2.39. RULE

These log messages refer to the RULE category.

2.39.1. [ID: 1230] IPC error managing dynamic rules

Log Categories
RULE
Log Message
IPC error managing dynamic rules.
Default Log Severity
Error
Parameters
module, error
Explanation
An unexpected and, hence, unhandled error occurred while managing dynamic rules. This may result in leaked rules remaining in the system after they should have been removed or reduced functionality if it was inserting new rules that failed.
Gateway Action
None
Action Description
None
Proposed Action
The device might need to be manually restarted to get full functionality. This should be reported to the vendor of the device.

2.39.2. [ID: 1240] Dynamic rules leaked

Log Categories
RULE
Log Message
Dynamic rules leaked.
Default Log Severity
Error
Parameters
module, count
Explanation
The system failed to remove rules that where dynamically set up by the module. Leaking/leaving unwanted dynamic rules in place is a last resort when all attempts to removed them has failed.
Gateway Action
None
Action Description
None
Proposed Action
The device might need to be manually restarted to get rid of those unwanted rules. This should be reported to the vendor of the device.

2.39.3. [ID: 1133] Blacklist rule added

Log Categories
RULE,BLACKLIST
Log Message
Blacklist rule added.
Default Log Severity
Information
Parameters
srcip, destip, proto, recviface
Explanation
A new blacklist rule has been added.
Gateway Action
None
Action Description
None
Proposed Action
None

2.39.4. [ID: 1164] Blacklist rule table size set to

Log Categories
RULE,BLACKLIST
Log Message
Blacklist rule table size set to.
Default Log Severity
Information
Parameters
size
Explanation
Maximum number of simultaneous blacklist entries changed/set to.
Gateway Action
None
Action Description
None
Proposed Action
None

2.39.5. [ID: 1141] Blacklist rule removed

Log Categories
RULE,BLACKLIST
Log Message
Blacklist rule removed.
Default Log Severity
Information
Parameters
srcip, destip, proto, recviface
Explanation
A blacklist rule has been removed either because it timed out or because the user manually removed it via the cli.
Gateway Action
None
Action Description
None
Proposed Action
None

2.39.6. [ID: 1165] Blacklist rule replaced

Log Categories
RULE,BLACKLIST
Log Message
Blacklist rule replaced.
Default Log Severity
Information
Parameters
srcip, destip, proto, srcip, destip, proto, recviface, recviface
Explanation
Random blacklist rule has been replaced with another rule.
Gateway Action
None
Action Description
None
Proposed Action
None

2.39.7. [ID: 649] Flow HA sync disallowed by access rule

Log Categories
RULE,FLOW,HA
Log Message
Flow HA sync disallowed by access rule.
Default Log Severity
Notice
Parameters
srcip, destip, recviface, matchkey, rule
Explanation
The access rules on the inactive HA node did not allow this flow to be installed.
Gateway Action
Skip
Action Description
None
Proposed Action
This event can be caused by having different configurations on the HA nodes. Running a cluster with different configurations on the nodes is not recommended, consider synchronizing the configurations.

2.39.8. [ID: 643] Flow HA sync failed due to address[...]

Log Categories
RULE,FLOW,HA
Log Message
Flow HA sync failed due to address translation mismatch.
Default Log Severity
Notice
Parameters
matchkey, rule
Explanation
The flow could not be installed on the inactive node due to that the rules on the inactive node specified different address translation than the rules on the active node.
Gateway Action
Skip
Action Description
None
Proposed Action
This event can be caused by having different configurations on the HA nodes. Running a cluster with different configurations on the nodes is not recommended, consider synchronizing the configurations.

2.39.9. [ID: 1150] Flow HA sync disallowed by blacklist rule

Log Categories
RULE,FLOW,HA,BLACKLIST
Log Message
Flow HA sync disallowed by blacklist rule.
Default Log Severity
Notice
Parameters
srcip, destip, recviface, matchkey, rule
Explanation
The blacklist rules on the inactive HA node did not allow this flow to be installed.
Gateway Action
Skip
Action Description
None
Proposed Action
This event can be caused by having different blacklist rules on the HA nodes. Running a cluster with different blacklist rules on the nodes is not recommended, consider synchronizing the blacklist rules.

2.39.10. [ID: 1662] Source IP not routed on receive interface

Log Categories
RULE,FLOW,HA
Log Message
Source IP not routed on receive interface.
Default Log Severity
Notice
Parameters
srcip, destip, recviface, matchkey, srcroute
Explanation
The flow could not be installed on the inactive node due to the source IP of the flow not being routed over the receive interface of the flow according to the inactive node's configuration.
Gateway Action
Skip
Action Description
None
Proposed Action
This event can be caused by having different configurations on the HA nodes. Running a cluster with different configurations on the nodes is not recommended, consider synchronizing the configurations.

2.39.11. [ID: 647] Flow HA sync failed due to no route to[...]

Log Categories
RULE,FLOW,HA
Log Message
Flow HA sync failed due to no route to destination.
Default Log Severity
Notice
Parameters
destip, iface, matchkey
Explanation
The flow could not be installed on the inactive node due to no route to the destination.
Gateway Action
Skip
Action Description
None
Proposed Action
This event can be caused by having different configurations on the HA nodes. Running a cluster with different configurations on the nodes is not recommended, consider synchronizing the configurations.

2.39.12. [ID: 659] Flow HA sync failed due to no route to source

Log Categories
RULE,FLOW,HA
Log Message
Flow HA sync failed due to no route to source.
Default Log Severity
Notice
Parameters
srcip, iface, matchkey
Explanation
The flow could not be installed on the inactive node due to no route to the source.
Gateway Action
Skip
Action Description
None
Proposed Action
This event can be caused by having different configurations on the HA nodes. Running a cluster with different configurations on the nodes is not recommended, consider synchronizing the configurations.

2.39.13. [ID: 1738] Flow HA sync disallowed by the ruleset

Log Categories
RULE,FLOW,HA
Log Message
Flow HA sync disallowed by the ruleset.
Default Log Severity
Notice
Parameters
matchkey, geoip, rule
Explanation
The flow could not be installed on the inactive node since the flow was disallowed by the inactive node's ruleset.
Gateway Action
Skip
Action Description
None
Proposed Action
This event can be caused by having different configurations on the HA nodes. Running a cluster with different configurations on the nodes is not recommended, consider synchronizing the configurations.

2.39.14. [ID: 1739] Flow HA sync failed due to configuration[...]

Log Categories
RULE,FLOW,HA
Log Message
Flow HA sync failed due to configuration mismatch.
Default Log Severity
Notice
Parameters
matchkey, rule
Explanation
The flow could not be installed on the inactive node since the packets on the flow should be processed in a different way according to the inactive node's ruleset.
Gateway Action
Skip
Action Description
None
Proposed Action
This event can be caused by having different configurations or licenses on the HA nodes. Running a cluster with different configurations or licenses on the nodes is not recommended, consider synchronizing the configurations and using identical licenses. Comparing rulesnoop output for the affected flow between the nodes might help to pin-point what the difference is.

2.39.15. [ID: 1741] Flow HA sync failed due to HA sync status[...]

Log Categories
RULE,FLOW,HA
Log Message
Flow HA sync failed due to HA sync status mismatch.
Default Log Severity
Notice
Parameters
matchkey, rule
Explanation
The flow could not be installed on the inactive node since according to the inactive node's ruleset this flow should not be HA synced.
Gateway Action
Skip
Action Description
None
Proposed Action
This event can be caused by having different configurations on the HA nodes. Running a cluster with different configurations on the nodes is not recommended, consider synchronizing the configurations.

2.39.16. [ID: 1395] Source address matches translation prefix

Log Categories
RULE,NAT64
Log Message
Source address matches translation prefix.
Default Log Severity
Notice
Parameters
prefix, matchkey, rule
Explanation
A packet with a source address matching the prefix used in protocol translation has been dropped. This is done to prevent hairpinning loops.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.39.17. [ID: 1088] Max sessions reached on ALG

Log Categories
RULE,FTPALG,SIPALG,DNSALG,GTPINSPECTION
Log Message
Max sessions reached on ALG.
Default Log Severity
Warning
Parameters
profile, type, max, pkt, rule, ruletype, ruleorigin
Explanation
The amount of sessions on an ALG has reached the limit configured in the profile used.
Gateway Action
Drop
Action Description
None
Proposed Action
If the MaxSessions limit is reached under normal usage patterns, try increasing the MaxSessions on the profile used to allow more sessions through.

2.39.18. [ID: 109] Packet received open

Log Categories
RULE
Log Message
Packet received open.
Default Log Severity
Notice
Parameters
flow, rule, user, userid
Explanation
Packet that is allowed to be forwarded according to setting is received. The traffic is configured to be allowed according to the rule set.
Gateway Action
Open
Action Description
None
Proposed Action
None

2.39.19. [ID: 431] Packet received reject

Log Categories
RULE
Log Message
Packet received reject.
Default Log Severity
Notice
Parameters
flow, rule, user, userid
Explanation
Packet that is allowed to be forwarded according to setting is received. The traffic is configured to be rejected according to the rule set.
Gateway Action
Open
Action Description
None
Proposed Action
None

2.39.20. [ID: 1209] Unsupported protocol combination for ALG

Log Categories
RULE,FTPALG,SIPALG,DNSALG,GTPINSPECTION
Log Message
Unsupported protocol combination for ALG.
Default Log Severity
Notice
Parameters
type, proto, pkt, rule, ruletype, ruleorigin
Explanation
The matching rule specified to use an Application Layer Gateway (ALG) to process the traffic but the selected ALG does not support the protocols used by the packet.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.39.21. [ID: 238] Allowed by access rule

Log Categories
RULE
Log Message
Allowed by access rule.
Default Log Severity
Notice
Parameters
pkt, rule
Explanation
The sender IP address was verified and accepted by an access rule in the access section.
Gateway Action
Allow
Action Description
None
Proposed Action
Modify the access rule accordingly, if the sender should not be allowed.

2.39.22. [ID: 242] Disallowed by access rule

Log Categories
RULE
Log Message
Disallowed by access rule.
Default Log Severity
Notice
Parameters
srcip, destip, recviface, pkt, rule
Explanation
The packet was dropped since the configuration, that is, access rules, does not allow packets from this sender to arrive at that interface.
Gateway Action
Drop
Action Description
None
Proposed Action
If the decision to drop the packet was correct but you don't want any logs then either change the LogEnabled property on the access rule (if the rule is an explicitly configured access rule), add an access rule to drop the packet silently or configure a log message exception in the log receiver to ignore this message. If the decision to drop the packet was incorrect then there are two cases: If the rule is an explicitly configured access rule then modify it, and possibly other, access rules accordingly. Otherwise start by verifying that the routing is correctly configured for the sender's address since routes provide automatic access rules. If that does not help, that is, in setups where packets arriving from the sender arrive on another interface than where packets going to the sender are routed, then add an access rule accepting the sender's address on the receive interface.

2.39.23. [ID: 1661] Source IP not routed on receive interface

Log Categories
RULE,ROUTE,IPSPOOFING
Log Message
Source IP not routed on receive interface.
Default Log Severity
Notice
Parameters
srcip, destip, recviface, srcroute, pkt
Explanation
The packet was dropped since the source IP of the packet is not routed over the receive interface of the packet. This event could indicate that someone is trying to use a spoofed IP address.
Gateway Action
Drop
Action Description
None
Proposed Action
This is an effect of the automatic reverse path ingress filtering of the system based on the routes known to the system. The default policy is basically "strict reverse path forwarding", that is, that a packet must be received on the interface where packets to the source IP of the packet would be routed out, to be acceptable. In some scenarios, for instance, where asymmetric routing is used, this is too strict. Exceptions can then be made by marking interfaces as security equvivalent or by adding explicit access rules to allow packets from the source IP on this interface even tough packets to the source IP will be sent over some other interface.

2.39.24. [ID: 1653] Receive sub interface id mismatch with route[...]

Log Categories
RULE,ROUTE,IPSPOOFING
Log Message
Receive sub interface id mismatch with route to source IP.
Default Log Severity
Notice
Parameters
srcip, destip, recviface, srcroute, pkt
Explanation
The packet was dropped since the source IP is routed on another sub interface id (belongs to another client) than the packet was received from. This event could indicate that someone is trying to use a spoofed IP address.
Gateway Action
Drop
Action Description
None
Proposed Action
This is an effect of the automatic reverse path ingress filtering of the system based on the routes known to the system. The default policy is basically "strict reverse path forwarding", that is, that a packet must be received on the interface where packets to the source IP of the packet would be routed out, to be acceptable. In some scenarios, for instance, where asymmetric routing is used, this is too strict. Exceptions can then be made by marking interfaces as security equvivalent or by adding explicit access rules to allow packets from the source IP on this interface even tough packets to the source IP will be sent over some other interface.

2.39.25. [ID: 394] Local Undelivered

Log Categories
RULE
Log Message
Local Undelivered.
Default Log Severity
Warning
Parameters
pkt
Explanation
Packet destined for the firewall itself was not picked up by any local service.
Gateway Action
Drop
Action Description
None
Proposed Action
Verify the configuration of the corresponding service if the packet should be processed.

2.39.26. [ID: 471] No route to destination

Log Categories
RULE
Log Message
No route to destination.
Default Log Severity
Warning
Parameters
destip, iface, pkt
Explanation
Further processing of received packet is not allowed due to no route coverage for the destination address.
Gateway Action
Drop
Action Description
None
Proposed Action
Configure route support for the destination if it should be allowed.

2.39.27. [ID: 129] No route to source

Log Categories
RULE
Log Message
No route to source.
Default Log Severity
Warning
Parameters
srcip, iface, pkt
Explanation
Further processing of received packet is not allowed due to no route coverage for the source address.
Gateway Action
Drop
Action Description
None
Proposed Action
Configure route support for the source if it should be allowed.

2.39.28. [ID: 1737] Denied by the ruleset

Log Categories
RULE
Log Message
Denied by the ruleset.
Default Log Severity
Notice
Parameters
matchkey, geoip, rule
Explanation
A rule lookup, other than to set up a new flow for a packet, matched a deny rule. An example of such rule lookups is the reevaluation of existing flows after rule changes.
Gateway Action
Deny
Action Description
None
Proposed Action
Modify the ruleset accordingly, if the traffic should be allowed.

2.39.29. [ID: 514] Packet dropped by the ruleset

Log Categories
RULE
Log Message
Packet dropped by the ruleset.
Default Log Severity
Warning
Parameters
pkt, geoip, rule
Explanation
Further processing of received packet is not allowed due to matched drop rule policy of the ruleset.
Gateway Action
Drop
Action Description
None
Proposed Action
Modify the ruleset accordingly, if the traffic should be allowed.

2.39.30. [ID: 384] Non-NATable IP protocol

Log Categories
RULE,SYSTEM,PORTMGR
Log Message
Non-NATable IP protocol.
Default Log Severity
Warning
Parameters
proto, localip, destip, rule
Explanation
Network Address Translation (NAT) is only fully supported for TCP, UDP and ICMP flows. Address translation will still be applied to flows with IP protocol number proto, but it is only possible to have one such flow open between the source and destination IP pair localip-destip.
Gateway Action
Ignore
Action Description
None
Proposed Action
Modify the rule rule to only include NATable protocols.

2.39.31. [ID: 520] Could not allocate NAT port

Log Categories
RULE,SYSTEM,PORTMGR
Log Message
Could not allocate NAT port.
Default Log Severity
Error
Parameters
localip, destip, rule
Explanation
A NAT flow could not be opened since dynamic port allocation failed for the source and destination IP pair localip-destip.
Gateway Action
Drop
Action Description
None
Proposed Action
The system might be low on RAM or all ports for the specified source and destination IP pair might be allocated.

2.39.32. [ID: 987] Could not allocate NAT IP from NATPool

Log Categories
RULE,SYSTEM,NATPOOL
Log Message
Could not allocate NAT IP from NATPool.
Default Log Severity
Critical
Parameters
pool, srcip, rule
Explanation
The system failed to setup a new flow since allocation of a dynamic NAT IP from a NAT Pool failed.
Gateway Action
Drop
Action Description
None
Proposed Action
Review NAT Pool related log messages for an indication why this event occurred.

2.39.33. [ID: 1158] Whitelist prevents blacklist action from[...]

Log Categories
RULE,THRESHOLD,FLOW,BLACKLIST
Log Message
Whitelist prevents blacklist action from being executed.
Default Log Severity
Warning
Parameters
conflictrule, thresholdset, matchkey, rule
Explanation
A flow setup attempt triggered the given thresholdset in threshold rule conflictrule: The flow setup attempt should have been blocked and blacklisted, but this was overruled by the whitelist rule rule. The flow setup attempt has therefore been allowed.
Gateway Action
Ignore
Action Description
A threshold blacklist action was prevented from being executed by a whitelist rule
Proposed Action
Investigate why the threshold rules are triggered by whitelisted traffic. Normally this should never happen; it may signify that network resources have been compromised.