2.40. SCTP

These log messages refer to the SCTP category.

2.40.1. [ID: 1335] IP address outside IP rule filter

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
IP address outside IP rule filter.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, ip, pkt, assoc, rule
Explanation
The packet contains an alternative transport address that does not comply with the IP rule. Traffic to and from addresses that don't match the IP rule, will not be allowed once the association has been established for stateful SCTP inspection since that would cause problems to an association's state tracking in case the traffic is using paths that do not pass through the firewall. By disallowing this kind of addresses, the association is narrowed down to match that of the IP rule.
Gateway Action
Strip
Action Description
None
Proposed Action
None

2.40.2. [ID: 1350] IP address outside IP rule filter

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
IP address outside IP rule filter.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, ip, pkt, assoc, rule
Explanation
The packet contains an alternative transport address that does not comply with the IP rule. Traffic to and from addresses that don't match the IP rule, will not be allowed once the association has been established for stateful SCTP inspection since that would cause problems to an association's state tracking in case the traffic is using paths that do not pass through the firewall. By disallowing this kind of addresses, the association is narrowed down to match that of the IP rule.
Gateway Action
Strip
Action Description
None
Proposed Action
None

2.40.3. [ID: 1371] ABORT bundled with DATA chunk

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
ABORT bundled with DATA chunk.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt
Explanation
An abort message was bundled with DATA chunks.
Gateway Action
Drop
Action Description
None
Proposed Action
This log message is controlled by SCTPSettings:SCTPLogFormatError.

2.40.4. [ID: 1216] Advertised receiver window credit too low

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Advertised receiver window credit too low.
Default Log Severity
Warning
Parameters
value, pkt
Explanation
This log message indicates that the advertised window credit during association setup is too low. Normally this is the maximum window credit for the entire lifetime of the association. Not only does this affect the data transfer rate, but also the maximum user message size in bytes. This log message is indirectly controlled by SCTPSettings:SCTPMinInitWindowCredit.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.5. [ID: 1324] Association abort

Log Categories
SCTP,STATEFUL
Log Message
Association abort.
Default Log Severity
Warning
Parameters
pkt, assoc, rule
Explanation
The association was aborted by a peer.
Gateway Action
Abort
Action Description
None
Proposed Action
None

2.40.6. [ID: 1361] Established association exists

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Established association exists.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
Explanation
The association the current control chunk is trying to establish already exists.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.7. [ID: 1367] Association established

Log Categories
SCTP,STATEFUL
Log Message
Association established.
Default Log Severity
Information
Parameters
pkt, assoc, rule
Explanation
An SCTP association handshake has been completed, and a new association has been established.
Gateway Action
Enable
Action Description
None
Proposed Action
None

2.40.8. [ID: 1658] Association establishment clash

Log Categories
SCTP,STATEFUL
Log Message
Association establishment clash.
Default Log Severity
Warning
Parameters
pkt, assoc, rule
Explanation
The association failed to establish because it tried to claim a combination of ports and IP addresses that is already in use by another association.
Gateway Action
Abort
Action Description
None
Proposed Action
The system may contain lingering associations that have been silently abandoned for one reason or another (there is also a known attack with these symptoms). Verify that the existing associations are valid; by default SCTP has a very long idle timeout and abandoned associations may need to be manually removed.

2.40.9. [ID: 1689] Association no longer allowed

Log Categories
SCTP,STATEFUL
Log Message
Association no longer allowed.
Default Log Severity
Warning
Parameters
assoc, rule
Explanation
The system policy has been updated, and as a consequence the association assoc was no longer allowed. The association has been forcefully closed.
Gateway Action
Close
Action Description
None
Proposed Action
Verify that the endpoints are aware that the association has been closed.

2.40.10. [ID: 1362] Association closed due to idle timeout

Log Categories
SCTP,STATEFUL
Log Message
Association closed due to idle timeout.
Default Log Severity
Information
Parameters
assoc, rule
Explanation
An SCTP association was closed due to idle timeout. An SCTP association is considered "idle" if it has no flows.
Gateway Action
Close
Action Description
None
Proposed Action
Strictly following RFC 4960, an established SCTP association should never time out. Examine the hosts involved if this is a reoccurring problem. The idle lifetime can also be adjusted using the setting SCTPSettings:SCTPIdleLifetime.

2.40.11. [ID: 1359] Handshake random replace

Log Categories
SCTP,STATEFUL
Log Message
Handshake random replace.
Default Log Severity
Warning
Parameters
assoc, rule
Explanation
There are too many concurrent SCTP handshakes and a randomly chosen handshake attempt has been discarded.
Gateway Action
Close
Action Description
None
Proposed Action
The maximum number of concurrent SCTP handshakes can be adjusted with SCTPSettings:SCTPMaxHandshake. Configure the system to support more simultaneous handshakes, or try to track down the host(s) that overloads the network.

2.40.12. [ID: 1326] Association handshake timeout

Log Categories
SCTP,STATEFUL
Log Message
Association handshake timeout.
Default Log Severity
Warning
Parameters
assoc, rule
Explanation
An SCTP association handshake timed out. No association was ever established. Larger amounts of "handshake timeouts" may be caused by port scanning.
Gateway Action
Close
Action Description
No association has been setup
Proposed Action
The maximum lifetime of an handshake can be adjusted using the setting SCTPSettings:SCTPHandshakeLifetime.

2.40.13. [ID: 1332] Association handshake initiated

Log Categories
SCTP,STATEFUL
Log Message
Association handshake initiated.
Default Log Severity
Notice
Parameters
pkt, assoc, rule
Explanation
An SCTP init message was received. This is the first part of an SCTP association handshake.
Gateway Action
Open
Action Description
Allowed by the configuration
Proposed Action
None; normally a log message that the association has been established should follow.

2.40.14. [ID: 1639] Association handshake restart

Log Categories
SCTP,STATEFUL
Log Message
Association handshake restart.
Default Log Severity
Notice
Parameters
pkt, assoc, rule
Explanation
An SCTP init message was received by an established association. This is an anomalous event that can happen, say if either of the end-points has lost their state (crashed or rebooted).
Gateway Action
Reopen
Action Description
None
Proposed Action
None; normally a log message that the association has been established should follow.

2.40.15. [ID: 1659] Association restart clash

Log Categories
SCTP,STATEFUL
Log Message
Association restart clash.
Default Log Severity
Warning
Parameters
pkt, assoc, rule
Explanation
A failed attempt was made to restart an SCTP association, leaving the old association unaffected. The attempt failed to establish the new association because the new association tried to claim a combination of ports and IP addresses that is already in use by other existing associations.
Gateway Action
Abort
Action Description
None
Proposed Action
The system may contain lingering associations that have been silently abandoned for one reason or another (there is also a known attack with these symptoms). Verify that the existing associations are valid; by default SCTP has a very long idle timeout and abandoned associations may need to be manually removed.

2.40.16. [ID: 1329] Association restart initiated

Log Categories
SCTP,STATEFUL
Log Message
Association restart initiated.
Default Log Severity
Notice
Parameters
newinitvtag, newrespvtag, assoc, rule
Explanation
An SCTP init message, matching an existing association, was received. This might be an association restart, in which case it should be followed by an "association restarted" log message.
Gateway Action
Open
Action Description
None
Proposed Action
None

2.40.17. [ID: 1384] Association restart initiated

Log Categories
SCTP,STATEFUL
Log Message
Association restart initiated.
Default Log Severity
Notice
Parameters
newinitip, newrespip, newinitvtag, newrespvtag, assoc, rule
Explanation
An SCTP init message, matching an existing association, was received. This might be an association restart, in which case it should be followed by an "association restarted" log message.
Gateway Action
Open
Action Description
None
Proposed Action
None

2.40.18. [ID: 1339] Association restarted

Log Categories
SCTP,STATEFUL
Log Message
Association restarted.
Default Log Severity
Information
Parameters
pkt, assoc, rule
Explanation
An SCTP association was successfully restarted.
Gateway Action
Reopen
Action Description
The effect is the same as if the old association had been closed, and a new one has been negotiated
Proposed Action
None

2.40.19. [ID: 1347] Association random replace

Log Categories
SCTP,STATEFUL
Log Message
Association random replace.
Default Log Severity
Warning
Parameters
assoc, rule
Explanation
There are too many concurrent established SCTP associations and a randomly chosen association has been discarded. More correctly; the currently established SCTP associations are using too many resources and one association has been selected. The selection is made randomly, but associations using more resources are more likely to be chosen.
Gateway Action
Close
Action Description
None
Proposed Action
The maximum number of concurrent SCTP associations can be (indirectly) adjusted with SCTPSettings:SCTPMaxAssocLinks. Configure the system to support more simultaneous associations, or try to track down the host(s) that overloads the network. Note that the setting counts the number of IP combinations that can be made within the associations; with the maximum supported IP addresses (32 per endpoint) the setting should be given a value that is 1024 (32 x 32) times larger than the maximum concurrent associations.

2.40.20. [ID: 1327] Association timeout on shutdown

Log Categories
SCTP,STATEFUL
Log Message
Association timeout on shutdown.
Default Log Severity
Warning
Parameters
assoc, rule
Explanation
An SCTP association was forcibly closed since the shutdown sequence timed out.
Gateway Action
Close
Action Description
None
Proposed Action
Strictly following RFC 4960, an SCTP association should never time out during the shutdown sequence. Examine the hosts involved if this is a reoccurring problem. The maximum lifetime of the shutdown sequence can be adjusted using the setting SCTPSettings:SCTPHandshakeLifetime.

2.40.21. [ID: 1358] Association closed

Log Categories
SCTP,STATEFUL
Log Message
Association closed.
Default Log Severity
Notice
Parameters
pkt, assoc, rule
Explanation
The association has been gracefully closed.
Gateway Action
Close
Action Description
None
Proposed Action
None

2.40.22. [ID: 1343] Association shutdown received

Log Categories
SCTP,STATEFUL
Log Message
Association shutdown received.
Default Log Severity
Information
Parameters
pkt, assoc, rule
Explanation
An SCTP association has begun a shutdown sequence.
Gateway Action
Allow
Action Description
The association is now effectively closed, but will linger until the peer has acknowledged the shutdown
Proposed Action
None

2.40.23. [ID: 1640] Association linger timeout

Log Categories
SCTP,STATEFUL
Log Message
Association linger timeout.
Default Log Severity
Critical
Parameters
assoc, rule
Explanation
The system failed to synchronize the shutdown of an SCTP association over the HA cluster, and could not recover the necessary information to retry. This may have left the association open in the established state, even though it should have been closed. Such associations will eventually timeout, but may be possible to exploit in the meantime.
Gateway Action
Discard
Action Description
Timeout while waiting for HA peer to acknowledge deletion of closed association
Proposed Action
Check if the association (identified as assoc) has been left open (verify that there are no log messages saying that it has been "restarted" or that a new one has been opened with the same network parameters); manually close it if so.

2.40.24. [ID: 1357] PPID blacklisted

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
PPID blacklisted.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, ppid, pkt, assoc, rule
Explanation
The Payload Protocol Identifier of a DATA chunk was blacklisted by the SCTP service that is used by the IP rule that allows the traffic.
Gateway Action
Drop
Action Description
None
Proposed Action
Exclude the Payload Protocol Identifier from the blacklist of the SCTP service used if you want to allow it.

2.40.25. [ID: 1239] Bundled singular chunk type

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Bundled singular chunk type.
Default Log Severity
Warning
Parameters
chunktype, count, pkt
Explanation
Certain chunks are not allowed to be mixed with other chunks in the same packet; in fact only one such chunk is allowed per packet. In this case a packet was found to not honor this restriction.
Gateway Action
Drop
Action Description
None
Proposed Action
This packet is broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed packets.

2.40.26. [ID: 1377] Unexpected cookie ack from initiator of[...]

Log Categories
SCTP,STATEFUL
Log Message
Unexpected cookie ack from initiator of restart.
Default Log Severity
Warning
Parameters
pkt, assoc, rule
Explanation
A COOKIE ACK was received from the initiator of a restart instead of the responder.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.27. [ID: 1375] Unexpected cookie echo from responder of[...]

Log Categories
SCTP,STATEFUL
Log Message
Unexpected cookie echo from responder of restart.
Default Log Severity
Warning
Parameters
pkt, assoc, rule
Explanation
A COOKIE ECHO was received from the responder of a restart instead of the initiator.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.28. [ID: 1298] Chunk length includes padding at end

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Chunk length includes padding at end.
Default Log Severity
Notice
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, padlen, pkt
Explanation
The length parameter of a chunk includes the padding at the end.
Gateway Action
Allow
Action Description
None
Proposed Action
This log message is controlled by SCTPSettings:SCTPLogFormatError.

2.40.29. [ID: 1660] Cookie echoed

Log Categories
SCTP,STATEFUL
Log Message
Cookie echoed.
Default Log Severity
Debug
Parameters
pkt, assoc, rule
Explanation
An SCTP cookie-echo message was received. This is the third part of an SCTP association handshake, consisting of the initiator returning the responder "cookie".
Gateway Action
Accept
Action Description
Part of association handshake.
Proposed Action
None; normally a log message that the association has been established should follow.

2.40.30. [ID: 1439] Stripped DATA chunk from packet containing[...]

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Stripped DATA chunk from packet containing SHUTDOWN.
Default Log Severity
Information
Parameters
chunktype, chunkindex, chunkoffset, chunklen, pkt
Explanation
DATA chunk found after SHUTDOWN chunk.
Gateway Action
Strip
Action Description
None
Proposed Action
None

2.40.31. [ID: 1363] Destination port mismatch

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Destination port mismatch.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, destport, pkt, assoc, rule
Explanation
The destination port of an SCTP packet sent by the initiator of an association does not match the destination port of the association the packet belongs to.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.32. [ID: 1369] Unexpected DATA from shutdown initiator

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Unexpected DATA from shutdown initiator.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
Explanation
A DATA chunk has been received for an SCTP association by the initiator of the shutdown.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.33. [ID: 1352] Initial vtag changed

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Initial vtag changed.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, newvtag, pkt, assoc, rule
Explanation
During an SCTP association establishment this is not the first INIT_ACK chunk that has been seen and it contains a different initiate tag than the first INIT_ACK chunk sent.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.34. [ID: 1345] No init seen

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
No init seen.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
Explanation
No former INIT chunk was encountered that justifies the receipt of the current chunk.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.35. [ID: 1386] Restart changed initiator IP address number

Log Categories
SCTP,STATEFUL
Log Message
Restart changed initiator IP address number.
Default Log Severity
Warning
Parameters
old, new, pkt, assoc, rule
Explanation
An INIT chunk was received for a restart of an association. The number of IP addresses between the original association and the restart is bigger.
Gateway Action
Drop
Action Description
None
Proposed Action
Make sure a restart does not contain more IP addresses that the original association.

2.40.36. [ID: 1376] Restart added initiator IP address

Log Categories
SCTP,STATEFUL
Log Message
Restart added initiator IP address.
Default Log Severity
Warning
Parameters
ip, pkt, assoc, rule
Explanation
A restart was issued which added a new ip address for the initiator of an SCTP association.
Gateway Action
Drop
Action Description
None
Proposed Action
Make sure a restart does not add IP addresses that do not exist to the initiator of the original association.

2.40.37. [ID: 1383] Restart added responder IP address

Log Categories
SCTP,STATEFUL
Log Message
Restart added responder IP address.
Default Log Severity
Warning
Parameters
ip, pkt, assoc, rule
Explanation
A restart was issued which added a new ip address for the responder of an SCTP association.
Gateway Action
Drop
Action Description
None
Proposed Action
Make sure a restart does not add IP addresses that do not exist to the responder of the original association.

2.40.38. [ID: 1387] Restart changed responder IP address number

Log Categories
SCTP,STATEFUL
Log Message
Restart changed responder IP address number.
Default Log Severity
Warning
Parameters
old, new, pkt, assoc, rule
Explanation
An INIT-ACK chunk was received for a restart of an association. The number of IP addresses between the original association and the restart is bigger.
Gateway Action
Drop
Action Description
None
Proposed Action
Make sure a restart does not contain more IP addresses that the original association.

2.40.39. [ID: 1338] Wrong association restart state

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Wrong association restart state.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
Explanation
A COOKIE_ACK has been received for a restart of an association which is not in the COOKIE_ECHOED or ESTABLISHED state.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.40. [ID: 1368] Shutdown during establishment

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Shutdown during establishment.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
Explanation
Received a shutdown related control chunk during the establishment of an association.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.41. [ID: 1355] Expired restart period

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Expired restart period.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
Explanation
The period for an association to be restarted has been expired.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.42. [ID: 1333] Too many shutdown requests

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Too many shutdown requests.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
Explanation
More than one SHUTDOWN or ABORT chunks have been received for the association within two seconds.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.43. [ID: 1346] Unexpected COOKIE ACK

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Unexpected COOKIE ACK.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
Explanation
A COOKIE_ACK chunk has been received while the current association is neither in the expected COOKIE_ECHOED state or in the ESTABLISHED state with the potential for a possible restart.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.44. [ID: 1331] Unexpected COOKIE ECHO

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Unexpected COOKIE ECHO.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
Explanation
A stray COOKIE_ECHO chunk has been received while the association has either received only an INIT chunk or is shutting down. Possibly a stale packet that was used to establish the present association or a past association that is no longer in existence.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.45. [ID: 1656] Unexpected DATA from initiator

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Unexpected DATA from initiator.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
Explanation
A DATA chunk from the initiator was seen, before having received a valid COOKIE-ECHO from the initiator. The packet has been dropped.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.46. [ID: 1654] Unexpected DATA from responder

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Unexpected DATA from responder.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
Explanation
A DATA chunk from the responder was seen, before having received the (Cookie) Echo-Ack from the responder. The packet has been dropped.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.47. [ID: 1342] Unexpected shutdown chunk

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Unexpected shutdown chunk.
Default Log Severity
Warning
Parameters
iplen, state, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
Explanation
Received a shutdown related control chunk while the association was in the wrong state.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.48. [ID: 1288] Empty state cookie parameter found

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Empty state cookie parameter found.
Default Log Severity
Warning
Parameters
chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, pkt
Explanation
A state cookie parameter with no value was found within an INIT_ACK chunk.
Gateway Action
Drop
Action Description
None
Proposed Action
This packet is invalid. If the packet sender is one of your network devices, investigate why the unit is sending empty state cookie parameters within INIT_ACK chunks.

2.40.49. [ID: 1686] Clash

Log Categories
SCTP,STATEFUL,HA
Log Message
Clash.
Default Log Severity
Critical
Parameters
srcport, srcip, destport, destip, srciface, assoc, rule
Explanation
Cannot synchronize assoc; an incompatible SCTP association exists at this node.
Gateway Action
Abort
Action Description
Synchronization failed and the system now has two different SCTP associations that at least partially respond to the same traffic
Proposed Action
Identify the two mutually exclusive associations, and manually resolve the situation. The peer is likely to have additional log messages. Consider rebooting one of the HA nodes.

2.40.50. [ID: 1685] Clash

Log Categories
SCTP,STATEFUL,HA
Log Message
Clash.
Default Log Severity
Warning
Parameters
srcport, srcip, destport, destip, srciface, assoc, rule
Explanation
Synchronization encountered an incompatible SCTP association at the current node. This was resolved by discarding the existing association without notifying the endpoints, as it (assoc) did not appear to have been in use for some time. More specifically, it had not been forwarding any traffic for a time exceeding the one given by FlowTimeoutSettings:FlowLifetimeSCTPStateful.
Gateway Action
Discard
Action Description
Synchronization encountered an unexpected situation involving two mutually exclusive SCTP associations. However, as one of the associations had been unused (not forwarding traffic) for a time of at least FlowTimeoutSettings:FlowLifetimeSCTPStateful, the assoc was discarded in favour of the one synchronized
Proposed Action
Verify that the discarded association indeed was right to discard.

2.40.51. [ID: 1684] Disallowed

Log Categories
SCTP,STATEFUL,HA
Log Message
Disallowed.
Default Log Severity
Warning
Parameters
srcport, srcip, destport, destip, srciface
Explanation
Disallowed by policies at the current node, but allowed by the peer node. This sometimes happen when associations are being setup at the same time that the HA node is booting up, or when the configuration has been updated at the HA peer but not at the current node.
Gateway Action
Ignore
Action Description
The association will not be synchronized; at least not for the moment
Proposed Action
Usually the association is synchronized once the HA peer has been updated, but it is still advised to verify that the relevant association has been properly synchronized.

2.40.52. [ID: 1170] Host name address detected

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Host name address detected.
Default Log Severity
Notice
Parameters
name, offset, datalen, pkt
Explanation
The packet contains a Host Name address parameter; an alternative address using the DNS format. Note that the host name will be resolved by a, potentially compromised, external entity. Therefore it has the potential to circumvent the IP policy (but not the routes). Whether this will incur a security risk depends on the network layout, but it does increase the target area. This log message is controlled by SCTPSettings:SCTPHostNameAddressParam.
Gateway Action
Allow
Action Description
None
Proposed Action
None

2.40.53. [ID: 1189] Host name address detected

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Host name address detected.
Default Log Severity
Information
Parameters
name, offset, datalen, pkt
Explanation
The packet contains a Host Name address parameter; an alternative address using the DNS format. Note that the host name will be resolved by a, potentially compromised, external entity. Therefore it has the potential to circumvent the IP policy (but not the routes). Whether this will incur a security risk depends on the network layout, but it does increase the target area. This log message is controlled by SCTPSettings:SCTPHostNameAddressParam.
Gateway Action
Strip
Action Description
None
Proposed Action
None

2.40.54. [ID: 1374] Host name address detected

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Host name address detected.
Default Log Severity
Warning
Parameters
name, offset, datalen, pkt, assoc, rule
Explanation
For stateful inspection of SCTP traffic, a Host Name Address parameter always gets stripped from a chunk.
Gateway Action
Strip
Action Description
None
Proposed Action
None

2.40.55. [ID: 1381] Wrong initiator primary IP

Log Categories
SCTP,STATEFUL
Log Message
Wrong initiator primary IP.
Default Log Severity
Warning
Parameters
ip, pkt, assoc, rule
Explanation
A packet with an INIT ACK chunk was received for a restart which did not use as destination IP the primary IP that the initiator of the restart declared on the previous INIT chunk he sent.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.56. [ID: 1379] Wrong responder primary IP

Log Categories
SCTP,STATEFUL
Log Message
Wrong responder primary IP.
Default Log Severity
Warning
Parameters
ip, pkt, assoc, rule
Explanation
A packet with an INIT ACK chunk was received for a restart which did not use as source IP the destination IP that the initiator of the restart used on the previous INIT chunk he sent.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.57. [ID: 1373] IP address inside IP rule filter

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
IP address inside IP rule filter.
Default Log Severity
Warning
Parameters
ip, pkt
Explanation
Although the IP address parameter encountered in an SCTP chunk is within the IP rule filter, the setting SCTPSettings:SCTPMultihoming does not allow it.
Gateway Action
Strip
Action Description
None
Proposed Action
None

2.40.58. [ID: 1198] IP address outside IP rule filter

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
IP address outside IP rule filter.
Default Log Severity
Information
Parameters
ip, pkt
Explanation
The packet contains an alternative transport address that does not comply with the IP rule. This log message, as well as how these addresses are treated by the system, is controlled by SCTPSettings:SCTPMultihoming. Allowing the association to use this transport address will result in a loosened IP policy; traffic to and from addresses that don't match the IP rule, will be allowed once the association has been established. By disallowing this kind of addresses, the association is narrowed down to match that of the IP rule.
Gateway Action
Strip
Action Description
None
Proposed Action
None

2.40.59. [ID: 1177] IP address outside IP rule filter

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
IP address outside IP rule filter.
Default Log Severity
Notice
Parameters
ip, pkt
Explanation
The packet contains an alternative transport address that does not comply with the IP rule. This log message, as well as how these addresses are treated by the system, is controlled by SCTPSettings:SCTPMultihoming. Allowing the association to use this transport address will result in a loosened IP policy; traffic to and from addresses that don't match the IP rule, will be allowed once the association has been established. By disallowing this kind of addresses, the association is narrowed down to match that of the IP rule.
Gateway Action
Allow
Action Description
None
Proposed Action
None

2.40.60. [ID: 1348] Source IP disallowed by association

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Source IP disallowed by association.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
Explanation
The initiator of an association has sent an SCTP packet using an IP that does not exist in the list of its IP addresses.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.61. [ID: 1385] IP disallowed by initiator of restart

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
IP disallowed by initiator of restart.
Default Log Severity
Warning
Parameters
ip, iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
Explanation
A packet with a COOKIE ECHO chunk has been received for a restart using an IP address that is used by the peer for the original association but was not included to be used for the restart as well.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.62. [ID: 1336] Destination IP disallowed by association

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Destination IP disallowed by association.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
Explanation
The initiator of an association has sent an SCTP packet using as destination IP an IP that does not exist in the list of the responder's IP addresses.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.63. [ID: 1378] IP disallowed by responder of restart

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
IP disallowed by responder of restart.
Default Log Severity
Warning
Parameters
ip, iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
Explanation
A packet with a COOKIE ACK chunk has been received for a restart using an IP address that is used by the peer for the original association but was not included to be used for the restart as well.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.64. [ID: 1294] SCTP padding with illegal length

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
SCTP padding with illegal length.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
Explanation
An SCTP chunk contained more than 3 bytes of padding; padlen bytes of padding. According to the RFC 4960 padding MUST not exceed 3 bytes in total. The illegal padding is located at offset offset (relative the SCTP header), inside the chunk with index chunkindex. This may also be a severely malformed packet, whose content is impossible to interpret.
Gateway Action
Drop
Action Description
None
Proposed Action
This packet is broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed packets.

2.40.65. [ID: 1271] SCTP mis-aligned by padding

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
SCTP mis-aligned by padding.
Default Log Severity
Warning
Parameters
offset, padlen, pkt
Explanation
What looks like mis-aligned padding was found at the end of the SCTP packet. The padding in itself was not a problem; this padding caused the end of the packet to be mis-aligned. Padding to a mis-aligned offset is not only pointless, but it is also a telltale sign of something broken.
Gateway Action
Drop
Action Description
None
Proposed Action
This packet is broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed packets.

2.40.66. [ID: 1277] SCTP chunk end mis-aligned by padding

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
SCTP chunk end mis-aligned by padding.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
Explanation
What looks like mis-aligned padding was found at the end of a chunk inside the SCTP packet; this padding caused the end of the chunk to be mis-aligned. Padding to a mis-aligned offset is not only pointless, but it is also a telltale sign of something broken.
Gateway Action
Drop
Action Description
None
Proposed Action
This packet is broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed packets.
Proposed Action
This packet is broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed packets.

2.40.67. [ID: 1291] Address type illegal with Host Name Address[...]

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Address type illegal with Host Name Address option.
Default Log Severity
Warning
Parameters
paramtype, pkt
Explanation
An SCTP message that combines the Host Name Address parameter with an address parameter of type paramtype. RCF4960 explicitly forbids the Host Name Address option to be combined with address parameters of any other address type.
Gateway Action
Drop
Action Description
None
Proposed Action
This packet is invalid. If the packet sender is one of your network devices, investigate why the unit is trying to use both static address and host name address parameters.

2.40.68. [ID: 1663] Init-ack seen

Log Categories
SCTP,STATEFUL
Log Message
Init-ack seen.
Default Log Severity
Debug
Parameters
pkt, assoc, rule
Explanation
An SCTP init-ack message was received. This is the second part of an SCTP association handshake, and the first reply from the responder. The message contains a "cookie" that the initiator is supposed to return unchanged.
Gateway Action
Accept
Action Description
Part of association handshake.
Proposed Action
None; normally a log message that the association has been established should follow.

2.40.69. [ID: 1382] Association restart from initiator failed

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Association restart from initiator failed.
Default Log Severity
Warning
Parameters
pkt, assoc, rule
Explanation
The initiator of an association issued a restart using a different primary IP and possibly interface but no matching IP rule was found to allow it.
Gateway Action
Drop
Action Description
None
Proposed Action
Configure an IP rule that allows the initiator to issue a restart using the new primary IP and interface.

2.40.70. [ID: 1366] Initiator vtag mismatch

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Initiator vtag mismatch.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, vtag, pkt, assoc, rule
Explanation
The verification tag of an SCTP common header sent by the responder of an SCTP association does not match the verification tag of the initiator.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.71. [ID: 1176] Invalid SCTP checksum

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Invalid SCTP checksum.
Default Log Severity
Notice
Parameters
chksum, calcchksum, pkt
Explanation
The checksum of the SCTP message was incorrect.
Gateway Action
Allow
Action Description
None
Proposed Action
Set SCTPSettings:SCTPValidateChecksum to change the behavior for SCTP checksum validation.

2.40.72. [ID: 1242] Invalid SCTP checksum

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Invalid SCTP checksum.
Default Log Severity
Warning
Parameters
chksum, calcchksum, pkt
Explanation
The checksum of the SCTP message was incorrect.
Gateway Action
Drop
Action Description
None
Proposed Action
Set SCTPSettings:SCTPValidateChecksum to change the behavior for SCTP checksum validation.

2.40.73. [ID: 1178] Invalid SCTP chunk length

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Invalid SCTP chunk length.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt
Explanation
The chunk length exceeded the SCTP message length, or the length did not match the length specified for that chunk type.
Gateway Action
Drop
Action Description
None
Proposed Action
This packet is broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed packets.

2.40.74. [ID: 1174] Invalid SCTP destination port

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Invalid SCTP destination port.
Default Log Severity
Notice
Parameters
matchkey
Explanation
The destination port of the SCTP message was zero.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.75. [ID: 1337] Invalid destination route

Log Categories
SCTP,ROUTE,STATEFUL,VALIDATE
Log Message
Invalid destination route.
Default Log Severity
Warning
Parameters
destiface, iface, flow, assoc, rule, user, userid
Explanation
The destination IP was routed via an interface destiface that is not security equivalent with the corresponding interface iface used when the association was setup. From the moment the association is setup, the initiator is assumed to be reached via the interface from which the INIT message was received, or one that is security equivalent with it. Similarly the responder is assumed to be reached via the original destination interface of the INIT message, or one that is security equivalent with it. This log message is generated when the assumption is violated by the traffic.
Gateway Action
Drop
Action Description
The system prevented an SCTP flow from being opened because the destination route is deemed not to be security equivalent with those used during association setup
Proposed Action
Establish whether the IP address is routed via the correct interface. Verify whether the IP address is valid for the association. Review whether the destination interface destiface should be security equivalent with the corresponding interface iface used at the association setup.

2.40.76. [ID: 1194] Invalid SCTP error cause length

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Invalid SCTP error cause length.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, code, offset, datalen, pkt
Explanation
The length of the error cause exceeded the SCTP ERROR chunk length, or the length did not match the length specified for that error cause type.
Gateway Action
Drop
Action Description
None
Proposed Action
This packet is broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed packets.

2.40.77. [ID: 1273] Invalid SCTP heartbeat information

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Invalid SCTP heartbeat information.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, type, datalen, pkt
Explanation
The information of a HEARTBEAT or HEARTBEAT ACK chunk chunktype was of the wrong type type. This log is controlled by SCTPSettings:SCTPLogFormatError.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.78. [ID: 1187] Invalid Host Name address format

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Invalid Host Name address format.
Default Log Severity
Warning
Parameters
iplen, offset, datalen, pkt
Explanation
A badly formatted Host Name address parameter was found. This log is controlled by SCTPSettings:SCTPLogFormatError.
Gateway Action
Drop
Action Description
None
Proposed Action
This packet is broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed packets.

2.40.79. [ID: 1353] Invalid stream ID

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Invalid stream ID.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, streamid, max, pkt, assoc, rule
Explanation
The stream ID of an SCTP DATA chunk was larger than the maximum inbound stream ID of the association.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.80. [ID: 1258] Illegal initiate tag

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Illegal initiate tag.
Default Log Severity
Warning
Parameters
value, pkt
Explanation
The initiate tag of the SCTP INIT chunk was zero which is not allowed.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.81. [ID: 1257] Invalid number of streams

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Invalid number of streams.
Default Log Severity
Warning
Parameters
inbound, outbound, pkt
Explanation
The number of inbound or outbound streams in an INIT chunk was zero.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.82. [ID: 1188] Invalid number of mandatory SCTP parameters

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Invalid number of mandatory SCTP parameters.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, code, offset, datalen, value, pkt
Explanation
A chunk was missing mandatory parameters. This log is controlled by SCTPSettings:SCTPLogFormatError.
Gateway Action
Drop
Action Description
None
Proposed Action
This packet is broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed packets.

2.40.83. [ID: 1325] Invalid stream ID

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Invalid stream ID.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, streamid, max, pkt, assoc, rule
Explanation
The stream ID of an SCTP DATA chunk was larger than the maximum outbound stream ID of the association.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.84. [ID: 1296] Invalid pad parameter inside chunk

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Invalid pad parameter inside chunk.
Default Log Severity
Warning
Parameters
chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, padlen, pkt
Explanation
A padding parameter according to RFC4820 was found within a chunk that is not an INIT chunk. According to RFC4820, apart from an INIT chunk, the padding parameter must not be included in any other chunk.
Gateway Action
Drop
Action Description
None
Proposed Action
This packet is invalid. If the packet sender is one of your network devices, investigate why the unit is sending packets with padding parameters included in other chunks than an INIT chunk.

2.40.85. [ID: 1195] Invalid SCTP chunk parameter length

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Invalid SCTP chunk parameter length.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, pkt
Explanation
The parameter length exceeded the SCTP chunk length, or the parameter length did not match the length specified for that parameter type.
Gateway Action
Drop
Action Description
None
Proposed Action
This packet is broken. If the packet sender is one of your network devices, investigate why the unit is sending malformed packets.

2.40.86. [ID: 1354] Invalid source interface

Log Categories
SCTP,ROUTE,STATEFUL,VALIDATE
Log Message
Invalid source interface.
Default Log Severity
Warning
Parameters
recviface, iface, flow, assoc, rule, user, userid
Explanation
The source IP was received by interface recviface that is not security equivalent with the corresponding interface iface that was used when the association was setup. From the moment the association is setup, the initiator is assumed to be reached via the interface from which the INIT message was received, or one that is security equivalent with it. Similarly the responder is assumed to be reached via the original destination interface of the INIT message, or one that is security equivalent with it. This log message is generated when the assumption is violated by the traffic.
Gateway Action
Drop
Action Description
The system prevented an SCTP flow from being opened because the source route is deemed not to be security equivalent with those used during association setup
Proposed Action
Establish whether the IP address was received by the correct interface. Verify whether the IP address is valid for the association. Review whether the receive interface recviface should be security equivalent with the corresponding interface iface used at the association setup.

2.40.87. [ID: 1167] Invalid SCTP source port

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Invalid SCTP source port.
Default Log Severity
Notice
Parameters
matchkey
Explanation
The source port of the SCTP message was zero.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.88. [ID: 1181] Invalid SCTP verification tag

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Invalid SCTP verification tag.
Default Log Severity
Notice
Parameters
vtag, pkt
Explanation
The SCTP verification tag was zero for an INIT message.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.89. [ID: 1301] Chunk length includes the padding of the last[...]

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Chunk length includes the padding of the last parameter.
Default Log Severity
Notice
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, padlen, pkt
Explanation
The length parameter of a chunk includes tha padding of the chunk's last parameter.
Gateway Action
Allow
Action Description
None
Proposed Action
This log message is controlled by SCTPSettings:SCTPLogFormatError.

2.40.90. [ID: 1340] Max IP addresses exceeded

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Max IP addresses exceeded.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, max, ip, pkt, assoc, rule
Explanation
Maximum number of IP addresses allowed for a peer of an association was reached. The IP address will be stripped from the packet.
Gateway Action
Strip
Action Description
None
Proposed Action
None

2.40.91. [ID: 1370] Max control chunks exceeded

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Max control chunks exceeded.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, count, max, pkt
Explanation
The configured maximum number of allowed SCTP control chunks for an SCTP packet per service used has been reached.
Gateway Action
Drop
Action Description
None
Proposed Action
If the maximum number of allowed SCTP control chunks for an SCTP packet per SCTP service is too low, increase it.

2.40.92. [ID: 1364] Max DATA chunks exceeded

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Max DATA chunks exceeded.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, count, max, pkt
Explanation
The configured maximum number of allowed SCTP DATA chunks for an SCTP packet per service used has been reached.
Gateway Action
Drop
Action Description
None
Proposed Action
If the maximum number of allowed SCTP DATA chunks for an SCTP packet per SCTP service is too low, increase it.

2.40.93. [ID: 1360] Max inbound streams adjusted

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Max inbound streams adjusted.
Default Log Severity
Notice
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, instreams, max, pkt, assoc, rule
Explanation
The maximum number of inbound streams in an INIT or INIT_ACK chunk was reduced due to the setting of the maximum allowed inbound streams set on the SCTP service used by the IP rule allowing the traffic in the case of an INIT chunk or because of the setting of the maximum allowed outbound streams in the case of an INIT_ACK chunk.
Gateway Action
Adjust
Action Description
None
Proposed Action
Increment the maximum inbound streams setting on the SCTP service used by the IP rule in case of an INIT chunk or the maximum outbound streams setting in case of an INIT_ACK chunk.

2.40.94. [ID: 1356] Max outbound streams adjusted

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Max outbound streams adjusted.
Default Log Severity
Notice
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, outstreams, max, pkt, assoc, rule
Explanation
The maximum number of outbound streams in an INIT or INIT_ACK chunk was reduced either due to the setting of the maximum allowed outbound streams set on the SCTP service used by the IP rule allowing the traffic in the case of an INIT chunk or because of the setting of the maximum allowed inbound streams in the case of an INIT_ACK chunk.
Gateway Action
Adjust
Action Description
None
Proposed Action
Increment the maximum outbound streams setting on the SCTP service used by the IP rule in case of an INIT chunk or the maximum inbound streams setting in case of an INIT_ACK chunk.

2.40.95. [ID: 1299] Missing SCTP chunk padding

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Missing SCTP chunk padding.
Default Log Severity
Warning
Parameters
chunktype, chunkindex, chunkoffset, chunklen, pkt
Explanation
A packet with a chunk that is not padded to a multiple of four was detected.
Gateway Action
Drop
Action Description
None
Proposed Action
This log message is controlled by SCTPSettings:SCTPLogFormatError. This packet is invalid. If the packet sender is one of your network devices, investigate why the unit is sending packets containing chunks not padded to a multiple of four.

2.40.96. [ID: 1285] Missing mandatory SCTP parameter from a chunk

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Missing mandatory SCTP parameter from a chunk.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, paramtype, pkt
Explanation
A mandatory parameter is missing from a chunk.
Gateway Action
Drop
Action Description
None
Proposed Action
This packet is invalid. If the packet sender is one of your network devices, investigate why the unit is sending SCTP packets with chunks that are missing mandatory parameters.

2.40.97. [ID: 1168] Missing SCTP cookie

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Missing SCTP cookie.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt
Explanation
The SCTP message contained an COOKIE ECHO chunk without cookie data.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.98. [ID: 1330] No association found

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
No association found.
Default Log Severity
Warning
Parameters
iplen, vtag, chunktype, chunkindex, chunkoffset, chunklen, pkt
Explanation
No association was found for a received SCTP chunk.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.99. [ID: 1688] No valid association found

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
No valid association found.
Default Log Severity
Notice
Parameters
pkt
Explanation
An SCTP packet was dropped even though a matching association had been found. This is related to policy updates and can either mean that the association ended up being forcefully closed, or it indicates a temporary condition where the system was unable to verify that the association conformed with the system policy.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.100. [ID: 1341] No whitelisted PPIDs

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
No whitelisted PPIDs.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, ppid, pkt, assoc, rule
Explanation
Whitelist of Payload Protocol Identifiers is used in the SCTP service configured without any members. All Payload Protocol Identifiers are disallowed.
Gateway Action
Drop
Action Description
None
Proposed Action
Include the Payload Protocol Identifiers you want to be allowed to the whitelist list of the SCTP service used by the IP rule that allows the traffic.

2.40.101. [ID: 1349] No possible association restart

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
No possible association restart.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt, assoc, rule
Explanation
An established association which has not previously encountered chunks that justify an association restart, receives a chunk that could be valid only if there was an ongoing possible restart.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.102. [ID: 1292] Non-zero SCTP chunk padding inside chunk

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Non-zero SCTP chunk padding inside chunk.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
Explanation
The SCTP chunk contained a padding parameter, a padding chunk, a padding trailer inside the chunk or some other non-standard padding construct beginning. The padding is located at offset offset (relative the SCTP header), inside the chunk with index chunkindex. The padding contains non-zero data; most likely unintentionally leaked data. This may also be a severely malformed packet, whose content is impossible to interpret.
Gateway Action
Allow
Action Description
None
Proposed Action
Investigate why non-standard padding is leaking data; try to locate the source. Padding chunks (chunktype equals 132) and padding parameters (only possible when chunktype equals 1) are likely an attempt by network appliance to disable a specific SCTP feature without a need to rewrite the packet. Non-zero padding inside error chunks (chunktype equals 9) is probably caused by the SCTP end point leaking internal data from network handling. The setting SCTPSettings:SCTPPaddingInsideChunk can be modified to change the handling of padding parameters, padding chunks and padding trailers. The setting SCTPSettings:SCTPNonZeroPadding can be modified to change the general handling of non-zero padding data.

2.40.103. [ID: 1297] Non-zero SCTP chunk padding inside chunk

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Non-zero SCTP chunk padding inside chunk.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
Explanation
The SCTP chunk contained a padding parameter, a padding chunk, a padding trailer inside the chunk or some other non-standard padding construct beginning. The padding is located at offset offset (relative the SCTP header), inside the chunk with index chunkindex. The padding contains non-zero data; most likely unintentionally leaked data. This may also be a severely malformed packet, whose content is impossible to interpret.
Gateway Action
Drop
Action Description
None
Proposed Action
Investigate why non-standard padding is leaking data; try to locate the source. Padding chunks (chunktype equals 132) and padding parameters (only possible when chunktype equals 1) are likely an attempt by network appliance to disable a specific SCTP feature without a need to rewrite the packet. Non-zero padding inside error chunks (chunktype equals 9) is probably caused by the SCTP end point leaking internal data from network handling. The setting SCTPSettings:SCTPPaddingInsideChunk can be modified to change the handling of padding parameters, padding chunks and padding trailers. The setting SCTPSettings:SCTPNonZeroPadding can be modified to change the general handling of non-zero padding data.

2.40.104. [ID: 1289] Non-zero SCTP chunk padding inside chunk

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Non-zero SCTP chunk padding inside chunk.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
Explanation
The SCTP chunk contained a padding parameter, a padding chunk, a padding trailer inside the chunk or some other non-standard padding construct beginning. The padding is located at offset offset (relative the SCTP header), inside the chunk with index chunkindex. The padding contains non-zero data; most likely unintentionally leaked data. This may also be a severely malformed packet, whose content is impossible to interpret.
Gateway Action
Strip
Action Description
None
Proposed Action
Investigate why non-standard padding is leaking data; try to locate the source. Padding chunks (chunktype equals 132) and padding parameters (only possible when chunktype equals 1) are likely an attempt by network appliance to disable a specific SCTP feature without a need to rewrite the packet. Non-zero padding inside error chunks (chunktype equals 9) is probably caused by the SCTP end point leaking internal data from network handling. The setting SCTPSettings:SCTPPaddingInsideChunk can be modified to change the handling of padding parameters, padding chunks and padding trailers. The setting SCTPSettings:SCTPNonZeroPadding can be modified to change the general handling of non-zero padding data.

2.40.105. [ID: 1197] SCTP chunk padding inside chunk

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
SCTP chunk padding inside chunk.
Default Log Severity
Notice
Parameters
chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
Explanation
The SCTP chunk contained a padding parameter, a padding trailer inside the chunk or some other valid, but more or less non-standard padding construct. The system did not investigate whether the padding data is non-zero or not, because of the current setting of SCTPSettings:SCTPNonZeroPadding. RFC 4820 describes the purpose of padding parameters and padding chunks as a mean to enlarge SCTP INIT chunks and SCTP packets, respectively. Another (more likely) usage is that firewalls can use padding parameters and padding chunks to remove features from an SCTP packet without affecting the packet layout.
Gateway Action
Allow
Action Description
None
Proposed Action
Set SCTPSettings:SCTPPaddingInsideChunk to change the handling of padding parameters, padding chunks and padding trailers. The setting SCTPSettings:SCTPNonZeroPadding can be modified to change the general handling of non-zero padding data.

2.40.106. [ID: 1290] SCTP chunk padding inside chunk

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
SCTP chunk padding inside chunk.
Default Log Severity
Information
Parameters
chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
Explanation
The SCTP chunk contained a padding parameter, a padding trailer inside the chunk or some other valid, but more or less non-standard padding construct. This log message will only be generated for valid padding; data consisting of all zeroes. RFC 4820 describes the purpose of padding parameters and padding chunks as a mean to enlarge SCTP INIT chunks and SCTP packets, respectively. Another (more likely) usage is that firewalls can use padding parameters and padding chunks to remove features from an SCTP packet without affecting the packet layout.
Gateway Action
Allow
Action Description
None
Proposed Action
Set SCTPSettings:SCTPPaddingInsideChunk to change the handling of padding parameters, padding chunks and padding trailers. The setting SCTPSettings:SCTPNonZeroPadding can be modified to change the general handling of non-zero padding data.

2.40.107. [ID: 1282] SCTP chunk padding inside chunk

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
SCTP chunk padding inside chunk.
Default Log Severity
Warning
Parameters
chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
Explanation
The SCTP chunk contained a padding parameter, a padding trailer inside the chunk or some other valid, but more or less non-standard padding construct. The system did not investigate whether the padding data is non-zero or not, because of the current setting of SCTPSettings:SCTPPaddingInsideChunk. RFC 4820 describes the purpose of padding parameters and padding chunks as a mean to enlarge SCTP INIT chunks and SCTP packets, respectively. Another (more likely) usage is that firewalls can use padding parameters and padding chunks to remove features from an SCTP packet without affecting the packet layout.
Gateway Action
Drop
Action Description
None
Proposed Action
Set SCTPSettings:SCTPPaddingInsideChunk to change the handling of padding parameters, padding chunks and padding trailers. The setting SCTPSettings:SCTPNonZeroPadding can be modified to change the general handling of non-zero padding data.

2.40.108. [ID: 1281] SCTP chunk padding inside chunk

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
SCTP chunk padding inside chunk.
Default Log Severity
Warning
Parameters
chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
Explanation
The SCTP chunk contained a padding parameter, a padding trailer inside the chunk or some other valid, but more or less non-standard padding construct. The system did not investigate whether the padding data is non-zero or not, because of the current setting of SCTPSettings:SCTPPaddingInsideChunk. RFC 4820 describes the purpose of padding parameters and padding chunks as a mean to enlarge SCTP INIT chunks and SCTP packets, respectively. Another (more likely) usage is that firewalls can use padding parameters and padding chunks to remove features from an SCTP packet without affecting the packet layout.
Gateway Action
Strip
Action Description
None
Proposed Action
Set SCTPSettings:SCTPPaddingInsideChunk to change the handling of padding parameters, padding chunks and padding trailers. The setting SCTPSettings:SCTPNonZeroPadding can be modified to change the general handling of non-zero padding data.

2.40.109. [ID: 1190] Non-zero SCTP chunk padding

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Non-zero SCTP chunk padding.
Default Log Severity
Notice
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, padlen, pkt
Explanation
The padding for an SCTP chunk (after the chunk) contained non-zero data. This is most likely unintentionally leaked internal data, remaining from packet handling.
Gateway Action
Allow
Action Description
None
Proposed Action
Set SCTPSettings:SCTPNonZeroPadding to change the handling of non-zero padding.

2.40.110. [ID: 1278] Non-zero SCTP chunk padding

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Non-zero SCTP chunk padding.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, padlen, pkt
Explanation
The padding for an SCTP chunk (after the chunk) contained non-zero data. This is most likely unintentionally leaked internal data, remaining from packet handling.
Gateway Action
Drop
Action Description
None
Proposed Action
Set SCTPSettings:SCTPNonZeroPadding to change the handling of non-zero padding.

2.40.111. [ID: 1279] Non-zero SCTP chunk padding

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Non-zero SCTP chunk padding.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, padlen, pkt
Explanation
The padding for an SCTP chunk (after the chunk) contained non-zero data. This is most likely unintentionally leaked internal data, remaining from packet handling.
Gateway Action
Strip
Action Description
None
Proposed Action
Set SCTPSettings:SCTPNonZeroPadding to change the handling of non-zero padding.

2.40.112. [ID: 1173] Non-zero reserved field in SCTP error cause

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Non-zero reserved field in SCTP error cause.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, code, offset, datalen, pkt
Explanation
The SCTP message contained an error cause with a reserved field that was not zero. This log is controlled by SCTPSettings:SCTPLogFormatError.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.113. [ID: 1269] Non-zero SCTP chunk parameter padding

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Non-zero SCTP chunk parameter padding.
Default Log Severity
Notice
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, paramoffset, paramlen, padlen, pkt
Explanation
The padding after an SCTP parameter (inside a chunk) contained non-zero data. This is most likely unintentionally leaked internal data, remaining from packet handling.
Gateway Action
Allow
Action Description
None
Proposed Action
Set SCTPSettings:SCTPNonZeroPadding to change the handling of non-zero padding.

2.40.114. [ID: 1268] Non-zero SCTP chunk parameter padding

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Non-zero SCTP chunk parameter padding.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, paramoffset, paramlen, padlen, pkt
Explanation
The padding after an SCTP parameter (inside a chunk) contained non-zero data. This is most likely unintentionally leaked internal data, remaining from packet handling.
Gateway Action
Drop
Action Description
None
Proposed Action
Set SCTPSettings:SCTPNonZeroPadding to change the handling of non-zero padding.

2.40.115. [ID: 1196] Non-zero SCTP chunk parameter padding

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Non-zero SCTP chunk parameter padding.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, paramoffset, paramlen, padlen, pkt
Explanation
The padding after an SCTP parameter (inside a chunk) contained non-zero data. This is most likely unintentionally leaked internal data, remaining from packet handling.
Gateway Action
Strip
Action Description
None
Proposed Action
Set SCTPSettings:SCTPNonZeroPadding to change the handling of non-zero padding.

2.40.116. [ID: 1344] Non-first SCTP cookie ack

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Non-first SCTP cookie ack.
Default Log Severity
Warning
Parameters
chunktype, chunkindex, chunkoffset, chunklen, offset, pkt
Explanation
A COOKIE ACK chunk was found that was not the first chunk in the packet.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.117. [ID: 1295] Non-first SCTP cookie

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Non-first SCTP cookie.
Default Log Severity
Warning
Parameters
chunktype, chunkindex, chunkoffset, chunklen, offset, pkt
Explanation
A COOKIE ECHO chunk was found that was not the first chunk in the packet.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.118. [ID: 1365] PPID not whitelisted

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
PPID not whitelisted.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, ppid, pkt, assoc, rule
Explanation
The Payload Protocol Identifier of a DATA chunk was not whitelisted by the SCTP service that is used by the IP rule that allows the traffic.
Gateway Action
Drop
Action Description
None
Proposed Action
Include the Payload Protocol Identifier in the whitelist of the SCTP service used if you want to allow it.

2.40.119. [ID: 1441] SCTP padding chunk

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
SCTP padding chunk.
Default Log Severity
Notice
Parameters
chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
Explanation
The SCTP contained a padding chunk. The system did not investigate whether the padding data is non-zero or not, because of the current setting of SCTPSettings:SCTPNonZeroPadding. RFC 4820 describes the purpose of padding parameters and padding chunks as a mean to enlarge SCTP INIT chunks and SCTP packets, respectively. Another (more likely) usage is that firewalls can use padding parameters and padding chunks to remove features from an SCTP packet without affecting the packet layout.
Gateway Action
Allow
Action Description
None
Proposed Action
Set SCTPSettings:SCTPPaddingChunk to change the handling of chunks. The setting SCTPSettings:SCTPNonZeroPadding can be modified to change the general handling of non-zero padding data.

2.40.120. [ID: 1438] SCTP padding chunk

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
SCTP padding chunk.
Default Log Severity
Information
Parameters
chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
Explanation
The SCTP contained a padding chunk. This log message will only be generated for valid padding; data consisting of all zeroes. RFC 4820 describes the purpose of padding parameters and padding chunks as a mean to enlarge SCTP INIT chunks and SCTP packets, respectively. Another (more likely) usage is that firewalls can use padding parameters and padding chunks to remove features from an SCTP packet without affecting the packet layout.
Gateway Action
Allow
Action Description
None
Proposed Action
Set SCTPSettings:SCTPPaddingChunk to change the handling of padding chunks. The setting SCTPSettings:SCTPNonZeroPadding can be modified to change the general handling of non-zero padding data.

2.40.121. [ID: 1440] SCTP padding chunk

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
SCTP padding chunk.
Default Log Severity
Warning
Parameters
chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
Explanation
The SCTP chunk contained a padding chunk. The system did not investigate whether the padding data is non-zero or not, because of the current setting of SCTPSettings:SCTPPaddingChunk. RFC 4820 describes the purpose of padding parameters and padding chunks as a mean to enlarge SCTP INIT chunks and SCTP packets, respectively. Another (more likely) usage is that firewalls can use padding parameters and padding chunks to remove features from an SCTP packet without affecting the packet layout.
Gateway Action
Drop
Action Description
None
Proposed Action
Set SCTPSettings:SCTPPaddingChunk to change the handling of chunks. The setting SCTPSettings:SCTPNonZeroPadding can be modified to change the general handling of non-zero padding data.

2.40.122. [ID: 1437] SCTP padding chunk

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
SCTP padding chunk.
Default Log Severity
Notice
Parameters
chunktype, chunkindex, chunkoffset, chunklen, offset, padlen, pkt
Explanation
The SCTP contained a padding chunk. The system did not investigate whether the padding data is non-zero or not, because of the current setting of SCTPSettings:SCTPNonZeroPadding. RFC 4820 describes the purpose of padding parameters and padding chunks as a mean to enlarge SCTP INIT chunks and SCTP packets, respectively. Another (more likely) usage is that firewalls can use padding parameters and padding chunks to remove features from an SCTP packet without affecting the packet layout.
Gateway Action
Strip
Action Description
None
Proposed Action
Set SCTPSettings:SCTPPaddingChunk to change the handling of chunks. The setting SCTPSettings:SCTPNonZeroPadding can be modified to change the general handling of non-zero padding data.

2.40.123. [ID: 1380] Association restart from responder failed

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Association restart from responder failed.
Default Log Severity
Warning
Parameters
pkt, assoc, rule
Explanation
The responder of an association issued a restart but no matching IP rule was found to allow it.
Gateway Action
Drop
Action Description
None
Proposed Action
Configure an IP rule that allows the restart from the responder.

2.40.124. [ID: 1328] Responder vtag mismatch

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Responder vtag mismatch.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, vtag, pkt, assoc, rule
Explanation
The verification tag of an SCTP common header sent by the initiator of an SCTP association does not match the verification tag of the responder.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.125. [ID: 1351] Source port mismatch

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
Source port mismatch.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, srcport, pkt, assoc, rule
Explanation
The source port of an SCTP packet sent by the initiator of an association does not match the source port of the association the packet belongs to.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.126. [ID: 1270] Stateful SCTP is not supported

Log Categories
SCTP,STATEFUL
Log Message
Stateful SCTP is not supported. Packets will be dropped.
Default Log Severity
Warning
Parameters
matchkey
Explanation
A stateful IP rule has matched SCTP traffic. Stateful SCTP traffic will be dropped.
Gateway Action
Drop
Action Description
None
Proposed Action
In order to forward the SCTP traffic, configure the IP rule as 'stateless'. SCTP support can also be turned off with SCTPSettings:SCTPEnabled, in which case SCTP will be forwarded as the 'unknown' IP protocol 132.

2.40.127. [ID: 1283] Too many occurrences of SCTP parameter

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Too many occurrences of SCTP parameter.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, paramtype, count, max, pkt
Explanation
The SCTP chunk chunktype contained too many parameters of type paramtype.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.128. [ID: 1334] Unexpected state cookie

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Unexpected state cookie.
Default Log Severity
Warning
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, pkt
Explanation
A state cookie parameter was discovered outside of an INIT-ACK chunk.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.40.129. [ID: 1280] Unknown mandatory chunk type

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Unknown mandatory chunk type.
Default Log Severity
Warning
Parameters
chunktype, flags, chunkindex, chunkoffset, chunklen, pkt
Explanation
An unknown "mandatory" chunk type has been encountered; what RFC 4960 mentions as "highest-order bit types" 00 and 01 in Section 3.2, and roughly translates into "when unknown, ignore the remaining chunks of this packet". While unknown, these types are typically used to modify the general actions an SCTP endpoint should take when acting upon chunks. The effect is likely limited to a single packet, and only those chunks following it.
Gateway Action
Abort
Action Description
None
Proposed Action
This log message is controlled by SCTPSettings:SCTPLogUnknownMandChunk. How to handle these types of unknown chunks is controlled by SCTPSettings:SCTPUnknownMandChunk and SCTPSettings:SCTPUnknownMandChunkNotify.

2.40.130. [ID: 1184] Unknown mandatory chunk type

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Unknown mandatory chunk type.
Default Log Severity
Notice
Parameters
chunktype, flags, chunkindex, chunkoffset, chunklen, pkt
Explanation
An unknown "mandatory" chunk type has been encountered; what RFC 4960 mentions as "highest-order bit types" 00 and 01 in Section 3.2, and roughly translates into "when unknown, ignore the remaining chunks of this packet". While unknown, these types are typically used to modify the general actions an SCTP endpoint should take when acting upon chunks. The effect is likely limited to a single packet, and only those chunks following it.
Gateway Action
Allow
Action Description
None
Proposed Action
This log message is controlled by SCTPSettings:SCTPLogUnknownMandChunk. How to handle these types of unknown chunks is controlled by SCTPSettings:SCTPUnknownMandChunk and SCTPSettings:SCTPUnknownMandChunkNotify.

2.40.131. [ID: 1193] Unknown mandatory chunk type

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Unknown mandatory chunk type.
Default Log Severity
Warning
Parameters
chunktype, flags, chunkindex, chunkoffset, chunklen, pkt
Explanation
An unknown "mandatory" chunk type has been encountered; what RFC 4960 mentions as "highest-order bit types" 00 and 01 in Section 3.2, and roughly translates into "when unknown, ignore the remaining chunks of this packet". While unknown, these types are typically used to modify the general actions an SCTP endpoint should take when acting upon chunks. The effect is likely limited to a single packet, and only those chunks following it.
Gateway Action
Drop
Action Description
None
Proposed Action
This log message is controlled by SCTPSettings:SCTPLogUnknownMandChunk. How to handle these types of unknown chunks is controlled by SCTPSettings:SCTPUnknownMandChunk and SCTPSettings:SCTPUnknownMandChunkNotify.

2.40.132. [ID: 1191] Unknown mandatory chunk type

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Unknown mandatory chunk type.
Default Log Severity
Warning
Parameters
chunktype, flags, chunkindex, chunkoffset, chunklen, pkt
Explanation
An unknown "mandatory" chunk type has been encountered; what RFC 4960 mentions as "highest-order bit types" 00 and 01 in Section 3.2, and roughly translates into "when unknown, ignore the remaining chunks of this packet". While unknown, these types are typically used to modify the general actions an SCTP endpoint should take when acting upon chunks. The effect is likely limited to a single packet, and only those chunks following it.
Gateway Action
Strip
Action Description
None
Proposed Action
This log message is controlled by SCTPSettings:SCTPLogUnknownMandChunk. How to handle these types of unknown chunks is controlled by SCTPSettings:SCTPUnknownMandChunk and SCTPSettings:SCTPUnknownMandChunkNotify.

2.40.133. [ID: 1236] Unknown mandatory parameter type

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Unknown mandatory parameter type.
Default Log Severity
Warning
Parameters
chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, pkt
Explanation
An unknown "mandatory" parameter type has been encountered; what RFC 4960 mentions as "highest-order bit types" 00 and 01 in Section 3.2.1, and roughly translates into "when unknown, ignore the remaining parameters of this chunk". While unknown, these types are typically carrying instructions to modify the interpretation of other parameters inside the same chunk.
Gateway Action
Abort
Action Description
None
Proposed Action
This log message is controlled by SCTPSettings:SCTPLogUnknownMandParam. How to handle these types of unknown parameters is controlled by SCTPSettings:SCTPUnknownMandParam and SCTPSettings:SCTPUnknownMandParamNotify.

2.40.134. [ID: 1171] Unknown mandatory parameter type

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Unknown mandatory parameter type.
Default Log Severity
Notice
Parameters
chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, pkt
Explanation
An unknown "mandatory" parameter type has been encountered; what RFC 4960 mentions as "highest-order bit types" 00 and 01 in Section 3.2.1, and roughly translates into "when unknown, ignore the remaining parameters of this chunk". While unknown, these types are typically carrying instructions to modify the interpretation of other parameters inside the same chunk.
Gateway Action
Allow
Action Description
None
Proposed Action
This log message is controlled by SCTPSettings:SCTPLogUnknownMandParam. How to handle these types of unknown parameters is controlled by SCTPSettings:SCTPUnknownMandParam and SCTPSettings:SCTPUnknownMandParamNotify.

2.40.135. [ID: 1166] Unknown mandatory parameter type

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Unknown mandatory parameter type.
Default Log Severity
Warning
Parameters
chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, pkt
Explanation
An unknown "mandatory" parameter type has been encountered; what RFC 4960 mentions as "highest-order bit types" 00 and 01 in Section 3.2.1, and roughly translates into "when unknown, ignore the remaining parameters of this chunk". While unknown, these types are typically carrying instructions to modify the interpretation of other parameters inside the same chunk.
Gateway Action
Drop
Action Description
None
Proposed Action
This log message is controlled by SCTPSettings:SCTPLogUnknownMandParam. How to handle these types of unknown parameters is controlled by SCTPSettings:SCTPUnknownMandParam and SCTPSettings:SCTPUnknownMandParamNotify.

2.40.136. [ID: 1186] Unknown mandatory parameter type

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Unknown mandatory parameter type.
Default Log Severity
Warning
Parameters
chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, pkt
Explanation
An unknown "mandatory" parameter type has been encountered; what RFC 4960 mentions as "highest-order bit types" 00 and 01 in Section 3.2.1, and roughly translates into "when unknown, ignore the remaining parameters of this chunk". While unknown, these types are typically carrying instructions to modify the interpretation of other parameters inside the same chunk.
Gateway Action
Strip
Action Description
None
Proposed Action
This log message is controlled by SCTPSettings:SCTPLogUnknownMandParam. How to handle these types of unknown parameters is controlled by SCTPSettings:SCTPUnknownMandParam and SCTPSettings:SCTPUnknownMandParamNotify.

2.40.137. [ID: 1248] Unknown optional chunk type

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Unknown optional chunk type.
Default Log Severity
Warning
Parameters
chunktype, flags, chunkindex, chunkoffset, chunklen, pkt
Explanation
An unknown "optional" chunk type has been encountered; what RFC 4960 mentions as "highest-order bit types" 10 and 11 in Section 3.2, and roughly translates into "when unknown, ignore chunk". While unknown, these types are typically carrying instructions to modify the SCTP association. Usually these instructions are not critical for the functionality of the association, though "type 11" is more likely to be of importance.
Gateway Action
Abort
Action Description
None
Proposed Action
This log message is controlled by SCTPSettings:SCTPLogUnknownOptChunk. How to handle these types of unknown chunks is controlled by SCTPSettings:SCTPUnknownOptChunk and SCTPSettings:SCTPUnknownOptChunkNotify.

2.40.138. [ID: 1180] Unknown optional chunk type

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Unknown optional chunk type.
Default Log Severity
Notice
Parameters
chunktype, flags, chunkindex, chunkoffset, chunklen, pkt
Explanation
An unknown "optional" chunk type has been encountered; what RFC 4960 mentions as "highest-order bit types" 10 and 11 in Section 3.2, and roughly translates into "when unknown, ignore chunk". While unknown, these types are typically carrying instructions to modify the SCTP association. Usually these instructions are not critical for the functionality of the association, though "type 11" is more likely to be of importance.
Gateway Action
Allow
Action Description
None
Proposed Action
This log message is controlled by SCTPSettings:SCTPLogUnknownOptChunk. How to handle these types of unknown chunks is controlled by SCTPSettings:SCTPUnknownOptChunk and SCTPSettings:SCTPUnknownOptChunkNotify.

2.40.139. [ID: 1172] Unknown optional chunk type

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Unknown optional chunk type.
Default Log Severity
Warning
Parameters
chunktype, flags, chunkindex, chunkoffset, chunklen, pkt
Explanation
An unknown "optional" chunk type has been encountered; what RFC 4960 mentions as "highest-order bit types" 10 and 11 in Section 3.2, and roughly translates into "when unknown, ignore chunk". While unknown, these types are typically carrying instructions to modify the SCTP association. Usually these instructions are not critical for the functionality of the association, though "type 11" is more likely to be of importance.
Gateway Action
Drop
Action Description
None
Proposed Action
This log message is controlled by SCTPSettings:SCTPLogUnknownOptChunk. How to handle these types of unknown chunks is controlled by SCTPSettings:SCTPUnknownOptChunk and SCTPSettings:SCTPUnknownOptChunkNotify.

2.40.140. [ID: 1175] Unknown optional chunk type

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Unknown optional chunk type.
Default Log Severity
Warning
Parameters
chunktype, flags, chunkindex, chunkoffset, chunklen, pkt
Explanation
An unknown "optional" chunk type has been encountered; what RFC 4960 mentions as "highest-order bit types" 10 and 11 in Section 3.2, and roughly translates into "when unknown, ignore chunk". While unknown, these types are typically carrying instructions to modify the SCTP association. Usually these instructions are not critical for the functionality of the association, though "type 11" is more likely to be of importance.
Gateway Action
Strip
Action Description
None
Proposed Action
This log message is controlled by SCTPSettings:SCTPLogUnknownOptChunk. How to handle these types of unknown chunks is controlled by SCTPSettings:SCTPUnknownOptChunk and SCTPSettings:SCTPUnknownOptChunkNotify.

2.40.141. [ID: 1214] Unknown optional parameter type

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Unknown optional parameter type.
Default Log Severity
Warning
Parameters
chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, pkt
Explanation
An unknown "optional" parameter type has been encountered; what RFC 4960 mentions as "highest-order bit types" 10 and 11 in Section 3.2.1, and roughly translates into "when unknown, ignore this parameter". While unknown, these types are typically carrying non-vital options for a chunk.
Gateway Action
Abort
Action Description
None
Proposed Action
This log message is controlled by SCTPSettings:SCTPLogUnknownOptParam. How to handle these types of unknown parameters is controlled by SCTPSettings:SCTPUnknownOptParam and SCTPSettings:SCTPUnknownOptParamNotify.

2.40.142. [ID: 1185] Unknown optional parameter type

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Unknown optional parameter type.
Default Log Severity
Notice
Parameters
chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, pkt
Explanation
An unknown "optional" parameter type has been encountered; what RFC 4960 mentions as "highest-order bit types" 10 and 11 in Section 3.2.1, and roughly translates into "when unknown, ignore this parameter". While unknown, these types are typically carrying non-vital options for a chunk.
Gateway Action
Allow
Action Description
None
Proposed Action
This log message is controlled by SCTPSettings:SCTPLogUnknownOptParam. How to handle these types of unknown parameters is controlled by SCTPSettings:SCTPUnknownOptParam and SCTPSettings:SCTPUnknownOptParamNotify.

2.40.143. [ID: 1182] Unknown optional parameter type

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Unknown optional parameter type.
Default Log Severity
Warning
Parameters
chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, pkt
Explanation
An unknown "optional" parameter type has been encountered; what RFC 4960 mentions as "highest-order bit types" 10 and 11 in Section 3.2.1, and roughly translates into "when unknown, ignore this parameter". While unknown, these types are typically carrying non-vital options for a chunk.
Gateway Action
Drop
Action Description
None
Proposed Action
This log message is controlled by SCTPSettings:SCTPLogUnknownOptParam. How to handle these types of unknown parameters is controlled by SCTPSettings:SCTPUnknownOptParam and SCTPSettings:SCTPUnknownOptParamNotify.

2.40.144. [ID: 1192] Unknown optional parameter type

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Unknown optional parameter type.
Default Log Severity
Warning
Parameters
chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, pkt
Explanation
An unknown "optional" parameter type has been encountered; what RFC 4960 mentions as "highest-order bit types" 10 and 11 in Section 3.2.1, and roughly translates into "when unknown, ignore this parameter". While unknown, these types are typically carrying non-vital options for a chunk.
Gateway Action
Strip
Action Description
None
Proposed Action
This log message is controlled by SCTPSettings:SCTPLogUnknownOptParam. How to handle these types of unknown parameters is controlled by SCTPSettings:SCTPUnknownOptParam and SCTPSettings:SCTPUnknownOptParamNotify.

2.40.145. [ID: 1169] Unknown supported address type

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Unknown supported address type.
Default Log Severity
Warning
Parameters
paramtype, pkt
Explanation
An unknown address type was found in the "supported address types" parameter. The packet may be broken.
Gateway Action
Allow
Action Description
None
Proposed Action
Unknown address types will be allowed if and only if SCTPSettings:SCTPUnknownAddressType allow this.

2.40.146. [ID: 1286] Unknown supported address type

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Unknown supported address type.
Default Log Severity
Warning
Parameters
paramtype, pkt
Explanation
An unknown address type was found in the "supported address types" parameter. The packet may be broken.
Gateway Action
Drop
Action Description
None
Proposed Action
Unknown address types will be allowed if and only if SCTPSettings:SCTPUnknownAddressType allow this.

2.40.147. [ID: 1179] Unknown supported address type

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Unknown supported address type.
Default Log Severity
Warning
Parameters
paramtype, pkt
Explanation
An unknown address type was found in the "supported address types" parameter. The packet may be broken.
Gateway Action
Strip
Action Description
None
Proposed Action
Unknown address types will be allowed if and only if SCTPSettings:SCTPUnknownAddressType allow this.

2.40.148. [ID: 1183] Unkown SCTP error cause

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Unkown SCTP error cause.
Default Log Severity
Notice
Parameters
iplen, offset, code, pkt
Explanation
The system does not recognize an error cause in the SCTP message. The body of the error cause will not be validated.
Gateway Action
Allow
Action Description
None
Proposed Action
None

2.40.149. [ID: 1747] Unresolved clash

Log Categories
SCTP,STATEFUL,HA
Log Message
Unresolved clash.
Default Log Severity
Critical
Parameters
assoc, rule
Explanation
The peer already has an existing association that partially overlaps the association assoc. The two associations have both been established in accordance with the policy of respective HA node, but the combination of the two over the HA cluster is not valid.
Gateway Action
Abort
Action Description
The node will try again
Proposed Action
Identify the two mutually exclusive associations, and manually resolve the situation. The peer is likely to have additional log messages. Consider rebooting one of the HA nodes.

2.40.150. [ID: 1745] Unresolved inconsistency

Log Categories
SCTP,STATEFUL,HA
Log Message
Unresolved inconsistency.
Default Log Severity
Notice
Parameters
assoc, rule
Explanation
Disallowed by peer, but allowed by the current node. This could occur temporarily when dynamic routes are involved.
Gateway Action
Ignore
Action Description
The node will try again
Proposed Action
None

2.40.151. [ID: 1746] Unresolved memory problem

Log Categories
SCTP,STATEFUL,HA
Log Message
Unresolved memory problem.
Default Log Severity
Warning
Parameters
assoc, rule
Explanation
Peer reported being unable to handle the synchronization attempt, likely because memory shortage.
Gateway Action
Ignore
Action Description
The node will try again, with decreased frequency
Proposed Action
Investigare the memory usage of the peer node, as well as periferal settings such as cache sizes. The peer is likely to have additional log messages. Consider making configuration changes in order to decrease the load.

2.40.152. [ID: 1744] Unresolved policies

Log Categories
SCTP,STATEFUL,HA
Log Message
Unresolved policies.
Default Log Severity
Warning
Parameters
assoc, rule
Explanation
Disallowed by peer, but allowed by the current node. The problem appears to be persistent.
Gateway Action
Ignore
Action Description
The node will try again, with decreased frequency
Proposed Action
Verify the the peer's configuration, and log messages.

2.40.153. [ID: 1208] Not supported address type

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
Not supported address type.
Default Log Severity
Notice
Parameters
paramtype, pkt
Explanation
An unsupported address type was found in the "supported address types" parameter.
Gateway Action
Strip
Action Description
None
Proposed Action
Whether an address type is considered unsupported or not depends primarily on the IP rule; address types used by the IP rule are supported, others are not. Any action on behalf of the unsupported address types will depend on SCTPSettings:SCTPMultihoming. The "host name address" type is a special case that is considered supported if and only if SCTPSettings:SCTPHostNameAddressParam is set to "Allow" this address type.

2.40.154. [ID: 1372] PPID whitelisted

Log Categories
SCTP,STATEFUL,VALIDATE
Log Message
PPID whitelisted.
Default Log Severity
Notice
Parameters
iplen, chunktype, chunkindex, chunkoffset, chunklen, ppid, pkt, assoc, rule
Explanation
The Payload Protocol Identifier of a DATA chunk is whitelisted by the SCTP service that is used by the IP rule that allows the traffic.
Gateway Action
Allow
Action Description
None
Proposed Action
Exclude the Payload Protocol Identifier from the whitelist of the SCTP service used if you want to disallow it.

2.40.155. [ID: 1300] State cookie parameter has zero for value

Log Categories
SCTP,STATELESS,VALIDATE
Log Message
State cookie parameter has zero for value.
Default Log Severity
Warning
Parameters
chunktype, chunkindex, chunkoffset, chunklen, paramtype, paramoffset, paramlen, pkt
Explanation
A state cookie parameter with zero for value was found within an INIT_ACK chunk.
Gateway Action
Drop
Action Description
None
Proposed Action
This packet is invalid. If the packet sender is one of your network devices, investigate why the unit is sending state cookie parameters with zero for value within INIT_ACK chunks.