Using the SonicOS Log Event Reference Guide

advertisement
Using the SonicOS Log Event Reference
Guide
This reference guide lists and describes SonicOS log event messages. Reference a log event
message by using the alphabetical index of log event messages.
This document contains the following sections:
• “Log > View” section on page 2
•
“Log > Categories” section on page 5
•
“Log > Syslog” section on page 9
•
“Log > Automation” section on page 10
•
“Log > Name Resolution” section on page 14
•
“Log > Reports” section on page 16
•
“Log > ViewPoint” section on page 17
•
“Index of Log Event Messages” section on page 19
•
“Index of Syslog Tag Field Description” section on page 57
SonicOS Log Event Reference Guide
1
Log > View
Log > View
The SonicWALL security appliance maintains an Event log for tracking potential security
threats. This log can be viewed in the Log > View page, or it can be automatically sent to an
e-mail address for convenience and archiving. The log is displayed in a table and can be sorted
by column.
The SonicWALL security appliance can alert you of important events, such as an attack to the
SonicWALL security appliance. Alerts are immediately e-mailed, either to an e-mail address or
to an e-mail pager. Each log entry contains the date and time of the event and a brief message
describing the event.
Log View Table
The log is displayed in a table and is sortable by column. The log table columns include:
•
Time - the date and time of the event.
•
Priority - the level of priority associated with your log event.
Syslog uses eight categories to characterize messages – in descending order of severity,
the categories include:
– Emergency
– Alert
– Critical
– Error
– Warning
– Notice
– Informational
– Debug
Specify a priority level on a SonicWALL security appliance on the Log > Categories page
to log messages for that priority level, plus all messages tagged with a higher severity. For
example, select ‘error’ as the priority level to log all messages tagged as ‘error,’ as well as
any messages tagged with ‘critical,’ ‘alert,’ and ‘emergency.’ Select ‘debug’ to log all
messages.
Note
2
Refer to Log Event Messages section for more information on your specific log event.
•
Category - the type of traffic, such as Network Access or Authenticated Access.
•
Message - provides description of the event.
•
Source - displays source network and IP address.
•
Destination - displays the destination network and IP address.
•
Notes - provides additional information about the event.
•
Rule - notes Network Access Rule affected by event.
SonicOS Log Event Reference Guide
Log > View
Navigating and Sorting Log View Table Entries
The Log View table provides easy pagination for viewing large numbers of log events. You can
navigate these log events by using the navigation control bar located at the top right of the Log
View table. Navigation control bar includes four buttons. The far left button displays the first
page of the table. The far right button displays the last page. The inside left and right arrow
buttons moved the previous or next page respectively.
You can sort the entries in the table by clicking on the column header. The entries are sorted
by ascending or descending order. The arrow to the right of the column entry indicates the
sorting status. A down arrow means ascending order. An up arrow indicates a descending
order.
Refresh
To update log messages, clicking the Refresh button near the top right corner of the page.
Clear Log
To delete the contents of the log, click the Clear Log button near the top right corner of the
page.
Export Log
To export the contents of the log to a defined destination, click the Export Log button below
the filter table.You can export log content to two formats:
•
Plain text format--Used in log and alert e-mail.
•
Comma-separated value (CSV) format--Used for importing into Excel or other
presentation development applications.
E-mail Log
If you have configured the SonicWALL security appliance to e-mail log files, clicking E-mail Log
near the top right corner of the page sends the current log files to the e-mail address specified
in the Log > Automation > E-mail section.
Note
The SonicWALL security appliance can alert you of important events, such as an attack to
the SonicWALL security appliance. Alerts are immediately sent via e-mail, either to an e-mail
address or to an e-mail pager. For sending alerts, you must enter your e-mail address and
server information in the Log > Automation page.
SonicOS Log Event Reference Guide
3
Log > View
Filtering Log Records Viewed
You can filter the results to display only event logs matching certain criteria. You can filter by
Priority, Category, Source (IP or Interface), and Destination (IP or Interface).
Step 1
Enter your filter criteria in the Log View Settings table.
Step 2
The fields you enter values into are combined into a search string with a logical AND. For
example, if you select an interface for Source and for Destination, the search string will look
for connections matching:
Source interface AND Destination interface
Step 3
Check the Group Filters box next to any two or more criteria to combine them with a logical
OR.
For example, if you enter values for Source IP, Destination IP, and Protocol, and check Group
Filters next to Source IP and Destination IP, the search string will look for connections
matching:
(Source IP OR Destination IP) AND Protocol
Step 4
Click Apply Filter to apply the filter immediately to the Log View Settings table. Click Reset
to clear the filter and display the unfiltered results again.
The following example filters for log events resulting from traffic from the WAN to the LAN:
Log Event Messages
For a complete reference guide of log event messages, refer to the “Log Event Message Index”
section on page 20.
4
SonicOS Log Event Reference Guide
Log > Categories
Log > Categories
This guide provides configuration tasks to enable you to categorize and customize the logging
functions on your SonicWALL security appliance for troubleshooting and diagnostics.
Note
You can extend your SonicWALL security appliance log reporting capabilities by using
SonicWALL ViewPoint. ViewPoint is a Web-based graphical reporting tool for detailed and
comprehensive reports. For more information on the SonicWALL ViewPoint reporting tool,
refer to www.sonicwall.com.
Log Severity/Priority
This section provides information on configuring the level of priority log messages are captured
and corresponding alert messages are sent through e-mail for notification.
Logging Level
The Logging Level control filters events by priority. Events of equal of greater priority are
passed, and events of lower priority are dropped. The Logging Level menu includes the
following priority scale items from highest to lowest priority:
•
Emergency (highest priority)
•
Alert
•
Critical
•
Error
•
Warning
•
Notice
•
Informational
•
Debug (lowest priority)
Alert Level
The Alert Level control determines how E-mail Alerts are sent. An event of equal or greater
priority causes an E-mail alert to be issued. Lower priority events do not cause an alert to be
sent. Events are pre-filtered by the Logging Level control, so if the Logging Level control is set
to a higher priority than that of the Alert Level control, only alerts at the Logging Level or higher
are sent. Alert levels include:
•
None (disables e-mail alerts)
•
Emergency (highest priority)
•
Alert
•
Critical
•
Error
•
Warning (lowest priority)
SonicOS Log Event Reference Guide
5
Log > Categories
Log Redundancy Filter
The Log Redundancy Filter allows you to define the time in seconds that the same attack is
logged on the Log > View page as a single entry in the SonicWALL log. Various attacks are often
rapidly repeated, which can quickly fill up a log if each attack is logged. The Log Redundancy
Filter has a default setting of 60 seconds.
Alert Redundancy Filter
The Alert Redundancy Filter allows you to define the time in seconds that the same attack is
logged on the Log > View page as a single entry in the SonicWALL log before an alert is issued.
The Alert Redundancy Filter has a default setting of 900 seconds.
Log Categories
SonicWALL security appliances provide automatic attack protection against well known
exploits. The majority of these legacy attacks were identified by telltale IP or TCP/UDP
characteristics, and recognition was limited to a set of fixed layer 3 and layer 4 values. As the
breadth and sophistication of attacks evolved, it has become essential to dig deeper into the
traffic, and to develop the sort of adaptability that could keep pace with the new threats.
All SonicWALL security appliances, even those running SonicWALL IPS, continue to recognize
these legacy port and protocol types of attacks. The current behavior on all SonicWALL security
appliances devices is to automatically and holistically prevent these legacy attacks, meaning
that it is not possible to disable prevention of these attacks either individually or globally.
SonicWALL security appliances now include an expanded list of attack categories that can be
logged.
The View Style menu provides the following three log category views:
•
All Categories - Displays both Legacy Categories and Expanded Categories.
•
Legacy Categories - Displays log categories carried over from earlier SonicWALL log event
categories.
•
Expanded Categories - Displays the expanded listing of categories that includes the older
Legacy Categories log events rearranged into the new structure.
The following table describes both the Legacy and Extended log categories.
Log Type
Category
Description
802.11 Management Legacy
Logs WLAN IEEE 802.11 connections.
Advanced Routing
Expanded
Logs messages related to RIPv2 and OSPF routing events.
Attacks
Legacy
Logs messages showing Denial of Service attacks, such as SYN Flood, Ping
of Death, and IP spoofing
Authenticated
Access
Expanded
Logs administrator, user, and guest account activity
Blocked Java, etc.
Legacy
Logs Java, ActiveX, and Cookies blocked by the SonicWALL security
appliance.
Blocked Web Sites
Legacy
Logs Web sites or newsgroups blocked by the Content Filter List or by
customized filtering.
BOOTP
Expanded
Logs BOOTP activity
Crypto Test
Expanded
Logs crypto algorithm and hardware testing
6
SonicOS Log Event Reference Guide
Log > Categories
Log Type
Category
Description
DDNS
Expanded
Logs Dynamic DNS activity
Denied LAN IP
Legacy
Logs all LAN IP addresses denied by the SonicWALL security appliance.
DHCP Client
Expanded
Logs DHCP client protocol activity
DHCP Relay
Expanded
Logs DHCP central and remote gateway activity
Dropped ICMP
Legacy
Logs blocked incoming ICMP packets.
Dropped TCP
Legacy
Logs blocked incoming TCP connections.
Dropped UDP
Legacy
Logs blocked incoming UDP packets.
Firewall Event
Extended
Logs internal firewall activity
Firewall Hardware
Extended
Logs firewall hardware error events
Firewall Logging
Extended
Logs general events and errors
Firewall Rule
Extended
Logs firewall rule modifications
GMS
Extended
Logs GMS status event
High Availability
Extended
Logs High Availability activity
IPcomp
Extended
Logs IP compression activity
Intrusion Prevention Extended
Logs intrusion prevention related activity
L2TP Client
Extended
Logs L2TP client activity
L2TP Server
Extended
Logs L2TP server activity
Multicast
Extended
Logs multicast IGMP activity
Network
Extended
Logs network ARP, fragmentation, and MTU activity
Network Access
Extended
Logs network and firewall protocol access activity
Network Debug
Legacy
Logs NetBIOS broadcasts, ARP resolution problems, and NAT resolution
problems. Also, detailed messages for VPN connections are displayed to assist
the network administrator with troubleshooting problems with active VPN
tunnels. Network Debug information is intended for experienced network
administrators.
Network Traffic
Expanded
Logs network traffic reporting events
PPP
Extended
Logs generic PPP activity
PPP Dial-Up
Extended
Logs PPP dial-up activity
PPPoE
Extended
Logs PPPoE activity
PPTP
Extended
Logs PPTP activity
RBL
Extended
Logs real-time black list activity
RIP
Extended
Logs RIP activity
Remote
Authentication
Extended
Logs RADIUS and LDAP server activity
Security Services
Extended
Logs security services activity
SonicPoint
Extended
Logs SonicPoint activity
System Errors
Legacy
Logs problems with DNS or e-mail.
System
Maintenance
Legacy
Logs general system activity, such as system activations.
User Activity
Legacy
Logs successful and unsuccessful log in attempts.
VOIP
Extended
Logs VoIP H.323/RAS, H.323/H.225, and H.323/H.245 activity
SonicOS Log Event Reference Guide
7
Log > Categories
Log Type
Category
Description
VPN
Extended
Logs VPN activity
VPN Client
Extended
Logs VPN client activity
VPN IKE
Extended
Logs VPN IKE activity
VPN IPsec
Extended
Logs VPN IPSec activity
VPN PKI
Extended
Logs VPN PKI activity
VPN Tunnel Status
Legacy
Logs status information on VPN tunnels.
WAN Failover
Extended
Logs WAN failover activity
Wireless
Extended
Logs wireless activity
Wlan IDS
Extended
Logs WLAN IDS activity
Managing Log Categories
The Log Categories table displays log category information organized into the following
columns:
•
Category - Displays log category name.
•
Description - Provides description of the log category activity type.
•
Log - Provides checkbox for enabling/disabling the display of the log events in on the Log
> View page.
•
Alerts - Provides checkbox for enabling/disabling the sending of alerts for the category.
•
Syslog - Provides checkbox for enabling/disabling the capture of the log events into the
SonicWALL security appliance Syslog.
•
Event Count - Displays the number of events for that category. Clicking the Refresh button
updates these numbers.
You can sort the log categories in the Log Categories table by clicking on the column header.
For example, clicking on the Category header sorts the log categories in descending order from
the default ascending order. An up or down arrow to the left of the column name indicates
whether the column is assorted in ascending or descending order.
You can enable or disable Log, Alerts, and Syslog on a category by category basis by clicking
on the check box for the category in the table. You can enable or disable Log, Alerts, and Syslog
for all categories by clicking the checkbox on the column header.
8
SonicOS Log Event Reference Guide
Log > Syslog
Log > Syslog
In addition to the standard event log, the SonicWALL security appliance can send a detailed log
to an external Syslog server. The SonicWALL Syslog captures all log activity and includes every
connection source and destination IP address, IP service, and number of bytes transferred. The
SonicWALL Syslog support requires an external server running a Syslog daemon on UDP Port
514. Syslog Analyzers such as SonicWALL ViewPoint or WebTrends Firewall Suite can be used
to sort, analyze, and graph the Syslog data. Messages from the SonicWALL security appliance
are then sent to the server(s). Up to three Syslog server IP addresses can be added.Syslog
Settings
Syslog Facility
•
Note
See RCF 3164 - The BSD Syslog Protocol for more information.
•
Note
Syslog Facility - Allows you to select the facilities and severities of the messages based on
the syslog protocol.
Override Syslog Settings with ViewPoint Settings - Check this box to override Syslog
settings, if you’re using SonicWALL ViewPoint for your reporting solution.
For more information on SonicWALL ViewPoint, go to http://www.sonicwall.com.
– Syslog Event Redundancy Filter (seconds) - This setting prevents repetitive messages
from being written to Syslog. If duplicate events occur during the period specified in the
Syslog Event Redundancy Rate field, they are not written to Syslog as unique events.
Instead, the additional events are counted, and then at the end of the period, a
message is written to the Syslog that includes the number of times the event occurred.
The Syslog Event Redundancy Filter default value is 60 seconds and the maximum
value is 86,400 seconds (24 hours). Setting this value to 0 seconds sends all Syslog
messages without filtering.
– Syslog Format - You can choose the format of the Syslog to be Default or WebTrends.
If you select WebTrends, however, you must have WebTrends software installed on
your system.
Note
If the SonicWALL security appliance is managed by SonicWALL GMS, the Syslog Server
fields cannot be configured by the administrator of the SonicWALL security appliance.
•
Enable Event Rate Limiting - This control allows you to enable rate limiting of events to
prevent the internal or external logging mechanism from being overwhelmed by log events.
•
Enable Data Rate Limiting - This control allows you to enable rate limiting of data to prevent
the internal or external logging mechanism from being overwhelmed by log events.
SonicOS Log Event Reference Guide
9
Log > Automation
Syslog Servers
Adding a Syslog Server
To add syslog servers to the SonicWALL security appliance
Step 1
Click Add. The Add Syslog Server window is displayed.
Step 2
Type the Syslog server name or IP address in the Name or IP Address field. Messages from
the SonicWALL security appliance are then sent to the servers.
Step 3
If your syslog is not using the default port of 514, type the port number in the Port Number field.
Step 4
Click OK.
Step 5
Click Accept to save all Syslog Server settings.
Log > Automation
The Log > Automation page includes settings for configuring the SonicWALL to send log files
using e-mail and configuring mail server settings.
E-mail Log Automation
•
Send Log to E-mail address - Enter your e-mail address (username@mydomain.com) in
this field to receive the event log via e-mail. Once sent, the log is cleared from the
SonicWALL memory. If this field is left blank, the log is not e-mailed.
•
Send Alerts to E-mail address - Enter your e-mail address (username@mydomain.com) in
the Send alerts to field to be immediately e-mailed when attacks or system errors occur.
Type a standard e-mail address or an e-mail paging service. If this field is left blank, e-mail
alert messages are not sent.
•
Send Log - Determines the frequency of sending log files. The options are When Full,
Weekly, or Daily. If the Weekly or Daily option is selected, then select the day of the week
the log is sent in the every menu and the time of day in 24-hour format in the At field.
•
Email Format - Specifies whether log emails will be sent in Plain Text or HTML format.
Mail Server Settings
The mail server settings allow you to specify the name or IP address of your mail server, the
from e-mail address, and authentication method.
Note
10
•
Mail Server (name or IP address) - Enter the IP address or FQDN of the e-mail server used
to send your log e-mails in this field.
•
From E-mail Address - Enter the E-mail address you want to display in the From field of the
message.
•
Authentication Method - You can use the default None item or select POP Before SMTP.
If the Mail Server (name or IP address) is left blank, log and alert messages are not emailed.
SonicOS Log Event Reference Guide
Log > Automation
Deep Packet Forensics
SonicWALL UTM appliances have configurable deep-packet classification capabilities that
intersect with forensic and content-management products. While the SonicWALL can reliably
detect and prevent any ‘interesting-content’ events, it can only provide a record of the
occurrence, but not the actual data of the event.
Of equal importance are diagnostic applications where the interesting-content is traffic that is
being unpredictably handled or inexplicably dropped.
Although the SonicWALL can achieve interesting-content using our Enhanced packet capture
diagnostic tool, data-recorders are application-specific appliances designed to record all the
packets on a network. They are highly optimized for this task, and can record network traffic
without dropping a single packet.
While data-recorders are good at recording data, they lack the sort of deep-packet inspection
intelligence afforded by IPS/GAV/ASPY/AF. Consider the minimal requirements of effective
data analysis:
•
Reliable storage of data
•
Effective indexing of data
•
Classification of interesting-content
Together, a UTM device (a SonicWALL appliance) and data-recorder (a Solera Networks
appliance) satisfy the requirements to offer outstanding forensic and data-leakage capabilities.
Distributed Event Detection and Replay
The Solera appliance can search its data-repository, while also allowing the administrator to
define “interesting-content” events on the SonicWALL. The level of logging detail and frequency
of the logging can be configured by the administrator. Nearly all events include Source IP,
Source Port, Destination IP, Destination Port, and Time. SonicOS Enhanced has an extensive
set of log events, including:
•
Debug/Informational Events—Connection setup/tear down
•
User-events—Administrative access, single sign-on activity, user logins, content filtering
details
•
Firewall Rule/Policy Events—Access to and from particular IP:Port combinations, also
identifiable by time
•
Interesting-content at the Network or Application Layer—Port-scans, SYN floods, DPI or AF
signature/policy hits
The following is an example of the process of distributed event detection and replay:
1.
The administrator defines the event trigger. For example, an Application Firewall policy is
defined to detect and log the transmission of an official document:
SonicOS Log Event Reference Guide
11
Log > Automation
2.
A user (at IP address 192.168.19.1) on the network retrieves the file.
3.
The event is logged by the SonicWALL.
4.
The administrator selects the Recorder icon from the left column of the log entry. Icon/link
only appears in the logs when a NPCS is defined on the SonicWALL (e.g. IP:
[192.168.169.100], Port: [443]). The defined NPCS appliance will be the link’s target. The
link will include the query string parameters defining the desired connection.
5.
The NPCS will (optionally) authenticate the user session.
6.
The requested data will be presented to the client as a .cap file, and can be saved or viewed
on the local machine.
Methods of Access
The client and NPCS must be able to reach one another. Usually, this means the client and the
NPCS will be in the same physical location, both connected to the SonicWALL appliance. In
any case, the client will be able to directly reach the NPCS, or will be able to reach the NPCS
through the SonicWALL. Administrators in a remote location will require some method of VPN
connectivity to the internal network. Access from a centralized GMS console will have similar
requirements.
Log Persistence
SonicOS currently allocates 32K to a rolling log buffer. When the log becomes full, it can be
emailed to a defined recipient and flushed, or it can simply be flushed. Emailing provides a
simple version of logging persistence, while GMS provides a more reliable and scalable
method.
By offering the administrator the option to deliver logs as either plain-text or HTML, the
administrator has an easy method to review and replay events logged.
12
SonicOS Log Event Reference Guide
Log > Automation
GMS
To provide the ability to identify and view events across an entire enterprise, a GMS update will
be required. Device-specific interesting-content events at the GMS console appear in Reports
> Log Viewer Search page, but are also found throughout the various reports, such as Top
Intrusions Over Time.
Solera Capture Stack
Solera Networks makes a series of appliances of varying capacities and speeds designed to
capture, archive, and regenerate network traffic. The Solera Networks Network Packet Capture
System (NPCS) provides utilities that allow the captured data to be accessed in time
sequenced playback, that is, analysis of captured data can be performed on a live network via
NPCS while the device is actively capturing and archiving data.
SonicOS Log Event Reference Guide
13
Log > Name Resolution
To configure your SonicWALL appliance with Solera select the Enable Solera Capture Stack
Integration option.
Configure the following options:
•
Server - Select the host for the Solera server. You can dynamically create the host by
selecting Create New Host...
•
Protocol - Select either HTTP or HTTPS.
•
Port - Specify the port number for connecting to the Solera server.
•
Interface(s) - Specify which interfaces you want to transmit data for to the Solera server.
•
User (optional) - Enter the username, if required.
•
Password (optional) - Enter the password, if required.
•
Confirm Password - Confirm the password.
– Mask Password - Leave this enabled to send the password as encrypted text.
Log > Name Resolution
The Log > Name Resolution page includes settings for configuring the name servers used to
resolve IP addresses and server names in the log reports.
The security appliance uses a DNS server or NetBIOS to resolve all IP addresses in log reports
into server names. It stores the names/address pairs in a cache, to assist with future lookups.
You can clear the cache by clicking Reset Name Cache in the top of the Log > Name Resolution
page.
14
SonicOS Log Event Reference Guide
Log > Name Resolution
Selecting Name Resolution Settings
The security appliance can use DNS, NetBIOS, or both to resolve IP addresses and server
names.
In the Name Resolution Method list, select:
•
None: The security appliance will not attempt to resolve IP addresses and Names in the log
reports.
•
DNS: The security appliance will use the DNS server you specify to resolve addresses and
names.
•
NetBIOS: The security appliance will use NetBIOS to resolve addresses and names. If you
select NetBIOS, no further configuration is necessary.
•
DNS then NetBIOS: The security appliance will first use the DNS server you specify to
resolve addresses and names. If it cannot resolve the name, it will try again with NetBIOS.
Specifying the DNS Server
To choose specific DNS servers or use the same servers as the WAN zone, perform the
following steps:
Step 1
Select Specify DNS Servers Manually or Inherit DNS Settings Dynamically from WAN Zone.
The second choice is selected by default.
Step 2
If you selected to specify a DNS server, enter the IP address for at least one DNS server on
your network. You can enter up to three servers.
Step 3
Click Accept in the top right corner of the Log > Name Resolution page to make your changes
take effect.
SonicOS Log Event Reference Guide
15
Log > Reports
Log > Reports
The SonicWALL security appliance can perform a rolling analysis of the event log to show the
top 25 most frequently accessed Web sites, the top 25 users of bandwidth by IP address, and
the top 25 services consuming the most bandwidth. You can generate these reports from the
Log > Reports page.
Note
SonicWALL ViewPoint provides a comprehensive Web-based reporting solution for
SonicWALL security appliances. For more information on SonicWALL ViewPoint, go to
http://www.sonicwall.com
Data Collection
The Reports window includes the following functions and commands:
•
Start Data Collection
Click Start Data Collection to begin log analysis. When log analysis is enabled, the button
label changes to Stop Data Collection.
•
Reset Data
Click Reset Data to clear the report statistics and begin a new sample period. The sample
period is also reset when data collection is stopped or started, and when the SonicWALL
security appliance is restarted.
View Data
Select the desired report from the Report to view menu. The options are Web Site Hits,
Bandwidth Usage by IP Address, and Bandwidth Usage by Service. These reports are
explained below. Click Refresh Data to update the report. The length of time analyzed by the
report is displayed in the Current Sample Period.
Web Site Hits
Selecting Web Site Hits from the Report to view menu displays a table showing the URLs for
the 25 most frequently accessed Web sites and the number of hits to a site during the current
sample period.
The Web Site Hits report ensures that the majority of Web access is to appropriate Web sites.
If leisure, sports, or other inappropriate sites appear in the Web Site Hits Report, you can
choose to block the sites. For information on blocking inappropriate Web sites, see .
Click on the name of a Web site to open that site in a new window.
Bandwidth Usage by IP Address
Selecting Bandwidth Usage by IP Address from the Report to view menu displays a table
showing the IP address of the 25 top users of Internet bandwidth and the number of megabytes
transmitted during the current sample period.
16
SonicOS Log Event Reference Guide
Log > ViewPoint
Bandwidth Usage by Service
Selecting Bandwidth Usage by Service from the Report to view menu displays a table showing
the name of the 25 top Internet services, such as HTTP, FTP, RealAudio, etc., and the number
of megabytes received from the service during the current sample period.
The Bandwidth Usage by Service report shows whether the services being used are
appropriate for your organization. If services such as video or push broadcasts are consuming
a large portion of the available bandwidth, you can choose to block these services.
Log > ViewPoint
SonicWALL ViewPoint is a Web-based graphical reporting tool that provides unprecedented
security awareness and control over your network environment through detailed and
comprehensive reports of your security and network activities. ViewPoint’s broad reporting
capabilities allow administrators to easily monitor network access and Internet usage, enhance
security, assess risks, understand more about employee Internet use and productivity, and
anticipate future bandwidth needs.
ViewPoint creates dynamic, real-time and historical network summaries, providing a flexible,
comprehensive view of network events and activities. Reports are based on syslog data
streams received from each SonicWALL appliance through LAN, Wireless LAN, WAN or VPN
connections. With ViewPoint, your organization can generate individual or aggregate reports
about virtually any aspect of appliance activity, including individual user or group usage
patterns, evens on specific appliances or groups of appliances, types and times of attacks,
resource consumption and constraints, and more.
For more information on SonicWALL ViewPoint, go to http://www.sonicwall.com.
For complete SonicWALL ViewPoint documentation, go to the SonicWALL documentation Web
site at http://www.sonicwall.com/us/support/3340.html.
SonicOS Log Event Reference Guide
17
Log > ViewPoint
Activating ViewPoint
The Log > ViewPoint page allows you to activate the ViewPoint license directly from the
SonicWALL Management Interface using two methods.
If you received a license activation key, enter the activation key in the Enter upgrade key field,
and click Accept.
Warning
You must have a mysonicwall.com account and your SonicWALL security appliance
must be registered to activate SonicWALL ViewPoint for your SonicWALl security
appliance.
Step 1
Click the Upgrade link in Click here to Upgrade on the Log > ViewPoint page. The
mysonicwall.com Login page is displayed.
Step 2
Enter your mysonicwall.com account username and password in the User Name and Password
fields, then click Submit. The System > Licenses page is displayed. If your SonicWALL security
appliance is already connected to your mysonicwall.com account, the System > Licenses page
appears after you click the SonicWALL Content Filtering Subscription link.
Step 3
Click Activate or Renew in the Manage Service column in the Manage Services Online table.
Type in the Activation Key in the New License Key field and click Submit.
Step 4
If you activated SonicWALL ViewPoint at mysonicwall.com, the SonicWALL ViewPoint
activation is automatically enabled on your SonicWALL within 24-hours or you can click the
Synchronize button on the Security Services > Summary page to update your SonicWALL.
Enabling ViewPoint Settings
Once you have installed the SonicWALL ViewPoint software, you can point the SonicWALL
security appliance to the server running ViewPoint, perform the following steps:
Step 1
Check the Enable ViewPoint Settings checkbox in the Syslog Servers section of the Log >
ViewPoint page.
Step 2
Click the Add button. The Add Syslog Server window is displayed.
Step 3
Enter the IP address or FQDN of the SonicWALL ViewPoint server in the Name or IP Address
field.
Step 4
Enter the port number for the SonicWALL ViewPoint server traffic in the Port field or use the
default port number.
Step 5
Click Accept.
Note
The Override Syslog Settings with ViewPoint Settings control on the Log >
Syslog page is automatically checked when you enable ViewPoint from the Log >
ViewPoint page. The IP address or FQDN you entered in the Add Syslog Server
window is also displayed on the Log > Syslog page as well as in the Syslog Servers
table on the Log > ViewPoint page.
Clicking the Edit icon displays the Add Syslog Server window for editing the ViewPoint server
information. Clicking the Delete
icon, deletes the ViewPoint syslog server entry.
18
SonicOS Log Event Reference Guide
Index of Log Event Messages
Index of Log Event Messages
This section contains a list of log event messages for all SonicWALL Firmware and SonicOS
Software Releases, ordered alphabetically. Use your web browser’s Find function to search for
a command.
Log Event Message Symbols Key
Log Event Message
Symbol Description
Context
%s Ethernet Port Down
Represents a character string.
[WAN | LAN | DMZ] Ethernet Port
Down
The cache is full; %u open
connections; some will be dropped
Represents a numerical string.
The cache is full; [40,000] open
connections; some will be dropped
TCP IP Layered-Data Packet Processing and SonicOS Log Event Handling
In specific cases of multi-layer packet processing, a TCP connection initially logged as "open,"
will be rejected by a deeper layer of packet processing. In these cases, the connection request
has not been forwarded by the SonicWALL security appliance, and the initial Connection Open
SonicOS log event message should be ignored in favor of the TCP Connection Dropped log
event message.
Each log event message described in the following table provides the following log event details:
• SonicOS Category—Displays the SonicOS Software category event type.
•
Legacy Category—Displays the SonicWALL Firmware Software category event type.
•
Priority Level—Displays the level of urgency of the log event message.
•
Log Message ID Number—Displays the ID number of the log event message.
•
SNMP Trap Type—Displays the SNMP Trap ID number of the log event message.
SonicOS Log Event Reference Guide
19
Index of Log Event Messages
Log Event Message Index
Log Event Message
Network Security Appliance activated
Log cleared
Log successfully sent via email
Log full; deactivating Network Security
Appliance
New URL List loaded
No new URL List available
Problem loading the URL List; check Filter
settings
Problem loading the URL List; check your
DNS server
Problem sending log email; check log
settings
Restarting Network Security Appliance;
dumping log to email
Web site access denied
Newsgroup access denied
Web site access allowed
Newsgroup access allowed
ActiveX access denied
Java access denied
ActiveX or Java archive access denied
Cookie removed
Ping of death dropped
IP spoof dropped
User logged out - user disconnect detected
(heartbeat timer expired)
Possible SYN flood attack detected
Land attack dropped
Fragmented packet dropped
Administrator login allowed
Administrator login denied due to bad
credentials
User login from an internal zone allowed
User login denied due to bad credentials
User login denied due to bad credentials
Login screen timed out
20
SonicOS Log Event Reference Guide
New Category
Firewall Event
Firewall Logging
Firewall Logging
Firewall Logging
Legacy Category
Maintenance
Maintenance
Maintenance
System Error
Priority
Alert
Information
Information
Error
ID
4
5
6
7
SNMP
Trap
Type
------601
Security Services
Security Services
Security Services
Maintenance
Maintenance
System Error
Information
Information
Error
8
9
10
----602
Security Services
System Error
Error
11
603
Firewall Logging
System Error
Warning
12
604
Firewall Event
Maintenance
Information
13
---
Network Access
Network Access
Network Access
Network Access
Network Access
Network Access
Network Access
Network Access
Intrusion Detection
Intrusion Detection
Authenticate
Access
Intrusion Detection
Intrusion Detection
Network
Authenticate
Access
Authenticate
Access
Authenticate
Access
Authenticate
Access
Authenticate
Access
Authenticate
Access
Blocked Sites
Blocked Sites
Blocked Sites
Blocked Sites
Blocked Code
Blocked Code
Blocked Code
Blocked Code
Attack
Attack
User Activity
Error
Notice
Notice
Notice
Notice
Notice
Notice
Notice
Alert
Alert
Information
14
15
16
17
18
19
20
21
22
23
24
701
702
703
704
--------501
502
---
Attack
Attack
TCP | UDP | ICMP
User Activity
Warning
Alert
Notice
Information
25
27
28
29
503
505
-----
Attack
Alert
30
560
User Activity
Information
31
---
User Activity
Information
32
---
User Activity
Information
33
---
User Activity
Information
34
---
Index of Log Event Messages
Log Event Message
Administrator login denied from %s; logins
disabled from this interface
TCP connection dropped
UDP packet dropped
ICMP packet dropped due to policy
PPTP packet dropped
IPsec packet dropped
Unknown protocol dropped
IPsec packet dropped; waiting for pending
IPsec connection
IPsec connection interrupt
NAT could not remap incoming packet
ARP timeout
Broadcast packet dropped
No ICMP redirect sent
Out-of-order command packet dropped
Failure to add data channel
RealAudio decode failure
Duplicate packet dropped
No HOST tag found in HTTP request
The cache is full; %u open connections;
some will be dropped
License exceeded: Connection dropped
because too many IP addresses are in use
on your LAN
Access to proxy server denied
Diagnostic Code E
Dynamic IPsec client connected
Received fragmented packet or
fragmentation needed
Diagnostic Code D
Illegal IPsec SPI
Unknown IPsec SPI
IPsec Authentication Failed
IPsec Decryption Failed
Incompatible IPsec Security Association
IPsec packet from or to an illegal host
NetBus attack dropped
Back Orifice attack dropped
Net Spy attack dropped
Sub Seven attack dropped
Ripper attack dropped
Striker attack dropped
Senna Spy attack dropped
New Category
Authenticate
Access
Network Access
Network Access
Network Access
Network Access
Network Access
Network Access
Network Access
Legacy Category Priority
Attack
Alert
ID
35
SNMP
Trap
Type
506
TCP
UDP
ICMP
TCP | UDP | ICMP
TCP | UDP | ICMP
Debug
Debug
Notice
Notice
Notice
Notice
Notice
Notice
Debug
36
37
38
39
40
41
42
---------------
Network Access
Unused
Network
Network Access
Unused
Network Access
Unused
Unused
Network Access
Network Access
Firewall Event
Debug
System Error
Debug
Debug
Debug
Debug
Debug
Debug
Debug
Debug
System Error
Debug
Error
Debug
Debug
Debug
Debug
Debug
Debug
Debug
Debug
Error
43
44
45
46
47
48
49
50
51
52
53
--606
----------------607
Firewall Event
System Error
Error
58
608
Network Access
VPN IPsec
VPN IPsec
Network
Blocked Sites
System Error
User Activity
Debug
Notice
Error
Information
Debug
60
61
62
63
705
609
-----
Firewall Hardware
VPN IPsec
VPN IPsec
VPN IPsec
VPN IPsec
VPN IPsec
VPN IPsec
Intrusion Detection
Intrusion Detection
Intrusion Detection
Intrusion Detection
Intrusion Detection
Intrusion Detection
Intrusion Detection
System Error
User Activity
Attack
Attack
Attack
User Activity
Attack
Attack
Attack
Attack
Attack
Attack
Attack
Attack
Error
Information
Error
Error
Error
Information
Error
Alert
Alert
Alert
Alert
Alert
Alert
Alert
64
65
66
67
68
69
70
72
73
74
75
76
77
78
610
--507
508
509
--510
511
512
513
514
515
516
517
SonicOS Log Event Reference Guide
21
Index of Log Event Messages
Log Event Message
Priority attack dropped
Ini Killer attack dropped
Smurf Amplification attack dropped
Possible port scan detected
Probable port scan detected
Failed to resolve name
IKE Responder: Accepting IPsec proposal
(Phase 2)
IKE Responder: IPsec proposal does not
match (Phase 2)
IKE negotiation complete. Adding IPsec SA.
(Phase 2)
Starting IKE negotiation
Deleting IPsec SA for destination
Deleting IPsec SA
Diagnostic Code A
Diagnostic Code B
Diagnostic Code C
Status
#Web site hit
Connection Opened
Retransmitting DHCP DISCOVER.
Retransmitting DHCP REQUEST
(Requesting).
Retransmitting DHCP REQUEST
(Renewing).
Retransmitting DHCP REQUEST
(Rebinding).
Retransmitting DHCP REQUEST
(Rebooting).
Retransmitting DHCP REQUEST (Verifying).
Sending DHCP DISCOVER.
DHCP Server not available. Did not get any
DHCP OFFER.
Got DHCP OFFER. Selecting.
Sending DHCP REQUEST.
DHCP Client did not get DHCP ACK.
DHCP Client got NACK.
DHCP Client got ACK from server.
DHCP Client is declining address offered by
the server.
DHCP Client sending REQUEST and going
to REBIND state.
22
SonicOS Log Event Reference Guide
New Category
Intrusion Detection
Intrusion Detection
Intrusion Detection
Intrusion Detection
Intrusion Detection
Network
VPN IKE
Legacy Category
Attack
Attack
Attack
Attack
Attack
Maintenance
User Activity
Priority
Alert
Alert
Alert
Alert
Alert
Information
Information
ID
79
80
81
82
83
84
87
SNMP
Trap
Type
518
519
520
521
522
-----
VPN IKE
User Activity
Warning
88
523
VPN IKE
User Activity
Information
89
---
VPN IKE
VPN IKE
VPN IKE
Firewall Hardware
Firewall Hardware
Firewall Hardware
GMS
Network Traffic
Network Traffic
DHCP Client
DHCP Client
User Activity
User Activity
User Activity
System Error
System Error
System Error
Maintenance
Connection Traffic
Connection
Maintenance
Maintenance
Information
Information
Information
Error
Error
Error
Emergency
Information
Information
Information
Information
90
91
92
93
94
95
96
97
98
99
100
------611
612
613
-----------
DHCP Client
Maintenance
Information
101
---
DHCP Client
Maintenance
Information
102
---
DHCP Client
Maintenance
Information
103
---
DHCP Client
DHCP Client
DHCP Client
Maintenance
Maintenance
Maintenance
Information
Information
Information
104
105
106
-------
DHCP Client
DHCP Client
DHCP Client
DHCP Client
DHCP Client
DHCP Client
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Information
Information
Information
Information
Information
Information
107
108
109
110
111
112
-------------
DHCP Client
Maintenance
Information
113
---
Index of Log Event Messages
Log Event Message
DHCP Client sending REQUEST and going
to RENEW state.
Sending DHCP REQUEST (Renewing).
Sending DHCP REQUEST (Rebinding).
Sending DHCP REQUEST (Rebooting).
Sending DHCP REQUEST (Verifying).
DHCP Client failed to verify and lease has
expired. Go to INIT state.
DHCP Client failed to verify and lease is still
valid. Go to BOUND state.
DHCP Client got a new IP address lease.
Sending DHCP RELEASE.
Access attempt from host without Anti-Virus
agent installed
Anti-Virus agent out-of-date on host
Received AV Alert: %s
Starting PPPoE discovery
PPPoE LCP Link Up
PPPoE LCP Link Down
PPPoE terminated
PPPoE Network Connected
PPPoE Network Disconnected
PPPoE discovery process complete
PPPoE starting CHAP Authentication
PPPoE starting PAP Authentication
PPPoE CHAP Authentication Failed
PPPoE PAP Authentication Failed
Wan IP Changed
XAUTH Succeeded with VPN client
XAUTH Failed with VPN client,
Authentication failure
XAUTH Failed with VPN client, Cannot
Contact RADIUS Server
Log Debug
Add an attack message
Primary firewall has transitioned to Active
Backup firewall has transitioned to Active
Primary firewall has transitioned to Idle
Backup firewall has transitioned to Idle
Primary missed heartbeats from Backup
Backup missed heartbeats from Primary
Primary received error signal from Backup
Backup received error signal from Primary
Backup firewall being preempted by Primary
New Category
DHCP Client
Legacy Category Priority
Maintenance
Information
ID
114
SNMP
Trap
Type
---
DHCP Client
DHCP Client
DHCP Client
DHCP Client
DHCP Client
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Information
Information
Information
Information
Information
115
116
117
118
119
-----------
DHCP Client
Maintenance
Information
120
---
DHCP Client
DHCP Client
Security Services
Maintenance
Maintenance
Maintenance
Information
Information
Information
121
122
123
-------
Security Services
Security Services
PPPoE
PPPoE
PPPoE
PPPoE
PPPoE
PPPoE
PPPoE
PPPoE
PPPoE
PPPoE
PPPoE
Firewall Event
VPN Client
VPN Client
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
System Error
User Activity
User Activity
Information
Warning
Information
Information
Information
Information
Information
Information
Information
Information
Information
Information
Information
Warning
Information
Error
124
125
127
128
129
130
131
132
133
134
135
136
137
138
139
140
--524
----------------------636
-----
VPN Client
User Activity
Information
141
---
Firewall Event
Firewall Event
High Availability
High Availability
High Availability
High Availability
High Availability
High Availability
High Availability
High Availability
High Availability
Debug
Attack
Maintenance
Maintenance
System Error
Maintenance
System Error
System Error
System Error
System Error
System Error
Error
Error
Alert
Alert
Alert
Alert
Error
Error
Error
Error
Error
142
143
144
145
146
147
148
149
150
151
152
--525
----614
--615
616
617
618
619
SonicOS Log Event Reference Guide
23
Index of Log Event Messages
New Category
High Availability
High Availability
Legacy Category Priority
System Error
Error
Maintenance
Information
ID
153
154
SNMP
Trap
Type
620
---
High Availability
Maintenance
Information
155
---
High Availability
High Availability
High Availability
Security Services
Maintenance
Maintenance
System Error
Maintenance
Information
Information
Error
Warning
156
157
158
159
----662
526
High Availability
Maintenance
Information
160
---
High Availability
Maintenance
Information
161
---
High Availability
High Availability
Firewall Hardware
Intrusion Detection
PPPoE
PPPoE
Maintenance
Maintenance
System Error
Attack
Maintenance
Maintenance
Information
Information
Error
Alert
Information
Information
162
163
164
165
166
167
----621
527
-----
PPPoE
PPPoE
Maintenance
Maintenance
Information
Information
168
169
-----
High Availability
System Error
Error
170
622
VPN IKE
Network Access
Network Access
Information
Notice
Notice
172
173
174
-------
Notice
175
---
Intrusion Detection
Intrusion Detection
Intrusion Detection
VPN IPsec
Network
Network
Debug
LAN TCP
LAN UDP | LAN
TCP
LAN ICMP | LAN
TCP
Attack
Attack
Attack
Attack
Debug
User Activity
Alert
Alert
Alert
Alert
Debug
Information
177
178
179
180
181
182
528
529
530
531
-----
Security Services
System Error
Error
183
623
Security Services
System Error
Error
184
624
Security Services
System Error
Error
185
625
Log Event Message
Primary firewall preempting Backup
Active Backup detects Active Primary:
Backup going Idle
Imported HA hardware ID did not match this
firewall
Discovered HA Backup Firewall
HA Peer Firewall Synchronized
Error synchronizing HA peer firewall (%s)
Received AV Alert: Your Network Anti-Virus
subscription has expired. %s
Primary received heartbeat from wrong
source
Backup received heartbeat from wrong
source
HA packet processing error
Heartbeat received from incompatible source
Diagnostic Code F
Forbidden E-Mail attachment disabled
PPPoE PAP Authentication success.
PPPoE PAP Authentication Failed. Please
verify PPPoE username and password
Disconnecting PPPoE due to traffic timeout
No response from ISP Disconnecting
PPPoE.
Backup going Active in preempt mode after
reboot
VPN Log Debug
TCP connection from LAN denied
UDP packet from LAN dropped
ICMP packet from LAN dropped
Network Access
Probable TCP FIN scan detected
Probable TCP XMAS scan detected
Probable TCP NULL scan detected
IPsec Replay Detected
TCP FIN packet dropped
Received a path MTU icmp message from
router/gateway
Problem loading the URL List; Appliance not
registered.
Problem loading the URL List; Subscription
expired.
Problem loading the URL List; Try loading it
again.
24
SonicOS Log Event Reference Guide
Index of Log Event Messages
Log Event Message
Problem loading the URL List; Retrying later.
Problem loading the URL List; Flash write
failure.
Received a path MTU icmp message from
router/gateway
The loaded content URL List has expired.
Error setting the IP address of the backup,
please manually set to backup LAN IP
Error updating HA peer configuration
Fraudulent Microsoft certificate found;
access denied
VPN TCP SYN
VPN TCP FIN
VPN TCP PSH
Content filter subscription expired.
New firmware available.
CLI administrator login allowed
CLI administrator login denied due to bad
credentials
L2TP Tunnel Negotiation Started
L2TP Session Negotiation Started
L2TP Max Retransmission Exceeded
L2TP Tunnel Established
L2TP Tunnel Disconnect from Remote
L2TP Session Established
L2TP Session Disconnect from Remote
L2TP PPP Negotiation Started
L2TP LCP Down
L2TP PPP Session Up
L2TP PPP Down
L2TP PPP Authentication Failed
L2TP LCP Up
L2TP Disconnect Initiated by the User
Disconnecting L2TP Tunnel due to traffic
timeout
L2TP Connect Initiated by the User
L2TP PPP link down
Primary WAN link down, Primary going Idle
Backup WAN link down, Primary going
Active
Primary WAN link down, Backup going
Active
Primary WAN link up, preempting Backup
New Category
Security Services
Security Services
Legacy Category Priority
System Error
Error
System Error
Error
ID
186
187
SNMP
Trap
Type
626
627
Network
User Activity
Information
188
---
Security Services
High Availability
System Error
System Error
Error
Error
190
191
628
629
High Availability
Intrusion Detection
System Error
Attack
Error
Error
192
193
630
532
VPN
VPN
VPN
Security Services
Firewall Event
Authenticate
Access
Authenticate
Access
L2TP Client
L2TP Client
L2TP Client
L2TP Client
L2TP Client
L2TP Client
L2TP Client
L2TP Client
L2TP Client
L2TP Client
L2TP Client
L2TP Client
L2TP Client
L2TP Client
L2TP Client
VPN Statistics
VPN Statistics
VPN Statistics
System Error
Maintenance
User Activity
Information
Information
Information
Error
Information
Information
194
195
196
197
198
199
------631
-----
User Activity
Warning
200
---
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Information
Information
Information
Information
Information
Information
Information
Information
Information
Information
Information
Information
Information
Information
Information
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
-------------------------------
L2TP Client
L2TP Client
High Availability
High Availability
Maintenance
Maintenance
Maintenance
System Error
Information
Information
Information
Error
216
217
218
219
------633
High Availability
System Error
Error
220
634
High Availability
Maintenance
Information
221
---
SonicOS Log Event Reference Guide
25
Index of Log Event Messages
Log Event Message
DHCP RELEASE relayed to Central
Gateway
DHCP lease relayed to local device
DHCP RELEASE received from remote
device
DHCP lease relayed to remote device
DHCP lease to LAN device conflicts with
remote device, deleting remote IP entry
WARNING: DHCP lease relayed from
Central Gateway conflicts with IP in Static
Devices list
DHCP lease dropped. Lease from Central
Gateway conflicts with Relay IP
IP spoof detected on packet to Central
Gateway, packet dropped
Request for Relay IP Table from Central
Gateway
Requesting Relay IP Table from Remote
Gateway
Sent Relay IP Table to Central Gateway
Obtained Relay IP Table from Remote
Gateway
Failed to synchronize Relay IP Table
VPN zone administrator login allowed
WAN zone administrator login allowed
VPN zone remote user login allowed
WAN zone remote user login allowed
NAT Discovery : Peer IPsec Security
Gateway behind a NAT/NAPT Device
NAT Discovery : Local IPsec Security
Gateway behind a NAT/NAPT Device
NAT Discovery : No NAT/NAPT device
detected between IPsec Security gateways
NAT Discovery : Peer IPsec Security
Gateway doesn't support VPN NAT
Traversal
User login denied - RADIUS authentication
failure
User login denied - RADIUS server timeout
User login denied - RADIUS configuration
error
26
SonicOS Log Event Reference Guide
New Category
DHCP Relay
Legacy Category Priority
Maintenance
Information
ID
222
SNMP
Trap
Type
---
DHCP Relay
DHCP Relay
Maintenance
Debug
Information
Information
223
224
-----
DHCP Relay
DHCP Relay
Debug
Maintenance
Information
Information
225
226
-----
DHCP Relay
Maintenance
Information
227
---
DHCP Relay
Maintenance
Warning
228
---
DHCP Relay
Attack
Error
229
533
DHCP Relay
Maintenance
Information
230
---
DHCP Relay
Maintenance
Information
231
---
DHCP Relay
DHCP Relay
Maintenance
Maintenance
Information
Information
232
233
-----
DHCP Relay
Authenticate
Access
Authenticate
Access
Authenticate
Access
Authenticate
Access
VPN IKE
System Error
User Activity
Warning
Information
234
235
632
---
User Activity
Information
236
---
User Activity
Information
237
---
User Activity
Information
238
---
User Activity
Information
239
---
VPN IKE
User Activity
Information
240
---
VPN IKE
User Activity
Information
241
---
VPN IKE
User Activity
Information
242
---
RADIUS
User Activity
Information
243
---
RADIUS
RADIUS
User Activity
User Activity
Warning
Warning
244
245
-----
Index of Log Event Messages
Log Event Message
User login denied - User has no privileges for
login from that location
IPsec packet from an illegal host
Forbidden E-Mail attachment deleted
IKE Responder: Mode %d - not tunnel mode
IKE Responder: No matching Phase 1 ID
found for proposed remote network
IKE Responder: Proposed remote network is
0.0.0.0 but not DHCP relay nor default route
IKE Responder: No match for proposed
remote network address
IKE Responder: Default LAN gateway is set
but peer is not proposing to use this SA as a
default route
IKE Responder: Tunnel terminates outside
firewall but proposed local network is not
NAT public address
IKE Responder: Tunnel terminates inside
firewall but proposed local network is not
inside firewall
IKE Responder: Tunnel terminates on DMZ
but proposed local network is on LAN
IKE Responder: Tunnel terminates on LAN
but proposed local network is on DMZ
IKE Responder: AH Perfect Forward
Secrecy mismatch
IKE Responder: ESP Perfect Forward
Secrecy mismatch
IKE Responder: Algorithms and/or keys do
not match
Administrator logged out
Administrator logged out - inactivity timer
expired
User logged out
User logged out - max session time
exceeded
User logged out - inactivity timer expired
NAT device may not support IPsec AH
passthrough
TCP Xmas Tree dropped
CFL auto-download disabled, time problem
detected
Requesting CRL from
New Category
Authenticate
Access
VPN IPsec
Intrusion Detection
VPN IKE
VPN IKE
Legacy Category Priority
User Activity
Information
ID
246
SNMP
Trap
Type
---
Maintenance
Attack
User Activity
User Activity
Information
Error
Warning
Warning
247
248
249
250
--534
535
536
VPN IKE
User Activity
Warning
251
537
VPN IKE
User Activity
Warning
252
538
VPN IKE
User Activity
Warning
253
539
VPN IKE
User Activity
Warning
254
540
VPN IKE
User Activity
Warning
255
541
VPN IKE
User Activity
Warning
256
542
VPN IKE
User Activity
Warning
257
543
VPN IKE
User Activity
Warning
258
544
VPN IKE
User Activity
Warning
259
545
VPN IKE
User Activity
Warning
260
546
Authenticate
Access
Authenticate
Access
Authenticate
Access
Authenticate
Access
Authenticate
Access
VPN IPsec
User Activity
Information
261
---
User Activity
Information
262
---
User Activity
Information
263
---
User Activity
Information
264
---
User Activity
Information
265
---
Maintenance
Information
266
---
Intrusion Detection
Security Services
Attack
Maintenance
Alert
Information
267
268
547
---
VPN PKI
User Activity
Information
269
---
SonicOS Log Event Reference Guide
27
Index of Log Event Messages
Log Event Message
CRL loaded from
Failed to get CRL from
Not enough memory to hold the CRL
Connection timed out
Cannot connect to the CRL server
Unknown reason
Failed to Process CRL from
Bad CRL format
Issuer match failed
Certificate on Revoked list(CRL)
No Certificate for
PPP Dial-Up: Dialing: %s
PPP Dial-Up: No dialtone detected - check
phone-line connection
PPP Dial-Up: No link carrier detected - check
phone number
PPP Dial-Up: Dialed number is busy
PPP Dial-Up: Dialed number did not answer
PPP Dial-Up: Connected at %s bps - starting
PPP
PPP Dial-Up: Unknown dialing failure
PPP Dial-Up: Link carrier lost
PPP: Authentication successful
PPP: PAP Authentication failed - check
username / password
PPP: CHAP authentication failed - check
username / password
PPP: MS-CHAP authentication failed - check
username / password
PPP: Starting MS-CHAP authentication
PPP: Starting CHAP authentication
PPP: Starting PAP authentication
PPP Dial-Up: PPP negotiation failed disconnecting
PPP Dial-Up: Idle time limit exceeded disconnecting
PPP Dial-Up: Failed to get IP address
PPP Dial-Up: Received new IP address
PPP Dial-Up: PPP link established
PPP Dial-Up: PPP link down
PPP Dial-Up: Shutting down link
PPP Dial-Up: Initialization : %s
PPP Dial-Up: User requested disconnect
PPP Dial-Up: User requested connect
28
SonicOS Log Event Reference Guide
New Category
VPN PKI
VPN PKI
VPN PKI
VPN PKI
VPN PKI
VPN PKI
VPN PKI
VPN PKI
VPN PKI
VPN PKI
VPN PKI
PPP Dial Up
PPP Dial Up
Legacy Category
User Activity
User Activity
User Activity
User Activity
User Activity
User Activity
User Activity
User Activity
User Activity
User Activity
User Activity
User Activity
User Activity
Priority
Information
Alert
Warning
Alert
Alert
Error
Alert
Alert
Alert
Alert
Alert
Information
Information
ID
270
271
272
273
274
275
276
277
278
279
280
281
282
SNMP
Trap
Type
---------------------------
PPP Dial Up
User Activity
Information
283
---
PPP Dial Up
PPP Dial Up
PPP Dial Up
User Activity
User Activity
User Activity
Information
Information
Information
284
285
286
-------
PPP Dial Up
PPP Dial Up
PPP
PPP
User Activity
User Activity
-----
Information
Information
Information
Information
287
288
289
290
---------
PPP
---
Information
291
---
PPP
---
Information
292
---
PPP
PPP
PPP
PPP Dial Up
------User Activity
Information
Information
Information
Information
293
294
295
296
---------
PPP Dial Up
User Activity
Information
297
---
PPP Dial Up
PPP Dial Up
PPP Dial Up
PPP Dial Up
PPP Dial Up
PPP Dial Up
PPP Dial Up
PPP Dial Up
User Activity
User Activity
User Activity
User Activity
User Activity
User Activity
User Activity
User Activity
Information
Information
Information
Information
Information
Information
Information
Information
298
299
300
301
302
303
304
305
-----------------
Index of Log Event Messages
New Category
PPP Dial Up
WAN Failover
L2TP Server
L2TP Server
L2TP Server
Legacy Category
User Activity
System Error
Maintenance
Maintenance
Maintenance
Priority
Information
Warning
Information
Information
Information
ID
306
307
308
309
310
SNMP
Trap
Type
--639
-------
L2TP Server
Maintenance
Information
311
---
L2TP Server
L2TP Server
Maintenance
Maintenance
Information
Information
312
313
-----
L2TP Server
Maintenance
Information
314
---
L2TP Server
Maintenance
Information
315
---
L2TP Server
Maintenance
Information
316
---
L2TP Server
Maintenance
Information
317
---
L2TP Server
Maintenance
Information
318
---
L2TP Server
Maintenance
Information
319
---
L2TP Server
Maintenance
Information
320
---
PPP Dial Up
User Activity
Information
321
---
PPP Dial Up
User Activity
Information
322
---
PPP Dial Up
User Activity
Information
323
---
PPP Dial Up
Firewall Event
Maintenance
System Error
Information
Error
324
325
--635
WAN Failover
PPP Dial Up
System Error
User Activity
Alert
Information
326
327
637
---
Authenticate
Access
User login failure rate exceeded - logins from Authenticate
user IP address denied
Access
PPP Dial-Up: The profile in use disabled
PPP Dial Up
VPN networking.
PPP Dial-Up: VPN networking restored.
PPP Dial Up
%s Ethernet Port Up
Firewall Event
%s Ethernet Port Down
Firewall Event
Maintenance
Information
328
---
Attack
Error
329
561
Maintenance
Information
330
---
Maintenance
System Error
System Error
Information
Warning
Error
331
332
333
--640
641
Log Event Message
PPP Dial-Up: Connect request canceled
The network connection in use is %s
L2TP Server : L2TP Tunnel Established.
L2TP Server : L2TP Session Established.
L2TP Server : L2TP PPP Session
Established.
L2TP Server: RADIUS/LDAP reports
Authentication Failure
L2TP Server: Local Authentication Failure
L2TP Server: RADIUS/LDAP server not
assigned IP address
L2TP Server: No IP address available in the
Local IP Pool
L2TP Server: L2TP Tunnel Disconnect from
the Remote.
L2TP Server: L2TP Session Disconnect
from the Remote.
L2TP Server: L2TP Remote terminated the
PPP session
L2TP Server: Local Authentication
Success.
L2TP Server: RADIUS/LDAP Authentication
Success
L2TP Server: Keep alive Failure. Closing
Tunnel
PPP Dial-Up: Manual intervention needed.
Check Primary Profile or Profile details
PPP Dial-Up: Trying to failover but Primary
Profile is manual
PPP Dial-Up: Startup without Ethernet cable,
will try to dial on outbound traffic
PPP Dial-Up: Dial initiated by %s
The current WAN interface is not ready to
route packets.
Probing failure on %s
PPP Dial-Up: Maximum connection time
exceeded - disconnecting
Administrator name changed
SonicOS Log Event Reference Guide
29
Index of Log Event Messages
Log Event Message
L2TP Server: Call Disconnect from Remote.
L2TP Server: Tunnel Disconnect from
Remote.
L2TP Server : Deleting the Tunnel
L2TP Server : Deleting the L2TP active
Session
L2TP Server : Retransmission Timeout,
Deleting the Tunnel
NAT translated packet exceeds size limit,
packet dropped
HTTP management port has changed
HTTPS management port has changed
IKE Responder: Mode %d - not transport
mode. Xauth is required but not supported
by peer.
L2TP Server : Access from L2TP VPN Client
Privilege not enabled for Radius Users.
L2TP Server : User Name authentication
Failure locally.
IKE Responder: Tunnel terminates outside
firewall but proposed remote network is not
NAT public address
IKE Initiator: Start Quick Mode (Phase 2).
Port configured to receive IPsec protocol
ONLY; drop packet received in the clear
Imported VPN SA is invalid - disabled
IPsec SA lifetime expired.
IKE SA lifetime expired.
IKE Initiator: Start Main Mode negotiation
(Phase 1)
IKE Responder: Received Quick Mode
Request (Phase 2)
IKE Initiator: Main Mode complete (Phase 1)
IKE Initiator: Aggressive Mode complete
(Phase 1).
IKE Responder: Received Main Mode
request (Phase 1)
IKE Responder: Received Aggressive Mode
request (Phase 1)
IKE Responder: Main Mode complete
(Phase 1)
IKE Initiator: Start Aggressive Mode
negotiation (Phase 1)
Entering FIPS ERROR state
Crypto DES test failed
Crypto DH test failed
30
SonicOS Log Event Reference Guide
New Category
L2TP Server
L2TP Server
Legacy Category Priority
Maintenance
Information
Maintenance
Information
ID
334
335
SNMP
Trap
Type
-----
L2TP Server
L2TP Server
Maintenance
Maintenance
Information
Information
336
337
-----
L2TP Server
Maintenance
Information
338
---
Network
Debug
Debug
339
---
Firewall Event
Firewall Event
VPN IKE
Maintenance
Maintenance
Debug
Information
Information
Warning
340
341
342
-------
L2TP Server
Maintenance
Information
343
---
L2TP Server
Maintenance
Information
344
---
VPN IKE
User Activity
Warning
345
548
VPN IKE
Network Access
User Activity
Information
TCP | UDP | ICMP Warning
346
347
-----
Firewall Event
VPN IPsec
VPN IKE
VPN IKE
Maintenance
User Activity
User Activity
User Activity
Warning
Information
Information
Information
348
349
350
351
---------
VPN IKE
User Activity
Information
352
---
VPN IKE
VPN IKE
User Activity
User Activity
Information
Information
353
354
-----
VPN IKE
User Activity
Information
355
---
VPN IKE
User Activity
Information
356
---
VPN IKE
User Activity
Information
357
---
VPN IKE
User Activity
Information
358
---
Crypto Test
Crypto Test
Crypto Test
Maintenance
Maintenance
Maintenance
Error
Error
Error
359
360
361
-------
Index of Log Event Messages
Log Event Message
Crypto Hmac-MD5 fest failed
Crypto Hmac-Sha1 test failed
Crypto RSA test failed
Crypto Sha1 test failed
Crypto hardware DES test failed
Crypto hardware 3DES test failed
Crypto hardware DES with SHA test failed
Crypto Hardware 3DES with SHA test failed
Crypto MD5 test failed
VPN Client Policy Provisioning
IKE Initiator: Accepting IPsec proposal
(Phase 2)
IKE Responder: Aggressive Mode complete
(Phase 1)
Error initializing Hardware acceleration for
VPN
PPTP Control Connection Negotiation
Started
PPTP Session Negotiation Started
PPTP Max Retransmission Exceeded
PPTP Control Connection Established
PPTP Tunnel Disconnect from Remote
PPTP Session Established
PPTP Session Disconnect from Remote
PPTP PPP Negotiation Started
PPTP LCP Down
PPTP PPP Session Up
PPTP PPP Down
PPTP PPP Authentication Failed
PPTP LCP Up
PPTP Disconnect Initiated by the User
Disconnecting PPTP Tunnel due to traffic
timeout
PPTP Connect Initiated by the User
PPTP PPP link down
PPTP starting CHAP Authentication
PPTP starting PAP Authentication
PPTP CHAP Authentication Failed. Please
verify PPTP username and password
PPTP PAP Authentication Failed
PPTP PAP Authentication success.
PPTP PAP Authentication Failed. Please
verify PPTP username and password
PPTP PPP Link Up
New Category
Crypto Test
Crypto Test
Crypto Test
Crypto Test
Crypto Test
Crypto Test
Crypto Test
Crypto Test
Crypto Test
VPN Client
VPN IKE
Legacy Category
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
User Activity
User Activity
Priority
Error
Error
Error
Error
Error
Error
Error
Error
Error
Information
Information
ID
362
363
364
365
366
367
368
369
370
371
372
SNMP
Trap
Type
-----------------------
VPN IKE
User Activity
Information
373
---
Firewall Hardware
Maintenance
Error
374
---
PPTP
Maintenance
Information
375
---
PPTP
PPTP
PPTP
PPTP
PPTP
PPTP
PPTP
PPTP
PPTP
PPTP
PPTP
PPTP
PPTP
PPTP
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Information
Information
Information
Information
Information
Information
Information
Information
Information
Information
Information
Information
Information
Information
376
377
378
379
380
381
382
383
384
385
386
387
388
389
-----------------------------
PPTP
PPTP
PPTP
PPTP
PPTP
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Information
Information
Information
Information
Information
390
391
392
393
394
-----------
PPTP
PPTP
PPTP
Maintenance
Maintenance
Maintenance
Information
Information
Information
395
396
397
-------
PPTP
Maintenance
Information
398
---
SonicOS Log Event Reference Guide
31
Index of Log Event Messages
Log Event Message
PPTP PPP Link down
PPTP PPP Link Finished
Received notify. NO_PROPOSAL_CHOSEN
IKE Responder: IKE proposal does not
match (Phase 1)
IKE negotiation aborted due to timeout
Failed payload verification after decryption;
possible preshared key mismatch
Failed payload validation
Received packet retransmission. Drop
duplicate packet
SA is disabled. Check VPN SA settings
Anti-Virus Licenses Exceeded
Received notify: ISAKMP_AUTH_FAILED
Computed hash does not match hash
received from peer; preshared key mismatch
Received notify: PAYLOAD_MALFORMED
Received IPsec SA delete request
Received IKE SA delete request
Received notify: INVALID_COOKIES
Received notify: RESPONDER_LIFETIME
Received notify: INVALID_SPI
PKI Error:
IKE Responder: Proposed local network is
0.0.0.0 but SA has no LAN Default Gateway
RIP disabled on interface %s
RIPv1 enabled on interface %s
RIPv2 enabled on interface %s
RIPv2 compatibility (broadcast) mode
enabled on interface %s
RIP disabled on DMZ interface
RIPv1 enabled on DMZ interface
RIPv2 enabled on DMZ interface
RIPv2 compatibility (broadcast) mode
enabled on DMZ interface
IPsecTunnel status changed
Source routed IP packet dropped
No response from server to Echo Requests,
disconnecting PPTP Tunnel
No response from PPTP server to control
connection requests
No response from PPTP server to call
requests
32
SonicOS Log Event Reference Guide
New Category
PPTP
PPTP
VPN IKE
VPN IKE
Legacy Category
Maintenance
Maintenance
User Activity
User Activity
Priority
Information
Information
Warning
Warning
ID
399
400
401
402
SNMP
Trap
Type
---------
VPN IKE
VPN IKE
User Activity
User Activity
Information
Warning
403
404
-----
VPN IKE
VPN IKE
User Activity
User Activity
Warning
Warning
405
406
-----
VPN IKE
Security Services
VPN IKE
VPN IKE
User Activity
Maintenance
User Activity
User Activity
Information
Information
Warning
Warning
407
408
409
410
---------
VPN IKE
VPN IKE
VPN IKE
VPN IKE
VPN IKE
VPN IKE
VPN PKI
VPN IKE
User Activity
User Activity
User Activity
User Activity
User Activity
User Activity
Maintenance
User Activity
Warning
Information
Information
Information
Information
Information
Error
Warning
411
412
413
414
415
416
417
418
--------------549
RIP
RIP
RIP
RIP
Maintenance
Maintenance
Maintenance
Maintenance
Information
Information
Information
Information
419
420
421
422
8401
8402
8403
8404
RIP
RIP
RIP
RIP
Maintenance
Maintenance
Maintenance
Maintenance
Information
Information
Information
Information
423
424
425
426
8405
8406
8407
8408
VPN
Information
427
801
Intrusion Detection
PPTP
VPN Tunnel
Status
Debug
Maintenance
Warning
Information
428
429
-----
PPTP
Maintenance
Information
430
---
PPTP
Maintenance
Information
431
---
Index of Log Event Messages
Log Event Message
PPTP server rejected control connection
PPTP server rejected the call request
PPP Dial-Up: Trying to failover but Alternate
Profile is manual
WLB Failback initiated by %s
Probing succeeded on %s
E-Mail fragment dropped
Locked-out user logins allowed - lockout
period expired
Locked-out user logins allowed by
administrator
Access rule added
Access rule modified
Access rule deleted
Access rules restored to defaults
PPTP Server is not responding, check if the
server is UP and running.
IKE Initiator: Accepting peer lifetime. (Phase
1)
FTP: PASV response spoof attack dropped
PKI Failure
PKI Failure: Output buffer too small
PKI Failure: Cannot alloc memory
PKI Failure: Reached the limit for local certs,
cant load any more
PKI Failure: Import failed
PKI Failure: Incorrect admin password
PKI Failure: CA certificates store exceeded.
Cannot verify this Local Certificate
PKI Failure: Improper file format. Please
select PKCS#12 (*.p12) file
PKI Failure: Certificate's ID does not match
this Network Security Appliance
PKI Failure: public-private key mismatch
PKI Failure: Duplicate local certificate name
PKI Failure: Duplicate local certificate
PKI Failure: No CA certificates yet loaded
PKI Failure: Internal error
PKI Failure: Temporary memory shortage, try
again
PKI Failure: The certificate chain is circular
PKI Failure: The certificate chain is
incomplete
PKI Failure: The certificate chain has no root
New Category
PPTP
PPTP
WAN Failover
Legacy Category
Maintenance
Maintenance
User Activity
Priority
Information
Information
Information
ID
432
433
434
SNMP
Trap
Type
-------
WAN Failover
WAN Failover
Intrusion Detection
Authenticate
Access
Authenticate
Access
Firewall Rule
Firewall Rule
Firewall Rule
Firewall Rule
PPTP
System Error
System Error
Attack
User Activity
Alert
Alert
Error
Information
435
436
437
438
652
638
550
---
User Activity
Information
439
---
User Activity
User Activity
User Activity
User Activity
Maintenance
Information
Information
Information
Information
Information
440
441
442
443
444
-----------
VPN IKE
User Activity
Information
445
---
Intrusion Detection
VPN PKI
VPN PKI
VPN PKI
VPN PKI
Attack
Maintenance
Maintenance
Maintenance
Maintenance
Error
Error
Error
Error
Error
446
447
448
449
450
551
---------
VPN PKI
VPN PKI
VPN PKI
Maintenance
Maintenance
Maintenance
Error
Error
Error
451
452
453
-------
VPN PKI
Maintenance
Error
454
---
VPN PKI
Maintenance
Error
455
---
VPN PKI
VPN PKI
VPN PKI
VPN PKI
VPN PKI
VPN PKI
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Error
Error
Error
Error
Error
Error
456
457
458
459
460
461
-------------
VPN PKI
VPN PKI
Maintenance
Maintenance
Error
Error
462
463
-----
VPN PKI
Maintenance
Error
464
---
SonicOS Log Event Reference Guide
33
Index of Log Event Messages
Log Event Message
PKI Failure: The certificate or a certificate in
the chain has expired
PKI Failure: The certificate or a certificate in
the chain has a validity period in the future
PKI Failure: The certificate or a certificate in
the chain is corrupt
PKI Failure: The certificate or a certificate in
the chain has a bad signature
PKI Failure: Loaded but could not verify
certificate
PKI Failure: Loaded the certificate but could
not verify it's chain
VPN Cleanup: Dynamic network settings
change
WARNING: Central Gateway does not have
a Relay IP Address. DHCP message
dropped.
DHCP REQUEST received from remote
device
DHCP DISCOVER received from remote
device
DHCP DECLINE received from remote
device
DHCP OFFER received from server
DHCP NACK received from server
ERROR: DHCP over VPN policy is not
defined. Cannot start IKE.
DHCP DISCOVER received from local
device
DHCP REQUEST received from local device
PPP Dial-Up: No peer IP address from DialUp ISP, local and remote IPs will be the
same
Received AV Alert: Your Network Anti-Virus
subscription will expire in 7 days. %s
Received notify: INVALID_ID_INFO
DHCP lease dropped. Lease from Central
Gateway conflicts with Remote Management
IP
Category:
User login denied - User has no privileges for
guest service
WLAN firmware image has been updated
Packet dropped by guest check
Received CFS Alert: Your Content Filtering
subscription will expire in 7 days.
34
SonicOS Log Event Reference Guide
New Category
VPN PKI
Legacy Category Priority
Maintenance
Error
ID
465
SNMP
Trap
Type
---
VPN PKI
Maintenance
Error
466
---
VPN PKI
Maintenance
Error
467
---
VPN PKI
Maintenance
Error
468
---
VPN PKI
Maintenance
Error
469
---
VPN PKI
Maintenance
Error
470
---
VPN
User Activity
Information
471
---
DHCP Relay
Maintenance
Information
472
---
DHCP Relay
Debug
Information
473
---
DHCP Relay
Debug
Information
474
---
DHCP Relay
Debug
Information
475
---
DHCP Relay
DHCP Relay
DHCP Relay
Debug
Debug
Maintenance
Information
Information
Information
476
477
478
-------
DHCP Relay
Debug
Information
479
---
DHCP Relay
PPP Dial Up
Debug
Maintenance
Information
Information
480
481
-----
Security Services
Maintenance
Warning
482
552
VPN IPsec
DHCP Relay
User Activity
Maintenance
Warning
Warning
483
484
-----
None
Authenticate
Access
Wireless
Network Access
Security Services
--User Activity
Debug
Information
485
486
-----
Maintenance
Information
TCP | UDP | ICMP Warning
Maintenance
Warning
487
488
489
----562
Index of Log Event Messages
Log Event Message
Received CFS Alert: Your Content Filtering
subscription has expired.
Received E-Mail Filter Alert: Your E-Mail
Filtering subscription will expire in 7 days.
Received E-Mail Filter Alert: Your E-Mail
Filtering subscription has expired.
ISDN Driver Firmware successfully updated
Global VPN Client License Exceeded:
Connection denied.
Packet dropped by WLAN vpn traversal
check
Registration Update Needed: Restore your
existing security service subscriptions by
clicking here.
Entering FIPS Error State.
WAN Interface not setup
PPPoE enabled but not ready
L2TP enabled but not ready
PPTP enabled but not ready
WAN not ready
VPN disabled for active dial up
DHCP client enabled but not ready
Blocked Quick Mode for Client using Default
KeyId
VPN disabled by administrator
New Category
Security Services
Legacy Category Priority
Maintenance
Warning
ID
490
SNMP
Trap
Type
563
Security Services
Maintenance
Warning
491
564
Security Services
Maintenance
Warning
492
565
Firewall Event
VPN Client
Maintenance
System Error
Information
Information
493
494
--658
Wireless
TCP | UDP | ICMP Warning
495
---
Security Services
Maintenance
Warning
496
---
Crypto Test
Firewall Event
PPPoE
Unused
PPTP
Firewall Event
Unused
DHCP Client
VPN Client
System Error
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
System Error
Error
Information
Information
Information
Information
Information
Information
Information
Error
497
498
499
500
501
502
503
504
505
659
--------------660
Maintenance
Information
506
---
Maintenance
Information
507
---
Maintenance
Information
508
---
Maintenance
Information
509
---
Maintenance
Information
510
---
Maintenance
Information
511
---
Maintenance
Information
512
---
Maintenance
Information
513
---
User Activity
Information
514
---
User Activity
Information
515
---
Authenticate
Access
VPN enabled by administrator
Authenticate
Access
WLAN disabled by administrator
Authenticate
Access
WLAN enabled by administrator
Authenticate
Access
WiFiSec Enforcement disabled by
Authenticate
administrator
Access
WiFiSec Enforcement enabled by
Authenticate
administrator
Access
Wireless MAC Filter List enabled by
Authenticate
administrator
Access
Wireless MAC Filter List disabled by
Authenticate
administrator
Access
PPPoE user name changed by Administrator Authenticate
Access
PPPoE password changed by Administrator Authenticate
Access
SonicOS Log Event Reference Guide
35
Index of Log Event Messages
Log Event Message
IKE Responder: Default LAN gateway is not
set but peer is proposing to use this SA as a
default route
WLAN Reboot
802.11 Management
New Category
VPN IKE
Legacy Category Priority
Attack
Error
ID
516
SNMP
Trap
Type
553
Firewall Hardware
Wireless
Error
Information
517
518
642
---
WLAN recovery
CLI administrator logged out
Wireless
Authenticate
Access
Firewall Event
Network Access
Network Access
Network Access
Network Access
Intrusion Detection
Intrusion Detection
System Error
802.11b
Management
Maintenance
User Activity
Information
Information
519
520
-----
Maintenance
Debug
ICMP
TCP
User Activity
Attack
Attack
Information
Alert
Notice
Notice
Notice
Alert
Alert
521
522
523
524
526
527
528
--554
------555
556
VPN Client
System Error
Information
529
643
PPP Dial Up
Maintenance
Information
530
---
PPP Dial Up
Maintenance
Information
531
---
Wireless
TCP | UDP | ICMP Warning
532
---
VPN IPsec
VPN IPsec
VPN IPsec
TCP | UDP | ICMP Notice
TCP | UDP | ICMP Notice
Debug
Debug
533
534
535
-------
VPN IPsec
Debug
536
---
Network Traffic
Network Access
Connection Traffic Information
Attack
Alert
537
538
--557
Firewall Hardware
System Error
Warning
539
644
Firewall Hardware
System Error
Warning
540
645
Firewall Event
Maintenance
Notice
541
---
PPP Dial Up
User Activity
Information
542
---
VPN IKE
User Activity
Information
543
---
Network Security Appliance initializing
Malformed or unhandled IP packet dropped
ICMP packet dropped no match
Web access request dropped
Web management request allowed
FTP: PORT bounce attack dropped.
FTP: PASV response bounce attack
dropped.
Global VPN Client connection is not allowed.
Appliance is not registered.
Network Modem Mode Enabled: turning off
NAT
Network Modem Mode Disabled: re-enabling
NAT
Internet Access restricted to authorized
users. Dropped packet received in the clear.
IPsec (ESP) packet dropped
IPsec (AH) packet dropped
IPsec (ESP) packet dropped; waiting for
pending IPsec connection
IPsec (AH) packet dropped; waiting for
pending IPsec connection
Connection Closed
FTP: Data connection from non default port
dropped
Real time clock battery failure Time values
may be incorrect
If not already enabled, enabling NTP is
recommended
Maximum number of Bandwidth Managed
rules exceeded upon upgrade to this version.
Some Bandwith settings ignored.
PPP Dial-Up: Previous session was
connected for %s
IKE Initiator: Using secondary gateway to
negotiate
36
SonicOS Log Event Reference Guide
Debug
Index of Log Event Messages
Log Event Message
IKE Initiator drop: VPN tunnel end point does
not match configured VPN Policy Bound to
scope
IKE Responder drop: VPN tunnel end point
does not match configured VPN Policy
Bound to scope
Found Rogue Access Point
WLAN sequence number out of order
Association Flood from WLAN station
User login failed - Guest service limit
reached
Guest Session Timeout
Guest Account Timeout
RIP disabled on WAN interface
RIPv1 enabled on WAN interface
RIPv2 enabled on WAN interface
RIPv2 compatibility (broadcast) mode
enabled on WAN interface
Found Rogue Access Point
Guest login denied. Guest '%s' is already
logged in. Please try again later.
Guest account '%s' created
Guest account '%s' deleted
Guest account '%s' disabled
Guest account '%s' re-enabled
Guest account '%s' pruned
Guest account '%s' re-generated
Guest Idle Timeout
Interface %s Link Is Up
Interface %s Link Is Down
Interface IP Assignment changed: Shutting
down %s
Interface IP Assignment : Binding and
initializing %s
Network for interface %s overlaps with
another interface.
New Category
VPN IKE
Legacy Category Priority
User Activity
Information
ID
544
SNMP
Trap
Type
---
VPN IKE
User Activity
Information
545
---
WLAN IDS
WLAN IDS
WLAN IDS
Authenticate
Access
Authenticate
Access
Authenticate
Access
RIP
RIP
RIP
RIP
WLAN IDS
WLAN IDS
WLAN IDS
User Activity
Alert
Warning
Alert
Information
546
547
548
549
901
902
903
---
User Activity
Information
550
---
User Activity
Information
551
---
Maintenance
Maintenance
Maintenance
Maintenance
Information
Information
Information
Information
552
553
554
555
8409
8410
8411
8412
WLAN IDS
Authenticate
Access
Authenticate
Access
Authenticate
Access
Authenticate
Access
Authenticate
Access
Authenticate
Access
Authenticate
Access
Authenticate
Access
Firewall Event
Firewall Event
Firewall Event
WLAN IDS
User Activity
Alert
Information
556
557
10804
---
User Activity
Information
558
---
User Activity
Information
559
---
User Activity
Information
560
---
User Activity
Information
561
---
User Activity
Information
562
---
User Activity
Information
563
---
User Activity
Information
564
---
System Error
System Error
Maintenance
Warning
Error
Information
565
566
567
646
647
---
Firewall Event
Maintenance
Information
568
---
Firewall Event
Maintenance
Information
569
---
SonicOS Log Event Reference Guide
37
Index of Log Event Messages
Log Event Message
Please connect interface %s to another
network to function properly
RIP Broadcasts for LAN Network %s are
being broadcast over dialup-connection
A prior version of preferences was loaded
because the most recent preferences file
was inaccessible
The preferences file is too large to be saved
in available flash memory
All preference values have been set to
factory default values
Voltages Out of Tolerance
New Category
Firewall Event
Legacy Category Priority
Maintenance
Information
ID
570
SNMP
Trap
Type
---
RIP
Maintenance
Information
571
8413
Firewall Event
System Error
Warning
572
648
Firewall Event
System Error
Warning
573
649
Firewall Event
System Error
Warning
574
650
Firewall Hardware
Error
575
101
Fan Failure
Firewall Hardware
Alert
576
102
Thermal Yellow
Firewall Hardware
Alert
577
103
Thermal Red
Firewall Hardware
Alert
578
104
Thermal Red Timer Exceeded
Firewall Hardware
Alert
579
105
TCP Syn/Fin packet dropped
WLB Spill-over started, configured threshold
exceeded
WLB Spill-over stopped
User login disabled from %s
Network Access
WAN Failover
System
Environment
System
Environment
System
Environment
System
Environment
System
Environment
Attack
Maintenance
Alert
Warning
580
581
558
---
Maintenance
Attack
Warning
Error
582
583
--559
System Error
System Error
System Error
User Activity
Maintenance
Maintenance
Alert
Alert
Alert
Warning
Information
Information
584
585
586
587
588
589
651
653
654
-------
Notice
590
---
PPP Dial Up
LAN UDP | LAN
TCP
Attack
Error
591
566
PPP Dial Up
Attack
Error
592
567
PPPoE
PPPoE
Maintenance
Maintenance
Information
Information
593
594
-----
PPPoE
PPTP
Network Access
Maintenance
Debug
Debug
Information
Debug
Information
595
596
597
-------
WAN Failover
Authenticate
Access
WLB Failover in progress
WAN Failover
WLB Resource is now available
WAN Failover
WLB Resource failed
WAN Failover
Header verification failed
VPN IKE
Received DHCP offer packet has errors
DHCP Client
Received response packet for DHCP request DHCP Client
has errors
IP type %s packet dropped
Network Access
Maximum sequential failed dial attempts (10)
to a single dial-up number: %s
Regulatory requirements prohibit %s from
being re-dialed for 30 minutes
Received PPPoE Active Discovery Offer
Received PPPoE Active Discovery
Session_confirmation
Sending PPPoE Active Discovery Request
PPTP decode failure
ICMP packet allowed
38
SonicOS Log Event Reference Guide
Index of Log Event Messages
Log Event Message
ICMP packet from LAN allowed
Diagnostic Code G
Diagnostic Code H
Diagnostic Code I
DNS packet allowed
Adding L2TP IP pool Address object Failed.
Global VPN Client version cannot enforce
personal firewall. Minimum Version required
is 2.1
Received unencrypted packet in crypto
active state
Spank attack multicast packet dropped
Received ISAKMP packet destined to port
%s
IPS Detection Alert: %s
IPS Prevention Alert: %s
Crypto Hardware AES test failed
A SonicOS Standard to Enhanced Upgrade
was performed
Not all configurations may have been
completely upgraded
Please manually check all system
configurations for correctness of Upgrade
Received IPS Alert: Your Intrusion
Prevention (IDP) subscription has expired.
WLAN client null probing
Payload processing failed
WLAN not in AP mode, DHCP server will not
provide lease to clients on WLAN
BOOTP server response relayed to remote
device
BOOTP Client IP address on LAN conflicts
with remote device IP, deleting IP address
from remote table
BOOTP reply relayed to local device
BOOTP Request received from remote
device
VoIP Call Connected
VoIP Call Disconnected
H.323/RAS Admission Reject
H.323/RAS Admission Confirm
H.323/RAS Admission Request
H.323/RAS Bandwidth Reject
H.323/RAS Disengage Confirm
H.323/RAS Gatekeeper Reject
New Category
Network Access
Firewall Hardware
Firewall Hardware
Firewall Hardware
Network Access
L2TP Server
VPN Client
Legacy Category
Debug
System Error
System Error
System Error
Debug
System Error
User Activity
Priority
Information
Error
Error
Error
Information
Error
Information
ID
598
599
600
601
602
603
604
SNMP
Trap
Type
--655
656
657
--661
---
VPN IKE
User Activity
Warning
605
---
Intrusion Detection
VPN IKE
Attack
Debug | UDP
Alert
Information
606
607
568
---
Intrusion Detection
Intrusion Detection
Crypto Test
Firewall Event
Attack
Attack
Maintenance
Maintenance
Alert
Alert
Error
Information
608
609
610
611
569
570
-----
Firewall Event
Maintenance
Information
612
---
Firewall Event
Maintenance
Information
613
---
Security Services
Maintenance
Warning
614
571
WLAN IDS
VPN IKE
Wireless
WLAN IDS
Debug
Maintenance
Warning
Error
Information
615
616
617
904
-----
BOOTP
Debug
Debug
618
---
BOOTP
Maintenance
Information
619
---
BOOTP
BOOTP
Maintenance
Debug
Information
Debug
620
621
-----
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
Information
Information
Debug
Debug
Debug
Debug
Debug
Debug
622
623
624
625
626
627
628
629
-----------------
SonicOS Log Event Reference Guide
39
Index of Log Event Messages
Log Event Message
H.323/RAS Location Confirm
H.323/RAS Location Reject
H.323/RAS Registration Reject
H.323/H.225 Setup
H.323/H.225 Connect
H.323/H.245 Address
H.323/H.245 End Session
VoIP %s Endpoint added
VoIP %s Endpoint removed
VoIP %s Endpoint not added - configured
'public' endpoint limit reached
H.323/RAS Unknown Message Response
H.323/RAS Disengage Reject
H.323/RAS Unregistration Reject
SIP Request
SIP Response
SIP Register expiration exceeds configured
Signaling inactivity time out
Packet dropped; connection limit for this
source IP address has been reached
Packet dropped; connection limit for this
destination IP address has been reached
Packet destination not in VPN Access list
Application Filters Block Alert: %s
Application Filter Detection Alert: %s
IPComp connection interrupt
IPComp packet dropped
IPComp packet dropped; waiting for pending
IPComp connection
Maximum events per second threshold
exceeded
Maximum syslog data per second threshold
exceeded
SMTP POP-Before-SMTP authentication
failed
Syslog Server cannot be reached
IKE Responder: Proposed IKE ID mismatch
IKE Responder: IP Address already exists in
the DHCP relay table. Client traffic not
allowed.
IKE Responder: %s policy does not allow
static IP for Virtual Adapter.
Received notify: INVALID_PAYLOAD
Drop WLAN traffic from non-SonicPoint
devices
40
SonicOS Log Event Reference Guide
New Category
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
Legacy Category
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
Priority
Debug
Debug
Debug
Debug
Debug
Debug
Debug
Debug
Debug
Warning
ID
630
631
632
633
634
635
636
637
638
639
SNMP
Trap
Type
---------------------
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
VoIP
Debug
Debug
Debug
Debug
Debug
Warning
640
641
642
643
644
645
-------------
Firewall Event
System Error
Alert
646
5238
Firewall Event
System Error
Alert
647
5239
VPN IPsec
Intrusion Detection
Intrusion Detection
IPComp
IPComp
IPComp
Attack
Attack
Attack
Debug
TCP | UDP | ICMP
Debug
Error
Alert
Alert
Debug
Notice
Debug
648
649
650
651
652
653
572
-----------
Firewall Logging
System Error
Critical
654
---
Firewall Logging
System Error
Critical
655
---
Firewall Logging
System Error
Warning
656
---
Network
VPN IKE
VPN Client
Maintenance
System Error
System Error
Information
Warning
Error
657
658
659
-------
VPN Client
System Error
Error
660
---
VPN IKE
Intrusion Detection
User Activity
Attack
Error
Error
661
662
--6434
Index of Log Event Messages
Priority
Warning
ID
663
Information
664
---
PPP Dial Up
Legacy Category
802.11b
Management
802.11b
Management
---
SNMP
Trap
Type
---
Information
665
---
PPP Dial Up
---
Information
666
---
SonicPoint
High Availability
High Availability
High Availability
High Availability
High Availability
High Availability
SonicPoint
Maintenance
System Error
System Error
System Error
System Error
Maintenance
Information
Information
Error
Error
Error
Error
Information
667
668
669
670
671
672
673
----663
664
665
666
---
High Availability
High Availability
Multicast
Multicast
Multicast
System Error
System Error
-------
Information
Error
Information
Information
Debug
674
675
676
677
678
--6234
-------
Multicast
---
Debug
679
---
Multicast
---
Debug
680
---
Multicast
---
Debug
681
---
Multicast
---
Information
682
---
Multicast
---
Notice
683
---
Multicast
---
Alert
684
---
Multicast
---
Alert
685
---
Multicast
Multicast
Multicast
-------
Notice
Notice
Notice
686
687
688
-------
Multicast
Multicast
-----
Debug
Notice
689
690
-----
Multicast
---
Notice
691
---
Log Event Message
WPA MIC Failure
New Category
Wireless
WPA Radius Server Timeout
Wireless
PPP Dial-Up: Dialing not allowed by
schedule. %s
PPP Dial-Up: Connection disconnected as
scheduled.
SonicPoint Status
HA Peer Firewall Rebooted
Error Rebooting HA Peer Firewall
License of HA pair doesn't match: %s
Primary received reboot signal from Backup
Backup received reboot signal from Primary
Synchronizing preferences to HA Peer
Firewall
Success to reach Interface %s probe
Failure to reach Interface %s probe
IGMP V2 client joined multicast Group : %s
IGMP V3 client joined multicast Group : %s
IGMP V3 Membership report received from
interface %s
IGMP V2 Membership report received from
interface %s
Router IGMP General query received on
interface %s
Router IGMP Membership query received
on interface %s
IGMP Leave group message Received on
interface %s
IGMP packet dropped, wrong checksum
received on interface %s
Multicast packet dropped, wrong MAC
address received on interface : %s
Multicast packet dropped, Invalid src IP
received on interface : %s
IGMP packet dropped, decoding error
IGMP Packet Not handled. Packet type : %s
IGMP V3 packet dropped, unsupported
Record type : %s
IGMP V3 reord type : %s not Handled
Multicast UDP packet dropped, no state
entry
Multicast TCP packet dropped
SonicOS Log Event Reference Guide
41
Index of Log Event Messages
Log Event Message
IGMP state table entry time out,deleting
interface : %s for multicast address : %s
IGMP state table entry time out,deleting VPN
SPI :%s for Multicast address : %s
Multicast UDP packet dropped, RTP stateful
failed
Multicast UDP packet dropped, RTCP
stateful failed
Multicast application %s not supported
Adding to multicast policyList , interface : %s
Deleting from Multicast policy list, interface :
%s
Adding to Multicast policyList , VPN SPI : %s
Deleting from Multicast policy list, VPN SPI :
%s
IGMP querier Router detected on interface
%s
IGMP querier Router detected on VPN
tunnel , SPI %S
Exceeded Max multicast address limit
Invalid Product Code Upgrade request
received: %s
Overriding Product Code Upgrade to: %s
Network Monitor: Host %s is offline
Network Monitor: Host %s is online
TCP packet received with invalid SEQ
number; TCP packet dropped
TCP packet received with invalid ACK
number; TCP packet dropped
TCP stateful inspection: Invalid flag; TCP
packet dropped
TCP stateful inspection: Bad header; TCP
packet dropped
TCP connection reject received; TCP
connection dropped
TCP connection abort received; TCP
connection dropped
EIGRP packet dropped
ARP request packet sent
ARP response packet received
ARP request packet received
ARP response packet sent
VPN policy count received exceeds the limit;
%s
Sending LCP Echo Request
42
SonicOS Log Event Reference Guide
New Category
Multicast
Legacy Category Priority
--Debug
ID
692
SNMP
Trap
Type
---
Multicast
---
Debug
693
---
Multicast
---
Warning
694
---
Multicast
---
Warning
695
---
Multicast
Multicast
Multicast
-------
Information
Debug
Debug
696
697
698
-------
Multicast
Multicast
-----
Debug
Debug
699
700
-----
Multicast
---
Debug
701
---
Multicast
---
Debug
702
---
Multicast
Firewall Event
-----
Warning
Error
703
704
-----
Firewall Event
Network Monitor
Network Monitor
Network
------Debug
Error
Alert
Alert
Debug
705
706
707
708
--14005
14006
---
Network
Debug
Debug
709
---
Network
Debug
Information
710
---
Network
Debug
Debug
711
---
Network
Debug
Debug
712
---
Network
Debug
Debug
713
---
Network Access
Network
Network
Network
Network
VPN
Debug
--------System Error
Notice
Information
Information
Information
Information
Error
714
715
716
717
718
719
-------------
PPPoE
Maintenance
Information
720
---
Index of Log Event Messages
New Category
PPPoE
PPPoE
PPPoE
Network Access
Network Access
Legacy Category
Maintenance
Maintenance
Maintenance
-----
Priority
Information
Information
Information
Information
Information
ID
721
722
723
724
725
SNMP
Trap
Type
-----------
Network Access
---
Information
726
---
SonicPoint
Maintenance
Information
Information
727
728
-----
Maintenance
Information
729
---
Virtual Access Point is enabled
SonicPoint
Authenticate
Access
Authenticate
Access
SonicPoint
730
---
Virtual Access Point is disabled
SonicPoint
731
---
Packet dropped by WLAN SSL-VPN
enforcement check
SSL-VPN enforcement
Source IP address connection status: %s
Destination IP address connection status:
%s
SMTP authentication problem:%s
PPPoE Client: Previous session was
connected for %s
Packet dropped. No firewall rule associated
with VPN policy.
NetBIOS settings were not upgraded. Use
Network>IP Helper to configure NetBIOS
support
LAN Subnet configurations were not
upgraded.
Time of day settings for firewall policies were
not upgraded.
Hardware Failover settings were not
upgraded.
User login denied - RADIUS communication
problem
User login denied - LDAP authentication
failure
User login denied - LDAP server timeout
User login denied - LDAP server down or
misconfigured
User login denied - LDAP communication
problem
Wireless
802.11b
Information
Management
802.11b
Information
Management
TCP | UDP | ICMP Warning
732
---
Wireless
Firewall Event
Firewall Event
Maintenance
-----
Information
Information
Information
733
734
735
-------
Firewall Logging
PPPoE
System Error
Maintenance
Warning
Information
737
738
-----
VPN
System Error
Alert
739
---
Firewall Event
Maintenance
Information
740
---
Firewall Event
Maintenance
Information
741
---
Firewall Event
Maintenance
Information
742
---
Firewall Event
Maintenance
Information
743
---
RADIUS
User Activity
Warning
744
---
RADIUS
User Activity
Information
745
---
RADIUS
RADIUS
User Activity
User Activity
Warning
Warning
746
747
-----
RADIUS
User Activity
Warning
748
---
Log Event Message
Received LCP Echo Request
Sending LCP Echo Reply
Received LCP Echo Reply
Guest Services drop traffic to deny network
Guest Services pass traffic to access allow
network
WLAN max concurrent users reached
already
SonicPoint Provision
WLAN disabled by schedule
WLAN enabled by schedule
SonicOS Log Event Reference Guide
43
Index of Log Event Messages
Log Event Message
User login denied - invalid credentials on
LDAP server
User login denied - insufficient access on
LDAP server
User login denied - LDAP schema mismatch
Allowed LDAP server certificate with wrong
host name
User login denied - LDAP server name
resolution failed
User login denied - RADIUS server name
resolution failed
User login denied - LDAP server certificate
not valid
User login denied - TLS or local certificate
problem
User login denied - LDAP directory mismatch
LDAP server does not allow CHAP
User login denied - user already logged in
TCP handshake violation detected; TCP
connection dropped
Access attempt from host out of compliance
with GSC policy
GSC policy out-of-date on host
Access attempt from host without GSC
installed
Failed to synchronize license information
with Licensing Server. Please see http://
help.mysonicwall.com/licsyncfail.html (code:
%s)
ADConnector %s response timed-out;
applying caching policy
DDNS Failure: Provider %s
DDNS Failure: Provider %s
DDNS Failure: Provider %s
DDNS Update success for domain %s
DDNS Warning: Provider %s
DDNS association %s taken Offline locally
DDNS association %s added
DDNS association %s enabled
DDNS association %s disabled
DDNS Association %s put on line
All DDNS associations have been deleted
DDNS association %s deactivated
DDNS association %s deleted
44
SonicOS Log Event Reference Guide
New Category
RADIUS
Legacy Category Priority
User Activity
Warning
ID
749
SNMP
Trap
Type
---
RADIUS
User Activity
Warning
750
---
RADIUS
RADIUS
User Activity
User Activity
Warning
Warning
751
752
-----
RADIUS
User Activity
Warning
753
---
RADIUS
User Activity
Warning
754
---
RADIUS
User Activity
Warning
755
---
RADIUS
User Activity
Warning
756
---
RADIUS
RADIUS
Authenticate
Access
Network Access
User Activity
User Activity
User Activity
Warning
Warning
Information
757
758
759
-------
---
Notice
760
---
Security Services
Maintenance
Information
761
---
Security Services
Security Services
Maintenance
Maintenance
Information
Information
762
763
--8627
Security Services
Maintenance
Warning
766
8628
Microsoft AD
---
Error
769
---
DDNS
DDNS
DDNS
DDNS
DDNS
DDNS
DDNS
DDNS
DDNS
DDNS
DDNS
DDNS
DDNS
System Error
System Error
System Error
Maintenance
System Error
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Maintenance
Error
Error
Error
Information
Warning
Information
Information
Information
Information
Information
Information
Information
Information
773
774
775
776
777
778
779
780
781
782
783
784
785
---------------------------
Index of Log Event Messages
Log Event Message
DDNS association %s updated
IPS Detection Alert: %s
IPS Prevention Alert: %s
DPI-SSL: %s
Application Firewall Alert: %s
Anti-Spyware Prevention Alert: %s
Anti-Spyware Detection Alert: %s
Anti-Spyware Service Expired
Outbound connection to RBL-listed SMTP
server dropped
Inbound connection from RBL-listed SMTP
server dropped
SMTP server found on RBL blacklist
No valid DNS server specified for RBL
lookups
Interface statistics report
SonicPoint statistics report
Gateway Anti-Virus Alert: %s
Gateway Anti-Virus Service expired
PPP Dial-Up: Invalid DNS IP address
returned from Dial-Up ISP; overriding using
dial-up profile settings
WAN node exceeded: Connection dropped
because too many IP addresses are in use
on your LAN
Adding Dynamic Entry for Bound MAC
Address
MAC address collides with Static ARP Entry
with Bound MAC address; packet dropped
Too many gratuitous ARPs detected
ARP unused/spare
Incoming call received for Remotely
Triggered Dial-out session
Remotely Triggered Dial-out session started.
Requesting authentication
Incorrect authentication received for
Remotely Triggered Dial-out
Successful authentication received for
Remotely Triggered Dial-out
Authentication timeout during Remotely
Triggered Dial-out session
Remotely Triggered Dial-out session ended.
Valid WAN bound data found. Normal dialup sequence will commence
Backup will be shut down in %s minutes
New Category
DDNS
Intrusion Detection
Intrusion Detection
DPI SSL
Application Firewall
Intrusion Detection
Intrusion Detection
Security Services
RBL
Legacy Category
--Attack
Attack
Network Access
User Activity
Attack
Attack
Maintenance
---
Priority
Information
Alert
Alert
Information
Alert
Alert
Alert
Warning
Notice
ID
786
789
790
791
793
794
795
796
797
SNMP
Trap
Type
--6435
6436
--13201
6437
6438
8631
---
RBL
---
Notice
798
---
RBL
RBL
-----
Notice
Error
799
800
-----
GMS
GMS
Security Services
Security Services
PPP Dial Up
----Attack
Maintenance
Maintenance
Information
Information
Alert
Warning
Information
805
806
809
810
811
----8632
8633
---
Firewall Event
System Error
Error
812
---
Network
---
Information
813
---
Network
---
Notice
814
---
Network
Network
Authenticate
Access
Authenticate
Access
Authenticate
Access
Authenticate
Access
Authenticate
Access
Authenticate
Access
----User Activity
Warning
Debug
Information
815
816
817
-------
User Activity
Information
818
---
User Activity
Information
819
---
User Activity
Information
820
---
User Activity
Information
821
---
User Activity
Information
822
---
System Error
Error
823
---
High Availability
SonicOS Log Event Reference Guide
45
Index of Log Event Messages
Log Event Message
Backup shut down because license is
expired
Backup active
DHCP Scopes altered automatically due to
change in network settings for interface %s
DHCP lease file in the flash is corrupted;
read failed
Failed to write DHCP leases to flash
DHCP leases written to flash
Invalid VLAN packet dropped
IP address conflict detected from ethernet
address %s
OCSP sending request.
OCSP send request message failed.
OCSP received response.
OCSP received response error.
OCSP Resolved Domain Name.
OCSP Failed to Resolve Domain Name.
OCSP Internal error handling received
response.
SYN Flood Mode changed by user to: Watch
and report possible SYN floods
SYN Flood Mode changed by user to: Watch
and proxy WAN connections when under
attack
SYN Flood Mode changed by user to:
Always proxy WAN connections
Possible SYN flood detected on WAN IF %s
- switching to connection-proxy mode
Possible SYN Flood on IF %s
SYN flood ceased or flooding machines
blacklisted - connection proxy disabled
SYN Flood blacklisting enabled by user
SYN Flood blacklisting disabled by user
SYN-Flooding machine %s blacklisted
Machine %s removed from SYN flood
blacklist
Possible SYN Flood on IF %s continues
Possible SYN Flood on IF %s has ceased
SYN Flood Blacklist on IF %s continues
TCP SYN received
CRL has expired
Failed to find certificate
CRL missing - Issuer requires CRL checking.
CRL validation failure for Root Certificate
46
SonicOS Log Event Reference Guide
New Category
High Availability
Legacy Category Priority
System Error
Error
ID
824
SNMP
Trap
Type
---
High Availability
Firewall Event
System Error
---
Information
Information
825
832
-----
Firewall Event
System Error
Warning
833
---
Firewall Event
Firewall Event
Network
Network
System Error
Maintenance
--Maintenance
Warning
Information
Alert
Warning
834
835
836
847
---------
VPN PKI
VPN PKI
VPN PKI
VPN PKI
VPN PKI
VPN PKI
VPN PKI
User Activity
User Activity
User Activity
User Activity
User Activity
User Activity
User Activity
Information
Error
Information
Error
Information
Error
Error
848
849
850
851
852
853
854
---------------
Intrusion Detection
Debug
Warning
856
---
Intrusion Detection
Debug
Warning
857
---
Intrusion Detection
Debug
Warning
858
---
Intrusion Detection
Debug
Alert
859
---
Intrusion Detection
Intrusion Detection
Debug
Debug
Alert
Alert
860
861
-----
Intrusion Detection
Intrusion Detection
Intrusion Detection
Intrusion Detection
Debug
Debug
Debug
Debug
Warning
Warning
Alert
Alert
862
863
864
865
---------
Intrusion Detection
Intrusion Detection
Intrusion Detection
Intrusion Detection
VPN PKI
VPN PKI
VPN PKI
VPN PKI
Debug
Debug
Debug
Debug
User Activity
User Activity
User Activity
User Activity
Warning
Alert
Warning
Debug
Alert
Alert
Alert
Alert
866
867
868
869
874
875
876
877
-----------------
Index of Log Event Messages
Log Event Message
Cannot Validate Issuer Path
WLAN radio frequency threat detected
Unable to resolve dynamic address object
System clock manually updated
HTTP method detected; examining stream
for host header
IP Header checksum error; packet dropped
TCP checksum error; packet dropped
UDP checksum error; packet dropped
ICMP checksum error; packet dropped
TCP packet received with invalid header
length; TCP packet dropped
TCP packet received on non-existent/closed
connection; TCP packet dropped
TCP packet received without mandatory
SYN flag; TCP packet dropped
TCP packet received without mandatory
ACK flag; TCP packet dropped
TCP packet received on a closing
connection; TCP packet dropped
TCP packet received with SYN flag on an
existing connection; TCP packet dropped
TCP packet received with invalid SACK
option length; TCP packet dropped
TCP packet received with invalid MSS option
length; TCP packet dropped
TCP packet received with invalid option
length; TCP packet dropped
TCP packet received with invalid source
port; TCP packet dropped
TCP packet received with invalid SYN Flood
cookie; TCP packet dropped
RST-Flooding machine %s blacklisted
RST Flood Blacklist on IF %s continues
Machine %s removed from RST flood
blacklist
FIN-Flooding machine %s blacklisted
FIN Flood Blacklist on IF %s continues
Machine %s removed from FIN flood
blacklist
Possible RST Flood on IF %s
Possible FIN Flood on IF %s
Possible RST Flood on IF %s has ceased
Possible FIN Flood on IF %s has ceased
New Category
VPN PKI
RF Management
Dynamic Address
Objects
Firewall Logging
Network Access
Legacy Category
User Activity
--Maintenance
Priority
Alert
Warning
Information
ID
878
879
880
SNMP
Trap
Type
-------
--TCP
Notice
Debug
881
882
-----
Network Access
Network Access
Network Access
Network Access
Network
TCP|UDP
TCP
UDP
UDP
Debug
Notice
Notice
Notice
Notice
Debug
883
884
885
886
887
-----------
Network
Debug
Debug
888
---
Network
Debug
Debug
889
---
Network
Debug
Debug
890
---
Network
Debug
Debug
891
---
Network
Debug
Information
892
---
Network
Debug
Debug
893
---
Network
Debug
Debug
894
---
Network
Debug
Debug
895
---
Network
Debug
Debug
896
---
Network
Debug
Information
897
---
Intrusion Detection
Intrusion Detection
Intrusion Detection
Debug
Debug
Debug
Alert
Warning
Alert
898
899
900
-------
Intrusion Detection
Intrusion Detection
Intrusion Detection
Debug
Debug
Debug
Alert
Warning
Alert
901
902
903
-------
Intrusion Detection
Intrusion Detection
Intrusion Detection
Intrusion Detection
Debug
Debug
Debug
Debug
Alert
Alert
Alert
Alert
904
905
906
907
---------
SonicOS Log Event Reference Guide
47
Index of Log Event Messages
Log Event Message
Possible RST Flood on IF %s continues
Possible FIN Flood on IF %s continues
Packet Dropped - IP TTL expired
Added host entry to dynamic address object
Removed host entry from dynamic address
object
IKE Responder: Phase 1 Authentication
Method does not match
IKE Responder: Phase 1 encryption
algorithm does not match
IKE Responder: Phase 1 encryption
algorithm keylength does not match
IKE Responder: Phase 1 hash algorithm
does not match
IKE Responder: Phase 1 XAUTH required
but policy has no user name
IKE Responder: Phase 1 XAUTH required
but policy has no user password
IKE Responder: Phase 1 DH Group does not
match
IKE Responder: AH authentication algorithm
does not match
IKE Responder: ESP encryption algorithm
does not match
IKE Responder: ESP authentication
algorithm does not match
IKE Responder: AH authentication key
length does not match
IKE Responder: ESP encryption key length
does not match
IKE Responder: ESP authentication key
length does not match
IKE Responder: AH authentication key
rounds does not match
IKE Responder: ESP encryption key rounds
does not match
IKE Responder: ESP authentication key
rounds does not match
IKE Responder: IP Compression algorithm
does not match
IKE Initiator: Remote party timeout Retransmitting IKE request.
IKE Responder: Remote party timeout Retransmitting IKE request.
IKE Responder: IPsec protocol mismatch
48
SonicOS Log Event Reference Guide
New Category
Intrusion Detection
Intrusion Detection
Network
Dynamic Address
Objects
Dynamic Address
Objects
VPN IKE
Legacy Category
Debug
Debug
Debug
Maintenance
Priority
Warning
Warning
Warning
Information
ID
908
909
910
911
SNMP
Trap
Type
---------
Maintenance
Information
912
---
User Activity
Warning
913
---
VPN IKE
User Activity
Warning
914
---
VPN IKE
User Activity
Warning
915
---
VPN IKE
User Activity
Warning
916
---
VPN IKE
User Activity
Warning
917
---
VPN IKE
User Activity
Warning
918
---
VPN IKE
User Activity
Warning
919
---
VPN IKE
User Activity
Warning
920
---
VPN IKE
User Activity
Warning
921
---
VPN IKE
User Activity
Warning
922
---
VPN IKE
User Activity
Warning
923
---
VPN IKE
User Activity
Warning
924
---
VPN IKE
User Activity
Warning
925
---
VPN IKE
User Activity
Warning
926
---
VPN IKE
User Activity
Warning
927
---
VPN IKE
User Activity
Warning
928
---
VPN IKE
User Activity
Warning
929
---
VPN IKE
User Activity
Information
930
---
VPN IKE
User Activity
Information
931
---
VPN IKE
User Activity
Warning
932
---
Index of Log Event Messages
Log Event Message
IKE Initiator: Proposed IKE ID mismatch
IKE Responder: Peer's local network does
not match VPN policy's <b>Destination
Network</b>
IKE Responder: Peer's destination network
does not match VPN policy's <b>Local
Network</b>
IKE Responder: Route table overrides VPN
policy
IKE Initiator: IKE proposal does not match
(Phase 1)
IKEv2 Initiator: Send IKE_SA_INIT request
IKEv2 Responder: Received IKE_SA_INIT
request
IKEv2 Initiator: Send IKE_AUTH request
IKEv2 Responder: Received IKE_AUTH
request
IKEv2 Authentication successful
IKEv2 Accept IKE SA Proposal
IKEv2 Accept IPsec SA Proposal
IKEv2 Initiator: Send CREATE_CHILD_SA
request
IKEv2 Responder: Received
CREATE_CHILD_SA request
IKEv2 Send delete IKE SA request
IKEv2 Received delete IKE SA request
IKEv2 Send delete IPsec SA request
IKEv2 Received delete IPsec SA request
IKEv2 Responder: Peer's destination
network does not match VPN policy's
<b>Local Network</b>
IKEv2 Responder: Peer's local network does
not match VPN policy's <b>Destination
Network</b>
IKEv2 Payload processing error
IKEv2 Initiator: Negotiations failed. Extra
payloads present.
IKEv2 Initiator: Negotiations failed. Missing
required payloads.
IKEv2 Initiator: Negotiations failed. Invalid
input state.
IKEv2 Initiator: Negotiations failed. Invalid
output state.
IKEv2 Payload validation failed.
IKEv2 Unable to find IKE SA
IKEv2 Decrypt packet failed
New Category
VPN IKE
VPN IKE
Legacy Category Priority
User Activity
Warning
User Activity
Warning
ID
933
934
SNMP
Trap
Type
-----
VPN IKE
User Activity
Warning
935
---
VPN IKE
User Activity
Warning
936
---
VPN IKE
User Activity
Warning
937
---
VPN IKE
VPN IKE
User Activity
User Activity
Information
Information
938
939
-----
VPN IKE
VPN IKE
User Activity
User Activity
Information
Information
940
941
-----
VPN IKE
VPN IKE
VPN IKE
VPN IKE
User Activity
User Activity
User Activity
User Activity
Information
Information
Information
Information
942
943
944
945
---------
VPN IKE
User Activity
Information
946
---
VPN IKE
VPN IKE
VPN IKE
VPN IKE
VPN IKE
User Activity
User Activity
User Activity
User Activity
User Activity
Information
Information
Information
Information
Information
947
948
949
950
951
-----------
VPN IKE
User Activity
Information
952
---
VPN IKE
VPN IKE
User Activity
User Activity
Warning
Warning
953
954
-----
VPN IKE
User Activity
Warning
955
---
VPN IKE
User Activity
Warning
956
---
VPN IKE
User Activity
Warning
957
---
VPN IKE
VPN IKE
VPN IKE
User Activity
User Activity
User Activity
Warning
Warning
Warning
958
959
960
-------
SonicOS Log Event Reference Guide
49
Index of Log Event Messages
Log Event Message
IKEv2 Out of memory
IKEv2 Responder: Policy for remote IKE ID
not found
IKEv2 Process Message queue failed
IKEv2 Invalid state
IKE Responder: Client Policy has no VPN
Access Networks assigned. Check
Configuration.
IKEv2 Invalid SPI size
IKEv2 VPN Policy not found
IKEv2 IPsec proposal does not match
IKEv2 IPsec attribute not found
IKEv2 IKE attribute not found
IKEv2 Peer is not responding. Negotiation
aborted.
IKEv2 Initiator: Remote party timeout Retransmitting IKEv2 request.
IKEv2 Initiator: Received IKE_SA_INT
response
IKEv2 Initiator: Received IKE_AUTH
response
IKEv2 Initiator: Received
CREATE_CHILD_SA response
IKEv2 Responder: Send IKE_SA_INIT
response
IKEv2 Responder: Send IKE_AUTH
response
IKEv2 negotiation complete
IKEv2 Function sendto() failed to transmit
packet.
IKEv2 Initiator: Proposed IKE ID mismatch
IKEv2 IKE proposal does not match
IKEv2 Received notify status payload
IKEv2 Received notify error payload
IKEv2 No NAT device detected between
negotiating peers
IKEv2 NAT device detected between
negotiating peers
User login denied - not allowed by policy rule
User login denied - not found locally
User login denied - SSO agent timeout
50
SonicOS Log Event Reference Guide
New Category
VPN IKE
VPN IKE
Legacy Category Priority
User Activity
Warning
User Activity
Error
ID
961
962
SNMP
Trap
Type
-----
VPN IKE
VPN IKE
VPN IKE
User Activity
User Activity
System Error
Warning
Warning
Error
963
964
965
-------
VPN IKE
VPN IKE
VPN IKE
VPN IKE
VPN IKE
VPN IKE
User Activity
User Activity
User Activity
User Activity
User Activity
User Activity
Warning
Warning
Warning
Warning
Warning
Warning
966
967
968
969
970
971
-------------
VPN IKE
User Activity
Information
972
---
VPN IKE
User Activity
Information
973
---
VPN IKE
User Activity
Information
974
---
VPN IKE
User Activity
Information
975
---
VPN IKE
User Activity
Information
976
---
VPN IKE
User Activity
Information
977
---
VPN IKE
VPN IKE
User Activity
User Activity
Information
Error
978
979
-----
VPN IKE
VPN IKE
VPN IKE
VPN IKE
VPN IKE
User Activity
User Activity
User Activity
User Activity
User Activity
Warning
Warning
Information
Warning
Information
980
981
982
983
984
-----------
VPN IKE
User Activity
Information
985
---
Authenticate
Access
Authenticate
Access
Authenticate
Access
User Activity
Information
986
---
User Activity
Information
987
---
User Activity
Warning
988
---
Index of Log Event Messages
Log Event Message
User login denied - SSO agent configuration
error
User login denied - SSO agent
communication problem
User login denied - SSO agent name
resolution failed
SSO returned a user name that is too long
SSO returned a domain name that is too
long
Configuration mode administration session
started
Configuration mode administration session
ended
Read-only mode GUI administration session
started
Non-config mode GUI administration session
started
GUI administration session ended
SSL Control: Website found in blacklist
SSL Control: Website found in whitelist
SSL Control: HTTPS via SSL2
SSL Control: Certificate with invalid date
SSL Control: Self-signed certificate
SSL Control: Weak cipher being used
SSL Control: Untrusted CA
SSL Control: Certificate chain not complete
SSL Control: Failed to decode Server Hello
User logged out - logout detected by SSO
Bind to LDAP server failed
Using LDAP without TLS - highly insecure
LDAP using non-administrative account VPN client user will not be able to change
passwords
IKEv2 Responder: Send
CREATE_CHILD_SA response
IKEv2 Send delete IKE SA response
IKEv2 Send delete IPsec SA response
IKEv2 Received delete IKE SA response
IKEv2 Received delete IPsec SA response
3G %s device detected
PPP message: %s
Chat started
Legacy Category Priority
User Activity
Warning
ID
989
SNMP
Trap
Type
---
User Activity
Warning
990
---
User Activity
Warning
991
---
User Activity
User Activity
Warning
Warning
992
993
-----
User Activity
Information
994
---
User Activity
Information
995
---
User Activity
Information
996
---
User Activity
Information
997
---
User Activity
Information
998
---
Blocked Sites
Blocked Sites
Blocked Sites
Blocked Sites
Blocked Sites
Blocked Sites
Blocked Sites
Blocked Sites
Blocked Sites
User Activity
Information
Information
Information
Information
Information
Information
Information
Information
Information
Information
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
---------------------
System Error
System Error
System Error
Error
Alert
Warning
1009 --1010 --1011 ---
VPN IKE
User Activity
Information
1012 ---
VPN IKE
VPN IKE
VPN IKE
VPN IKE
Firewall Hardware
User Activity
User Activity
User Activity
User Activity
System
Environment
--User Activity
Information
Information
Information
Information
Information
1013
1014
1015
1016
1017
Information
Information
1018 --1019 ---
New Category
Authenticate
Access
Authenticate
Access
Authenticate
Access
SSO
SSO
Authenticate
Access
Authenticate
Access
Authenticate
Access
Authenticate
Access
Authenticate
Access
Network Access
Network Access
Network Access
Network Access
Network Access
Network Access
Network Access
Network Access
Network Access
Authenticate
Access
RADIUS
RADIUS
RADIUS
PPP
PPP Dial Up
SonicOS Log Event Reference Guide
-----------
51
Index of Log Event Messages
Log Event Message
Chat completed
Chat wrote '%s'
Chat %s
Chat failed: %s
Unable to send message to dial-up task
Diagnostic Code J
3G Dial-up: %s.
3G Dial-up: data usage limit reached for the
'%s' billing cycle. Disconnecting the 3G
session.
%s auto-dial failed: Current Connection
Model is configured as Ethernet Only
TCP packet received with non-permitted
option; TCP packet dropped
TCP packet received with invalid Window
Scale option length; TCP packet dropped
TCP packet received with invalid Window
Scale option value; TCP packet dropped
Chat started by '%s'
Problem occurred during user group
membership retrieval
Received AF Alert: Your Application Firewall
(AF) subscription has expired.
User login denied - password expired
New Category
PPP Dial Up
PPP Dial Up
PPP Dial Up
PPP Dial Up
PPP Dial Up
Firewall Hardware
PPP Dial Up
PPP Dial Up
Legacy Category
User Activity
User Activity
User Activity
User Activity
System Error
System Error
User Activity
User Activity
Priority
Information
Information
Information
Information
Error
Error
Alert
Alert
ID
1020
1021
1022
1023
1024
1025
1026
1027
PPP Dial Up
System Error
Alert
1028 ---
Network
Debug
Debug
1029 ---
Network
Debug
Debug
1030 ---
Network
Debug
Debug
1031 ---
PPP Dial Up
Authenticate
Access
Security Services
User Activity
User Activity
Information
Warning
1032 --1033 ---
Maintenance
Warning
1034 8635
User Activity
Information
1035 ---
User Activity
Error
1036 ---
-----------
Information
Information
Information
Alert
Alert
1037
1038
1039
1040
1041
-----------
---------
Information
Error
Information
Information
1042
1043
1044
1045
5424
5425
-----
-----
Information
Information
1046 --1047 ---
---
Information
1048 ---
-----
Information
Information
1049 --1050 ---
Authenticate
Access
IKE Responder: IKE Phase 1 exchange does VPN IKE
not match
PPP Dial-Up: Starting PPP
PPP Dial Up
Dial-up: Traffic generated by '%s'
PPP Dial Up
Dial-up: Session initiated by data packet
PPP Dial Up
DHCP Server: IP conflict detected
Firewall Event
DHCP Server: Received DHCP decline from Firewall Event
client
Physical environment normal
Firewall Hardware
Power supply without redundancy
Firewall Hardware
Discovered HA %s Firewall
High Availability
Diagnostic Auto-restart scheduled for %s
Firewall Event
minutes from now
Diagnostic Auto-restart canceled
Firewall Event
"As per Diagnostic Auto-restart configuration Firewall Event
request, restarting system"
User login denied - password doesn't meet
Authenticate
constraints
Access
Settings Import: %s
Firewall Event
VPN Policy Added
VPN
52
SonicOS Log Event Reference Guide
SNMP
Trap
Type
----------5423
--7643
Index of Log Event Messages
Log Event Message
VPN Policy Deleted
VPN Policy Modified
PC Card removed.
PC Card inserted.
3G: No SIM detected
PC Card: No device detected
Peer firewall rebooting (%s)
Primary firewall rebooting itself as it
transitioned from Active to Idle while
Preempt
Backup firewall rebooting itself as it
transitioned from Active to Idle while
Preempt
Crypto SHA1 based DRNG KAT test failed
Successfully sent Preference file to remote
backup server
Failed to send Preference file to remote
backup server, Error: %s
Successfully sent TSR file to remote backup
server
Failed to send TSR file to remote backup
server, Error: %s
Successfully sent %s file to remote backup
server
Failed to send file to remote backup server,
Error: %s
System shutdown by administrator. Power
cycle required.
Multiple DHCP Servers are detected on
network
External Web Server Host Resolution Failed
%s
Invalid DNS Server will not be accepted by
the dynamic client
DHCP Server sanity check passed %s
DHCP Server sanity check failed %s
SSO agent returned error
L2TP Tunnel Negotiation %s
SSO agent is down
SSO agent is up
SonicPointN Status
SonicPointN Provision
SSLVPN zone remote user login allowed
SNMP
Trap
Type
----5418
5419
---------
New Category
VPN
VPN
Firewall Hardware
Firewall Hardware
Firewall Hardware
Firewall Hardware
High Availability
High Availability
Legacy Category
-----------------
Priority
Information
Information
Alert
Alert
Alert
Alert
Information
Information
ID
1051
1052
1053
1054
1055
1056
1057
1058
High Availability
---
Information
1059 ---
Crypto Test
Firewall Event
--Maintenance
Error
Information
1060 --1061 ---
Firewall Event
Maintenance
Information
1062 ---
Firewall Event
Maintenance
Information
1063 ---
Firewall Event
Maintenance
Information
1064 ---
Firewall Event
Maintenance
Information
1065 ---
Firewall Event
Maintenance
Information
1066 ---
Firewall Event
---
Alert
1067 5242
Firewall Event
---
Warning
1068 ---
Authenticate
Access
Firewall Event
---
Error
1069 ---
---
Information
1070 ---
Firewall Event
Firewall Event
SSO
L2TP Client
SSO
SSO
SonicPoint-N
SonicPoint-N
Authenticate
Access
----User Activity
--User Activity
User Activity
----User Activity
Critical
Critical
Warning
Information
Alert
Alert
Information
Information
Information
1071
1072
1073
1074
1075
1076
1077
1078
1080
SonicOS Log Event Reference Guide
-------------------
53
Index of Log Event Messages
Log Event Message
SSL Control: Certificate with MD5 Digest
Signature Algorithm
%s is operational.
%s is unavailable.
Anti-Spam service is enabled by
administrator.
Anti-Spam service is disabled by
administrator.
Your Anti-Spam Service subscription has
expired.
SMTP connection limit is reached.
Connection is dropped.
Anti-Spam Startup Failure - %s
Anti-Spam Teardown Failure - %s
DHCP Server: Received DHCP message
from untrusted relay agent
Outbound connection to GRID-listed SMTP
server dropped
Inbound connection from GRID-listed SMTP
server dropped
SMTP server found on Reject List
No valid DNS server specified for GRID
lookups
Unprocessed email received from MTA on
Inbound SMTP port
Processed Email received from Email
Security Service
SCEP Client: %s
Possible DNS rebind attack detected
DNS rebind attack blocked
Network Monitor: Policy %s status is UP
Network Monitor: Policy %s status is DOWN
Network Monitor: Policy %s status is
UNKNOWN
Network Monitor: Host %s status is
UNKNOWN
Network Monitor Policy %s Added
Network Monitor Policy %s Deleted
Network Monitor Policy %s Modified
Message blocked by Real-Time Email
Scanner
CSR Generation: %s
Assigned IP address %s
Released IP address %s
Ftp server accepted the connection
54
SonicOS Log Event Reference Guide
New Category
Network Access
Legacy Category Priority
Blocked Sites
Information
SNMP
Trap
Type
ID
1081 ---
Anti-Spam
Anti-Spam
Anti-Spam
-------
Warning
Warning
Information
1082 13801
1083 13802
1084 13803
Anti-Spam
---
Information
1085 13804
Anti-Spam
---
Warning
1086 13805
Anti-Spam
---
Warning
1087 13806
Anti-Spam
Anti-Spam
Firewall Event
-------
Warning
Warning
Notice
1088 13807
1089 13808
1090 ---
Anti-Spam
---
Notice
1091 13809
Anti-Spam
---
Notice
1092 13810
Anti-Spam
Anti-Spam
-----
Notice
Error
1093 13811
1094 13812
Anti-Spam
---
Information
1095 13813
Anti-Spam
---
Information
1096 13814
VPN PKI
Intrusion Detection
Intrusion Detection
Network Monitor
Network Monitor
Network Monitor
-------------
Notice
Alert
Alert
Alert
Alert
Alert
1097
1098
1099
1100
1101
1102
Network Monitor
---
Alert
1103 14004
Network Monitor
Network Monitor
Network Monitor
Anti-Spam
---------
Information
Information
Information
Information
1104
1105
1106
1108
---------
VPN PKI
DHCP Server
DHCP Server
FTP
---------
Information
Information
Information
Debug
1109
1110
1111
1112
---------
--6465
6466
14001
14002
14003
Index of Log Event Messages
Log Event Message
Ftp client user name was sent
Ftp client user logged in successfully
Ftp client user logged in failed
Ftp client user logged out
User login denied - SSO probe failed
New Category
FTP
FTP
FTP
FTP
Authenticate
Access
User login denied - Mail Address(From/to) or Authenticate
SMTP Server is not configured
Access
RADIUS user cannot use One Time
Authenticate
Password - no mail address set for
Access
equivalent local user
User login denied - Terminal Services agent Authenticate
timeout
Access
User login denied - Terminal Services agent Authenticate
name resolution failed
Access
User login denied - No name received from Authenticate
Terminal Services agent
Access
User login denied - Terminal Services agent Authenticate
communication problem
Access
User logged out - logout reported by
Authenticate
Terminal Services agent
Access
High Availability has been enabled and Dial- High Availability
Up device(s) are not supported in High
Availability processing.
The High Availability monitoring IP
High Availability
configuration of Interface %s is incorrect.
IKE Responder: ESP mode mismatch Local VPN IKE
- Tunnel Remote - Transport
IKE Responder: ESP mode mismatch Local VPN IKE
- Transport Remote - Tunnel
WAN DHCPC IP Changed
Firewall Event
WLAN DHCPC IP Changed
Firewall Event
Probe Response Success - %s
Anti-Spam
Probe Response Failure - %s
Anti-Spam
Peer HA firewall has stateful license but this High Availability
firewall is not yet registered
The stateful license of HA peer firewall is not High Availability
activated
Received unauthenticathed GRID response Anti-Spam
Invalid key or serial number used for GRID
Anti-Spam
response
Invalid key version used for GRID response Anti-Spam
Host IP address not in GRID List
Anti-Spam
No response received from DNS server
Anti-Spam
Not blacklisted as per configuration
Anti-Spam
SNMP
Trap
Type
-----------
Legacy Category
--------User Activity
Priority
Debug
Debug
Debug
Debug
Warning
ID
1113
1114
1115
1116
1117
User Activity
Information
1118 ---
User Activity
Information
1119 ---
User Activity
Warning
1120 ---
User Activity
Warning
1121 ---
User Activity
Warning
1122 ---
User Activity
Warning
1123 ---
User Activity
Information
1124 ---
---
Information
1125 ---
---
Error
1126 ---
User Activity
Warning
1127 ---
User Activity
Warning
1128 ---
System Error
System Error
----System Error
Warning
Warning
Debug
Debug
Alert
1129
1130
1131
1132
1136
System Error
Alert
1137 ---
-----
Debug
Debug
1138 --1139 ---
---------
Debug
Debug
Debug
Debug
1140
1141
1142
1143
SonicOS Log Event Reference Guide
-----------
---------
55
Index of Log Event Messages
Log Event Message
Default to not blacklisted
Failed to insert entry into GRID result IP
cached table
Resolved ES Cloud - %s
Updated ES Cloud Address - %s
Your Active/Active Clustering subscription
has expired.
Terminal Services agent is down
Terminal Services agent is up
Active/Active Clustering license is not
activated on the following cluster units: %s
SSLVPN Traffic
Application Control Detection Alert: %s
Application Control Prevention Alert: %s
GMS or syslog server name lookup failed try again in 60 secs.
User account '%s' expired and disabled
User account '%s' expired and pruned
Received Alert: Your Firewall Visualization
Control subscription has expired.
Attempt to contact Remote backup server for
upload approval failed
Backup remote server did not approve
upload request
Modules attached to HA units do not match:
%s
Malformed DNS packet detected
A high percentage of the system packet
buffers are held waiting for SSO
A user has a very high number of
connections waiting for SSO
DOS protection on WAN begins %s
DOS protection on WAN %s
DOS protection on WAN %s
Deleting IPsec SA (Phase 2)
Delete invalid scope because port ip in the
range of this DHCP scope.
IKE Responder: Peer's network does not
match VPN policy's Network
Added new LDAP mirror user group: %s
Deleted LDAP mirror user group: %s
56
SonicOS Log Event Reference Guide
New Category
Anti-Spam
Anti-Spam
Legacy Category Priority
--Debug
--Debug
SNMP
Trap
Type
ID
1144 --1145 ---
Anti-Spam
Anti-Spam
High Availability
-------
Debug
Debug
Warning
1146 --1147 --1149 ---
SSO
SSO
High Availability
User Activity
User Activity
---
Alert
Alert
Error
1150 --1151 --1152 ---
SSL VPN
App-Control
Detection
App-Control
Detection
Firewall Event
Connection Traffic Information
--Alert
1153 --1154 15001
---
Alert
1155 15002
---
Error
1156 ---
Authenticate
Access
Authenticate
Access
Security Services
User Activity
Information
1157 ---
User Activity
Information
1158 ---
---
Warning
1159 ---
Firewall Event
Maintenance
Debug
1160 ---
Firewall Event
Maintenance
Debug
1161 ---
High Availability
System Error
Alert
1162 664
Network Access
SSO
Debug
User Activity
Alert
Alert
1177 --1178 ---
SSO
User Activity
Alert
1179 ---
Intrusion Detection
Intrusion Detection
Intrusion Detection
VPN IKE
DHCP Server
Debug
Debug
Debug
User Activity
---
Alert
Warning
Alert
Debug
Warning
1180
1181
1182
1183
1184
VPN IKE
User Activity
Warning
1189 ---
RADIUS
RADIUS
User Activity
User Activity
Information
Information
1190 --1191 ---
-----------
Index of Syslog Tag Field Description
Log Event Message
Added a new member to an LDAP mirror
user group
Removed a member from an LDAP mirror
user group
Monitoring probe out interface mismatch %s
New Category
RADIUS
Legacy Category Priority
User Activity
Information
SNMP
Trap
Type
ID
1192 ---
RADIUS
User Activity
Information
1193 ---
High Availability
---
Error
1194 ---
Index of Syslog Tag Field Description
This section provides an alphabetical listing of Syslog tags and the associated field description.
Tag
Field
Description
<ddd>
Syslog message prefix
The beginning of each syslog message has a
string of the form <ddd> where ddd is a decimal
number indicating facility and priority of the message. (See [1] Section 4.1.1)
arg
URL
Used to render a URL: arg represents the URL
path name part.
bcastRx
Interface statistics report
Displays the broadcast packets received
bcastTx
Interface statistics report
Displays the broadcast packets transmitted
bytesRx
Interface statistics report
Displays the bytes received
bytesTx
Interface statistics report
Displays the bytes transmitted
c
Message category (legacy only)
Indicates the legacy category number (Note: We
are not currently sending new category information.)
change
Configuration change webpage
Displays the basename of the firewall web page
that performed the last configuration change
code
Blocking code
Indicates the CFS block code category
code
ICMP type and code
Indicates the ICMP code
conns
Firewall status report
Indicates the number of connections in use
cpuUtil
Firewall status report
Displays the CPU utilization (not in use)
dst
Destination
Destination IP address, and optionally, port, network interface, and resolved name.
dstname
Destination URL
Displays the URL of web site hit and other legacy
destination strings
dstname
URL
Used to render a URL: dstname represents the
URL host part
SonicOS Log Event Reference Guide
57
Index of Syslog Tag Field Description
dyn
Firewall status report
Displays the HA and dialup connection state (rendered as “h.d” where “h” is “n” (not enabled), “b”
(backup), or “p” (primary) and “d” is “1” (enabled)
or “0” (disabled))
fw
Firewall WAN IP
Indicates the WAN IP Address
fwlan
Firewall status report
Indicates the LAN zone IP address
goodRxBytes
SonicPoint statistics report
Indicates the well formed bytes recevied
goodTxBytes
SonicPoint statistics report
Indicates the well formed bytes transmitted
i
Firewall status report
Displays the GMS message interval in seconds
id=firewall
Webtrends prefix
Syntactic sugar for WebTrends (and GMS by
habit)
if
Interface statistics report
Displays the interface on which statistics are
reported
ipscat
IPS message
Displays the IPS category
ipspri
IPS message
Displays the IPS priority
lic
Firewall status report
Indicates the number of licenses for firewalls with
limited modes
m
Message ID
Provides the message ID number
mac
MAC address
Provides the MAC address
msg
Static message
Displays the event message (from spreadsheet)
msg
Dynamically-defined message
Displays a dynamically defined message string
msg
Static message with dynamic string
Displays a message using the predefined message string containing a “%s” and a dynamic
string argument.
msg
Static message with dynamic number
Displays a message using the predefined string
string containing a “%s” and a dynamic numeric
argument.
msg
IPS message
Displays a message using the predefined message string containing a “%s” and a dynamic
string argument.
msg
Anti-Spyware message
Displays the event message (from spreadsheet)
n
Message count
Indicates the number of times event occurs
op
HTTP OP code
Displays the HTTP operation (GET, POST, etc.)
of web site hit
pri
Message priority
Displays the event priority level (0=emergency..7=debug)
58
SonicOS Log Event Reference Guide
Index of Syslog Tag Field Description
proto
IP protocol
Indicates the IP protocol and detail information
proto
Protocol and service
Displays the protocol information (rendered as
“proto/service”)
proto
Protocol and service
Displays the protocol information (rendered as
“proto/service”)
pt
Firewall status report
Displays the HTTP/HTTPS management port
(rendered as “hhh.sss”)
radio
SonicPoint statistics report
Displays the SonicPoint radio on which event
occurred
ramUtil
Firewall status report
Displays the RAM utilization (not in use)
rcvd
Bytes received
Indicates the number of bytes received within
connection
result
HTTP Result code
Displays the HTTP result code (200, 403, etc.) of
web site hit
rule
Rule ID
Displays the Access Rule number causing packet
drop
sent
Bytes sent
Displays the number of bytes sent within connection
sid
IPS message
Provides the IPS signature ID
sid
Anti-Spyware message
Provides the AntiSpyware signature ID
sn
Firewall serial number
Indicates the device serial number
spycat
Anti-Spyware message
Displays the antiSpyware category
spypri
Anti-Spyware message
Displays the AntiSpyware priority
src
Source
Indicates the source IP address, and optionally,
port, network interface, and resolved name.
station
SonicPoint statistics report
Displays the client (station) on which event
occurred
time
Time
Reports the time of event
type
ICMP type and code
Indicates the ICMP type
ucastRx
Interface statistics report
Displays the unicast packets received
ucastTx
Interface statistics report
Displays the unicast packets transmitted
unsynched
Firewall status report
Reports the time since last local change in seconds
usesstandbysa
Firewall status report
Displays whether standby SA is in use (“1” or “0”)
for GMS management
SonicOS Log Event Reference Guide
59
Index of Syslog Tag Field Description
usr (or user)
User
Displays the user name (“user” is the tag used by
WebTrends)
vpnpolicy
VPN policy name
Displays the VPN policy name of event
60
SonicOS Log Event Reference Guide
232-001835-00_Rev_A
Download