking from one network into another.
Gateway Action
Drop
Action Description
None
Proposed Action
Examine why these packets are being received. There are two possible sources: An active attack, or that the system is hearing its own ND messages (the most common case is that one physical multicast-capable network have been partitioned into two or more "logical" subnet). Check the receive mode for the receiving interface. An attacker can attempt to "impersonate" the firewall by using a known address associated with the firewall, in order to "update" an unsecure host with false information. This kind of attack is usually not directed to the firewall, and so the likeliness that the firewall will of detecting this is very low for "normal" or "selective multicast" mode, and high for "promiscuous" or "all-multicast" mode. Whether to log this event is controlled by the NDSettings:NDValidation setting.

2.32.52. [ID: 239] Dead peer probe answered from unknown HW[...]

Log Categories
NDP,STATEFUL,VALIDATE
Log Message
Dead peer probe answered from unknown HW sender.
Default Log Severity
Warning
Parameters
knownhw, srchw, srcip, destip, targetip, iface, pkt
Explanation
The system has sent a dead peer probe to a previously resolved IP, and received an answer with a different L2 address. This is not expected to happen as the probe (from the system) was sent to the known address knownhw, and is an illegal response.
Gateway Action
Drop
Action Description
The packet has been dropped and will not be considered an answer for the dead peer probe
Proposed Action
Whether to log this event or not is controlled by the NDSettings:NDValidation setting. The packet is considered invalid, so it will be dropped regardless of the setting. Examine the network to see why such a response was sent. It may be an attempt to hijack traffic, in which case srchw must be the address of a compromised machine.

2.32.53. [ID: 315] Spoofed IP sender

Log Categories
NDP,STATELESS,VALIDATE
Log Message
Spoofed IP sender.
Default Log Severity
Warning
Parameters
srchw, srcip, destip, targetip, iface, pkt
Explanation
An ND message has been received from one IP owned (or proxied) by the system. Either this is a forged message, or packets are leaking from one network into another.
Gateway Action
Drop
Action Description
None
Proposed Action
Examine why these packets are being received. There are two possible sources: An active attack, or that the system is hearing its own ND messages (the most common case is that one physical multicast-capable network have been partitioned into two or more "logical" subnet). Check the receive mode for the receiving interface. An attacker can attempt to "impersonate" the firewall by using a known address associated with the firewall, in order to "update" an unsecure host with false information. This kind of attack is usually not directed to the firewall, and so the likeliness that the firewall will of detecting this is very low for "normal" or "selective multicast" mode, and high for "promiscuous" or "all-multicast" mode. Whether to log this event is controlled by the NDSettings:NDValidation setting.

2.32.54. [ID: 271] Spoofed source linklayer option

Log Categories
NDP,STATELESS,VALIDATE
Log Message
Spoofed source linklayer option.
Default Log Severity
Warning
Parameters
srchw, srcip, destip, targetip, option, iface, pkt
Explanation
An ND message contained a source link-layer option with an L2 address that belongs to the system. Either this is a forged message, or packets are leaking from one network into another.
Gateway Action
Drop
Action Description
None
Proposed Action
Examine why these packets are being received. There are two possible sources: An active attack, or that the system is hearing its own ND messages (the most common case is that one physical multicast-capable network have been partitioned into two or more "logical" subnet). Check the receive mode for the receiving interface. An attacker can attempt to "impersonate" the firewall by using a known address associated with the firewall, in order to "update" an unsecure host with false information. This kind of attack is usually not directed to the firewall, and so the likeliness that the firewall will of detecting this is very low for "normal" or "selective multicast" mode, and high for "promiscuous" or "all-multicast" mode. Whether to log this event is controlled by the NDSettings:NDValidation setting.

2.32.55. [ID: 446] Spoofed IP target

Log Categories
NDP,STATELESS,VALIDATE
Log Message
Spoofed IP target.
Default Log Severity
Warning
Parameters
srchw, srcip, destip, targetip, iface, pkt
Explanation
An ND message has been received for one target IP that is owned (or proxied) by the system. Either this is a forged message, or packets are leaking from one network into another.
Gateway Action
Drop
Action Description
None
Proposed Action
Examine why these packets are being received. There are two possible sources: An active attack, or that the system is hearing its own ND messages (the most common case is that one physical multicast-capable network have been partitioned into two or more "logical" subnet). Check the receive mode for the receiving interface. An attacker can attempt to "impersonate" the firewall by using a known address associated with the firewall, in order to "update" an unsecure host with false information. This kind of attack is usually not directed to the firewall, and so the likeliness that the firewall will of detecting this is very low for "normal" or "selective multicast" mode, and high for "promiscuous" or "all-multicast" mode. Whether to log this event is controlled by the NDSettings:NDValidation setting.

2.32.56. [ID: 1160] IPv6 DNS was discovered

Log Categories
NDP
Log Message
IPv6 DNS was discovered.
Default Log Severity
Notice
Parameters
ip, iface
Explanation
IPv6 DNS has been discovered on the interface.
Gateway Action
None
Action Description
None
Proposed Action
None

2.32.57. [ID: 1136] IPv6 DNS has expired

Log Categories
NDP
Log Message
IPv6 DNS has expired.
Default Log Severity
Notice
Parameters
ip, iface
Explanation
IPv6 DNS has expired.
Gateway Action
None
Action Description
None
Proposed Action
None

2.32.58. [ID: 1139] Generated IPv6 address appear to be occupied

Log Categories
NDP
Log Message
Generated IPv6 address appear to be occupied.
Default Log Severity
Warning
Parameters
ip, iface
Explanation
Generated IPv6 address appear to be occupied.
Gateway Action
Reject
Action Description
None
Proposed Action
This could mean that there is identical hardware on the network since IP is generated based on MAC.

2.32.59. [ID: 1134] No routers were discovered

Log Categories
NDP
Log Message
No routers were discovered.
Default Log Severity
Warning
Parameters
iface
Explanation
No router advertisements were received.
Gateway Action
None
Action Description
None
Proposed Action
None

2.32.60. [ID: 1159] IPv6 prefix was discovered

Log Categories
NDP
Log Message
IPv6 prefix was discovered.
Default Log Severity
Notice
Parameters
network, iface
Explanation
IPv6 prefix has been discovered on the interface.
Gateway Action
None
Action Description
None
Proposed Action
None

2.32.61. [ID: 1151] IPv6 prefix has expired

Log Categories
NDP
Log Message
IPv6 prefix has expired.
Default Log Severity
Notice
Parameters
network, iface
Explanation
IPv6 prefix has expired.
Gateway Action
None
Action Description
None
Proposed Action
None

2.32.62. [ID: 1284] IPv6 prefix preferred lifetime exceeds valid[...]

Log Categories
NDP
Log Message
IPv6 prefix preferred lifetime exceeds valid lifetime.
Default Log Severity
Notice
Parameters
network, iface
Explanation
IPv6 prefix preferred lifetime exceeds valid lifetime.
Gateway Action
Reject
Action Description
None
Proposed Action
None

2.32.63. [ID: 1138] Router was discovered

Log Categories
NDP
Log Message
Router was discovered.
Default Log Severity
Notice
Parameters
ip, iface
Explanation
IPv6 router has been discovered on the interface.
Gateway Action
None
Action Description
None
Proposed Action
None

2.32.64. [ID: 1142] IPv6 router has expired

Log Categories
NDP
Log Message
IPv6 router has expired.
Default Log Severity
Notice
Parameters
ip, iface
Explanation
IPv6 router has expired.
Gateway Action
None
Action Description
None
Proposed Action
None