2.50. TCP

These log messages refer to the TCP category.

2.50.1. [ID: 102] Ambiguous MSS announcement

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Ambiguous MSS announcement.
Default Log Severity
Warning
Parameters
old, new, effective, tcpopt, flow, user, userid
Explanation
The gateway has received several packets with the SYN flag set, on this flow. Not all of these packets announced the same Maximum Segment Size (MSS). The gateway will act as if the value of the parameter effective was announced in all packets that had the SYN flag set on this flow.
Gateway Action
Accept
Action Description
The gateway accepted the new MSS announcement as the new effective MSS for the flow
Proposed Action
None

2.50.2. [ID: 189] TCP MSS too high

Log Categories
TCP,STATELESS,VALIDATE
Log Message
TCP MSS too high.
Default Log Severity
Notice
Parameters
mss, max, tcpopt, setting, flow, pkt, user, userid
Explanation
The TCP packet announced a Maximum Segment Size (MSS) larger than the configured limit.
Gateway Action
Adjust
Action Description
None
Proposed Action
The setting TCPSettings:TCPMSSOnHigh controls how the gateway handles packets that announce a Maximum Segment Size (MSS) larger than the configured limit. The limit is configured in the setting TCPSettings:TCPMSSMax.

2.50.3. [ID: 393] TCP MSS too low

Log Categories
TCP,STATELESS,VALIDATE
Log Message
TCP MSS too low.
Default Log Severity
Notice
Parameters
mss, min, tcpopt, setting, flow, pkt, user, userid
Explanation
The TCP packet announced a Maximum Segment Size (MSS) less than the configured limit.
Gateway Action
Adjust
Action Description
None
Proposed Action
The setting TCPSettings:TCPMSSOnLow controls how the gateway handles packets that announce a Maximum Segment Size (MSS) less than the configured limit. The limit is configured in the setting TCPSettings:TCPMSSMin.

2.50.4. [ID: 591] Oversized TCP window

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Oversized TCP window.
Default Log Severity
Information
Parameters
windowsize, max, state, flow, pkt, user, userid
Explanation
The packet's announced receive window exceeded the configured limit. This event is only logged once per flow.
Gateway Action
Adjust
Action Description
The size of the announced receive window was lowered below the configured limit
Proposed Action
Window size limitation is controlled by two settings. The setting TCPSettings:TCPMaxWindow sets the actual limit and the setting TCPSettings:TCPOversizedWindow control's the action of the gateway when the limit is exceeded.

2.50.5. [ID: 416] Ambiguous SACK permission announced

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Ambiguous SACK permission announced.
Default Log Severity
Warning
Parameters
tcpopt, flow, user, userid
Explanation
The gateway has received several packets with the SYN flag set, on this flow. Some, but not all, of these packets granted the peer permission to send SACK options.
Gateway Action
Allow
Action Description
The gateway will allow packets with the SACK option from the peer on this flow-pair
Proposed Action
None

2.50.6. [ID: 307] Ambiguous SACK permission announced

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Ambiguous SACK permission announced.
Default Log Severity
Warning
Parameters
tcpopt, flow, user, userid
Explanation
The gateway has received several packets with the SYN flag set, on this flow. Some, but not all, of these packets granted the peer permission to send SACK options.
Gateway Action
Deny
Action Description
The gateway will drop packets with the SACK option from the peer on this flow-pair
Proposed Action
If this seems to cause problems, for instance, through packet drops generating "not negotiated option" logs pointing at the SACK option, then changing the setting TCPSettings:TCPOPT_SACK so that the gateway will strip the SACK option and there by disabling the use of SACK options could be used as a workaround.

2.50.7. [ID: 246] Ambiguous window scale negotiation

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Ambiguous window scale negotiation.
Default Log Severity
Warning
Parameters
tcpopt, flow, user, userid
Explanation
The gateway has received several packets with the SYN flag set, on this flow. Some, but not all, of these packets has proposed to use the window scale option.
Gateway Action
Disable
Action Description
The gateway will act as if the negotiation of window scale failed on this flow-pair. This means that it will not apply any shift count when processing the window information in subsequent packets. This will also affect the validation of sequence numbers since that depends on the window information
Proposed Action
If this seems to cause problems, for instance, with the sequence number validation, then changing the setting TCPSettings:TCPOPT_WSOPT so that the gateway will strip the Window Scale option and there by disabling the use of Window Scale options could be used as a workaround.

2.50.8. [ID: 551] Ambiguous window scale negotiation

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Ambiguous window scale negotiation.
Default Log Severity
Warning
Parameters
tcpopt, flow, user, userid
Explanation
The gateway has received several packets with the SYN flag set, on this flow. Some, but not all, of these packets has proposed to use the window scale option.
Gateway Action
Enable
Action Description
The gateway will act as if window scale was successfully negotiated on this flow-pair. This means that it will use the announced shift counts when processing the window information in subsequent packets. This will also affect the validation of sequence numbers since that depends on the window information
Proposed Action
None

2.50.9. [ID: 565] SACK block with invalid range

Log Categories
TCP,STATELESS,VALIDATE
Log Message
SACK block with invalid range.
Default Log Severity
Warning
Parameters
sackblock, tcpopt, flow, pkt, user, userid
Explanation
The TCP packet had a SACK option containing a block with an empty or inverted range, that is, a range that runs from a higher sequence number to a lower sequence number.
Gateway Action
Drop
Action Description
None
Proposed Action
Investigate the source of this erroneous packet.

2.50.10. [ID: 411] Resent SYN with mismatching window scale[...]

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Resent SYN with mismatching window scale proposal.
Default Log Severity
Warning
Parameters
new, effective, tcpopt, flow, pkt, user, userid
Explanation
The gateway has received a retransmission of a packet with the SYN flag set. The retransmitted packet announced a different Window Scale shift count than the original packet and is therefore dropped.
Gateway Action
Drop
Action Description
None
Proposed Action
If this seems to cause problems, then changing the setting TCPSettings:TCPOPT_WSOPT so that the gateway will strip the Window Scale option and there by disabling the use of Window Scale options could be used as a workaround.

2.50.11. [ID: 545] Disallowed flag set

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Disallowed flag set.
Default Log Severity
Warning
Parameters
flag, setting, flow, pkt, user, userid
Explanation
The TCP packet had an uncommon, unusual or poorly standardized flag set.
Gateway Action
Drop
Action Description
None
Proposed Action
Investigate the source of this strange packet. If the problem can't be fixed at the source then the gateway can be configured to either silently take action on such packets or just ignore them all together by modifying one of the settings TCPSettings:TCPUrg, TCPSettings:TCPECN or TCPSettings:TCPRF, depending on the flag in question. The parameter setting shows which of the settings that was applied to the packet.

2.50.12. [ID: 202] Bad TCP option length

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Bad TCP option length.
Default Log Severity
Warning
Parameters
tcpopt, len, expectlen, setting, flow, pkt, user, userid
Explanation
While parsing the TCP header an option with an invalid length, for that specific option type, was found.
Gateway Action
Drop
Action Description
None
Proposed Action
Investigate the source of this erroneous packet. If the problem can't be fixed at the source then the gateway's response to this event can be changed through the setting TCPSettings:TCPBadOptionLengths.

2.50.13. [ID: 596] TCP segment exceeds previous FIN

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
TCP segment exceeds previous FIN.
Default Log Severity
Warning
Parameters
seqno, max, flags, state, flow, pkt, user, userid
Explanation
The TCP packet ended at a higher sequence number than the sequence number assigned to the FIN flag by a previous packet. Since the FIN flag signals the end of the data stream, packets with higher sequence numbers should not occur. The parameter seqno contains the last sequence number transported in the segment and the parameter max contains the sequence number immediately before the previously received FIN.
Gateway Action
Drop
Action Description
None
Proposed Action
The setting TCPSettings:TCPSeqNumValidationMode controls how strictly the gateway validates sequence numbers.

2.50.14. [ID: 547] TCP FIN flag set without the ACK flag

Log Categories
TCP,STATELESS,VALIDATE
Log Message
TCP FIN flag set without the ACK flag.
Default Log Severity
Warning
Parameters
setting, flow, pkt, user, userid
Explanation
The TCP packet had the FIN flag set but the ACK flag cleared. This combination is normally invalid.
Gateway Action
Drop
Action Description
None
Proposed Action
The setting TCPSettings:TCPFinNoAck controls how the gateway handles packets with this flag combination.

2.50.15. [ID: 113] Disallowed flag combination

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Disallowed flag combination.
Default Log Severity
Warning
Parameters
goodflag, badflag, setting, flow, pkt, user, userid
Explanation
The TCP packet had an unusual, and normally invalid, flag combination set.
Gateway Action
Drop
Action Description
None
Proposed Action
Investigate the source of this erroneous packet. If the problem can't be fixed at the source then the gateway can be configured to either silently take action on such packets or just ignore them all together by modifying one of the settings TCPSettings:TCPSynUrg, TCPSettings:TCPSynPsh, TCPSettings:TCPSynRst, TCPSettings:TCPSynFin, TCPSettings:TCPRstFin or TCPSettings:TCPFinUrg, depending on which flag combination the packet had. The parameter setting shows which of the settings that was applied to the packet.

2.50.16. [ID: 388] Invalid TCP checksum

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Invalid TCP checksum.
Default Log Severity
Warning
Parameters
setting, flow, pkt, user, userid
Explanation
The packet's TCP checksum was invalid.
Gateway Action
Drop
Action Description
None
Proposed Action
TCP checksum verification is controlled by the setting TCPSettings:TCPChecksumVerification.

2.50.17. [ID: 359] Invalid TCP option length

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Invalid TCP option length.
Default Log Severity
Warning
Parameters
tcpopt, len, setting, flow, pkt, user, userid
Explanation
A TCP option with explicit length had an invalid length. No option with explicit length can be shorter than two bytes (one byte to indicate the kind of option and one byte to indicate the length).
Gateway Action
Drop
Action Description
None
Proposed Action
Investigate the source of this erroneous packet. If the problem can't be fixed at the source then the gateway's response to this event can be changed through the setting TCPSettings:TCPBadOptionLengths.

2.50.18. [ID: 139] Invalid reset sequence number in state SYN[...]

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Invalid reset sequence number in state SYN RECVD.
Default Log Severity
Warning
Parameters
seqno, min, max, flow, pkt, user, userid
Explanation
A reset packet was received from the originator of the connection before any SYN-ACK was received from the terminator side. Resets under these conditions are required to have a sequence number in close proximity to the sequence number of the SYN packet to be considered valid.
Gateway Action
Drop
Action Description
None
Proposed Action
Configuring the TCP sequence number validation in audit mode using the setting TCPSettings:TCPSeqNumValidationMode can be used as a workaround.

2.50.19. [ID: 187] TCP MSS too high

Log Categories
TCP,STATELESS,VALIDATE
Log Message
TCP MSS too high.
Default Log Severity
Warning
Parameters
mss, max, tcpopt, setting, flow, pkt, user, userid
Explanation
The TCP packet announced a Maximum Segment Size (MSS) larger than the configured limit.
Gateway Action
Drop
Action Description
None
Proposed Action
The setting TCPSettings:TCPMSSOnHigh controls how the gateway handles packets that announce a Maximum Segment Size (MSS) larger than the configured limit. The limit is configured in the setting TCPSettings:TCPMSSMax.

2.50.20. [ID: 312] TCP MSS too low

Log Categories
TCP,STATELESS,VALIDATE
Log Message
TCP MSS too low.
Default Log Severity
Warning
Parameters
mss, min, tcpopt, setting, flow, pkt, user, userid
Explanation
The TCP packet announced a Maximum Segment Size (MSS) less than the configured limit.
Gateway Action
Drop
Action Description
None
Proposed Action
The setting TCPSettings:TCPMSSOnLow controls how the gateway handles packets that announce a Maximum Segment Size (MSS) less than the configured limit. The limit is configured in the setting TCPSettings:TCPMSSMin.

2.50.21. [ID: 571] New acknowledgment in ICMP message

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
New acknowledgment in ICMP message.
Default Log Severity
Warning
Parameters
ackseqno, max, state, flow, pkt, user, userid
Explanation
The acknowledgment in an ICMP encapsulated TCP packet was higher than any acknowledgment processed on the flow.
Gateway Action
Drop
Action Description
None
Proposed Action
The gateway's response to this event is configured through the setting TCPSettings:TCPSeqNumValidationMode.

2.50.22. [ID: 375] Not forwarded sequence number in ICMP message

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Not forwarded sequence number in ICMP message.
Default Log Severity
Warning
Parameters
seqno, len, max, flow, pkt, user, userid
Explanation
The sequence number in an ICMP encapsulated TCP packet was higher than any sequence number processed on the flow.
Gateway Action
Drop
Action Description
None
Proposed Action
The gateway's response to this event is configured through the setting TCPSettings:TCPSeqNumValidationMode.

2.50.23. [ID: 456] Non-zero header padding

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Non-zero header padding.
Default Log Severity
Warning
Parameters
setting, flow, pkt, user, userid
Explanation
The padding between the option field and the end of the header was found to be non-zero. It is recommended to at least strip this information from the packet to prevent unfiltered data from being tunneled within the padding.
Gateway Action
Drop
Action Description
None
Proposed Action
The setting TCPSettings:TCPNonZeroHeaderPadding controls the gateway's behavior when non-zero header padding is found.

2.50.24. [ID: 493] SACK block announced data not sent

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
SACK block announced data not sent.
Default Log Severity
Warning
Parameters
sackblock, max, tcpopt, setting, flow, pkt, user, userid
Explanation
The SACK option in the packet announced that data not yet sent by the peer already had been received.
Gateway Action
Drop
Action Description
None
Proposed Action
The gateway's reaction to this event is controlled by the setting TCPSettings:TCPInconsistentSACK.

2.50.25. [ID: 447] TCP NULL packet

Log Categories
TCP,STATELESS,VALIDATE
Log Message
TCP NULL packet.
Default Log Severity
Warning
Parameters
setting, flow, pkt, user, userid
Explanation
The TCP packet had none of the flags SYN, FIN, RST or ACK set.
Gateway Action
Drop
Action Description
None
Proposed Action
Investigate the source of the packet and try to fix the problem there. Secondly, review the setting TCPSettings:TCPNULL which controls the gateway's behavior when receiving such packets.

2.50.26. [ID: 449] Non-first SACK block announced acknowledged[...]

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Non-first SACK block announced acknowledged data.
Default Log Severity
Warning
Parameters
sackblock, ackseqno, tcpopt, setting, flow, pkt, user, userid
Explanation
A non-first SACK block acknowledged data already acknowledged by the standard acknowledgment field in the header. Only the first SACK block is allowed to do that.
Gateway Action
Drop
Action Description
None
Proposed Action
The gateway's reaction to this event is controlled by the setting TCPSettings:TCPInconsistentSACK.

2.50.27. [ID: 437] Disallowed TCP option

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Disallowed TCP option.
Default Log Severity
Warning
Parameters
tcpopt, setting, flow, pkt, user, userid
Explanation
The packet contained an option of the kind indicated by the parameter tcpopt.
Gateway Action
Drop
Action Description
None
Proposed Action
The gateway's action when it finds an option of this type is controlled by the setting indicated by the parameter setting.

2.50.28. [ID: 173] SYN only option in non-SYN segment

Log Categories
TCP,STATELESS,VALIDATE
Log Message
SYN only option in non-SYN segment.
Default Log Severity
Warning
Parameters
tcpopt, setting, flow, pkt, user, userid
Explanation
A TCP option that only should occur in packets with the SYN flag set was found in a packet with the SYN flag cleared.
Gateway Action
Drop
Action Description
None
Proposed Action
Investigate the source of the packet and try to fix the problem there. If that is not possible then the gateway's behavior can be adjusted through the setting TCPSettings:TCPSynOptInNonSyn.

2.50.29. [ID: 373] TCP option length missing

Log Categories
TCP,STATELESS,VALIDATE
Log Message
TCP option length missing.
Default Log Severity
Warning
Parameters
tcpopt, setting, flow, pkt, user, userid
Explanation
A TCP option with explicit length was found at a position in the header such that the length information fell outside of the header.
Gateway Action
Drop
Action Description
None
Proposed Action
Investigate the source of this erroneous packet. If the problem can't be fixed at the source then the gateway's response to this event can be changed through the setting TCPSettings:TCPBadOptionLengths.

2.50.30. [ID: 182] Oversized TCP segment

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Oversized TCP segment.
Default Log Severity
Warning
Parameters
mss, datalen, hdrlen, state, flow, pkt, user, userid
Explanation
The packet exceeded the Maximum Segment Size (MSS) announced by the peer. If no MSS has been announced, an MSS of 536/1220 is assumed for TCP over IPv4/IPv6.
Gateway Action
Drop
Action Description
None
Proposed Action
The setting TCPSettings:TCPOversizedSegment controls if the gateway should check that the MSS is obeyed and what actions it should take when the MSS is exceeded.

2.50.31. [ID: 369] Oversized TCP window in ICMP message

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Oversized TCP window in ICMP message.
Default Log Severity
Warning
Parameters
windowsize, max, state, flow, pkt, user, userid
Explanation
The TCP window in the ICMP encapsulated packet exceeded the maximal window limit. This is erroneous since no packet that exceeded the limit has been forwarded.
Gateway Action
Drop
Action Description
None
Proposed Action
Window size limitation is controlled by two settings. The setting TCPSettings:TCPMaxWindow sets the actual limit and the setting TCPSettings:TCPOversizedWindow control's the action of the gateway when the limit is exceeded.

2.50.32. [ID: 227] TCP option does not fit in the header

Log Categories
TCP,STATELESS,VALIDATE
Log Message
TCP option does not fit in the header.
Default Log Severity
Warning
Parameters
tcpopt, len, avail, setting, flow, pkt, user, userid
Explanation
A TCP option with a length that exceeded the remaining part of the header was found in the packet.
Gateway Action
Drop
Action Description
None
Proposed Action
Investigate the source of this erroneous packet. If the problem can't be fixed at the source then the gateway's response to this event can be changed through the setting TCPSettings:TCPBadOptionLengths.

2.50.33. [ID: 200] Too high TCP sequence number

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Too high TCP sequence number.
Default Log Severity
Warning
Parameters
seqno, len, min, max, windowsize, gap, flags, state, flow, pkt, user, userid
Explanation
The sequence number in the TCP packet was above the receive window announced by the receiver of the packet. This is normally invalid and should not occur, however, there are a few exceptions, the primary exception being if the receiver recently has reduced it receive window.
Gateway Action
Drop
Action Description
None
Proposed Action
The gateway's response to this event is controlled by the setting TCPSettings:TCPSeqNumValidationMode.

2.50.34. [ID: 463] Too low FIN sequence number

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Too low FIN sequence number.
Default Log Severity
Warning
Parameters
seqno, min, state, flow, pkt, user, userid
Explanation
The packet had the FIN flag set but a sequence number that had already been used for data. The FIN flag is logically located at the end of the data stream and should have a previously unused sequence number.
Gateway Action
Drop
Action Description
None
Proposed Action
If this event occurs frequently and causes problems then configuring a non-strict sequence number validation mode in the setting TCPSettings:TCPSeqNumValidationMode can be used as a workaround.

2.50.35. [ID: 168] Too low TCP sequence number

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Too low TCP sequence number.
Default Log Severity
Warning
Parameters
seqno, len, min, max, windowsize, gap, flags, state, loglevel, value, flow, pkt, user, userid
Explanation
The sequence number in the TCP packet was below the receive window announced by the receiver of the packet. The reason for why this event occurs can be as simple as timing. When a receiver of a data stream receives the next part of the stream it will move its receive window forward. Gateways on the path between the sender and the receiver of the data stream will pick up this information before it reaches the sender. This mean that when the sender retransmits a segment it may fall within the receive window known to the sender but if the original segment in fact was received by the receiver then a new receive window announcement, that does not include the segment, may be on the way from the receiver to the sender. A gateway that picks up the new receive window announcement before the retransmitted segment will come to the conclusion that the segment's sequence number is too low.
Gateway Action
Drop
Action Description
None
Proposed Action
The setting TCPSettings:TCPSeqTooLowLogLevel is the tool that can be used to filter out normal/expected occurrences of this event. The configured log level is shown in the parameter loglevel and the parameter value holds the corresponding value for this packet. The gateway's response to this event is also controlled by the setting TCPSettings:TCPSeqNumValidationMode.

2.50.36. [ID: 103] Too low sequence number in ICMP message

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Too low sequence number in ICMP message.
Default Log Severity
Warning
Parameters
seqno, min, max, loglevel, value, flow, pkt, user, userid
Explanation
The sequence number in the TCP packet encapsulated in an ICMP message was below the receive window announced by the intended receiver of the encapsulated packet. Either the sequence number had already been acknowledged or it had never been used at all.
Gateway Action
Drop
Action Description
None
Proposed Action
The setting TCPSettings:TCPSeqNumValidationMode is the primary control of the gateway's response to this event. To filter out event caused by network conditions the setting TCPSettings:TCPSeqTooLowLogLevel also applies. The configured log level is shown in the parameter loglevel and the parameter value holds the corresponding value for this packet.

2.50.37. [ID: 145] Truncated TCP header encapsulated in ICMP[...]

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Truncated TCP header encapsulated in ICMP message.
Default Log Severity
Warning
Parameters
avail, hdrlen, setting, flow, pkt, user, userid
Explanation
Only a part of encapsulated packet's TCP header was available in the ICMP packet. The parameter avail shows how much of the encapsulated packet's IP payload that was available and the hdrlen holds the length of the TCP header.
Gateway Action
Drop
Action Description
None
Proposed Action
The setting TCPSettings:TCPTruncHeaderInICMP controls how the gateway handles ICMP packets with a truncated TCP header in the encapsulated packet.

2.50.38. [ID: 210] Too high TCP acknowledgment

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Too high TCP acknowledgment.
Default Log Severity
Warning
Parameters
ackseqno, max, gap, state, flow, pkt, user, userid
Explanation
The TCP acknowledgment in the packet announced that data not yet sent by the peer already had been received.
Gateway Action
Drop
Action Description
None
Proposed Action
The gateway's response to this event is configured through the setting TCPSettings:TCPSeqNumValidationMode.

2.50.39. [ID: 444] Unacceptable initial TCP acknowledgment

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Unacceptable initial TCP acknowledgment.
Default Log Severity
Warning
Parameters
ackseqno, min, max, state, flow, pkt, user, userid
Explanation
The first TCP acknowledgment received on the flow did not match the sequence numbers of the packets sent in the other direction.
Gateway Action
Drop
Action Description
None
Proposed Action
The gateway's response to this event is configured through the setting TCPSettings:TCPSeqNumValidationMode.

2.50.40. [ID: 217] Unused non-zero ACK

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Unused non-zero ACK.
Default Log Severity
Warning
Parameters
setting, flow, pkt, user, userid
Explanation
The acknowledgment field in the packet was set even though the ACK flag was cleared. It is recommended to at least strip this information from the packet to prevent unfiltered data from being tunneled within the acknowledgment field. Also, some operating systems reveal sequence number information this way, which can make it easier for intruders wanting to hijack established connections.
Gateway Action
Drop
Action Description
None
Proposed Action
The setting TCPSettings:TCPUnusedNonZeroAckField controls the gateway's behavior when an unused non-zero acknowledgment field is found.

2.50.41. [ID: 527] Unused non-zero urgent pointer

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Unused non-zero urgent pointer.
Default Log Severity
Warning
Parameters
setting, flow, pkt, user, userid
Explanation
The urgent pointer field in the packet was set even though the URG flag was cleared. It is recommended to at least strip this information from the packet to prevent unfiltered data from being tunneled within the urgent pointer field.
Gateway Action
Drop
Action Description
None
Proposed Action
The setting TCPSettings:TCPUnusedNonZeroUrgField controls the gateway's behavior when an unused non-zero urgent pointer field is found.

2.50.42. [ID: 538] Fragmented TCP header encapsulated in ICMP[...]

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Fragmented TCP header encapsulated in ICMP message.
Default Log Severity
Warning
Parameters
flow, pkt, user, userid
Explanation
An ICMP packet encapsulating a TCP packet was received. The TCP header in the encapsulated packet was split into several parts due to IP fragmentation. Either the ICMP packet was fragmented or the encapsulated TCP packet was a fragment. Either way, the fragmentation had to target an unreasonable low MTU for that to occur so the packet was considered invalid.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.50.43. [ID: 267] TCP header length exceeds IP payload length

Log Categories
TCP,STATELESS,VALIDATE
Log Message
TCP header length exceeds IP payload length.
Default Log Severity
Warning
Parameters
hdrlen, iplen, flow, pkt, user, userid
Explanation
The TCP header claimed to be larger than the size of the IP payload that it was contained within.
Gateway Action
Drop
Action Description
None
Proposed Action
Investigate the source of the packet and try to fix the problem there. If the problem can't be fixed at the source then the log message can be turned off by configuring the log receivers or turning the setting TCPSettings:TCPLogInvalidHeaderLen off.

2.50.44. [ID: 299] Ambiguous MSS announcement

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Ambiguous MSS announcement.
Default Log Severity
Warning
Parameters
old, new, effective, tcpopt, flow, user, userid
Explanation
The gateway has received several packets with the SYN flag set, on this flow. Not all of these packets announced the same Maximum Segment Size (MSS). The gateway will act as if the value of the parameter effective was announced in all packets that had the SYN flag set on this flow.
Gateway Action
Ignore
Action Description
The gateway ignored the new MSS announcement
Proposed Action
None

2.50.45. [ID: 258] Unexpected invalid FIN

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Unexpected invalid FIN.
Default Log Severity
Warning
Parameters
state, flow, pkt, user, userid
Explanation
A packet classified (internally) as having an unreliable sequence number also had the FIN flag set. This combination is not allowed in strict sequence number validation mode.
Gateway Action
Drop
Action Description
None
Proposed Action
If this event occurs frequently and causes problems then configuring a non-strict sequence number validation mode in the setting TCPSettings:TCPSeqNumValidationMode can be used as a workaround.

2.50.46. [ID: 561] Invalid TCP header length

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Invalid TCP header length.
Default Log Severity
Warning
Parameters
hdrlen, flow, pkt, user, userid
Explanation
The TCP packet's header length field claimed that the header was shorter than the minimal 20 bytes.
Gateway Action
Drop
Action Description
None
Proposed Action
Investigate the source of the packet and try to fix the problem there. If the problem can't be fixed at the source then the log message can be turned off by configuring the log receivers or turning the setting TCPSettings:TCPLogInvalidHeaderLen off.

2.50.47. [ID: 399] Window scale shift count exceeds 14

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Window scale shift count exceeds 14.
Default Log Severity
Warning
Parameters
value, tcpopt, flow, pkt, user, userid
Explanation
The packet was dropped since it contained a Window Scale option specifying an invalid (too large) shift count.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.50.48. [ID: 342] Suspicious flag set

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Suspicious flag set.
Default Log Severity
Notice
Parameters
flag, setting, flow, pkt, user, userid
Explanation
The TCP packet had an uncommon, unusual or poorly standardized flag set.
Gateway Action
None
Action Description
None
Proposed Action
Investigate the source of this strange packet. If the problem can't be fixed at the source then the gateway can be configured to either silently take action on such packets or just ignore them all together by modifying one of the settings TCPSettings:TCPUrg, TCPSettings:TCPECN or TCPSettings:TCPRF, depending on the flag in question. The parameter setting shows which of the settings that was applied to the packet.

2.50.49. [ID: 320] TCP segment exceeds previous FIN

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
TCP segment exceeds previous FIN.
Default Log Severity
Notice
Parameters
seqno, max, flags, state, flow, pkt, user, userid
Explanation
The TCP packet ended at a higher sequence number than the sequence number assigned to the FIN flag by a previous packet. Since the FIN flag signals the end of the data stream, packets with higher sequence numbers should not occur. The parameter seqno contains the last sequence number transported in the segment and the parameter max contains the sequence number immediately before the previously received FIN.
Gateway Action
None
Action Description
None
Proposed Action
The setting TCPSettings:TCPSeqNumValidationMode controls how strictly the gateway validates sequence numbers.

2.50.50. [ID: 468] TCP FIN flag set without the ACK flag

Log Categories
TCP,STATELESS,VALIDATE
Log Message
TCP FIN flag set without the ACK flag.
Default Log Severity
Notice
Parameters
setting, flow, pkt, user, userid
Explanation
The TCP packet had the FIN flag set but the ACK flag cleared. This combination is normally invalid.
Gateway Action
None
Action Description
None
Proposed Action
The setting TCPSettings:TCPFinNoAck controls how the gateway handles packets with this flag combination.

2.50.51. [ID: 504] Suspicious flag combination

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Suspicious flag combination.
Default Log Severity
Notice
Parameters
goodflag, badflag, setting, flow, pkt, user, userid
Explanation
The TCP packet had an unusual, and normally invalid, flag combination set.
Gateway Action
None
Action Description
None
Proposed Action
Investigate the source of this erroneous packet. If the problem can't be fixed at the source then the gateway can be configured to either silently take action on such packets or just ignore them all together by modifying one of the settings TCPSettings:TCPSynUrg, TCPSettings:TCPSynPsh, TCPSettings:TCPSynRst, TCPSettings:TCPSynFin, TCPSettings:TCPRstFin or TCPSettings:TCPFinUrg, depending on which flag combination the packet had. The parameter setting shows which of the settings that was applied to the packet.

2.50.52. [ID: 218] TCP MSS exceeds log level

Log Categories
TCP,STATELESS,VALIDATE
Log Message
TCP MSS exceeds log level.
Default Log Severity
Notice
Parameters
mss, loglevel, tcpopt, setting, flow, pkt, user, userid
Explanation
The TCP packet announced a Maximum Segment Size (MSS) larger than the configured log level.
Gateway Action
None
Action Description
None
Proposed Action
The log level is configured in the setting TCPSettings:TCPMSSLogLevel.

2.50.53. [ID: 270] Invalid TCP checksum

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Invalid TCP checksum.
Default Log Severity
Notice
Parameters
setting, flow, pkt, user, userid
Explanation
The packet's TCP checksum was invalid.
Gateway Action
None
Action Description
None
Proposed Action
TCP checksum verification is controlled by the setting TCPSettings:TCPChecksumVerification.

2.50.54. [ID: 147] Invalid reset sequence number in state SYN[...]

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Invalid reset sequence number in state SYN RECVD.
Default Log Severity
Notice
Parameters
seqno, min, max, flow, pkt, user, userid
Explanation
A reset packet was received from the originator of the connection before any SYN-ACK was received from the terminator side. Resets under these conditions are required to have a sequence number in close proximity to the sequence number of the SYN packet to be considered valid.
Gateway Action
None
Action Description
None
Proposed Action
Logging of this event can be configured with the setting TCPSettings:TCPSeqNumValidationMode.

2.50.55. [ID: 209] TCP MSS too high

Log Categories
TCP,STATELESS,VALIDATE
Log Message
TCP MSS too high.
Default Log Severity
Notice
Parameters
mss, max, tcpopt, setting, flow, pkt, user, userid
Explanation
The TCP packet announced a Maximum Segment Size (MSS) larger than the configured limit.
Gateway Action
None
Action Description
None
Proposed Action
The setting TCPSettings:TCPMSSOnHigh controls how the gateway handles packets that announce a Maximum Segment Size (MSS) larger than the configured limit. The limit is configured in the setting TCPSettings:TCPMSSMax.

2.50.56. [ID: 215] TCP MSS too low

Log Categories
TCP,STATELESS,VALIDATE
Log Message
TCP MSS too low.
Default Log Severity
Notice
Parameters
mss, min, tcpopt, setting, flow, pkt, user, userid
Explanation
The TCP packet announced a Maximum Segment Size (MSS) less than the configured limit.
Gateway Action
None
Action Description
None
Proposed Action
The setting TCPSettings:TCPMSSOnLow controls how the gateway handles packets that announce a Maximum Segment Size (MSS) less than the configured limit. The limit is configured in the setting TCPSettings:TCPMSSMin.

2.50.57. [ID: 592] New acknowledgment in ICMP message

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
New acknowledgment in ICMP message.
Default Log Severity
Notice
Parameters
ackseqno, max, state, flow, pkt, user, userid
Explanation
The acknowledgment in an ICMP encapsulated TCP packet was higher than any acknowledgment processed on the flow.
Gateway Action
None
Action Description
None
Proposed Action
The gateway's response to this event is configured through the setting TCPSettings:TCPSeqNumValidationMode.

2.50.58. [ID: 353] Not forwarded sequence number in ICMP message

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Not forwarded sequence number in ICMP message.
Default Log Severity
Notice
Parameters
seqno, len, max, flow, pkt, user, userid
Explanation
The sequence number in an ICMP encapsulated TCP packet was higher than any sequence number processed on the flow.
Gateway Action
None
Action Description
None
Proposed Action
The gateway's response to this event is configured through the setting TCPSettings:TCPSeqNumValidationMode.

2.50.59. [ID: 169] Non-zero header padding

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Non-zero header padding.
Default Log Severity
Notice
Parameters
setting, flow, pkt, user, userid
Explanation
The padding between the option field and the end of the header was found to be non-zero. It is recommended to at least strip this information from the packet to prevent unfiltered data from being tunneled within the padding.
Gateway Action
None
Action Description
None
Proposed Action
The setting TCPSettings:TCPNonZeroHeaderPadding controls the gateway's behavior when non-zero header padding is found.

2.50.60. [ID: 484] SACK block announced data not sent

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
SACK block announced data not sent.
Default Log Severity
Notice
Parameters
sackblock, max, tcpopt, setting, flow, pkt, user, userid
Explanation
The SACK option in the packet announced that data not yet sent by the peer already had been received.
Gateway Action
None
Action Description
None
Proposed Action
The gateway's reaction to this event is controlled by the setting TCPSettings:TCPInconsistentSACK.

2.50.61. [ID: 257] TCP NULL packet

Log Categories
TCP,STATELESS,VALIDATE
Log Message
TCP NULL packet.
Default Log Severity
Notice
Parameters
setting, flow, pkt, user, userid
Explanation
The TCP packet had none of the flags SYN, FIN, RST or ACK set.
Gateway Action
None
Action Description
None
Proposed Action
Investigate the source of the packet and try to fix the problem there. Secondly, review the setting TCPSettings:TCPNULL which controls the gateway's behavior when receiving such packets.

2.50.62. [ID: 345] Non-first SACK block announced acknowledged[...]

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Non-first SACK block announced acknowledged data.
Default Log Severity
Notice
Parameters
sackblock, ackseqno, tcpopt, setting, flow, pkt, user, userid
Explanation
A non-first SACK block acknowledged data already acknowledged by the standard acknowledgment field in the header. Only the first SACK block is allowed to do that.
Gateway Action
None
Action Description
None
Proposed Action
The gateway's reaction to this event is controlled by the setting TCPSettings:TCPInconsistentSACK.

2.50.63. [ID: 614] TCP option

Log Categories
TCP,STATELESS,VALIDATE
Log Message
TCP option.
Default Log Severity
Notice
Parameters
tcpopt, setting, flow, pkt, user, userid
Explanation
The packet contained an option of the kind indicated by the parameter tcpopt.
Gateway Action
None
Action Description
None
Proposed Action
The gateway's action when it finds an option of this type is controlled by the setting indicated by the parameter setting.

2.50.64. [ID: 366] SYN only option in non-SYN segment

Log Categories
TCP,STATELESS,VALIDATE
Log Message
SYN only option in non-SYN segment.
Default Log Severity
Notice
Parameters
tcpopt, setting, flow, pkt, user, userid
Explanation
A TCP option that only should occur in packets with the SYN flag set was found in a packet with the SYN flag cleared.
Gateway Action
None
Action Description
None
Proposed Action
Investigate the source of the packet and try to fix the problem there. If that is not possible then the gateway's behavior can be adjusted through the setting TCPSettings:TCPSynOptInNonSyn.

2.50.65. [ID: 181] Oversized TCP segment

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Oversized TCP segment.
Default Log Severity
Notice
Parameters
mss, datalen, hdrlen, state, flow, pkt, user, userid
Explanation
The packet exceeded the Maximum Segment Size (MSS) announced by the peer. If no MSS has been announced, an MSS of 536/1220 is assumed for TCP over IPv4/IPv6.
Gateway Action
None
Action Description
None
Proposed Action
The setting TCPSettings:TCPOversizedSegment controls if the gateway should check that the MSS is obeyed and what actions it should take when the MSS is exceeded.

2.50.66. [ID: 199] Oversized TCP window

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Oversized TCP window.
Default Log Severity
Information
Parameters
windowsize, max, state, flow, pkt, user, userid
Explanation
The packet's announced receive window exceeded the configured limit. This event is only logged once per flow.
Gateway Action
None
Action Description
None
Proposed Action
Window size limitation is controlled by two settings. The setting TCPSettings:TCPMaxWindow sets the actual limit and the setting TCPSettings:TCPOversizedWindow control's the action of the gateway when the limit is exceeded.

2.50.67. [ID: 461] Too high TCP sequence number

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Too high TCP sequence number.
Default Log Severity
Notice
Parameters
seqno, len, min, max, windowsize, gap, flags, state, flow, pkt, user, userid
Explanation
The sequence number in the TCP packet was above the receive window announced by the receiver of the packet. This is normally invalid and should not occur, however, there are a few exceptions, the primary exception being if the receiver recently has reduced it receive window.
Gateway Action
None
Action Description
None
Proposed Action
The gateway's response to this event is controlled by the setting TCPSettings:TCPSeqNumValidationMode.

2.50.68. [ID: 207] Too low FIN sequence number

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Too low FIN sequence number.
Default Log Severity
Notice
Parameters
seqno, min, state, flow, pkt, user, userid
Explanation
The packet had the FIN flag set but a sequence number that had already been used for data. The FIN flag is logically located at the end of the data stream and should have a previously unused sequence number.
Gateway Action
None
Action Description
None
Proposed Action
If this event occurs frequently and causes problems then configuring a non-strict sequence number validation mode in the setting TCPSettings:TCPSeqNumValidationMode can be used as a workaround.

2.50.69. [ID: 420] Too low TCP sequence number

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Too low TCP sequence number.
Default Log Severity
Notice
Parameters
seqno, len, min, max, windowsize, gap, flags, state, loglevel, value, flow, pkt, user, userid
Explanation
The sequence number in the TCP packet was below the receive window announced by the receiver of the packet. The reason for why this event occurs can be as simple as timing. When a receiver of a data stream receives the next part of the stream it will move its receive window forward. Gateways on the path between the sender and the receiver of the data stream will pick up this information before it reaches the sender. This mean that when the sender retransmits a segment it may fall within the receive window known to the sender but if the original segment in fact was received by the receiver then a new receive window announcement, that does not include the segment, may be on the way from the receiver to the sender. A gateway that picks up the new receive window announcement before the retransmitted segment will come to the conclusion that the segment's sequence number is too low.
Gateway Action
None
Action Description
None
Proposed Action
The setting TCPSettings:TCPSeqTooLowLogLevel is the tool that can be used to filter out normal/expected occurrences of this event. The configured log level is shown in the parameter loglevel and the parameter value holds the corresponding value for this packet. The gateway's response to this event is also controlled by the setting TCPSettings:TCPSeqNumValidationMode.

2.50.70. [ID: 601] Too low sequence number in ICMP message

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Too low sequence number in ICMP message.
Default Log Severity
Notice
Parameters
seqno, min, max, loglevel, value, flow, pkt, user, userid
Explanation
The sequence number in the TCP packet encapsulated in an ICMP message was below the receive window announced by the intended receiver of the encapsulated packet. Either the sequence number had already been acknowledged or it had never been used at all.
Gateway Action
None
Action Description
None
Proposed Action
The setting TCPSettings:TCPSeqNumValidationMode is the primary control of the gateway's response to this event. To filter out event caused by network conditions the setting TCPSettings:TCPSeqTooLowLogLevel also applies. The configured log level is shown in the parameter loglevel and the parameter value holds the corresponding value for this packet.

2.50.71. [ID: 560] Truncated TCP header encapsulated in ICMP[...]

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Truncated TCP header encapsulated in ICMP message.
Default Log Severity
Notice
Parameters
avail, hdrlen, setting, flow, pkt, user, userid
Explanation
Only a part of encapsulated packet's TCP header was available in the ICMP packet. The parameter avail shows how much of the encapsulated packet's IP payload that was available and the hdrlen holds the length of the TCP header.
Gateway Action
None
Action Description
None
Proposed Action
The setting TCPSettings:TCPTruncHeaderInICMP controls how the gateway handles ICMP packets with a truncated TCP header in the encapsulated packet.

2.50.72. [ID: 498] Too high TCP acknowledgment

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Too high TCP acknowledgment.
Default Log Severity
Notice
Parameters
ackseqno, max, gap, state, flow, pkt, user, userid
Explanation
The TCP acknowledgment in the packet announced that data not yet sent by the peer already had been received.
Gateway Action
None
Action Description
None
Proposed Action
The gateway's response to this event is configured through the setting TCPSettings:TCPSeqNumValidationMode.

2.50.73. [ID: 479] Unacceptable initial TCP acknowledgment

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Unacceptable initial TCP acknowledgment.
Default Log Severity
Notice
Parameters
ackseqno, min, max, state, flow, pkt, user, userid
Explanation
The first TCP acknowledgment received on the flow did not match the sequence numbers of the packets sent in the other direction.
Gateway Action
None
Action Description
None
Proposed Action
The gateway's response to this event is configured through the setting TCPSettings:TCPSeqNumValidationMode.

2.50.74. [ID: 541] Unused non-zero ACK

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Unused non-zero ACK.
Default Log Severity
Notice
Parameters
setting, flow, pkt, user, userid
Explanation
The acknowledgment field in the packet was set even though the ACK flag was cleared. It is recommended to at least strip this information from the packet to prevent unfiltered data from being tunneled within the acknowledgment field. Also, some operating systems reveal sequence number information this way, which can make it easier for intruders wanting to hijack established connections.
Gateway Action
None
Action Description
None
Proposed Action
The setting TCPSettings:TCPUnusedNonZeroAckField controls the gateway's behavior when an unused non-zero acknowledgment field is found.

2.50.75. [ID: 337] Unused non-zero urgent pointer

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Unused non-zero urgent pointer.
Default Log Severity
Notice
Parameters
setting, flow, pkt, user, userid
Explanation
The urgent pointer field in the packet was set even though the URG flag was cleared. It is recommended to at least strip this information from the packet to prevent unfiltered data from being tunneled within the urgent pointer field.
Gateway Action
None
Action Description
None
Proposed Action
The setting TCPSettings:TCPUnusedNonZeroUrgField controls the gateway's behavior when an unused non-zero urgent pointer field is found.

2.50.76. [ID: 335] Multiple TCP options of the same kind

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Multiple TCP options of the same kind.
Default Log Severity
Warning
Parameters
tcpopt, flow, pkt, user, userid
Explanation
The packet contained more than one TCP option of a type that should not occur more than once in a packet.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.50.77. [ID: 250] No new flow for this packet

Log Categories
TCP,STATELESS,VALIDATE
Log Message
No new flow for this packet.
Default Log Severity
Notice
Parameters
pkt
Explanation
No flow matched the TCP packet and the packet was not a plain-SYN so it was not allowed to setup a new flow.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.50.78. [ID: 252] TCP option not negotiated

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
TCP option not negotiated.
Default Log Severity
Warning
Parameters
tcpopt, flow, pkt, user, userid
Explanation
Some TCP options must be negotiated during the handshake before they can be used. The dropped packet contained such an option, as indicated by the parameter tcpopt, but that option had not been negotiated on the flow.
Gateway Action
Drop
Action Description
None
Proposed Action
If this event is triggered frequently then the gateway can be configured to silently strip the type of option that is causing the problem as a workaround while the problem is investigated and resolved. Stripping options is controlled the TCPOPT_* settings.

2.50.79. [ID: 381] SACK option without the ACK flag set

Log Categories
TCP,STATELESS,VALIDATE
Log Message
SACK option without the ACK flag set.
Default Log Severity
Warning
Parameters
tcpopt, flow, pkt, user, userid
Explanation
The packet contained a SACK option without having the ACK flag set.
Gateway Action
Drop
Action Description
None
Proposed Action
None

2.50.80. [ID: 1011] New TCP flow denied

Log Categories
TCP,STATELESS,FLOW
Log Message
New TCP flow denied.
Default Log Severity
Notice
Parameters
pkt
Explanation
The configured stateless IP rule does only allow existing TCP streams to setup new flows.
Gateway Action
Drop
Action Description
None
Proposed Action
To allow new TCP streams, the IP rule's StatelessAllowNewTCP setting must be changed.

2.50.81. [ID: 208] Disallowed flag set

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Disallowed flag set.
Default Log Severity
Notice
Parameters
flag, setting, flow, pkt, user, userid
Explanation
The TCP packet had an uncommon, unusual or poorly standardized flag set.
Gateway Action
Strip
Action Description
The flag indicated by the parameter flag was stripped from the packet
Proposed Action
Investigate the source of this strange packet. If the problem can't be fixed at the source then the gateway can be configured to either silently take action on such packets or just ignore them all together by modifying one of the settings TCPSettings:TCPUrg, TCPSettings:TCPECN or TCPSettings:TCPRF, depending on the flag in question. The parameter setting shows which of the settings that was applied to the packet.

2.50.82. [ID: 491] Bad TCP option length

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Bad TCP option length.
Default Log Severity
Notice
Parameters
tcpopt, len, expectlen, setting, flow, pkt, user, userid
Explanation
While parsing the TCP header an option with an invalid length, for that specific option type, was found.
Gateway Action
Strip
Action Description
The broken option and any other options following the broken option were removed from the packet
Proposed Action
Investigate the source of this erroneous packet. If the problem can't be fixed at the source then the gateway's response to this event can be changed through the setting TCPSettings:TCPBadOptionLengths.

2.50.83. [ID: 322] Disallowed flag combination

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Disallowed flag combination.
Default Log Severity
Notice
Parameters
goodflag, badflag, setting, flow, pkt, user, userid
Explanation
The TCP packet had an unusual, and normally invalid, flag combination set.
Gateway Action
Strip
Action Description
The flag indicated by badflag was stripped from the packet
Proposed Action
Investigate the source of this erroneous packet. If the problem can't be fixed at the source then the gateway can be configured to either silently take action on such packets or just ignore them all together by modifying one of the settings TCPSettings:TCPSynUrg, TCPSettings:TCPSynPsh, TCPSettings:TCPSynRst, TCPSettings:TCPSynFin, TCPSettings:TCPRstFin or TCPSettings:TCPFinUrg, depending on which flag combination the packet had. The parameter setting shows which of the settings that was applied to the packet.

2.50.84. [ID: 329] Invalid TCP option length

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Invalid TCP option length.
Default Log Severity
Notice
Parameters
tcpopt, len, setting, flow, pkt, user, userid
Explanation
A TCP option with explicit length had an invalid length. No option with explicit length can be shorter than two bytes (one byte to indicate the kind of option and one byte to indicate the length).
Gateway Action
Strip
Action Description
None
Proposed Action
Investigate the source of this erroneous packet. If the problem can't be fixed at the source then the gateway's response to this event can be changed through the setting TCPSettings:TCPBadOptionLengths.

2.50.85. [ID: 241] Non-zero header padding

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Non-zero header padding.
Default Log Severity
Notice
Parameters
setting, flow, pkt, user, userid
Explanation
The padding between the option field and the end of the header was found to be non-zero. It is recommended to at least strip this information from the packet to prevent unfiltered data from being tunneled within the padding.
Gateway Action
Strip
Action Description
None
Proposed Action
The setting TCPSettings:TCPNonZeroHeaderPadding controls the gateway's behavior when non-zero header padding is found.

2.50.86. [ID: 352] SACK block announced data not sent

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
SACK block announced data not sent.
Default Log Severity
Notice
Parameters
sackblock, max, tcpopt, setting, flow, pkt, user, userid
Explanation
The SACK option in the packet announced that data not yet sent by the peer already had been received.
Gateway Action
Strip
Action Description
The whole SACK option is removed from the packet
Proposed Action
The gateway's reaction to this event is controlled by the setting TCPSettings:TCPInconsistentSACK.

2.50.87. [ID: 581] Non-first SACK block announced acknowledged[...]

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Non-first SACK block announced acknowledged data.
Default Log Severity
Notice
Parameters
sackblock, ackseqno, tcpopt, setting, flow, pkt, user, userid
Explanation
A non-first SACK block acknowledged data already acknowledged by the standard acknowledgment field in the header. Only the first SACK block is allowed to do that.
Gateway Action
Strip
Action Description
The whole SACK option is removed from the packet
Proposed Action
The gateway's reaction to this event is controlled by the setting TCPSettings:TCPInconsistentSACK.

2.50.88. [ID: 253] Disallowed TCP option

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Disallowed TCP option.
Default Log Severity
Notice
Parameters
tcpopt, setting, flow, pkt, user, userid
Explanation
The packet contained an option of the kind indicated by the parameter tcpopt.
Gateway Action
Strip
Action Description
None
Proposed Action
The gateway's action when it finds an option of this type is controlled by the setting indicated by the parameter setting.

2.50.89. [ID: 391] SYN only option in non-SYN segment

Log Categories
TCP,STATELESS,VALIDATE
Log Message
SYN only option in non-SYN segment.
Default Log Severity
Notice
Parameters
tcpopt, setting, flow, pkt, user, userid
Explanation
A TCP option that only should occur in packets with the SYN flag set was found in a packet with the SYN flag cleared.
Gateway Action
Strip
Action Description
None
Proposed Action
Investigate the source of the packet and try to fix the problem there. If that is not possible then the gateway's behavior can be adjusted through the setting TCPSettings:TCPSynOptInNonSyn.

2.50.90. [ID: 194] TCP option length missing

Log Categories
TCP,STATELESS,VALIDATE
Log Message
TCP option length missing.
Default Log Severity
Notice
Parameters
tcpopt, setting, flow, pkt, user, userid
Explanation
A TCP option with explicit length was found at a position in the header such that the length information fell outside of the header.
Gateway Action
Strip
Action Description
The broken option was removed from the packet
Proposed Action
Investigate the source of this erroneous packet. If the problem can't be fixed at the source then the gateway's response to this event can be changed through the setting TCPSettings:TCPBadOptionLengths.

2.50.91. [ID: 351] TCP option does not fit in the header

Log Categories
TCP,STATELESS,VALIDATE
Log Message
TCP option does not fit in the header.
Default Log Severity
Notice
Parameters
tcpopt, len, avail, setting, flow, pkt, user, userid
Explanation
A TCP option with a length that exceeded the remaining part of the header was found in the packet.
Gateway Action
Strip
Action Description
The broken option was removed from the packet.
Proposed Action
Investigate the source of this erroneous packet. If the problem can't be fixed at the source then the gateway's response to this event can be changed through the setting TCPSettings:TCPBadOptionLengths.

2.50.92. [ID: 429] Unused non-zero ACK

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Unused non-zero ACK.
Default Log Severity
Notice
Parameters
setting, flow, pkt, user, userid
Explanation
The acknowledgment field in the packet was set even though the ACK flag was cleared. It is recommended to at least strip this information from the packet to prevent unfiltered data from being tunneled within the acknowledgment field. Also, some operating systems reveal sequence number information this way, which can make it easier for intruders wanting to hijack established connections.
Gateway Action
Strip
Action Description
The acknowledgment field was set to zero
Proposed Action
The setting TCPSettings:TCPUnusedNonZeroAckField controls the gateway's behavior when an unused non-zero acknowledgment field is found.

2.50.93. [ID: 245] Unused non-zero urgent pointer

Log Categories
TCP,STATELESS,VALIDATE
Log Message
Unused non-zero urgent pointer.
Default Log Severity
Notice
Parameters
setting, flow, pkt, user, userid
Explanation
The urgent pointer field in the packet was set even though the URG flag was cleared. It is recommended to at least strip this information from the packet to prevent unfiltered data from being tunneled within the urgent pointer field.
Gateway Action
Strip
Action Description
The urgent pointer field was set to zero
Proposed Action
The setting TCPSettings:TCPUnusedNonZeroUrgField controls the gateway's behavior when an unused non-zero urgent pointer field is found.

2.50.94. [ID: 188] Unexpected TCP flags

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Unexpected TCP flags.
Default Log Severity
Warning
Parameters
flags, state, flow, pkt, user, userid
Explanation
The TCP packet had a TCP flag set that is not expected to be set in the current state of the TCP connection.
Gateway Action
Drop
Action Description
None
Proposed Action
This log message can be turned off by the setting TCPSettings:TCPLogStateViolations.

2.50.95. [ID: 433] Unexpected SYN packet

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
Unexpected SYN packet.
Default Log Severity
Warning
Parameters
seqno, origseqno, flags, offset, state, flow, pkt, user, userid
Explanation
The TCP packet's combination of sequence number and SYN flag or the mere existence of the SYN flag was unexpected in the current state of the TCP connection. There are several reasons why this event can occur. The first is that a handshake packet has be retransmitted even though it was not necessary to establish the connection and then been delayed more than most other packets on the connection. In this case the parameters seqno and origseqno should match. If the ACK flag is not set, according to the flags parameter, then it could be an attempt to setup a new connection before the flow state belonging to a previous connection has timed out. Such an attempt is only valid if either the old connection has been torn down or if it never was properly established. The parameter state should give an indication of the state of the old connection. SYN_RECVD, FIN_RCVD and TIME_WAIT are valid connection states for reopening the flow state. The packet could also be an indication of a broken device or be a part of some network scan or some other malicious activity.
Gateway Action
Drop
Action Description
None
Proposed Action
If this appears to be an attempt to setup a new connection while the flow state of a previous connection still exists then consider changing the setting TCPSettings:TCPAllowReopen to allow the flow state to be reopened/reused. The parameter offset is intended as an aid in deciding whether to allow any sequence number to reopen the flow state or just those that are higher than the sequence numbers used on the old connection. If the offset is greater than zero then it should be sufficient to only allow higher sequence numbers otherwise any sequence number must be allowed, to have the intended effect. If allowing flow states to be reopened is not an option then an alternative solution is to reduce the idle lifetime for TCP flow states during setup and/or tear-down to make it less likely that the same connection will be reused before the flow state has timed out. However, reducing the idle lifetimes too much can cause other problems, for instance, with connection establishment. This log message can be turned off by the setting TCPSettings:TCPLogStateViolations.

2.50.96. [ID: 510] TCP state tracking requires stricter[...]

Log Categories
TCP,STATEFUL
Log Message
TCP state tracking requires stricter validation.
Default Log Severity
Error
Parameters
setting, min
Explanation
The implementation of the TCP state tracking assumes that certain strange packets are handled during validation. The current configuration breaks that assumption and is therefore not supported.
Gateway Action
None
Action Description
None
Proposed Action
Change the configuration to comply and report this error to the vendor's support organization. If you need to use the current settings then TCP state tracking must be disabled and the traffic forwarded using only some lighter validation.

2.50.97. [ID: 293] TCP window shrinking

Log Categories
TCP,STATEFUL,VALIDATE
Log Message
TCP window shrinking.
Default Log Severity
Information
Parameters
old, new, gap, flags, ackseqno, state, flow, pkt, user, userid
Explanation
A new receive window was announced on the flow. However, the previous receive window announcement accepted higher sequence numbers than the new one. This means that the sender of this segment has revoked previous claims that it is willing to accept a certain range of sequence numbers. This is discouraged behavior and could be causing packet drops due to too high sequence number. The parameter gap contains the size of the sequence number range which is no longer announced as part of the receive window.
Gateway Action
None
Action Description
None
Proposed Action
None