SonicOS 5.9/6.0.5/6.2 Log Events Reference...
Transcript of SonicOS 5.9/6.0.5/6.2 Log Events Reference...
| 1
SonicOS 5.9 / 6.0.5 / 6.2Log Events Reference Guide
with Enhanced Logging
Notes, Cautions, and Warnings
© 2014 Dell Inc.
Trademarks: Dell™, the DELL logo, SonicWALL™, SonicWALL GMS™, SonicWALL Analyzer™, Reassembly-Free Deep Packet Inspection™, Dynamic Security for the Global Network™, SonicWALL Clean VPN™, SonicWALL Clean Wireless™, SonicWALL Comprehensive Gateway Security Suite™, SonicWALL Mobile Connect™, and all other SonicWALL product and service names and slogans are trademarks of Dell Inc.
2014 – 09 P/N 232-002657-00 Rev. A
NOTE: A NOTE indicates important information that helps you make better use of your system.
CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
OverviewThis reference guide lists and describes SonicOS log event messages for SonicOS 5.9, 6.0.5, and 6.2. Reference a log event message by using the alphabetical index from the Log Event Message Index table of this document.
This document contains the following sections:• Log > Monitor on page 1
• Log > Settings on page 1
• Index of Log Event Messages on page 2
• Log > Syslog on page 169
• Index of Syslog Tag Field Descriptions on page 170
• Table of Values on page 178
Log > MonitorThe Dell SonicWALL security appliance maintains an Event log for tracking potential security threats. This log can be viewed by navigating to the Dashboard > Log Monitor or Log > Log Monitor page, or it can be automatically sent to an email address for convenience and archiving. The log is displayed in a table and can be sorted by column.
For more information on configuring the Log Monitor page, refer to the SonicOS Administrator’s Guide.
Log > SettingsThe Log > Settings page allows you to categorize and customize the logging functions on your Dell SonicWALL security appliance for troubleshooting and diagnostics.
For more information on configuring and managing the Log > Settings page, refer to the SonicOS Administrator’s Guide.
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 1
Index of Log Event MessagesThe following table is the Log Event Message Index, which is a list of log event messages for the SonicOS 5.9, 6.0.5, and 6.2 firmware.
Each log event message described in the following table provides the following log event details:
• Log Event Message ID Number—Displays the ID number of the log event message.
• Firmware Version—Displays the SonicOS firmware version the log event message appears on.
• Legacy Category—Displays the category event type. This is the same category as Table 1: Legacy Category on page 178.
• SonicOS Category—Displays the SonicOS category type. This is the same category as Table 2: Expanded Categories on page 179.
• Priority Level—Displays the level of urgency of the log event message. For additional information, you can also reference Table 3: Priority Level on page 182.
• SNMP Trap Type—Displays the SNMP Trap ID number of the log event message.
• Log Event Messages—Displays the name of the event message.
ID
Firmware
Version
Legacy
Category Category
Priority
Level
SNMP Trap
Type Message
4 5.9.0 Maintenance Firewall Event ALERT ‐‐‐
Network Security Appliance
activated
4 6.0.5 Maintenance Firewall Event ALERT ‐‐‐
Network Security Appliance
activated
4 6.2.0 Maintenance Firewall Event ALERT ‐‐‐
Network Security Appliance
activated
5 5.9.0 Maintenance Firewall Logging INFO ‐‐‐ Log Cleared
5 6.0.5 Maintenance Firewall Logging INFO ‐‐‐ Log Cleared
5 6.2.0 Maintenance Firewall Logging INFO ‐‐‐ Log Cleared
6 5.9.0 Maintenance Firewall Logging INFO ‐‐‐ Log successfully sent via E‐mail
6 6.0.5 Maintenance Firewall Logging INFO ‐‐‐ Log successfully sent via E‐mail
6 6.2.0 Maintenance Firewall Logging INFO ‐‐‐ Log successfully sent via E‐mail
10 5.9.0 System Error Security Services ERROR 602
Problem loading the URL List;
check Filter settings
10 6.0.5 System Error Security Services ERROR 602
Problem loading the URL List;
check Filter settings
10 6.2.0 System Error Security Services ERROR 602
Problem loading the URL List;
check Filter settings
12 5.9.0 System Error Firewall Logging WARNING 604
Problem sending log E‐mail;
check log settings
12 6.0.5 System Error Firewall Logging WARNING 604
Problem sending log E‐mail;
check log settings
2 |
12 6.2.0 System Error Firewall Logging WARNING 604
Problem sending log E‐mail;
check log settings
14 5.9.0 Blocked Sites Network Access ERROR 701 Web site access denied
14 6.0.5 Blocked Sites Network Access ERROR 701 Web site access denied
14 6.2.0 Blocked Sites Network Access ERROR 701 Web site access denied
15 5.9.0 Blocked Sites Network Access NOTICE 702 Newsgroup access denied
15 6.0.5 Blocked Sites Network Access NOTICE 702 Newsgroup access denied
15 6.2.0 Blocked Sites Network Access NOTICE 702 Newsgroup access denied
16 5.9.0 Blocked Sites Network Access NOTICE 703 Web site access allowed
16 6.0.5 Blocked Sites Network Access NOTICE 703 Web site access allowed
16 6.2.0 Blocked Sites Network Access NOTICE 703 Web site access allowed
17 5.9.0 Blocked Sites Network Access NOTICE 704 Newsgroup access allowed
17 6.0.5 Blocked Sites Network Access NOTICE 704 Newsgroup access allowed
17 6.2.0 Blocked Sites Network Access NOTICE 704 Newsgroup access allowed
18 5.9.0 Blocked Code Network Access NOTICE ‐‐‐ ActiveX access denied
18 6.0.5 Blocked Code Network Access NOTICE ‐‐‐ ActiveX access denied
18 6.2.0 Blocked Code Network Access NOTICE ‐‐‐ ActiveX access denied
19 5.9.0 Blocked Code Network Access NOTICE ‐‐‐ Java access denied
19 6.0.5 Blocked Code Network Access NOTICE ‐‐‐ Java access denied
19 6.2.0 Blocked Code Network Access NOTICE ‐‐‐ Java access denied
20 5.9.0 Blocked Code Network Access NOTICE ‐‐‐
ActiveX or Java archive access
denied
20 6.0.5 Blocked Code Network Access NOTICE ‐‐‐
ActiveX or Java archive access
denied
20 6.2.0 Blocked Code Network Access NOTICE ‐‐‐
ActiveX or Java archive access
denied
21 5.9.0 Blocked Code Network Access NOTICE ‐‐‐ Cookie removed
21 6.0.5 Blocked Code Network Access NOTICE ‐‐‐ Cookie removed
21 6.2.0 Blocked Code Network Access NOTICE ‐‐‐ Cookie removed
22 5.9.0 Attack
Intrusion Detec‐
tion ALERT 501 Ping of death dropped
22 6.0.5 Attack
Intrusion Detec‐
tion ALERT 501 Ping of death dropped
22 6.2.0 Attack
Intrusion Detec‐
tion ALERT 501 Ping of death dropped
23 5.9.0 Attack
Intrusion Detec‐
tion ALERT 502 IP spoof dropped
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 3
23 6.0.5 Attack
Intrusion Detec‐
tion ALERT 502 IP spoof dropped
23 6.2.0 Attack
Intrusion Detec‐
tion ALERT 502 IP spoof dropped
24 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
User logged out ‐ user discon‐
nect detected
24 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
User logged out ‐ user discon‐
nect detected
24 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
User logged out ‐ user discon‐
nect detected
25 5.9.0 Attack
Intrusion Detec‐
tion WARNING 503
Possible SYN flood attack
detected
25 6.0.5 Attack
Intrusion Detec‐
tion WARNING 503
Possible SYN flood attack
detected
25 6.2.0 Attack
Intrusion Detec‐
tion WARNING 503
Possible SYN flood attack
detected
27 5.9.0 Attack
Intrusion Detec‐
tion ALERT 505 Land attack dropped
27 6.0.5 Attack
Intrusion Detec‐
tion ALERT 505 Land attack dropped
27 6.2.0 Attack
Intrusion Detec‐
tion ALERT 505 Land attack dropped
28 5.9.0
TCP | UDP |
ICMP Network NOTICE ‐‐‐ Fragmented packet dropped
28 6.0.5
TCP | UDP |
ICMP Network NOTICE ‐‐‐ Fragmented packet dropped
28 6.2.0
TCP | UDP |
ICMP Network NOTICE ‐‐‐ Fragmented packet dropped
29 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐ Administrator login allowed
29 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐ Administrator login allowed
29 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐ Administrator login allowed
30 5.9.0 Attack
Authenticated
Access ALERT 560
Administrator login denied due
to bad credentials
30 6.0.5 Attack
Authenticated
Access ALERT 560
Administrator login denied due
to bad credentials
4 |
30 6.2.0 Attack
Authenticated
Access ALERT 560
Administrator login denied due
to bad credentials
31 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
User login from an internal zone
allowed
31 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
User login from an internal zone
allowed
31 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
User login from an internal zone
allowed
32 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
User login denied due to bad
credentials
32 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
User login denied due to bad
credentials
32 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
User login denied due to bad
credentials
33 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
User login denied due to bad
credentials
33 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
User login denied due to bad
credentials
33 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
User login denied due to bad
credentials
34 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐ Pending login timed out
34 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐ Pending login timed out
34 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐ Pending login timed out
35 5.9.0 Attack
Authenticated
Access ALERT ‐‐‐
Administrator login denied
from %s; logins disabled from
this interface
35 6.0.5 Attack
Authenticated
Access ALERT 506
Administrator login denied
from %s; logins disabled from
this interface
35 6.2.0 Attack
Authenticated
Access ALERT 506
Administrator login denied
from %s; logins disabled from
this interface
36 5.9.0 TCP Network Access NOTICE ‐‐‐ TCP connection dropped
36 6.0.5 TCP Network Access NOTICE ‐‐‐ TCP connection dropped
36 6.2.0 TCP Network Access NOTICE ‐‐‐ TCP connection dropped
37 5.9.0 UDP Network Access NOTICE ‐‐‐ UDP packet dropped
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 5
37 6.0.5 UDP Network Access NOTICE ‐‐‐ UDP packet dropped
37 6.2.0 UDP Network Access NOTICE ‐‐‐ UDP packet dropped
38 5.9.0 ICMP Network Access NOTICE ‐‐‐
ICMP packet dropped due to
Policy
38 6.0.5 ICMP Network Access NOTICE ‐‐‐
ICMP packet dropped due to
Policy
38 6.2.0 ICMP Network Access NOTICE ‐‐‐
ICMP packet dropped due to
Policy
41 5.9.0 Debug Network Access NOTICE ‐‐‐ Unknown protocol dropped
41 6.0.5 Debug Network Access NOTICE ‐‐‐ Unknown protocol dropped
41 6.2.0 Debug Network Access NOTICE ‐‐‐ Unknown protocol dropped
43 5.9.0 Debug Network Access DEBUG ‐‐‐ IPsec connection interrupt
43 6.0.5 Debug Network Access DEBUG ‐‐‐ IPsec connection interrupt
43 6.2.0 Debug Network Access DEBUG ‐‐‐ IPsec connection interrupt
45 5.9.0 Debug Network DEBUG ‐‐‐ ARP Timeout
45 6.0.5 Debug Network DEBUG ‐‐‐ ARP Timeout
45 6.2.0 Debug Network DEBUG ‐‐‐ ARP Timeout
46 5.9.0 Debug Network Access DEBUG ‐‐‐ Broadcast packet dropped
46 6.0.5 Debug Network Access DEBUG ‐‐‐ Broadcast packet dropped
46 6.2.0 Debug Network Access DEBUG ‐‐‐ Broadcast packet dropped
48 5.9.0 Debug Network Access DEBUG ‐‐‐
Out‐of‐order command packet
dropped
48 6.0.5 Debug Network Access DEBUG ‐‐‐
Out‐of‐order command packet
dropped
48 6.2.0 Debug Network Access DEBUG ‐‐‐
Out‐of‐order command packet
dropped
49 5.9.0 Debug Unused DEBUG ‐‐‐ Failure to add data channel
49 6.0.5 Debug Unused DEBUG ‐‐‐ Failure to add data channel
49 6.2.0 Debug Unused DEBUG ‐‐‐ Failure to add data channel
53 5.9.0 System Error Firewall Event ERROR 607
The cache is full; %u open con‐
nections; some will be dropped
53 6.0.5 System Error Firewall Event ERROR 607
The cache is full; %u open con‐
nections; some will be dropped
53 6.2.0 System Error Firewall Event ERROR 607
The cache is full; %u open con‐
nections; some will be dropped
6 |
58 5.9.0 System Error Firewall Event ERROR 608
License exceeded: Connection
dropped because too many IP
addresses are in use on your
LAN
58 6.0.5 System Error Firewall Event ERROR 608
License exceeded: Connection
dropped because too many IP
addresses are in use on your
LAN
58 6.2.0 System Error Firewall Event ERROR 608
License exceeded: Connection
dropped because too many IP
addresses are in use on your
LAN
60 5.9.0 Blocked Sites Network Access NOTICE 705 Access to proxy server denied
60 6.0.5 Blocked Sites Network Access NOTICE 705 Access to proxy server denied
60 6.2.0 Blocked Sites Network Access NOTICE 705 Access to proxy server denied
61 5.9.0 System Error VPN IPsec ERROR 609 Diagnostic Code E
61 6.0.5 System Error VPN IPsec ERROR 609 Diagnostic Code E
61 6.2.0 System Error VPN IPsec ERROR 609 Diagnostic Code E
63 5.9.0 Debug Network DEBUG ‐‐‐
Received fragmented packet or
fragmentation needed
63 6.0.5 Debug Network DEBUG ‐‐‐
Received fragmented packet or
fragmentation needed
63 6.2.0 Debug Network DEBUG ‐‐‐
Received fragmented packet or
fragmentation needed
65 5.9.0 User Activity VPN IPsec INFO ‐‐‐ Illegal IPsec SPI
65 6.0.5 User Activity VPN IPsec INFO ‐‐‐ Illegal IPsec SPI
65 6.2.0 User Activity VPN IPsec INFO ‐‐‐ Illegal IPsec SPI
67 5.9.0 Attack VPN IPsec ERROR 508 IPsec Authentication Failed
67 6.0.5 Attack VPN IPsec ERROR 508 IPsec Authentication Failed
67 6.2.0 Attack VPN IPsec ERROR 508 IPsec Authentication Failed
68 5.9.0 Attack VPN IPsec ERROR 509 IPsec Decryption Failed
68 6.0.5 Attack VPN IPsec ERROR 509 IPsec Decryption Failed
68 6.2.0 Attack VPN IPsec ERROR 509 IPsec Decryption Failed
69 5.9.0 User Activity VPN IPsec INFO ‐‐‐
Incompatible IPsec Security
Association
69 6.0.5 User Activity VPN IPsec INFO ‐‐‐
Incompatible IPsec Security
Association
69 6.2.0 User Activity VPN IPsec INFO ‐‐‐
Incompatible IPsec Security
Association
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 7
70 5.9.0 Attack VPN IPsec ERROR 510
IPsec packet from or to an ille‐
gal host
70 6.0.5 Attack VPN IPsec ERROR 510
IPsec packet from or to an ille‐
gal host
70 6.2.0 Attack VPN IPsec ERROR 510
IPsec packet from or to an ille‐
gal host
81 5.9.0 Attack
Intrusion Detec‐
tion ALERT 520
Smurf Amplification attack
dropped
81 6.0.5 Attack
Intrusion Detec‐
tion ALERT 520
Smurf Amplification attack
dropped
81 6.2.0 Attack
Intrusion Detec‐
tion ALERT 520
Smurf Amplification attack
dropped
82 5.9.0 Attack
Intrusion Detec‐
tion ALERT 521 Possible port scan detected
82 6.0.5 Attack
Intrusion Detec‐
tion ALERT 521 Possible port scan detected
82 6.2.0 Attack
Intrusion Detec‐
tion ALERT 521 Possible port scan detected
83 5.9.0 Attack
Intrusion Detec‐
tion ALERT 522 Probable port scan detected
83 6.0.5 Attack
Intrusion Detec‐
tion ALERT 522 Probable port scan detected
83 6.2.0 Attack
Intrusion Detec‐
tion ALERT 522 Probable port scan detected
84 5.9.0 Maintenance Network INFO ‐‐‐ Failed to resolve name
84 6.0.5 Maintenance Network INFO ‐‐‐ Failed to resolve name
84 6.2.0 Maintenance Network INFO ‐‐‐ Failed to resolve name
87 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKE Responder: Accepting IPsec
proposal (Phase 2)
87 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKE Responder: Accepting IPsec
proposal (Phase 2)
87 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKE Responder: Accepting IPsec
proposal (Phase 2)
88 5.9.0 User Activity VPN IKE WARNING 523
IKE Responder: IPsec proposal
does not match (Phase 2)
88 6.0.5 User Activity VPN IKE WARNING 523
IKE Responder: IPsec proposal
does not match (Phase 2)
88 6.2.0 User Activity VPN IKE WARNING 523
IKE Responder: IPsec proposal
does not match (Phase 2)
8 |
89 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKE negotiation complete. Add‐
ing IPsec SA. (Phase 2)
89 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKE negotiation complete. Add‐
ing IPsec SA. (Phase 2)
89 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKE negotiation complete. Add‐
ing IPsec SA. (Phase 2)
93 5.9.0 System Error Firewall Hardware ERROR 611 Diagnostic Code A
93 6.0.5 System Error Firewall Hardware ERROR 611 Diagnostic Code A
93 6.2.0 System Error Firewall Hardware ERROR 611 Diagnostic Code A
94 5.9.0 System Error Firewall Hardware ERROR 612 Diagnostic Code B
94 6.0.5 System Error Firewall Hardware ERROR 612 Diagnostic Code B
94 6.2.0 System Error Firewall Hardware ERROR 612 Diagnostic Code B
95 5.9.0 System Error Firewall Hardware ERROR 613 Diagnostic Code C
95 6.0.5 System Error Firewall Hardware ERROR 613 Diagnostic Code C
95 6.2.0 System Error Firewall Hardware ERROR 613 Diagnostic Code C
96 5.9.0 Maintenance GMS INFO ‐‐‐ Status
96 6.0.5 Maintenance GMS INFO ‐‐‐ Status
96 6.2.0 Maintenance GMS INFO ‐‐‐ Status
97 5.9.0
Connection
Traffic Network Traffic INFO ‐‐‐ Web site hit
97 6.0.5
Connection
Traffic Network Traffic INFO ‐‐‐ Web site hit
97 6.2.0
Connection
Traffic Network Traffic INFO ‐‐‐ Web site hit
98 5.9.0 Connection Network Traffic INFO ‐‐‐ Connection Opened
98 6.0.5 Connection Network Traffic INFO ‐‐‐ Connection Opened
98 6.2.0 Connection Network Traffic INFO ‐‐‐ Connection Opened
99 5.9.0 Maintenance DHCP Client INFO ‐‐‐
Retransmitting DHCP DIS‐
COVER.
99 6.0.5 Maintenance DHCP Client INFO ‐‐‐
Retransmitting DHCP DIS‐
COVER.
99 6.2.0 Maintenance DHCP Client INFO ‐‐‐
Retransmitting DHCP DIS‐
COVER.
100 5.9.0 Maintenance DHCP Client INFO ‐‐‐
Retransmitting DHCP Request
(Requesting).
100 6.0.5 Maintenance DHCP Client INFO ‐‐‐
Retransmitting DHCP Request
(Requesting).
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 9
100 6.2.0 Maintenance DHCP Client INFO ‐‐‐
Retransmitting DHCP Request
(Requesting).
101 5.9.0 Maintenance DHCP Client INFO ‐‐‐
Retransmitting DHCP Request
(Renewing).
101 6.0.5 Maintenance DHCP Client INFO ‐‐‐
Retransmitting DHCP Request
(Renewing).
101 6.2.0 Maintenance DHCP Client INFO ‐‐‐
Retransmitting DHCP Request
(Renewing).
102 5.9.0 Maintenance DHCP Client INFO ‐‐‐
Retransmitting DHCP Request
(Rebinding).
102 6.0.5 Maintenance DHCP Client INFO ‐‐‐
Retransmitting DHCP Request
(Rebinding).
102 6.2.0 Maintenance DHCP Client INFO ‐‐‐
Retransmitting DHCP Request
(Rebinding).
103 5.9.0 Maintenance DHCP Client INFO ‐‐‐
Retransmitting DHCP Request
(Rebooting).
103 6.0.5 Maintenance DHCP Client INFO ‐‐‐
Retransmitting DHCP Request
(Rebooting).
103 6.2.0 Maintenance DHCP Client INFO ‐‐‐
Retransmitting DHCP Request
(Rebooting).
104 5.9.0 Maintenance DHCP Client INFO ‐‐‐
Retransmitting DHCP Request
(Verifying).
104 6.0.5 Maintenance DHCP Client INFO ‐‐‐
Retransmitting DHCP Request
(Verifying).
104 6.2.0 Maintenance DHCP Client INFO ‐‐‐
Retransmitting DHCP Request
(Verifying).
105 5.9.0 Maintenance DHCP Client INFO ‐‐‐ Sending DHCP DISCOVER.
105 6.0.5 Maintenance DHCP Client INFO ‐‐‐ Sending DHCP DISCOVER.
105 6.2.0 Maintenance DHCP Client INFO ‐‐‐ Sending DHCP DISCOVER.
106 5.9.0 Maintenance DHCP Client INFO ‐‐‐
DHCP Server not available. Did
not get any DHCP OFFER.
106 6.0.5 Maintenance DHCP Client INFO ‐‐‐
DHCP Server not available. Did
not get any DHCP OFFER.
106 6.2.0 Maintenance DHCP Client INFO ‐‐‐
DHCP Server not available. Did
not get any DHCP OFFER.
107 5.9.0 Maintenance DHCP Client INFO ‐‐‐ Got DHCP OFFER. Selecting.
107 6.0.5 Maintenance DHCP Client INFO ‐‐‐ Got DHCP OFFER. Selecting.
107 6.2.0 Maintenance DHCP Client INFO ‐‐‐ Got DHCP OFFER. Selecting.
108 5.9.0 Maintenance DHCP Client INFO ‐‐‐ Sending DHCP Request.
10 |
108 6.0.5 Maintenance DHCP Client INFO ‐‐‐ Sending DHCP Request.
108 6.2.0 Maintenance DHCP Client INFO ‐‐‐ Sending DHCP Request.
109 5.9.0 Maintenance DHCP Client INFO ‐‐‐
DHCP Client did not get DHCP
ACK.
109 6.0.5 Maintenance DHCP Client INFO ‐‐‐
DHCP Client did not get DHCP
ACK.
109 6.2.0 Maintenance DHCP Client INFO ‐‐‐
DHCP Client did not get DHCP
ACK.
110 5.9.0 Maintenance DHCP Client INFO ‐‐‐ DHCP Client got NACK.
110 6.0.5 Maintenance DHCP Client INFO ‐‐‐ DHCP Client got NACK.
110 6.2.0 Maintenance DHCP Client INFO ‐‐‐ DHCP Client got NACK.
111 5.9.0 Maintenance DHCP Client INFO ‐‐‐
DHCP Client got ACK from
server.
111 6.0.5 Maintenance DHCP Client INFO ‐‐‐
DHCP Client got ACK from
server.
111 6.2.0 Maintenance DHCP Client INFO ‐‐‐
DHCP Client got ACK from
server.
112 5.9.0 Maintenance DHCP Client INFO ‐‐‐
DHCP Client is declining address
offered by the server.
112 6.0.5 Maintenance DHCP Client INFO ‐‐‐
DHCP Client is declining address
offered by the server.
112 6.2.0 Maintenance DHCP Client INFO ‐‐‐
DHCP Client is declining address
offered by the server.
113 5.9.0 Maintenance DHCP Client INFO ‐‐‐
DHCP Client sending Request
and going to REBIND state.
113 6.0.5 Maintenance DHCP Client INFO ‐‐‐
DHCP Client sending Request
and going to REBIND state.
113 6.2.0 Maintenance DHCP Client INFO ‐‐‐
DHCP Client sending Request
and going to REBIND state.
114 5.9.0 Maintenance DHCP Client INFO ‐‐‐
DHCP Client sending Request
and going to RENEW state.
114 6.0.5 Maintenance DHCP Client INFO ‐‐‐
DHCP Client sending Request
and going to RENEW state.
114 6.2.0 Maintenance DHCP Client INFO ‐‐‐
DHCP Client sending Request
and going to RENEW state.
115 5.9.0 Maintenance DHCP Client INFO ‐‐‐
Sending DHCP Request (Renew‐
ing).
115 6.0.5 Maintenance DHCP Client INFO ‐‐‐
Sending DHCP Request (Renew‐
ing).
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 11
115 6.2.0 Maintenance DHCP Client INFO ‐‐‐
Sending DHCP Request (Renew‐
ing).
116 5.9.0 Maintenance DHCP Client INFO ‐‐‐
Sending DHCP Request (Rebind‐
ing).
116 6.0.5 Maintenance DHCP Client INFO ‐‐‐
Sending DHCP Request (Rebind‐
ing).
116 6.2.0 Maintenance DHCP Client INFO ‐‐‐
Sending DHCP Request (Rebind‐
ing).
117 5.9.0 Maintenance DHCP Client INFO ‐‐‐
Sending DHCP Request (Reboot‐
ing).
117 6.0.5 Maintenance DHCP Client INFO ‐‐‐
Sending DHCP Request (Reboot‐
ing).
117 6.2.0 Maintenance DHCP Client INFO ‐‐‐
Sending DHCP Request (Reboot‐
ing).
118 5.9.0 Maintenance DHCP Client INFO ‐‐‐
Sending DHCP Request (Verify‐
ing).
118 6.0.5 Maintenance DHCP Client INFO ‐‐‐
Sending DHCP Request (Verify‐
ing).
118 6.2.0 Maintenance DHCP Client INFO ‐‐‐
Sending DHCP Request (Verify‐
ing).
119 5.9.0 Maintenance DHCP Client INFO ‐‐‐
DHCP Client failed to verify and
lease has expired. Go to INIT
state.
119 6.0.5 Maintenance DHCP Client INFO ‐‐‐
DHCP Client failed to verify and
lease has expired. Go to INIT
state.
119 6.2.0 Maintenance DHCP Client INFO ‐‐‐
DHCP Client failed to verify and
lease has expired. Go to INIT
state.
121 5.9.0 Maintenance DHCP Client INFO ‐‐‐
DHCP Client got a new IP
address lease.
121 6.0.5 Maintenance DHCP Client INFO ‐‐‐
DHCP Client got a new IP
address lease.
121 6.2.0 Maintenance DHCP Client INFO ‐‐‐
DHCP Client got a new IP
address lease.
122 5.9.0 Maintenance DHCP Client INFO ‐‐‐ Sending DHCP RELEASE.
122 6.0.5 Maintenance DHCP Client INFO ‐‐‐ Sending DHCP RELEASE.
122 6.2.0 Maintenance DHCP Client INFO ‐‐‐ Sending DHCP RELEASE.
12 |
123 5.9.0 Maintenance Security Services INFO ‐‐‐
Access attempt from host with‐
out Anti‐Virus agent installed
123 6.0.5 Maintenance Security Services INFO ‐‐‐
Access attempt from host with‐
out Anti‐Virus agent installed
123 6.2.0 Maintenance Security Services INFO ‐‐‐
Access attempt from host with‐
out Anti‐Virus agent installed
124 5.9.0 Maintenance Security Services INFO ‐‐‐
Anti‐Virus agent out‐of‐date on
host
124 6.0.5 Maintenance Security Services INFO ‐‐‐
Anti‐Virus agent out‐of‐date on
host
124 6.2.0 Maintenance Security Services INFO ‐‐‐
Anti‐Virus agent out‐of‐date on
host
125 5.9.0 Maintenance Security Services WARNING 524 Received AV Alert: %s
125 6.0.5 Maintenance Security Services WARNING 524 Received AV Alert: %s
125 6.2.0 Maintenance Security Services WARNING 524 Received AV Alert: %s
127 5.9.0 Maintenance PPPoE INFO ‐‐‐ Starting PPPoE discovery
127 6.0.5 Maintenance PPPoE INFO ‐‐‐ Starting PPPoE discovery
127 6.2.0 Maintenance PPPoE INFO ‐‐‐ Starting PPPoE discovery
128 5.9.0 Maintenance PPPoE INFO ‐‐‐ PPPoE LCP Link Up
128 6.0.5 Maintenance PPPoE INFO ‐‐‐ PPPoE LCP Link Up
128 6.2.0 Maintenance PPPoE INFO ‐‐‐ PPPoE LCP Link Up
129 5.9.0 Maintenance PPPoE INFO ‐‐‐ PPPoE LCP Link Down
129 6.0.5 Maintenance PPPoE INFO ‐‐‐ PPPoE LCP Link Down
129 6.2.0 Maintenance PPPoE INFO ‐‐‐ PPPoE LCP Link Down
130 5.9.0 Maintenance PPPoE INFO ‐‐‐ PPPoE terminated
130 6.0.5 Maintenance PPPoE INFO ‐‐‐ PPPoE terminated
130 6.2.0 Maintenance PPPoE INFO ‐‐‐ PPPoE terminated
131 5.9.0 Maintenance PPPoE INFO ‐‐‐ PPPoE Network Connected
131 6.0.5 Maintenance PPPoE INFO ‐‐‐ PPPoE Network Connected
131 6.2.0 Maintenance PPPoE INFO ‐‐‐ PPPoE Network Connected
132 5.9.0 Maintenance PPPoE INFO ‐‐‐ PPPoE Network Disconnected
132 6.0.5 Maintenance PPPoE INFO ‐‐‐ PPPoE Network Disconnected
132 6.2.0 Maintenance PPPoE INFO ‐‐‐ PPPoE Network Disconnected
133 5.9.0 Maintenance PPPoE INFO ‐‐‐
PPPoE discovery process com‐
plete
133 6.0.5 Maintenance PPPoE INFO ‐‐‐
PPPoE discovery process com‐
plete
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 13
133 6.2.0 Maintenance PPPoE INFO ‐‐‐
PPPoE discovery process com‐
plete
134 5.9.0 Maintenance PPPoE INFO ‐‐‐
PPPoE starting CHAP Authenti‐
cation
134 6.0.5 Maintenance PPPoE INFO ‐‐‐
PPPoE starting CHAP Authenti‐
cation
134 6.2.0 Maintenance PPPoE INFO ‐‐‐
PPPoE starting CHAP Authenti‐
cation
138 5.9.0 System Error Firewall Event WARNING 636 Wan IP Changed
138 6.0.5 System Error Firewall Event WARNING 636 Wan IP Changed
138 6.2.0 System Error Firewall Event WARNING 636 Wan IP Changed
139 5.9.0 User Activity VPN Client INFO ‐‐‐
XAUTH Succeeded with VPN cli‐
ent
139 6.0.5 User Activity VPN Client INFO ‐‐‐
XAUTH Succeeded with VPN cli‐
ent
139 6.2.0 User Activity VPN Client INFO ‐‐‐
XAUTH Succeeded with VPN cli‐
ent
140 5.9.0 User Activity VPN Client ERROR ‐‐‐
XAUTH Failed with VPN client,
Authentication failure
140 6.0.5 User Activity VPN Client ERROR ‐‐‐
XAUTH Failed with VPN client,
Authentication failure
140 6.2.0 User Activity VPN Client ERROR ‐‐‐
XAUTH Failed with VPN client,
Authentication failure
141 5.9.0 User Activity VPN Client INFO ‐‐‐
XAUTH Failed with VPN client,
Cannot Contact RADIUS Server
141 6.0.5 User Activity VPN Client INFO ‐‐‐
XAUTH Failed with VPN client,
Cannot Contact RADIUS Server
141 6.2.0 User Activity VPN Client INFO ‐‐‐
XAUTH Failed with VPN client,
Cannot Contact RADIUS Server
142 5.9.0 Debug Firewall Event ERROR ‐‐‐ Log Debug
142 6.0.5 Debug Firewall Event ERROR ‐‐‐ Log Debug
142 6.2.0 Debug Firewall Event ERROR ‐‐‐ Log Debug
143 5.9.0 Attack Firewall Event ERROR 525 Add an attack message
143 6.0.5 Attack Firewall Event ERROR 525 Add an attack message
143 6.2.0 Attack Firewall Event ERROR 525 Add an attack message
144 5.9.0 Maintenance High Availability ALERT 6201
Primary firewall has transi‐
tioned to Active
144 6.0.5 Maintenance High Availability ALERT ‐‐‐
Primary firewall has transi‐
tioned to Active
14 |
144 6.2.0 Maintenance High Availability ALERT 6201
Primary firewall has transi‐
tioned to Active
145 5.9.0 Maintenance High Availability ALERT 6202
Secondary firewall has transi‐
tioned to Active
145 6.0.5 Maintenance High Availability ALERT ‐‐‐
Secondary firewall has transi‐
tioned to Active
145 6.2.0 Maintenance High Availability ALERT 6202
Secondary firewall has transi‐
tioned to Active
146 5.9.0 System Error High Availability ALERT 6203
Primary firewall has transi‐
tioned to Standby
146 6.0.5 System Error High Availability ALERT 614
Primary firewall has transi‐
tioned to Standby
146 6.2.0 System Error High Availability ALERT 6203
Primary firewall has transi‐
tioned to Standby
147 5.9.0 Maintenance High Availability ALERT 6204
Secondary firewall has transi‐
tioned to Standby
147 6.0.5 Maintenance High Availability ALERT 6204
Secondary firewall has transi‐
tioned to Standby
147 6.2.0 Maintenance High Availability ALERT 6204
Secondary firewall has transi‐
tioned to Standby
148 5.9.0 System Error High Availability ERROR 615
Primary missed heartbeats
from Secondary
148 6.0.5 System Error High Availability ERROR 615
Primary missed heartbeats
from Secondary
148 6.2.0 System Error High Availability ERROR 615
Primary missed heartbeats
from Secondary
149 5.9.0 System Error High Availability ERROR 616
Secondary missed heartbeats
from Primary
149 6.0.5 System Error High Availability ERROR 616
Secondary missed heartbeats
from Primary
149 6.2.0 System Error High Availability ERROR 616
Secondary missed heartbeats
from Primary
150 5.9.0 System Error High Availability ERROR 617
Primary received error signal
from Secondary
150 6.0.5 System Error High Availability ERROR 617
Primary received error signal
from Secondary
150 6.2.0 System Error High Availability ERROR 617
Primary received error signal
from Secondary
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 15
151 5.9.0 System Error High Availability ERROR 618
Secondary received error signal
from Primary
151 6.0.5 System Error High Availability ERROR 618
Secondary received error signal
from Primary
151 6.2.0 System Error High Availability ERROR 618
Secondary received error signal
from Primary
153 5.9.0 System Error High Availability ERROR 620
Primary firewall preempting
Secondary
153 6.0.5 System Error High Availability ERROR 620
Primary firewall preempting
Secondary
153 6.2.0 System Error High Availability ERROR 620
Primary firewall preempting
Secondary
157 5.9.0 Maintenance High Availability INFO ‐‐‐ HA Peer Firewall Synchronized
157 6.0.5 Maintenance High Availability INFO ‐‐‐ HA Peer Firewall Synchronized
157 6.2.0 Maintenance High Availability INFO ‐‐‐ HA Peer Firewall Synchronized
158 5.9.0 System Error High Availability ERROR 662
Error synchronizing HA peer
firewall (%s)
158 6.0.5 System Error High Availability ERROR 662
Error synchronizing HA peer
firewall (%s)
158 6.2.0 System Error High Availability ERROR 662
Error synchronizing HA peer
firewall (%s)
159 5.9.0 Maintenance Security Services WARNING 526
Received AV Alert: Your Net‐
work Anti‐Virus subscRIPtion
has expired. %s
159 6.0.5 Maintenance Security Services WARNING 526
Received AV Alert: Your Net‐
work Anti‐Virus subscRIPtion
has expired. %s
159 6.2.0 Maintenance Security Services WARNING 526
Received AV Alert: Your Net‐
work Anti‐Virus subscRIPtion
has expired. %s
162 5.9.0 Maintenance High Availability INFO ‐‐‐ HA packet processing error
162 6.0.5 Maintenance High Availability INFO ‐‐‐ HA packet processing error
162 6.2.0 Maintenance High Availability INFO ‐‐‐ HA packet processing error
164 5.9.0 System Error Firewall Hardware ERROR 621 Diagnostic Code F
164 6.0.5 System Error Firewall Hardware ERROR 621 Diagnostic Code F
164 6.2.0 System Error Firewall Hardware ERROR 621 Diagnostic Code F
165 5.9.0 Attack
Intrusion Detec‐
tion ALERT 527
Forbidden E‐Mail attachment
disabled
16 |
165 6.0.5 Attack
Intrusion Detec‐
tion ALERT 527
Forbidden E‐Mail attachment
disabled
165 6.2.0 Attack
Intrusion Detec‐
tion ALERT 527
Forbidden E‐Mail attachment
disabled
168 5.9.0 Maintenance PPPoE INFO ‐‐‐
Disconnecting PPPoE due to
traffic Timeout
168 6.0.5 Maintenance PPPoE INFO ‐‐‐
Disconnecting PPPoE due to
traffic Timeout
168 6.2.0 Maintenance PPPoE INFO ‐‐‐
Disconnecting PPPoE due to
traffic Timeout
169 5.9.0 Maintenance PPPoE INFO ‐‐‐
No response from ISP Discon‐
necting PPPoE.
169 6.0.5 Maintenance PPPoE INFO ‐‐‐
No response from ISP Discon‐
necting PPPoE.
169 6.2.0 Maintenance PPPoE INFO ‐‐‐
No response from ISP Discon‐
necting PPPoE.
170 5.9.0 System Error High Availability ERROR 622
Secondary going Active in pre‐
empt mode after reboot
170 6.0.5 System Error High Availability ERROR 622
Secondary going Active in pre‐
empt mode after reboot
170 6.2.0 System Error High Availability ERROR 622
Secondary going Active in pre‐
empt mode after reboot
171 5.9.0 User Activity VPN IKE DEBUG ‐‐‐ %s
171 6.0.5 User Activity VPN IKE DEBUG ‐‐‐ %s
171 6.2.0 User Activity VPN IKE DEBUG ‐‐‐ %s
173 5.9.0 LAN TCP Network Access NOTICE ‐‐‐
TCP connection from LAN
denied
173 6.0.5 LAN TCP Network Access NOTICE ‐‐‐
TCP connection from LAN
denied
173 6.2.0 LAN TCP Network Access NOTICE ‐‐‐
TCP connection from LAN
denied
174 5.9.0
LAN UDP | LAN
TCP Network Access NOTICE ‐‐‐ UDP packet from LAN dropped
174 6.0.5
LAN UDP | LAN
TCP Network Access NOTICE ‐‐‐ UDP packet from LAN dropped
174 6.2.0
LAN UDP | LAN
TCP Network Access NOTICE ‐‐‐ UDP packet from LAN dropped
175 5.9.0
LAN ICMP | LAN
TCP Network Access NOTICE ‐‐‐ ICMP packet from LAN dropped
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 17
175 6.0.5
LAN ICMP | LAN
TCP Network Access NOTICE ‐‐‐ ICMP packet from LAN dropped
175 6.2.0
LAN ICMP | LAN
TCP Network Access NOTICE ‐‐‐ ICMP packet from LAN dropped
177 5.9.0 Attack
Intrusion Detec‐
tion ALERT 528 Probable TCP FIN scan detected
177 6.0.5 Attack
Intrusion Detec‐
tion ALERT 528 Probable TCP FIN scan detected
177 6.2.0 Attack
Intrusion Detec‐
tion ALERT 528 Probable TCP FIN scan detected
178 5.9.0 Attack
Intrusion Detec‐
tion ALERT 529
Probable TCP XMAS scan
detected
178 6.0.5 Attack
Intrusion Detec‐
tion ALERT 529
Probable TCP XMAS scan
detected
178 6.2.0 Attack
Intrusion Detec‐
tion ALERT 529
Probable TCP XMAS scan
detected
179 5.9.0 Attack
Intrusion Detec‐
tion ALERT 530
Probable TCP NULL scan
detected
179 6.0.5 Attack
Intrusion Detec‐
tion ALERT 530
Probable TCP NULL scan
detected
179 6.2.0 Attack
Intrusion Detec‐
tion ALERT 530
Probable TCP NULL scan
detected
180 5.9.0 Attack VPN IPsec ALERT 531 IPsec Replay Detected
180 6.0.5 Attack VPN IPsec ALERT 531 IPsec Replay Detected
180 6.2.0 Attack VPN IPsec ALERT 531 IPsec Replay Detected
181 5.9.0 Debug Network DEBUG ‐‐‐ TCP FIN packet dropped
181 6.0.5 Debug Network DEBUG ‐‐‐ TCP FIN packet dropped
181 6.2.0 Debug Network DEBUG ‐‐‐ TCP FIN packet dropped
182 5.9.0 User Activity Network INFO ‐‐‐
Received a path MTU ICMP
message from router/gateway
182 6.0.5 User Activity Network INFO ‐‐‐
Received a path MTU ICMP
message from router/gateway
182 6.2.0 User Activity Network INFO ‐‐‐
Received a path MTU ICMP
message from router/gateway
183 5.9.0 System Error Security Services ERROR 623
Problem loading the URL List;
Appliance not registered.
183 6.0.5 System Error Security Services ERROR 623
Problem loading the URL List;
Appliance not registered.
18 |
183 6.2.0 System Error Security Services ERROR 623
Problem loading the URL List;
Appliance not registered.
188 5.9.0 User Activity Network INFO ‐‐‐
Received a path MTU ICMP
message from router/gateway
188 6.0.5 User Activity Network INFO ‐‐‐
Received a path MTU ICMP
message from router/gateway
188 6.2.0 User Activity Network INFO ‐‐‐
Received a path MTU ICMP
message from router/gateway
190 5.9.0 System Error Security Services ERROR 628
The loaded content URL List has
expired.
190 6.0.5 System Error Security Services ERROR 628
The loaded content URL List has
expired.
190 6.2.0 System Error Security Services ERROR 628
The loaded content URL List has
expired.
191 5.9.0 System Error High Availability ERROR 629
Error setting the IP address of
the Secondary, please manually
set to Secondary LAN IP
191 6.0.5 System Error High Availability ERROR 629
Error setting the IP address of
the Secondary, please manually
set to Secondary LAN IP
191 6.2.0 System Error High Availability ERROR 629
Error setting the IP address of
the Secondary, please manually
set to Secondary LAN IP
199 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐ CLI administrator login allowed
199 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐ CLI administrator login allowed
199 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐ CLI administrator login allowed
200 5.9.0 User Activity
Authenticated
Access WARNING ‐‐‐
CLI administrator login denied
due to bad credentials
200 6.0.5 User Activity
Authenticated
Access WARNING ‐‐‐
CLI administrator login denied
due to bad credentials
200 6.2.0 User Activity
Authenticated
Access WARNING ‐‐‐
CLI administrator login denied
due to bad credentials
201 5.9.0 Maintenance L2TP Client INFO ‐‐‐
L2TP Tunnel Negotiation
Started
201 6.0.5 Maintenance L2TP Client INFO ‐‐‐
L2TP Tunnel Negotiation
Started
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 19
201 6.2.0 Maintenance L2TP Client INFO ‐‐‐
L2TP Tunnel Negotiation
Started
202 5.9.0 Maintenance L2TP Client INFO ‐‐‐
L2TP Session Negotiation
Started
202 6.0.5 Maintenance L2TP Client INFO ‐‐‐
L2TP Session Negotiation
Started
202 6.2.0 Maintenance L2TP Client INFO ‐‐‐
L2TP Session Negotiation
Started
204 5.9.0 Maintenance L2TP Client INFO ‐‐‐ L2TP Tunnel Established
204 6.0.5 Maintenance L2TP Client INFO ‐‐‐ L2TP Tunnel Established
204 6.2.0 Maintenance L2TP Client INFO ‐‐‐ L2TP Tunnel Established
205 5.9.0 Maintenance L2TP Client INFO ‐‐‐
L2TP Tunnel Disconnect from
Remote
205 6.0.5 Maintenance L2TP Client INFO ‐‐‐
L2TP Tunnel Disconnect from
Remote
205 6.2.0 Maintenance L2TP Client INFO ‐‐‐
L2TP Tunnel Disconnect from
Remote
206 5.9.0 Maintenance L2TP Client INFO ‐‐‐ L2TP Session Established
206 6.0.5 Maintenance L2TP Client INFO ‐‐‐ L2TP Session Established
206 6.2.0 Maintenance L2TP Client INFO ‐‐‐ L2TP Session Established
207 5.9.0 Maintenance L2TP Client INFO ‐‐‐
L2TP Session Disconnect from
Remote
207 6.0.5 Maintenance L2TP Client INFO ‐‐‐
L2TP Session Disconnect from
Remote
207 6.2.0 Maintenance L2TP Client INFO ‐‐‐
L2TP Session Disconnect from
Remote
208 5.9.0 Maintenance L2TP Client INFO ‐‐‐ L2TP PPP Negotiation Started
208 6.0.5 Maintenance L2TP Client INFO ‐‐‐ L2TP PPP Negotiation Started
208 6.2.0 Maintenance L2TP Client INFO ‐‐‐ L2TP PPP Negotiation Started
210 5.9.0 Maintenance L2TP Client INFO ‐‐‐ L2TP PPP Session Up
210 6.0.5 Maintenance L2TP Client INFO ‐‐‐ L2TP PPP Session Up
210 6.2.0 Maintenance L2TP Client INFO ‐‐‐ L2TP PPP Session Up
211 5.9.0 Maintenance L2TP Client INFO ‐‐‐ L2TP PPP Down
211 6.0.5 Maintenance L2TP Client INFO ‐‐‐ L2TP PPP Down
211 6.2.0 Maintenance L2TP Client INFO ‐‐‐ L2TP PPP Down
212 5.9.0 Maintenance L2TP Client INFO ‐‐‐ L2TP PPP Authentication Failed
212 6.0.5 Maintenance L2TP Client INFO ‐‐‐ L2TP PPP Authentication Failed
212 6.2.0 Maintenance L2TP Client INFO ‐‐‐ L2TP PPP Authentication Failed
20 |
215 5.9.0 Maintenance L2TP Client INFO ‐‐‐
Disconnecting L2TP Tunnel due
to traffic Timeout
215 6.0.5 Maintenance L2TP Client INFO ‐‐‐
Disconnecting L2TP Tunnel due
to traffic Timeout
215 6.2.0 Maintenance L2TP Client INFO ‐‐‐
Disconnecting L2TP Tunnel due
to traffic Timeout
217 5.9.0 Maintenance L2TP Client INFO ‐‐‐ L2TP PPP link down
217 6.0.5 Maintenance L2TP Client INFO ‐‐‐ L2TP PPP link down
217 6.2.0 Maintenance L2TP Client INFO ‐‐‐ L2TP PPP link down
222 5.9.0 Maintenance DHCP Relay INFO ‐‐‐
DHCP RELEASE relayed to Cen‐
tral Gateway
222 6.0.5 Maintenance DHCP Relay INFO ‐‐‐
DHCP RELEASE relayed to Cen‐
tral Gateway
222 6.2.0 Maintenance DHCP Relay INFO ‐‐‐
DHCP RELEASE relayed to Cen‐
tral Gateway
223 5.9.0 Maintenance DHCP Relay INFO ‐‐‐
DHCP lease relayed to local
device
223 6.0.5 Maintenance DHCP Relay INFO ‐‐‐
DHCP lease relayed to local
device
223 6.2.0 Maintenance DHCP Relay INFO ‐‐‐
DHCP lease relayed to local
device
224 5.9.0 Debug DHCP Relay INFO ‐‐‐
DHCP RELEASE received from
remote device
224 6.0.5 Debug DHCP Relay INFO ‐‐‐
DHCP RELEASE received from
remote device
224 6.2.0 Debug DHCP Relay INFO ‐‐‐
DHCP RELEASE received from
remote device
225 5.9.0 Debug DHCP Relay INFO ‐‐‐
DHCP lease relayed to remote
device
225 6.0.5 Debug DHCP Relay INFO ‐‐‐
DHCP lease relayed to remote
device
225 6.2.0 Debug DHCP Relay INFO ‐‐‐
DHCP lease relayed to remote
device
226 5.9.0 Maintenance DHCP Relay INFO ‐‐‐
DHCP lease to LAN device con‐
flicts with remote device, delet‐
ing remote IP entry
226 6.0.5 Maintenance DHCP Relay INFO ‐‐‐
DHCP lease to LAN device con‐
flicts with remote device, delet‐
ing remote IP entry
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 21
226 6.2.0 Maintenance DHCP Relay INFO ‐‐‐
DHCP lease to LAN device con‐
flicts with remote device, delet‐
ing remote IP entry
227 5.9.0 Maintenance DHCP Relay INFO ‐‐‐
WARNING: DHCP lease relayed
from Central Gateway conflicts
with IP in Static Devices list
227 6.0.5 Maintenance DHCP Relay INFO ‐‐‐
WARNING: DHCP lease relayed
from Central Gateway conflicts
with IP in Static Devices list
227 6.2.0 Maintenance DHCP Relay INFO ‐‐‐
WARNING: DHCP lease relayed
from Central Gateway conflicts
with IP in Static Devices list
228 5.9.0 Maintenance DHCP Relay WARNING ‐‐‐
DHCP lease dropped. Lease
from Central Gateway conflicts
with Relay IP
228 6.0.5 Maintenance DHCP Relay WARNING ‐‐‐
DHCP lease dropped. Lease
from Central Gateway conflicts
with Relay IP
228 6.2.0 Maintenance DHCP Relay WARNING ‐‐‐
DHCP lease dropped. Lease
from Central Gateway conflicts
with Relay IP
229 5.9.0 Attack DHCP Relay ERROR 533
IP spoof detected on packet to
Central Gateway, packet
dropped
229 6.0.5 Attack DHCP Relay ERROR 533
IP spoof detected on packet to
Central Gateway, packet
dropped
229 6.2.0 Attack DHCP Relay ERROR 533
IP spoof detected on packet to
Central Gateway, packet
dropped
230 5.9.0 Maintenance DHCP Relay INFO ‐‐‐
Request for Relay IP Table from
Central Gateway
230 6.0.5 Maintenance DHCP Relay INFO ‐‐‐
Request for Relay IP Table from
Central Gateway
230 6.2.0 Maintenance DHCP Relay INFO ‐‐‐
Request for Relay IP Table from
Central Gateway
231 5.9.0 Maintenance DHCP Relay INFO ‐‐‐
Requesting Relay IP Table from
Remote Gateway
231 6.0.5 Maintenance DHCP Relay INFO ‐‐‐
Requesting Relay IP Table from
Remote Gateway
22 |
231 6.2.0 Maintenance DHCP Relay INFO ‐‐‐
Requesting Relay IP Table from
Remote Gateway
232 5.9.0 Maintenance DHCP Relay INFO ‐‐‐
Sent Relay IP Table to Central
Gateway
232 6.0.5 Maintenance DHCP Relay INFO ‐‐‐
Sent Relay IP Table to Central
Gateway
232 6.2.0 Maintenance DHCP Relay INFO ‐‐‐
Sent Relay IP Table to Central
Gateway
233 5.9.0 Maintenance DHCP Relay INFO ‐‐‐
Obtained Relay IP Table from
Remote Gateway
233 6.0.5 Maintenance DHCP Relay INFO ‐‐‐
Obtained Relay IP Table from
Remote Gateway
233 6.2.0 Maintenance DHCP Relay INFO ‐‐‐
Obtained Relay IP Table from
Remote Gateway
234 5.9.0 System Error DHCP Relay WARNING 632
Failed to synchronize Relay IP
Table
234 6.0.5 System Error DHCP Relay WARNING 632
Failed to synchronize Relay IP
Table
234 6.2.0 System Error DHCP Relay WARNING 632
Failed to synchronize Relay IP
Table
235 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
VPN zone administrator login
allowed
235 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
VPN zone administrator login
allowed
235 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
VPN zone administrator login
allowed
236 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
WAN zone administrator login
allowed
236 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
WAN zone administrator login
allowed
236 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
WAN zone administrator login
allowed
237 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
VPN zone remote user login
allowed
237 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
VPN zone remote user login
allowed
237 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
VPN zone remote user login
allowed
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 23
238 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
WAN zone remote user login
allowed
238 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
WAN zone remote user login
allowed
238 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
WAN zone remote user login
allowed
239 5.9.0 User Activity VPN IKE INFO ‐‐‐
NAT Discovery : Peer IPsec
Security Gateway behind a
NAT/NAPT Device
239 6.0.5 User Activity VPN IKE INFO ‐‐‐
NAT Discovery : Peer IPsec
Security Gateway behind a
NAT/NAPT Device
239 6.2.0 User Activity VPN IKE INFO ‐‐‐
NAT Discovery : Peer IPsec
Security Gateway behind a
NAT/NAPT Device
240 5.9.0 User Activity VPN IKE INFO ‐‐‐
NAT Discovery : Local IPsec
Security Gateway behind a
NAT/NAPT Device
240 6.0.5 User Activity VPN IKE INFO ‐‐‐
NAT Discovery : Local IPsec
Security Gateway behind a
NAT/NAPT Device
240 6.2.0 User Activity VPN IKE INFO ‐‐‐
NAT Discovery : Local IPsec
Security Gateway behind a
NAT/NAPT Device
241 5.9.0 User Activity VPN IKE INFO ‐‐‐
NAT Discovery : No NAT/NAPT
device detected between IPsec
Security gateways
241 6.0.5 User Activity VPN IKE INFO ‐‐‐
NAT Discovery : No NAT/NAPT
device detected between IPsec
Security gateways
241 6.2.0 User Activity VPN IKE INFO ‐‐‐
NAT Discovery : No NAT/NAPT
device detected between IPsec
Security gateways
242 5.9.0 User Activity VPN IKE INFO ‐‐‐
NAT Discovery : Peer IPsec
Security Gateway doesn't sup‐
port VPN NAT Traversal
242 6.0.5 User Activity VPN IKE INFO ‐‐‐
NAT Discovery : Peer IPsec
Security Gateway doesn't sup‐
port VPN NAT Traversal
24 |
242 6.2.0 User Activity VPN IKE INFO ‐‐‐
NAT Discovery : Peer IPsec
Security Gateway doesn't sup‐
port VPN NAT Traversal
243 5.9.0 User Activity RADIUS INFO ‐‐‐
User login denied ‐ RADIUS
authentication failure
243 6.0.5 User Activity RADIUS INFO ‐‐‐
User login denied ‐ RADIUS
authentication failure
243 6.2.0 User Activity RADIUS INFO ‐‐‐
User login denied ‐ RADIUS
authentication failure
244 5.9.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ RADIUS
server Timeout
244 6.0.5 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ RADIUS
server Timeout
244 6.2.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ RADIUS
server Timeout
245 5.9.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ RADIUS con‐
figuration error
245 6.0.5 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ RADIUS con‐
figuration error
245 6.2.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ RADIUS con‐
figuration error
246 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
User login denied ‐ User has no
privileges for login from that
location
246 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
User login denied ‐ User has no
privileges for login from that
location
246 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
User login denied ‐ User has no
privileges for login from that
location
247 5.9.0 Maintenance VPN IPsec INFO ‐‐‐ IPsec packet from an illegal host
247 6.0.5 Maintenance VPN IPsec INFO ‐‐‐ IPsec packet from an illegal host
247 6.2.0 Maintenance VPN IPsec INFO ‐‐‐ IPsec packet from an illegal host
248 5.9.0 Attack
Intrusion Detec‐
tion ERROR 534
Forbidden E‐Mail attachment
deleted
248 6.0.5 Attack
Intrusion Detec‐
tion ERROR 534
Forbidden E‐Mail attachment
deleted
248 6.2.0 Attack
Intrusion Detec‐
tion ERROR 534
Forbidden E‐Mail attachment
deleted
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 25
249 5.9.0 User Activity VPN IKE WARNING 535
IKE Responder: Mode %s ‐ not
tunnel mode
249 6.0.5 User Activity VPN IKE WARNING 535
IKE Responder: Mode %d ‐ not
tunnel mode
249 6.2.0 User Activity VPN IKE WARNING 535
IKE Responder: Mode %s ‐ not
tunnel mode
250 5.9.0 User Activity VPN IKE WARNING 536
IKE Responder: No matching
Phase 1 ID found for proposed
remote network
250 6.0.5 User Activity VPN IKE WARNING 536
IKE Responder: No matching
Phase 1 ID found for proposed
remote network
250 6.2.0 User Activity VPN IKE WARNING 536
IKE Responder: No matching
Phase 1 ID found for proposed
remote network
251 5.9.0 User Activity VPN IKE WARNING 537
IKE Responder: Proposed
remote network is 0.0.0.0 but
not DHCP relay nor default
route
251 6.0.5 User Activity VPN IKE WARNING 537
IKE Responder: Proposed
remote network is 0.0.0.0 but
not DHCP relay nor default
route
251 6.2.0 User Activity VPN IKE WARNING 537
IKE Responder: Proposed
remote network is 0.0.0.0 but
not DHCP relay nor default
route
252 5.9.0 User Activity VPN IKE WARNING 538
IKE Responder: No match for
proposed remote network
address
252 6.0.5 User Activity VPN IKE WARNING 538
IKE Responder: No match for
proposed remote network
address
252 6.2.0 User Activity VPN IKE WARNING 538
IKE Responder: No match for
proposed remote network
address
253 5.9.0 User Activity VPN IKE WARNING 539
IKE Responder: Default LAN
gateway is set but peer is not
proposing to use this SA as a
default route
26 |
253 6.0.5 User Activity VPN IKE WARNING 539
IKE Responder: Default LAN
gateway is set but peer is not
proposing to use this SA as a
default route
253 6.2.0 User Activity VPN IKE WARNING 539
IKE Responder: Default LAN
gateway is set but peer is not
proposing to use this SA as a
default route
254 5.9.0 User Activity VPN IKE WARNING 540
IKE Responder: Tunnel termi‐
nates outside firewall but pro‐
posed local network is not NAT
public address
254 6.0.5 User Activity VPN IKE WARNING 540
IKE Responder: Tunnel termi‐
nates outside firewall but pro‐
posed local network is not NAT
public address
254 6.2.0 User Activity VPN IKE WARNING 540
IKE Responder: Tunnel termi‐
nates outside firewall but pro‐
posed local network is not NAT
public address
255 5.9.0 User Activity VPN IKE WARNING 541
IKE Responder: Tunnel termi‐
nates inside firewall but pro‐
posed local network is not
inside firewall
255 6.0.5 User Activity VPN IKE WARNING 541
IKE Responder: Tunnel termi‐
nates inside firewall but pro‐
posed local network is not
inside firewall
255 6.2.0 User Activity VPN IKE WARNING 541
IKE Responder: Tunnel termi‐
nates inside firewall but pro‐
posed local network is not
inside firewall
256 5.9.0 User Activity VPN IKE WARNING 542
IKE Responder: Tunnel termi‐
nates on DMZ but proposed
local network is on LAN
256 6.0.5 User Activity VPN IKE WARNING 542
IKE Responder: Tunnel termi‐
nates on DMZ but proposed
local network is on LAN
256 6.2.0 User Activity VPN IKE WARNING 542
IKE Responder: Tunnel termi‐
nates on DMZ but proposed
local network is on LAN
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 27
257 5.9.0 User Activity VPN IKE WARNING 543
IKE Responder: Tunnel termi‐
nates on LAN but proposed
local network is on DMZ
257 6.0.5 User Activity VPN IKE WARNING 543
IKE Responder: Tunnel termi‐
nates on LAN but proposed
local network is on DMZ
257 6.2.0 User Activity VPN IKE WARNING 543
IKE Responder: Tunnel termi‐
nates on LAN but proposed
local network is on DMZ
258 5.9.0 User Activity VPN IKE WARNING 544
IKE Responder: AH Perfect For‐
ward Secrecy mismatch
258 6.0.5 User Activity VPN IKE WARNING 544
IKE Responder: AH Perfect For‐
ward Secrecy mismatch
258 6.2.0 User Activity VPN IKE WARNING 544
IKE Responder: AH Perfect For‐
ward Secrecy mismatch
259 5.9.0 User Activity VPN IKE WARNING 545
IKE Responder: ESP Perfect For‐
ward Secrecy mismatch
259 6.0.5 User Activity VPN IKE WARNING 545
IKE Responder: ESP Perfect For‐
ward Secrecy mismatch
259 6.2.0 User Activity VPN IKE WARNING 545
IKE Responder: ESP Perfect For‐
ward Secrecy mismatch
260 5.9.0 User Activity VPN IKE WARNING 546
IKE Responder: Algorithms and/
or keys do not match
260 6.0.5 User Activity VPN IKE WARNING 546
IKE Responder: Algorithms and/
or keys do not match
260 6.2.0 User Activity VPN IKE WARNING 546
IKE Responder: Algorithms and/
or keys do not match
261 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐ Administrator logged out
261 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐ Administrator logged out
261 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐ Administrator logged out
262 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
Administrator logged out ‐ inac‐
tivity timer expired
262 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
Administrator logged out ‐ inac‐
tivity timer expired
262 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
Administrator logged out ‐ inac‐
tivity timer expired
28 |
263 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐ User logged out ‐ %s
263 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐ User logged out
263 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐ User logged out ‐ %s
264 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
User logged out ‐ max session
time exceeded
264 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
User logged out ‐ max session
time exceeded
264 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
User logged out ‐ max session
time exceeded
265 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
User logged out ‐ inactivity
timer expired
265 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
User logged out ‐ inactivity
timer expired
265 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
User logged out ‐ inactivity
timer expired
266 5.9.0 Maintenance VPN IPsec INFO ‐‐‐
NAT device may not support
IPsec AH pass‐through
266 6.0.5 Maintenance VPN IPsec INFO ‐‐‐
NAT device may not support
IPsec AH pass‐through
266 6.2.0 Maintenance VPN IPsec INFO ‐‐‐
NAT device may not support
IPsec AH pass‐through
267 5.9.0 Attack
Intrusion Detec‐
tion ALERT 547 TCP Xmas Tree dropped
267 6.0.5 Attack
Intrusion Detec‐
tion ALERT 547 TCP Xmas Tree dropped
267 6.2.0 Attack
Intrusion Detec‐
tion ALERT 547 TCP Xmas Tree dropped
269 5.9.0 User Activity VPN PKI INFO ‐‐‐ Requesting CRL from
269 6.0.5 User Activity VPN PKI INFO ‐‐‐ Requesting CRL from
269 6.2.0 User Activity VPN PKI INFO ‐‐‐ Requesting CRL from
270 5.9.0 User Activity VPN PKI INFO ‐‐‐ CRL loaded from
270 6.0.5 User Activity VPN PKI INFO ‐‐‐ CRL loaded from
270 6.2.0 User Activity VPN PKI INFO ‐‐‐ CRL loaded from
271 5.9.0 User Activity VPN PKI ALERT ‐‐‐ Failed to get CRL from
271 6.0.5 User Activity VPN PKI ALERT ‐‐‐ Failed to get CRL from
271 6.2.0 User Activity VPN PKI ALERT ‐‐‐ Failed to get CRL from
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 29
272 5.9.0 User Activity VPN PKI WARNING ‐‐‐
Not enough memory to hold
the CRL
272 6.0.5 User Activity VPN PKI WARNING ‐‐‐
Not enough memory to hold
the CRL
272 6.2.0 User Activity VPN PKI WARNING ‐‐‐
Not enough memory to hold
the CRL
273 5.9.0 User Activity VPN PKI ALERT ‐‐‐ Connection timed out
273 6.0.5 User Activity VPN PKI ALERT ‐‐‐ Connection timed out
273 6.2.0 User Activity VPN PKI ALERT ‐‐‐ Connection timed out
274 5.9.0 User Activity VPN PKI ALERT ‐‐‐
Cannot connect to the CRL
server
274 6.0.5 User Activity VPN PKI ALERT ‐‐‐
Cannot connect to the CRL
server
274 6.2.0 User Activity VPN PKI ALERT ‐‐‐
Cannot connect to the CRL
server
275 5.9.0 User Activity VPN PKI ERROR ‐‐‐ Unknown reason
275 6.0.5 User Activity VPN PKI ERROR ‐‐‐ Unknown reason
275 6.2.0 User Activity VPN PKI ERROR ‐‐‐ Unknown reason
276 5.9.0 User Activity VPN PKI ALERT ‐‐‐ Failed to Process CRL from
276 6.0.5 User Activity VPN PKI ALERT ‐‐‐ Failed to Process CRL from
276 6.2.0 User Activity VPN PKI ALERT ‐‐‐ Failed to Process CRL from
277 5.9.0 User Activity VPN PKI ALERT ‐‐‐ Bad CRL format
277 6.0.5 User Activity VPN PKI ALERT ‐‐‐ Bad CRL format
277 6.2.0 User Activity VPN PKI ALERT ‐‐‐ Bad CRL format
278 5.9.0 User Activity VPN PKI ALERT ‐‐‐ Issuer match failed
278 6.0.5 User Activity VPN PKI ALERT ‐‐‐ Issuer match failed
278 6.2.0 User Activity VPN PKI ALERT ‐‐‐ Issuer match failed
279 5.9.0 User Activity VPN PKI ALERT ‐‐‐ Certificate on Revoked list(CRL)
279 6.0.5 User Activity VPN PKI ALERT ‐‐‐ Certificate on Revoked list(CRL)
279 6.2.0 User Activity VPN PKI ALERT ‐‐‐ Certificate on Revoked list(CRL)
280 5.9.0 User Activity VPN PKI ALERT ‐‐‐ No Certificate for
280 6.0.5 User Activity VPN PKI ALERT ‐‐‐ No Certificate for
280 6.2.0 User Activity VPN PKI ALERT ‐‐‐ No Certificate for
281 5.9.0 User Activity PPP Dial‐Up INFO ‐‐‐ PPP Dial‐Up: Dialing: %s
281 6.0.5 User Activity PPP Dial‐Up INFO ‐‐‐ PPP Dial‐Up: Dialing: %s
281 6.2.0 User Activity PPP Dial‐Up INFO ‐‐‐ PPP Dial‐Up: Dialing: %s
30 |
282 5.9.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: No dial tone
detected ‐ check phone‐line
connection
282 6.0.5 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: No dial tone
detected ‐ check phone‐line
connection
282 6.2.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: No dial tone
detected ‐ check phone‐line
connection
283 5.9.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: No link carrier
detected ‐ check phone number
283 6.0.5 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: No link carrier
detected ‐ check phone number
283 6.2.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: No link carrier
detected ‐ check phone number
284 5.9.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Dialed number is
busy
284 6.0.5 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Dialed number is
busy
284 6.2.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Dialed number is
busy
285 5.9.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Dialed number did
not answer
285 6.0.5 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Dialed number did
not answer
285 6.2.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Dialed number did
not answer
286 5.9.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Connected at %s
bps ‐ starting PPP
286 6.0.5 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Connected at %s
bps ‐ starting PPP
286 6.2.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Connected at %s
bps ‐ starting PPP
287 5.9.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Unknown dialing
failure
287 6.0.5 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Unknown dialing
failure
287 6.2.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Unknown dialing
failure
288 5.9.0 User Activity PPP Dial‐Up INFO ‐‐‐ PPP Dial‐Up: Link carrier lost
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 31
288 6.0.5 User Activity PPP Dial‐Up INFO ‐‐‐ PPP Dial‐Up: Link carrier lost
288 6.2.0 User Activity PPP Dial‐Up INFO ‐‐‐ PPP Dial‐Up: Link carrier lost
289 5.9.0 ‐‐‐ PPP INFO ‐‐‐ PPP: Authentication successful
289 6.0.5 ‐‐‐ PPP INFO ‐‐‐ PPP: Authentication successful
289 6.2.0 ‐‐‐ PPP INFO ‐‐‐ PPP: Authentication successful
290 5.9.0 ‐‐‐ PPP INFO ‐‐‐
PPP: PAP Authentication failed ‐
check username / password
290 6.0.5 ‐‐‐ PPP INFO ‐‐‐
PPP: PAP Authentication failed ‐
check username / password
290 6.2.0 ‐‐‐ PPP INFO ‐‐‐
PPP: PAP Authentication failed ‐
check username / password
291 5.9.0 ‐‐‐ PPP INFO ‐‐‐
PPP: CHAP authentication failed
‐ check username / password
291 6.0.5 ‐‐‐ PPP INFO ‐‐‐
PPP: CHAP authentication failed
‐ check username / password
291 6.2.0 ‐‐‐ PPP INFO ‐‐‐
PPP: CHAP authentication failed
‐ check username / password
292 5.9.0 ‐‐‐ PPP INFO ‐‐‐
PPP: MS‐CHAP authentication
failed ‐ check username / pass‐
word
292 6.0.5 ‐‐‐ PPP INFO ‐‐‐
PPP: MS‐CHAP authentication
failed ‐ check username / pass‐
word
292 6.2.0 ‐‐‐ PPP INFO ‐‐‐
PPP: MS‐CHAP authentication
failed ‐ check username / pass‐
word
293 5.9.0 ‐‐‐ PPP INFO ‐‐‐
PPP: Starting MS‐CHAP authen‐
tication
293 6.0.5 ‐‐‐ PPP INFO ‐‐‐
PPP: Starting MS‐CHAP authen‐
tication
293 6.2.0 ‐‐‐ PPP INFO ‐‐‐
PPP: Starting MS‐CHAP authen‐
tication
294 5.9.0 ‐‐‐ PPP INFO ‐‐‐
PPP: Starting CHAP authentica‐
tion
294 6.0.5 ‐‐‐ PPP INFO ‐‐‐
PPP: Starting CHAP authentica‐
tion
294 6.2.0 ‐‐‐ PPP INFO ‐‐‐
PPP: Starting CHAP authentica‐
tion
32 |
295 5.9.0 ‐‐‐ PPP INFO ‐‐‐
PPP: Starting PAP authentica‐
tion
295 6.0.5 ‐‐‐ PPP INFO ‐‐‐
PPP: Starting PAP authentica‐
tion
295 6.2.0 ‐‐‐ PPP INFO ‐‐‐
PPP: Starting PAP authentica‐
tion
297 5.9.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Idle time limit
exceeded ‐ disconnecting
297 6.0.5 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Idle time limit
exceeded ‐ disconnecting
297 6.2.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Idle time limit
exceeded ‐ disconnecting
299 5.9.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Received new IP
address
299 6.0.5 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Received new IP
address
299 6.2.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Received new IP
address
300 5.9.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: PPP link estab‐
lished
300 6.0.5 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: PPP link estab‐
lished
300 6.2.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: PPP link estab‐
lished
301 5.9.0 User Activity PPP Dial‐Up INFO ‐‐‐ PPP Dial‐Up: PPP link down
301 6.0.5 User Activity PPP Dial‐Up INFO ‐‐‐ PPP Dial‐Up: PPP link down
301 6.2.0 User Activity PPP Dial‐Up INFO ‐‐‐ PPP Dial‐Up: PPP link down
302 5.9.0 User Activity PPP Dial‐Up INFO ‐‐‐ PPP Dial‐Up: Shutting down link
302 6.0.5 User Activity PPP Dial‐Up INFO ‐‐‐ PPP Dial‐Up: Shutting down link
302 6.2.0 User Activity PPP Dial‐Up INFO ‐‐‐ PPP Dial‐Up: Shutting down link
303 5.9.0 User Activity PPP Dial‐Up INFO ‐‐‐ PPP Dial‐Up: Initialization : %s
303 6.0.5 User Activity PPP Dial‐Up INFO ‐‐‐ PPP Dial‐Up: Initialization : %s
303 6.2.0 User Activity PPP Dial‐Up INFO ‐‐‐ PPP Dial‐Up: Initialization : %s
306 5.9.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Connect request
canceled
306 6.0.5 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Connect request
canceled
306 6.2.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Connect request
canceled
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 33
307 5.9.0 System Error WAN Failover WARNING 639
The network connection in use
is %s
307 6.0.5 System Error WAN Failover WARNING 639
The network connection in use
is %s
307 6.2.0 System Error WAN Failover WARNING 639
The network connection in use
is %s
308 5.9.0 Maintenance L2TP Server INFO ‐‐‐
L2TP Server : L2TP Tunnel
Established.
308 6.0.5 Maintenance L2TP Server INFO ‐‐‐
L2TP Server : L2TP Tunnel
Established.
308 6.2.0 Maintenance L2TP Server INFO ‐‐‐
L2TP Server : L2TP Tunnel
Established.
309 5.9.0 Maintenance L2TP Server INFO ‐‐‐
L2TP Server : L2TP Session
Established.
309 6.0.5 Maintenance L2TP Server INFO ‐‐‐
L2TP Server : L2TP Session
Established.
309 6.2.0 Maintenance L2TP Server INFO ‐‐‐
L2TP Server : L2TP Session
Established.
311 5.9.0 Maintenance L2TP Server INFO ‐‐‐
L2TP Server: RADIUS/LDAP
reports Authentication Failure
311 6.0.5 Maintenance L2TP Server INFO ‐‐‐
L2TP Server: RADIUS/LDAP
reports Authentication Failure
311 6.2.0 Maintenance L2TP Server INFO ‐‐‐
L2TP Server: RADIUS/LDAP
reports Authentication Failure
312 5.9.0 Maintenance L2TP Server INFO ‐‐‐
L2TP Server: Local Authentica‐
tion Failure
312 6.0.5 Maintenance L2TP Server INFO ‐‐‐
L2TP Server: Local Authentica‐
tion Failure
312 6.2.0 Maintenance L2TP Server INFO ‐‐‐
L2TP Server: Local Authentica‐
tion Failure
318 5.9.0 Maintenance L2TP Server INFO ‐‐‐
L2TP Server: Local Authentica‐
tion Success.
318 6.0.5 Maintenance L2TP Server INFO ‐‐‐
L2TP Server: Local Authentica‐
tion Success.
318 6.2.0 Maintenance L2TP Server INFO ‐‐‐
L2TP Server: Local Authentica‐
tion Success.
319 5.9.0 Maintenance L2TP Server INFO ‐‐‐
L2TP Server: RADIUS/LDAP
Authentication Success
34 |
319 6.0.5 Maintenance L2TP Server INFO ‐‐‐
L2TP Server: RADIUS/LDAP
Authentication Success
319 6.2.0 Maintenance L2TP Server INFO ‐‐‐
L2TP Server: RADIUS/LDAP
Authentication Success
321 5.9.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Manual interven‐
tion needed. Check Primary
Profile or Profile details
321 6.0.5 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Manual interven‐
tion needed. Check Primary
Profile or Profile details
321 6.2.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Manual interven‐
tion needed. Check Primary
Profile or Profile details
322 5.9.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Trying to failover
but Primary Profile is manual
322 6.0.5 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Trying to failover
but Primary Profile is manual
322 6.2.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Trying to failover
but Primary Profile is manual
326 5.9.0 System Error WAN Failover ALERT 637 Probing failure on %s
326 6.0.5 System Error WAN Failover ALERT 637 Probing failure on %s
326 6.2.0 System Error WAN Failover ALERT 637 Probing failure on %s
327 5.9.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Maximum connec‐
tion time exceeded ‐ discon‐
necting
327 6.0.5 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Maximum connec‐
tion time exceeded ‐ discon‐
necting
327 6.2.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Maximum connec‐
tion time exceeded ‐ discon‐
necting
328 5.9.0 Maintenance
Authenticated
Access INFO ‐‐‐ Administrator name changed
328 6.0.5 Maintenance
Authenticated
Access INFO ‐‐‐ Administrator name changed
328 6.2.0 Maintenance
Authenticated
Access INFO ‐‐‐ Administrator name changed
329 5.9.0 Attack
Authenticated
Access ERROR 561
User login failure rate exceeded
‐ logins from user IP address
denied
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 35
329 6.0.5 Attack
Authenticated
Access ERROR 561
User login failure rate exceeded
‐ logins from user IP address
denied
329 6.2.0 Attack
Authenticated
Access ERROR 561
User login failure rate exceeded
‐ logins from user IP address
denied
330 5.9.0 Maintenance PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: The profile in use
disabled VPN networking.
330 6.0.5 Maintenance PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: The profile in use
disabled VPN networking.
330 6.2.0 Maintenance PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: The profile in use
disabled VPN networking.
331 5.9.0 Maintenance PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: VPN networking
restored.
331 6.0.5 Maintenance PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: VPN networking
restored.
331 6.2.0 Maintenance PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: VPN networking
restored.
335 5.9.0 Maintenance L2TP Server INFO ‐‐‐
L2TP Server: Tunnel Disconnect
from Remote.
335 6.0.5 Maintenance L2TP Server INFO ‐‐‐
L2TP Server: Tunnel Disconnect
from Remote.
335 6.2.0 Maintenance L2TP Server INFO ‐‐‐
L2TP Server: Tunnel Disconnect
from Remote.
336 5.9.0 Maintenance L2TP Server INFO ‐‐‐
L2TP Server : Deleting the Tun‐
nel
336 6.0.5 Maintenance L2TP Server INFO ‐‐‐
L2TP Server : Deleting the Tun‐
nel
336 6.2.0 Maintenance L2TP Server INFO ‐‐‐
L2TP Server : Deleting the Tun‐
nel
337 5.9.0 Maintenance L2TP Server INFO ‐‐‐
L2TP Server : Deleting the L2TP
active Session
337 6.0.5 Maintenance L2TP Server INFO ‐‐‐
L2TP Server : Deleting the L2TP
active Session
337 6.2.0 Maintenance L2TP Server INFO ‐‐‐
L2TP Server : Deleting the L2TP
active Session
338 5.9.0 Maintenance L2TP Server INFO ‐‐‐
L2TP Server : Retransmission
Timeout, Deleting the Tunnel
338 6.0.5 Maintenance L2TP Server INFO ‐‐‐
L2TP Server : Retransmission
Timeout, Deleting the Tunnel
36 |
338 6.2.0 Maintenance L2TP Server INFO ‐‐‐
L2TP Server : Retransmission
Timeout, Deleting the Tunnel
339 5.9.0 Debug Network DEBUG ‐‐‐
NAT translated packet exceeds
size limit, packet dropped
339 6.0.5 Debug Network DEBUG ‐‐‐
NAT translated packet exceeds
size limit, packet dropped
339 6.2.0 Debug Network DEBUG ‐‐‐
NAT translated packet exceeds
size limit, packet dropped
340 5.9.0 Maintenance Firewall Event INFO ‐‐‐
HTTP management port has
changed
340 6.0.5 Maintenance Firewall Event INFO ‐‐‐
HTTP management port has
changed
340 6.2.0 Maintenance Firewall Event INFO ‐‐‐
HTTP management port has
changed
341 5.9.0 Maintenance Firewall Event INFO ‐‐‐
HTTPS management port has
changed
341 6.0.5 Maintenance Firewall Event INFO ‐‐‐
HTTPS management port has
changed
341 6.2.0 Maintenance Firewall Event INFO ‐‐‐
HTTPS management port has
changed
344 5.9.0 Maintenance L2TP Server INFO ‐‐‐
L2TP Server : User Name
authentication Failure locally.
344 6.0.5 Maintenance L2TP Server INFO ‐‐‐
L2TP Server : User Name
authentication Failure locally.
344 6.2.0 Maintenance L2TP Server INFO ‐‐‐
L2TP Server : User Name
authentication Failure locally.
346 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Start Quick Mode
(Phase 2).
346 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Start Quick Mode
(Phase 2).
346 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Start Quick Mode
(Phase 2).
347 5.9.0
TCP | UDP |
ICMP Network Access WARNING ‐‐‐
Port configured to receive IPsec
protocol ONLY; drop packet
received in the clear
347 6.0.5
TCP | UDP |
ICMP Network Access WARNING ‐‐‐
Port configured to receive IPsec
protocol ONLY; drop packet
received in the clear
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 37
347 6.2.0
TCP | UDP |
ICMP Network Access WARNING ‐‐‐
Port configured to receive IPsec
protocol ONLY; drop packet
received in the clear
348 5.9.0 Maintenance Firewall Event WARNING ‐‐‐
Imported VPN SA is invalid ‐ dis‐
abled
348 6.0.5 Maintenance Firewall Event WARNING ‐‐‐
Imported VPN SA is invalid ‐ dis‐
abled
348 6.2.0 Maintenance Firewall Event WARNING ‐‐‐
Imported VPN SA is invalid ‐ dis‐
abled
350 5.9.0 User Activity VPN IKE INFO ‐‐‐ IKE SA lifetime expired.
350 6.0.5 User Activity VPN IKE INFO ‐‐‐ IKE SA lifetime expired.
350 6.2.0 User Activity VPN IKE INFO ‐‐‐ IKE SA lifetime expired.
351 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Start Main Mode
negotiation (Phase 1)
351 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Start Main Mode
negotiation (Phase 1)
351 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Start Main Mode
negotiation (Phase 1)
352 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKE Responder: Received Quick
Mode Request (Phase 2)
352 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKE Responder: Received Quick
Mode Request (Phase 2)
352 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKE Responder: Received Quick
Mode Request (Phase 2)
353 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Main Mode com‐
plete (Phase 1)
353 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Main Mode com‐
plete (Phase 1)
353 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Main Mode com‐
plete (Phase 1)
354 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Aggressive Mode
complete (Phase 1).
354 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Aggressive Mode
complete (Phase 1).
354 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Aggressive Mode
complete (Phase 1).
355 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKE Responder: Received Main
Mode Request (Phase 1)
38 |
355 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKE Responder: Received Main
Mode Request (Phase 1)
355 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKE Responder: Received Main
Mode Request (Phase 1)
356 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKE Responder: Received
Aggressive Mode Request
(Phase 1)
356 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKE Responder: Received
Aggressive Mode Request
(Phase 1)
356 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKE Responder: Received
Aggressive Mode Request
(Phase 1)
357 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKE Responder: Main Mode
complete (Phase 1)
357 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKE Responder: Main Mode
complete (Phase 1)
357 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKE Responder: Main Mode
complete (Phase 1)
358 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Start Aggressive
Mode negotiation (Phase 1)
358 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Start Aggressive
Mode negotiation (Phase 1)
358 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Start Aggressive
Mode negotiation (Phase 1)
360 5.9.0 Maintenance Crypto Test ERROR ‐‐‐ Crypto DES test failed
360 6.0.5 Maintenance Crypto Test ERROR ‐‐‐ Crypto DES test failed
360 6.2.0 Maintenance Crypto Test ERROR ‐‐‐ Crypto DES test failed
361 5.9.0 Maintenance Crypto Test ERROR ‐‐‐ Crypto DH test failed
361 6.0.5 Maintenance Crypto Test ERROR ‐‐‐ Crypto DH test failed
361 6.2.0 Maintenance Crypto Test ERROR ‐‐‐ Crypto DH test failed
362 5.9.0 Maintenance Crypto Test ERROR ‐‐‐ Crypto Hmac‐MD5 test failed
362 6.0.5 Maintenance Crypto Test ERROR ‐‐‐ Crypto Hmac‐MD5 test failed
362 6.2.0 Maintenance Crypto Test ERROR ‐‐‐ Crypto Hmac‐MD5 test failed
363 5.9.0 Maintenance Crypto Test ERROR ‐‐‐ Crypto Hmac‐Sha1 test failed
363 6.0.5 Maintenance Crypto Test ERROR ‐‐‐ Crypto Hmac‐Sha1 test failed
363 6.2.0 Maintenance Crypto Test ERROR ‐‐‐ Crypto Hmac‐Sha1 test failed
364 5.9.0 Maintenance Crypto Test ERROR ‐‐‐ Crypto RSA test failed
364 6.0.5 Maintenance Crypto Test ERROR ‐‐‐ Crypto RSA test failed
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 39
364 6.2.0 Maintenance Crypto Test ERROR ‐‐‐ Crypto RSA test failed
365 5.9.0 Maintenance Crypto Test ERROR ‐‐‐ Crypto Sha1 test failed
365 6.0.5 Maintenance Crypto Test ERROR ‐‐‐ Crypto Sha1 test failed
365 6.2.0 Maintenance Crypto Test ERROR ‐‐‐ Crypto Sha1 test failed
366 5.9.0 Maintenance Crypto Test ERROR ‐‐‐ Crypto hardware DES test failed
366 6.0.5 Maintenance Crypto Test ERROR ‐‐‐ Crypto hardware DES test failed
366 6.2.0 Maintenance Crypto Test ERROR ‐‐‐ Crypto hardware DES test failed
367 5.9.0 Maintenance Crypto Test ERROR ‐‐‐
Crypto hardware 3DES test
failed
367 6.0.5 Maintenance Crypto Test ERROR ‐‐‐
Crypto hardware 3DES test
failed
367 6.2.0 Maintenance Crypto Test ERROR ‐‐‐
Crypto hardware 3DES test
failed
368 5.9.0 Maintenance Crypto Test ERROR ‐‐‐
Crypto hardware DES with SHA
test failed
368 6.0.5 Maintenance Crypto Test ERROR ‐‐‐
Crypto hardware DES with SHA
test failed
368 6.2.0 Maintenance Crypto Test ERROR ‐‐‐
Crypto hardware DES with SHA
test failed
369 5.9.0 Maintenance Crypto Test ERROR ‐‐‐
Crypto Hardware 3DES with
SHA test failed
369 6.0.5 Maintenance Crypto Test ERROR ‐‐‐
Crypto Hardware 3DES with
SHA test failed
369 6.2.0 Maintenance Crypto Test ERROR ‐‐‐
Crypto Hardware 3DES with
SHA test failed
371 5.9.0 User Activity VPN Client INFO ‐‐‐ VPN Client Policy Provisioning
371 6.0.5 User Activity VPN Client INFO ‐‐‐ VPN Client Policy Provisioning
371 6.2.0 User Activity VPN Client INFO ‐‐‐ VPN Client Policy Provisioning
372 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Accepting IPsec
proposal (Phase 2)
372 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Accepting IPsec
proposal (Phase 2)
372 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Accepting IPsec
proposal (Phase 2)
373 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKE Responder: Aggressive
Mode complete (Phase 1)
373 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKE Responder: Aggressive
Mode complete (Phase 1)
40 |
373 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKE Responder: Aggressive
Mode complete (Phase 1)
375 5.9.0 Maintenance PPTP INFO ‐‐‐
PPTP Control Connection Nego‐
tiation Started
375 6.0.5 Maintenance PPTP INFO ‐‐‐
PPTP Control Connection Nego‐
tiation Started
375 6.2.0 Maintenance PPTP INFO ‐‐‐
PPTP Control Connection Nego‐
tiation Started
376 5.9.0 Maintenance PPTP INFO ‐‐‐
PPTP Session Negotiation
Started
376 6.0.5 Maintenance PPTP INFO ‐‐‐
PPTP Session Negotiation
Started
376 6.2.0 Maintenance PPTP INFO ‐‐‐
PPTP Session Negotiation
Started
378 5.9.0 Maintenance PPTP INFO ‐‐‐
PPTP Control Connection Estab‐
lished
378 6.0.5 Maintenance PPTP INFO ‐‐‐
PPTP Control Connection Estab‐
lished
378 6.2.0 Maintenance PPTP INFO ‐‐‐
PPTP Control Connection Estab‐
lished
379 5.9.0 Maintenance PPTP INFO ‐‐‐
PPTP Tunnel Disconnect from
Remote
379 6.0.5 Maintenance PPTP INFO ‐‐‐
PPTP Tunnel Disconnect from
Remote
379 6.2.0 Maintenance PPTP INFO ‐‐‐
PPTP Tunnel Disconnect from
Remote
380 5.9.0 Maintenance PPTP INFO ‐‐‐ PPTP Session Established
380 6.0.5 Maintenance PPTP INFO ‐‐‐ PPTP Session Established
380 6.2.0 Maintenance PPTP INFO ‐‐‐ PPTP Session Established
381 5.9.0 Maintenance PPTP INFO ‐‐‐
PPTP Session Disconnect from
Remote
381 6.0.5 Maintenance PPTP INFO ‐‐‐
PPTP Session Disconnect from
Remote
381 6.2.0 Maintenance PPTP INFO ‐‐‐
PPTP Session Disconnect from
Remote
382 5.9.0 Maintenance PPTP INFO ‐‐‐ PPTP PPP Negotiation Started
382 6.0.5 Maintenance PPTP INFO ‐‐‐ PPTP PPP Negotiation Started
382 6.2.0 Maintenance PPTP INFO ‐‐‐ PPTP PPP Negotiation Started
384 5.9.0 Maintenance PPTP INFO ‐‐‐ PPTP PPP Session Up
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 41
384 6.0.5 Maintenance PPTP INFO ‐‐‐ PPTP PPP Session Up
384 6.2.0 Maintenance PPTP INFO ‐‐‐ PPTP PPP Session Up
385 5.9.0 Maintenance PPTP INFO ‐‐‐ PPTP PPP Down
385 6.0.5 Maintenance PPTP INFO ‐‐‐ PPTP PPP Down
385 6.2.0 Maintenance PPTP INFO ‐‐‐ PPTP PPP Down
388 5.9.0 Maintenance PPTP INFO ‐‐‐
PPTP Disconnect Initiated by
the User
388 6.0.5 Maintenance PPTP INFO ‐‐‐
PPTP Disconnect Initiated by
the User
388 6.2.0 Maintenance PPTP INFO ‐‐‐
PPTP Disconnect Initiated by
the User
389 5.9.0 Maintenance PPTP INFO ‐‐‐
Disconnecting PPTP Tunnel due
to traffic Timeout
389 6.0.5 Maintenance PPTP INFO ‐‐‐
Disconnecting PPTP Tunnel due
to traffic Timeout
389 6.2.0 Maintenance PPTP INFO ‐‐‐
Disconnecting PPTP Tunnel due
to traffic Timeout
390 5.9.0 Maintenance PPTP INFO ‐‐‐
PPTP Connect Initiated by the
User
390 6.0.5 Maintenance PPTP INFO ‐‐‐
PPTP Connect Initiated by the
User
390 6.2.0 Maintenance PPTP INFO ‐‐‐
PPTP Connect Initiated by the
User
392 5.9.0 Maintenance PPTP INFO ‐‐‐
PPTP starting CHAP Authentica‐
tion
392 6.0.5 Maintenance PPTP INFO ‐‐‐
PPTP starting CHAP Authentica‐
tion
392 6.2.0 Maintenance PPTP INFO ‐‐‐
PPTP starting CHAP Authentica‐
tion
393 5.9.0 Maintenance PPTP INFO ‐‐‐
PPTP starting PAP Authentica‐
tion
393 6.0.5 Maintenance PPTP INFO ‐‐‐
PPTP starting PAP Authentica‐
tion
393 6.2.0 Maintenance PPTP INFO ‐‐‐
PPTP starting PAP Authentica‐
tion
396 5.9.0 Maintenance PPTP INFO ‐‐‐
PPTP PAP Authentication suc‐
cess.
396 6.0.5 Maintenance PPTP INFO ‐‐‐
PPTP PAP Authentication suc‐
cess.
42 |
396 6.2.0 Maintenance PPTP INFO ‐‐‐
PPTP PAP Authentication suc‐
cess.
398 5.9.0 Maintenance PPTP INFO ‐‐‐ PPTP PPP Link Up
398 6.0.5 Maintenance PPTP INFO ‐‐‐ PPTP PPP Link Up
398 6.2.0 Maintenance PPTP INFO ‐‐‐ PPTP PPP Link Up
399 5.9.0 Maintenance PPTP INFO ‐‐‐ PPTP PPP Link down
399 6.0.5 Maintenance PPTP INFO ‐‐‐ PPTP PPP Link down
399 6.2.0 Maintenance PPTP INFO ‐‐‐ PPTP PPP Link down
400 5.9.0 Maintenance PPTP INFO ‐‐‐ PPTP PPP Link Finished
400 6.0.5 Maintenance PPTP INFO ‐‐‐ PPTP PPP Link Finished
400 6.2.0 Maintenance PPTP INFO ‐‐‐ PPTP PPP Link Finished
401 5.9.0 User Activity VPN IKE WARNING ‐‐‐
Received notify.
NO_PROPOSAL_CHOSEN
401 6.0.5 User Activity VPN IKE WARNING ‐‐‐
Received notify.
NO_PROPOSAL_CHOSEN
401 6.2.0 User Activity VPN IKE WARNING ‐‐‐
Received notify.
NO_PROPOSAL_CHOSEN
402 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: IKE proposal
does not match (Phase 1)
402 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: IKE proposal
does not match (Phase 1)
402 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: IKE proposal
does not match (Phase 1)
403 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKE negotiation aborted due to
Timeout
403 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKE negotiation aborted due to
Timeout
403 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKE negotiation aborted due to
Timeout
404 5.9.0 User Activity VPN IKE WARNING ‐‐‐
Failed payload verification after
decryption; possible preshared
key mismatch
404 6.0.5 User Activity VPN IKE WARNING ‐‐‐
Failed payload verification after
decryption; possible preshared
key mismatch
404 6.2.0 User Activity VPN IKE WARNING ‐‐‐
Failed payload verification after
decryption; possible preshared
key mismatch
405 5.9.0 User Activity VPN IKE WARNING ‐‐‐ Failed payload validation
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 43
405 6.0.5 User Activity VPN IKE WARNING ‐‐‐ Failed payload validation
405 6.2.0 User Activity VPN IKE WARNING ‐‐‐ Failed payload validation
406 5.9.0 User Activity VPN IKE WARNING ‐‐‐
Received packet retransmis‐
sion. Drop duplicate packet
406 6.0.5 User Activity VPN IKE WARNING ‐‐‐
Received packet retransmis‐
sion. Drop duplicate packet
406 6.2.0 User Activity VPN IKE WARNING ‐‐‐
Received packet retransmis‐
sion. Drop duplicate packet
408 5.9.0 Maintenance Security Services INFO ‐‐‐ Anti‐Virus Licenses Exceeded
408 6.0.5 Maintenance Security Services INFO ‐‐‐ Anti‐Virus Licenses Exceeded
408 6.2.0 Maintenance Security Services INFO ‐‐‐ Anti‐Virus Licenses Exceeded
409 5.9.0 User Activity VPN IKE WARNING ‐‐‐
Received notify:
ISAKMP_AUTH_FAILED
409 6.0.5 User Activity VPN IKE WARNING ‐‐‐
Received notify:
ISAKMP_AUTH_FAILED
409 6.2.0 User Activity VPN IKE WARNING ‐‐‐
Received notify:
ISAKMP_AUTH_FAILED
410 5.9.0 User Activity VPN IKE WARNING ‐‐‐
Computed hash does not match
hash received from peer; pre‐
shared key mismatch
410 6.0.5 User Activity VPN IKE WARNING ‐‐‐
Computed hash does not match
hash received from peer; pre‐
shared key mismatch
410 6.2.0 User Activity VPN IKE WARNING ‐‐‐
Computed hash does not match
hash received from peer; pre‐
shared key mismatch
411 5.9.0 User Activity VPN IKE WARNING ‐‐‐
Received notify:
PAYLOAD_MALFORMED
411 6.0.5 User Activity VPN IKE WARNING ‐‐‐
Received notify:
PAYLOAD_MALFORMED
411 6.2.0 User Activity VPN IKE WARNING ‐‐‐
Received notify:
PAYLOAD_MALFORMED
412 5.9.0 User Activity VPN IKE INFO ‐‐‐
Received IPsec SA delete
request
412 6.0.5 User Activity VPN IKE INFO ‐‐‐
Received IPsec SA delete
request
412 6.2.0 User Activity VPN IKE INFO ‐‐‐
Received IPsec SA delete
request
413 5.9.0 User Activity VPN IKE INFO ‐‐‐ Received IKE SA delete request
44 |
413 6.0.5 User Activity VPN IKE INFO ‐‐‐ Received IKE SA delete request
413 6.2.0 User Activity VPN IKE INFO ‐‐‐ Received IKE SA delete request
414 5.9.0 User Activity VPN IKE INFO ‐‐‐
Received notify:
INVALID_COOKIES
414 6.0.5 User Activity VPN IKE INFO ‐‐‐
Received notify:
INVALID_COOKIES
414 6.2.0 User Activity VPN IKE INFO ‐‐‐
Received notify:
INVALID_COOKIES
415 5.9.0 User Activity VPN IKE INFO ‐‐‐
Received notify:
RESPONDER_LIFETIME
415 6.0.5 User Activity VPN IKE INFO ‐‐‐
Received notify:
RESPONDER_LIFETIME
415 6.2.0 User Activity VPN IKE INFO ‐‐‐
Received notify:
RESPONDER_LIFETIME
416 5.9.0 User Activity VPN IKE INFO ‐‐‐ Received notify: INVALID_SPI
416 6.0.5 User Activity VPN IKE INFO ‐‐‐ Received notify: INVALID_SPI
416 6.2.0 User Activity VPN IKE INFO ‐‐‐ Received notify: INVALID_SPI
419 5.9.0 Maintenance RIP INFO 8401 RIP disabled on interface %s
419 6.0.5 Maintenance RIP INFO 8401 RIP disabled on interface %s
419 6.2.0 Maintenance RIP INFO 8401 RIP disabled on interface %s
420 5.9.0 Maintenance RIP INFO 8402 RIPv1 enabled on interface %s
420 6.0.5 Maintenance RIP INFO 8402 RIPv1 enabled on interface %s
420 6.2.0 Maintenance RIP INFO 8402 RIPv1 enabled on interface %s
421 5.9.0 Maintenance RIP INFO 8403 RIPv2 enabled on interface %s
421 6.0.5 Maintenance RIP INFO 8403 RIPv2 enabled on interface %s
421 6.2.0 Maintenance RIP INFO 8403 RIPv2 enabled on interface %s
422 5.9.0 Maintenance RIP INFO 8404
RIPv2 compatibility (broadcast)
mode enabled on interface %s
422 6.0.5 Maintenance RIP INFO 8404
RIPv2 compatibility (broadcast)
mode enabled on interface %s
422 6.2.0 Maintenance RIP INFO 8404
RIPv2 compatibility (broadcast)
mode enabled on interface %s
423 5.9.0 Maintenance RIP INFO 8405 RIP disabled on DMZ interface
423 6.0.5 Maintenance RIP INFO 8405 RIP disabled on DMZ interface
423 6.2.0 Maintenance RIP INFO 8405 RIP disabled on DMZ interface
424 5.9.0 Maintenance RIP INFO 8406 RIPv1 enabled on DMZ interface
424 6.0.5 Maintenance RIP INFO 8406 RIPv1 enabled on DMZ interface
424 6.2.0 Maintenance RIP INFO 8406 RIPv1 enabled on DMZ interface
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 45
425 5.9.0 Maintenance RIP INFO 8407 RIPv2 enabled on DMZ interface
425 6.0.5 Maintenance RIP INFO 8407 RIPv2 enabled on DMZ interface
425 6.2.0 Maintenance RIP INFO 8407 RIPv2 enabled on DMZ interface
426 5.9.0 Maintenance RIP INFO 8408
RIPv2 compatibility (broadcast)
mode enabled on DMZ inter‐
face
426 6.0.5 Maintenance RIP INFO 8408
RIPv2 compatibility (broadcast)
mode enabled on DMZ inter‐
face
426 6.2.0 Maintenance RIP INFO 8408
RIPv2 compatibility (broadcast)
mode enabled on DMZ inter‐
face
427 5.9.0
VPN Tunnel Sta‐
tus VPN INFO 801 IPsec Tunnel status changed
427 6.0.5
VPN Tunnel Sta‐
tus VPN INFO 801 IPsec Tunnel status changed
427 6.2.0
VPN Tunnel Sta‐
tus VPN INFO 801 IPsec Tunnel status changed
428 5.9.0 Debug
Intrusion Detec‐
tion WARNING ‐‐‐
Source routed IP packet
dropped
428 6.0.5 Debug
Intrusion Detec‐
tion WARNING ‐‐‐
Source routed IP packet
dropped
428 6.2.0 Debug
Intrusion Detec‐
tion WARNING ‐‐‐
Source routed IP packet
dropped
429 5.9.0 Maintenance PPTP INFO ‐‐‐
No response from server to
Echo Requests, disconnecting
PPTP Tunnel
429 6.0.5 Maintenance PPTP INFO ‐‐‐
No response from server to
Echo Requests, disconnecting
PPTP Tunnel
429 6.2.0 Maintenance PPTP INFO ‐‐‐
No response from server to
Echo Requests, disconnecting
PPTP Tunnel
430 5.9.0 Maintenance PPTP INFO ‐‐‐
No response from PPTP server
to control connection requests
430 6.0.5 Maintenance PPTP INFO ‐‐‐
No response from PPTP server
to control connection requests
430 6.2.0 Maintenance PPTP INFO ‐‐‐
No response from PPTP server
to control connection requests
46 |
431 5.9.0 Maintenance PPTP INFO ‐‐‐
No response from PPTP server
to call requests
431 6.0.5 Maintenance PPTP INFO ‐‐‐
No response from PPTP server
to call requests
431 6.2.0 Maintenance PPTP INFO ‐‐‐
No response from PPTP server
to call requests
432 5.9.0 Maintenance PPTP INFO ‐‐‐
PPTP server rejected control
connection
432 6.0.5 Maintenance PPTP INFO ‐‐‐
PPTP server rejected control
connection
432 6.2.0 Maintenance PPTP INFO ‐‐‐
PPTP server rejected control
connection
433 5.9.0 Maintenance PPTP INFO ‐‐‐
PPTP server rejected the call
request
433 6.0.5 Maintenance PPTP INFO ‐‐‐
PPTP server rejected the call
request
433 6.2.0 Maintenance PPTP INFO ‐‐‐
PPTP server rejected the call
request
434 5.9.0 User Activity WAN Failover INFO ‐‐‐
PPP Dial‐Up: Trying to failover
but Alternate Profile is manual
434 6.0.5 User Activity WAN Failover INFO ‐‐‐
PPP Dial‐Up: Trying to failover
but Alternate Profile is manual
434 6.2.0 User Activity WAN Failover INFO ‐‐‐
PPP Dial‐Up: Trying to failover
but Alternate Profile is manual
435 5.9.0 System Error WAN Failover ALERT 652 WLB Failback initiated by %s
435 6.0.5 System Error WAN Failover ALERT 652 WLB Failback initiated by %s
435 6.2.0 System Error WAN Failover ALERT 652 WLB Failback initiated by %s
436 5.9.0 System Error WAN Failover ALERT 638 Probing succeeded on %s
436 6.0.5 System Error WAN Failover ALERT 638 Probing succeeded on %s
436 6.2.0 System Error WAN Failover ALERT 638 Probing succeeded on %s
437 5.9.0 Attack
Intrusion Detec‐
tion ERROR 550 E‐Mail fragment dropped
437 6.0.5 Attack
Intrusion Detec‐
tion ERROR 550 E‐Mail fragment dropped
437 6.2.0 Attack
Intrusion Detec‐
tion ERROR 550 E‐Mail fragment dropped
438 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
Locked‐out user logins allowed ‐
lockout period expired
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 47
438 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
Locked‐out user logins allowed ‐
lockout period expired
438 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
Locked‐out user logins allowed ‐
lockout period expired
439 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
Locked‐out user logins allowed
by %s
439 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
Locked‐out user logins allowed
by administrator
439 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
Locked‐out user logins allowed
by %s
440 5.9.0 User Activity Firewall Rule INFO ‐‐‐ Access rule added
440 6.0.5 User Activity Firewall Rule INFO ‐‐‐ Access rule added
440 6.2.0 User Activity Firewall Rule INFO ‐‐‐ Access rule added
441 5.9.0 User Activity Firewall Rule INFO ‐‐‐ Access rule modified
441 6.0.5 User Activity Firewall Rule INFO ‐‐‐ Access rule modified
441 6.2.0 User Activity Firewall Rule INFO ‐‐‐ Access rule modified
442 5.9.0 User Activity Firewall Rule INFO ‐‐‐ Access rule deleted
442 6.0.5 User Activity Firewall Rule INFO ‐‐‐ Access rule deleted
442 6.2.0 User Activity Firewall Rule INFO ‐‐‐ Access rule deleted
443 5.9.0 User Activity Firewall Rule INFO ‐‐‐
Access rules restored to
defaults
443 6.0.5 User Activity Firewall Rule INFO ‐‐‐
Access rules restored to
defaults
443 6.2.0 User Activity Firewall Rule INFO ‐‐‐
Access rules restored to
defaults
444 5.9.0 Maintenance PPTP INFO ‐‐‐
PPTP Server is not responding,
check if the server is UP and
running.
444 6.0.5 Maintenance PPTP INFO ‐‐‐
PPTP Server is not responding,
check if the server is UP and
running.
444 6.2.0 Maintenance PPTP INFO ‐‐‐
PPTP Server is not responding,
check if the server is UP and
running.
445 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Accepting peer
lifetime. (Phase 1)
445 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Accepting peer
lifetime. (Phase 1)
48 |
445 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Accepting peer
lifetime. (Phase 1)
446 5.9.0 Attack
Intrusion Detec‐
tion ERROR 551
FTP: PASV response spoof
attack dropped
446 6.0.5 Attack
Intrusion Detec‐
tion ERROR 551
FTP: PASV response spoof
attack dropped
446 6.2.0 Attack
Intrusion Detec‐
tion ERROR 551
FTP: PASV response spoof
attack dropped
448 5.9.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Output buffer too
small
448 6.0.5 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Output buffer too
small
448 6.2.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Output buffer too
small
449 5.9.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Cannot alloc mem‐
ory
449 6.0.5 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Cannot alloc mem‐
ory
449 6.2.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Cannot alloc mem‐
ory
450 5.9.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Reached the limit
for local certs, cant load any
more
450 6.0.5 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Reached the limit
for local certs, cant load any
more
450 6.2.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Reached the limit
for local certs, cant load any
more
451 5.9.0 Maintenance VPN PKI ERROR ‐‐‐ PKI Failure: Import failed
451 6.0.5 Maintenance VPN PKI ERROR ‐‐‐ PKI Failure: Import failed
451 6.2.0 Maintenance VPN PKI ERROR ‐‐‐ PKI Failure: Import failed
452 5.9.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Incorrect admin
password
452 6.0.5 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Incorrect admin
password
452 6.2.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Incorrect admin
password
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 49
453 5.9.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: CA certificates store
exceeded. Cannot verify this
Local Certificate
453 6.0.5 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: CA certificates store
exceeded. Cannot verify this
Local Certificate
453 6.2.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: CA certificates store
exceeded. Cannot verify this
Local Certificate
454 5.9.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Improper file for‐
mat. Please select PKCS#12
(*.p12) file
454 6.0.5 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Improper file for‐
mat. Please select PKCS#12
(*.p12) file
454 6.2.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Improper file for‐
mat. Please select PKCS#12
(*.p12) file
455 5.9.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Certificate's ID does
not match this Network Secu‐
rity Appliance
455 6.0.5 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Certificate's ID does
not match this Network Secu‐
rity Appliance
455 6.2.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Certificate's ID does
not match this Network Secu‐
rity Appliance
456 5.9.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: public‐private key
mismatch
456 6.0.5 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: public‐private key
mismatch
456 6.2.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: public‐private key
mismatch
457 5.9.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Duplicate local cer‐
tificate name
457 6.0.5 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Duplicate local cer‐
tificate name
457 6.2.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Duplicate local cer‐
tificate name
50 |
458 5.9.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Duplicate local cer‐
tificate
458 6.0.5 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Duplicate local cer‐
tificate
458 6.2.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Duplicate local cer‐
tificate
459 5.9.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: No CA certificates
yet loaded
459 6.0.5 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: No CA certificates
yet loaded
459 6.2.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: No CA certificates
yet loaded
460 5.9.0 Maintenance VPN PKI ERROR ‐‐‐ PKI Failure: Internal error
460 6.0.5 Maintenance VPN PKI ERROR ‐‐‐ PKI Failure: Internal error
460 6.2.0 Maintenance VPN PKI ERROR ‐‐‐ PKI Failure: Internal error
461 5.9.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Temporary mem‐
ory shortage, try again
461 6.0.5 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Temporary mem‐
ory shortage, try again
461 6.2.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Temporary mem‐
ory shortage, try again
462 5.9.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: The certificate chain
is circular
462 6.0.5 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: The certificate chain
is circular
462 6.2.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: The certificate chain
is circular
463 5.9.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: The certificate chain
is incomplete
463 6.0.5 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: The certificate chain
is incomplete
463 6.2.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: The certificate chain
is incomplete
464 5.9.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: The certificate chain
has no root
464 6.0.5 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: The certificate chain
has no root
464 6.2.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: The certificate chain
has no root
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 51
465 5.9.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: The certificate or a
certificate in the chain has
expired
465 6.0.5 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: The certificate or a
certificate in the chain has
expired
465 6.2.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: The certificate or a
certificate in the chain has
expired
466 5.9.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: The certificate or a
certificate in the chain has a
validity period in the future
466 6.0.5 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: The certificate or a
certificate in the chain has a
validity period in the future
466 6.2.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: The certificate or a
certificate in the chain has a
validity period in the future
467 5.9.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: The certificate or a
certificate in the chain is cor‐
rupt
467 6.0.5 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: The certificate or a
certificate in the chain is cor‐
rupt
467 6.2.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: The certificate or a
certificate in the chain is cor‐
rupt
468 5.9.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: The certificate or a
certificate in the chain has a
bad signature
468 6.0.5 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: The certificate or a
certificate in the chain has a
bad signature
468 6.2.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: The certificate or a
certificate in the chain has a
bad signature
469 5.9.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Loaded but could
not verify certificate
469 6.0.5 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Loaded but could
not verify certificate
52 |
469 6.2.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Loaded but could
not verify certificate
470 5.9.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Loaded the certifi‐
cate but could not verify its
chain
470 6.0.5 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Loaded the certifi‐
cate but could not verify its
chain
470 6.2.0 Maintenance VPN PKI ERROR ‐‐‐
PKI Failure: Loaded the certifi‐
cate but could not verify its
chain
473 5.9.0 Debug DHCP Relay INFO ‐‐‐
DHCP REQUEST received from
remote device
473 6.0.5 Debug DHCP Relay INFO ‐‐‐
DHCP REQUEST received from
remote device
473 6.2.0 Debug DHCP Relay INFO ‐‐‐
DHCP REQUEST received from
remote device
474 5.9.0 Debug DHCP Relay INFO ‐‐‐
DHCP DISCOVER received from
remote device
474 6.0.5 Debug DHCP Relay INFO ‐‐‐
DHCP DISCOVER received from
remote device
474 6.2.0 Debug DHCP Relay INFO ‐‐‐
DHCP DISCOVER received from
remote device
476 5.9.0 Debug DHCP Relay INFO ‐‐‐
DHCP OFFER received from
server
476 6.0.5 Debug DHCP Relay INFO ‐‐‐
DHCP OFFER received from
server
476 6.2.0 Debug DHCP Relay INFO ‐‐‐
DHCP OFFER received from
server
477 5.9.0 Debug DHCP Relay INFO ‐‐‐
DHCP NACK received from
server
477 6.0.5 Debug DHCP Relay INFO ‐‐‐
DHCP NACK received from
server
477 6.2.0 Debug DHCP Relay INFO ‐‐‐
DHCP NACK received from
server
481 5.9.0 Maintenance PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: No peer IP address
from Dial‐Up ISP, local and
remote IPs will be the same
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 53
481 6.0.5 Maintenance PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: No peer IP address
from Dial‐Up ISP, local and
remote IPs will be the same
481 6.2.0 Maintenance PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: No peer IP address
from Dial‐Up ISP, local and
remote IPs will be the same
482 5.9.0 Maintenance Security Services WARNING 552
Received AV Alert: Your Net‐
work Anti‐Virus subscRIPtion
will expire in 7 days. %s
482 6.0.5 Maintenance Security Services WARNING 552
Received AV Alert: Your Net‐
work Anti‐Virus subscRIPtion
will expire in 7 days. %s
482 6.2.0 Maintenance Security Services WARNING 552
Received AV Alert: Your Net‐
work Anti‐Virus subscRIPtion
will expire in 7 days. %s
483 5.9.0 User Activity VPN IPsec WARNING ‐‐‐
Received notify:
INVALID_ID_INFO
483 6.0.5 User Activity VPN IPsec WARNING ‐‐‐
Received notify:
INVALID_ID_INFO
483 6.2.0 User Activity VPN IPsec WARNING ‐‐‐
Received notify:
INVALID_ID_INFO
484 5.9.0 Maintenance DHCP Relay WARNING ‐‐‐
DHCP lease dropped. Lease
from Central Gateway conflicts
with Remote Management IP
484 6.0.5 Maintenance DHCP Relay WARNING ‐‐‐
DHCP lease dropped. Lease
from Central Gateway conflicts
with Remote Management IP
484 6.2.0 Maintenance DHCP Relay WARNING ‐‐‐
DHCP lease dropped. Lease
from Central Gateway conflicts
with Remote Management IP
486 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
User login denied ‐ User has no
privileges for guest service
486 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
User login denied ‐ User has no
privileges for guest service
486 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
User login denied ‐ User has no
privileges for guest service
488 5.9.0
TCP | UDP |
ICMP Network Access WARNING ‐‐‐ Packet dropped by guest check
488 6.0.5
TCP | UDP |
ICMP Network Access WARNING ‐‐‐ Packet dropped by guest check
54 |
488 6.2.0
TCP | UDP |
ICMP Network Access WARNING ‐‐‐ Packet dropped by guest check
489 5.9.0 Maintenance Security Services WARNING 562
Received CFS Alert: Your Con‐
tent Filtering subscRIPtion will
expire in 7 days.
489 6.0.5 Maintenance Security Services WARNING 562
Received CFS Alert: Your Con‐
tent Filtering subscRIPtion will
expire in 7 days.
489 6.2.0 Maintenance Security Services WARNING 562
Received CFS Alert: Your Con‐
tent Filtering subscRIPtion will
expire in 7 days.
490 5.9.0 Maintenance Security Services WARNING 563
Received CFS Alert: Your Con‐
tent Filtering subscRIPtion has
expired.
490 6.0.5 Maintenance Security Services WARNING 563
Received CFS Alert: Your Con‐
tent Filtering subscRIPtion has
expired.
490 6.2.0 Maintenance Security Services WARNING 563
Received CFS Alert: Your Con‐
tent Filtering subscRIPtion has
expired.
491 5.9.0 Maintenance Security Services WARNING 564
Received E‐Mail Filter Alert:
Your E‐Mail Filtering subscRIP‐
tion will expire in 7 days.
491 6.0.5 Maintenance Security Services WARNING 564
Received E‐Mail Filter Alert:
Your E‐Mail Filtering subscRIP‐
tion will expire in 7 days.
491 6.2.0 Maintenance Security Services WARNING 564
Received E‐Mail Filter Alert:
Your E‐Mail Filtering subscRIP‐
tion will expire in 7 days.
492 5.9.0 Maintenance Security Services WARNING 565
Received E‐Mail Filter Alert:
Your E‐Mail Filtering subscRIP‐
tion has expired.
492 6.0.5 Maintenance Security Services WARNING 565
Received E‐Mail Filter Alert:
Your E‐Mail Filtering subscRIP‐
tion has expired.
492 6.2.0 Maintenance Security Services WARNING 565
Received E‐Mail Filter Alert:
Your E‐Mail Filtering subscRIP‐
tion has expired.
493 5.9.0 Maintenance Firewall Event INFO ‐‐‐
ISDN Driver Firmware success‐
fully updated
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 55
493 6.0.5 Maintenance Firewall Event INFO ‐‐‐
ISDN Driver Firmware success‐
fully updated
493 6.2.0 Maintenance Firewall Event INFO ‐‐‐
ISDN Driver Firmware success‐
fully updated
494 5.9.0 System Error VPN Client INFO 658
Global VPN Client License
Exceeded: Connection denied.
494 6.0.5 System Error VPN Client INFO 658
Global VPN Client License
Exceeded: Connection denied.
494 6.2.0 System Error VPN Client INFO 658
Global VPN Client License
Exceeded: Connection denied.
496 5.9.0 Maintenance Security Services WARNING ‐‐‐
Registration Update Needed,
Please restore your existing
security service subscRIPtions.
496 6.0.5 Maintenance Security Services WARNING ‐‐‐
Registration Update Needed,
Please restore your existing
security service subscRIPtions.
496 6.2.0 Maintenance Security Services WARNING ‐‐‐
Registration Update Needed,
Please restore your existing
security service subscRIPtions.
502 5.9.0 Maintenance Firewall Event INFO ‐‐‐ WAN not ready
502 6.0.5 Maintenance Firewall Event INFO ‐‐‐ WAN not ready
502 6.2.0 Maintenance Firewall Event INFO ‐‐‐ WAN not ready
505 5.9.0 System Error VPN Client ERROR 660
Blocked Quick Mode for Client
using Default KeyId
505 6.0.5 System Error VPN Client ERROR 660
Blocked Quick Mode for Client
using Default KeyId
505 6.2.0 System Error VPN Client ERROR 660
Blocked Quick Mode for Client
using Default KeyId
506 5.9.0 Maintenance
Authenticated
Access INFO ‐‐‐ VPN disabled by administrator
506 6.0.5 Maintenance
Authenticated
Access INFO ‐‐‐ VPN disabled by administrator
506 6.2.0 Maintenance
Authenticated
Access INFO ‐‐‐ VPN disabled by administrator
507 5.9.0 Maintenance
Authenticated
Access INFO ‐‐‐ VPN enabled by administrator
507 6.0.5 Maintenance
Authenticated
Access INFO ‐‐‐ VPN enabled by administrator
56 |
507 6.2.0 Maintenance
Authenticated
Access INFO ‐‐‐ VPN enabled by administrator
508 5.9.0 Maintenance
Authenticated
Access INFO ‐‐‐
WLAN disabled by administra‐
tor
508 6.0.5 Maintenance
Authenticated
Access INFO ‐‐‐
WLAN disabled by administra‐
tor
508 6.2.0 Maintenance
Authenticated
Access INFO ‐‐‐
WLAN disabled by administra‐
tor
509 5.9.0 Maintenance
Authenticated
Access INFO ‐‐‐ WLAN enabled by administrator
509 6.0.5 Maintenance
Authenticated
Access INFO ‐‐‐ WLAN enabled by administrator
509 6.2.0 Maintenance
Authenticated
Access INFO ‐‐‐ WLAN enabled by administrator
518 5.9.0
802.11b Man‐
agement Wireless INFO ‐‐‐ 802.11 Management
518 6.0.5
802.11b Man‐
agement Wireless INFO ‐‐‐ 802.11 Management
518 6.2.0
802.11b Man‐
agement Wireless INFO ‐‐‐ 802.11 Management
520 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐ CLI administrator logged out
520 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐ CLI administrator logged out
520 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐ CLI administrator logged out
521 5.9.0 Maintenance Firewall Event INFO ‐‐‐
Network Security Appliance ini‐
tializing
521 6.0.5 Maintenance Firewall Event INFO ‐‐‐
Network Security Appliance ini‐
tializing
521 6.2.0 Maintenance Firewall Event INFO ‐‐‐
Network Security Appliance ini‐
tializing
522 5.9.0 Debug Network Access ALERT 554
Malformed or unhandled IP
packet dropped
522 6.0.5 Debug Network Access ALERT 554
Malformed or unhandled IP
packet dropped
522 6.2.0 Debug Network Access ALERT 554
Malformed or unhandled IP
packet dropped
523 5.9.0 ICMP Network Access NOTICE ‐‐‐ ICMP packet dropped no match
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 57
523 6.0.5 ICMP Network Access NOTICE ‐‐‐ ICMP packet dropped no match
523 6.2.0 ICMP Network Access NOTICE ‐‐‐ ICMP packet dropped no match
524 5.9.0 TCP Network Access NOTICE ‐‐‐ Web access Request dropped
524 6.0.5 TCP Network Access NOTICE ‐‐‐ Web access Request dropped
524 6.2.0 TCP Network Access NOTICE ‐‐‐ Web access Request dropped
526 5.9.0 User Activity Network Access NOTICE ‐‐‐
Web management request
allowed
526 6.0.5 User Activity Network Access NOTICE ‐‐‐
Web management request
allowed
526 6.2.0 User Activity Network Access NOTICE ‐‐‐
Web management request
allowed
527 5.9.0 Attack
Intrusion Detec‐
tion ALERT 555
FTP: PORT bounce attack
dropped.
527 6.0.5 Attack
Intrusion Detec‐
tion ALERT 555
FTP: PORT bounce attack
dropped.
527 6.2.0 Attack
Intrusion Detec‐
tion ALERT 555
FTP: PORT bounce attack
dropped.
528 5.9.0 Attack
Intrusion Detec‐
tion ALERT 556
FTP: PASV response bounce
attack dropped.
528 6.0.5 Attack
Intrusion Detec‐
tion ALERT 556
FTP: PASV response bounce
attack dropped.
528 6.2.0 Attack
Intrusion Detec‐
tion ALERT 556
FTP: PASV response bounce
attack dropped.
529 5.9.0 System Error VPN Client INFO 643
Global VPN Client connection is
not allowed. Appliance is not
registered.
529 6.0.5 System Error VPN Client INFO 643
Global VPN Client connection is
not allowed. Appliance is not
registered.
529 6.2.0 System Error VPN Client INFO 643
Global VPN Client connection is
not allowed. Appliance is not
registered.
533 5.9.0
TCP | UDP |
ICMP VPN IPsec NOTICE ‐‐‐ IPsec (ESP) packet dropped
533 6.0.5
TCP | UDP |
ICMP VPN IPsec NOTICE ‐‐‐ IPsec (ESP) packet dropped
533 6.2.0
TCP | UDP |
ICMP VPN IPsec NOTICE ‐‐‐ IPsec (ESP) packet dropped
58 |
534 5.9.0
TCP | UDP |
ICMP VPN IPsec NOTICE ‐‐‐ IPsec (AH) packet dropped
534 6.0.5
TCP | UDP |
ICMP VPN IPsec NOTICE ‐‐‐ IPsec (AH) packet dropped
534 6.2.0
TCP | UDP |
ICMP VPN IPsec NOTICE ‐‐‐ IPsec (AH) packet dropped
535 5.9.0 Debug VPN IPsec DEBUG ‐‐‐
IPsec (ESP) packet dropped;
waiting for pending IPsec con‐
nection
535 6.0.5 Debug VPN IPsec DEBUG ‐‐‐
IPsec (ESP) packet dropped;
waiting for pending IPsec con‐
nection
535 6.2.0 Debug VPN IPsec DEBUG ‐‐‐
IPsec (ESP) packet dropped;
waiting for pending IPsec con‐
nection
537 5.9.0
Connection
Traffic Network Traffic INFO ‐‐‐ Connection Closed
537 6.0.5
Connection
Traffic Network Traffic INFO ‐‐‐ Connection Closed
537 6.2.0
Connection
Traffic Network Traffic INFO ‐‐‐ Connection Closed
538 5.9.0 Attack Network Access ALERT 557
FTP: Data connection from non
default port dropped
538 6.0.5 Attack Network Access ALERT 557
FTP: Data connection from non
default port dropped
538 6.2.0 Attack Network Access ALERT 557
FTP: Data connection from non
default port dropped
542 5.9.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Previous session
was connected for %s
542 6.0.5 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Previous session
was connected for %s
542 6.2.0 User Activity PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Previous session
was connected for %s
543 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Using secondary
gateway to negotiate
543 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Using secondary
gateway to negotiate
543 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Using secondary
gateway to negotiate
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 59
544 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKE Initiator drop: VPN tunnel
end point does not match con‐
figured VPN Policy Bound to
scope
544 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKE Initiator drop: VPN tunnel
end point does not match con‐
figured VPN Policy Bound to
scope
544 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKE Initiator drop: VPN tunnel
end point does not match con‐
figured VPN Policy Bound to
scope
545 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKE Responder drop: VPN tun‐
nel end point does not match
configured VPN Policy Bound to
scope
545 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKE Responder drop: VPN tun‐
nel end point does not match
configured VPN Policy Bound to
scope
545 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKE Responder drop: VPN tun‐
nel end point does not match
configured VPN Policy Bound to
scope
546 5.9.0 WLAN IDS WLAN IDS ALERT 901 Found Rogue Access Point
546 6.0.5 WLAN IDS WLAN IDS ALERT 901 Found Rogue Access Point
546 6.2.0 WLAN IDS WLAN IDS ALERT 901 Found Rogue Access Point
548 5.9.0 WLAN IDS WLAN IDS ALERT 903
Association Flood from WLAN
station
548 6.0.5 WLAN IDS WLAN IDS ALERT 903
Association Flood from WLAN
station
548 6.2.0 WLAN IDS WLAN IDS ALERT 903
Association Flood from WLAN
station
549 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
User login failed ‐ Guest service
limit reached
549 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
User login failed ‐ Guest service
limit reached
549 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
User login failed ‐ Guest service
limit reached
60 |
550 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐ Guest Session Timeout
550 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐ Guest Session Timeout
550 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐ Guest Session Timeout
551 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐ Guest Account Timeout
551 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐ Guest Account Timeout
551 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐ Guest Account Timeout
557 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
Guest login denied. Guest '%s' is
already logged in. Please try
again later.
557 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
Guest login denied. Guest '%s' is
already logged in. Please try
again later.
557 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
Guest login denied. Guest '%s' is
already logged in. Please try
again later.
558 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐ Guest account '%s' created
558 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐ Guest account '%s' created
558 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐ Guest account '%s' created
559 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐ Guest account '%s' deleted
559 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐ Guest account '%s' deleted
559 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐ Guest account '%s' deleted
560 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐ Guest account '%s' disabled
560 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐ Guest account '%s' disabled
560 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐ Guest account '%s' disabled
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 61
561 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐ Guest account '%s' re‐enabled
561 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐ Guest account '%s' re‐enabled
561 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐ Guest account '%s' re‐enabled
562 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐ Guest account '%s' pruned
562 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐ Guest account '%s' pruned
562 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐ Guest account '%s' pruned
563 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
Guest account '%s' re‐gener‐
ated
563 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
Guest account '%s' re‐gener‐
ated
563 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
Guest account '%s' re‐gener‐
ated
564 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐ Guest Idle Timeout
564 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐ Guest Idle Timeout
564 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐ Guest Idle Timeout
565 5.9.0 System Error Firewall Event ALERT 646 Interface %s Link Is Up
565 6.0.5 System Error Firewall Event ALERT 646 Interface %s Link Is Up
565 6.2.0 System Error Firewall Event ALERT 646 Interface %s Link Is Up
566 5.9.0 System Error Firewall Event ALERT 647 Interface %s Link Is Down
566 6.0.5 System Error Firewall Event ALERT 647 Interface %s Link Is Down
566 6.2.0 System Error Firewall Event ALERT 647 Interface %s Link Is Down
567 5.9.0 Maintenance Firewall Event INFO ‐‐‐
Interface IP Assignment
changed: Shutting down %s
567 6.0.5 Maintenance Firewall Event INFO ‐‐‐
Interface IP Assignment
changed: Shutting down %s
567 6.2.0 Maintenance Firewall Event INFO ‐‐‐
Interface IP Assignment
changed: Shutting down %s
568 5.9.0 Maintenance Firewall Event INFO ‐‐‐
Interface IP Assignment : Bind‐
ing and initializing %s
62 |
568 6.0.5 Maintenance Firewall Event INFO ‐‐‐
Interface IP Assignment : Bind‐
ing and initializing %s
568 6.2.0 Maintenance Firewall Event INFO ‐‐‐
Interface IP Assignment : Bind‐
ing and initializing %s
569 5.9.0 Maintenance Firewall Event INFO ‐‐‐
Network for interface %s over‐
laps with another interface.
569 6.0.5 Maintenance Firewall Event INFO ‐‐‐
Network for interface %s over‐
laps with another interface.
569 6.2.0 Maintenance Firewall Event INFO ‐‐‐
Network for interface %s over‐
laps with another interface.
570 5.9.0 Maintenance Firewall Event INFO ‐‐‐
Please connect interface %s to
another network to function
properly
570 6.0.5 Maintenance Firewall Event INFO ‐‐‐
Please connect interface %s to
another network to function
properly
570 6.2.0 Maintenance Firewall Event INFO ‐‐‐
Please connect interface %s to
another network to function
properly
573 5.9.0 System Error Firewall Event WARNING 649
The preferences file is too large
to be saved in available flash
memory
573 6.0.5 System Error Firewall Event WARNING 649
The preferences file is too large
to be saved in available flash
memory
573 6.2.0 System Error Firewall Event WARNING 649
The preferences file is too large
to be saved in available flash
memory
574 5.9.0 System Error Firewall Event WARNING 650
All preference values have been
set to factory default values
574 6.0.5 System Error Firewall Event WARNING 650
All preference values have been
set to factory default values
574 6.2.0 System Error Firewall Event WARNING 650
All preference values have been
set to factory default values
575 5.9.0
System Envi‐
ronment Firewall Hardware ERROR 101 Voltages Out of Tolerance
575 6.0.5
System Envi‐
ronment Firewall Hardware ERROR 101 Voltages Out of Tolerance
575 6.2.0
System Envi‐
ronment Firewall Hardware ERROR 101 Voltages Out of Tolerance
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 63
576 5.9.0
System Envi‐
ronment Firewall Hardware ALERT 102 Fan Failure
576 6.0.5
System Envi‐
ronment Firewall Hardware ALERT 102 Fan Failure
576 6.2.0
System Envi‐
ronment Firewall Hardware ALERT 102 Fan Failure
577 5.9.0
System Envi‐
ronment Firewall Hardware ALERT 103 Thermal Yellow
577 6.0.5
System Envi‐
ronment Firewall Hardware ALERT 103 Thermal Yellow
577 6.2.0
System Envi‐
ronment Firewall Hardware ALERT 103 Thermal Yellow
578 5.9.0
System Envi‐
ronment Firewall Hardware ALERT 104 Thermal Red
578 6.0.5
System Envi‐
ronment Firewall Hardware ALERT 104 Thermal Red
578 6.2.0
System Envi‐
ronment Firewall Hardware ALERT 104 Thermal Red
579 5.9.0
System Envi‐
ronment Firewall Hardware ALERT 105 Thermal Red Timer Exceeded
579 6.0.5
System Envi‐
ronment Firewall Hardware ALERT 105 Thermal Red Timer Exceeded
579 6.2.0
System Envi‐
ronment Firewall Hardware ALERT 105 Thermal Red Timer Exceeded
580 5.9.0 Attack Network Access ALERT 558 TCP SYN/FIN packet dropped
580 6.0.5 Attack Network Access ALERT 558 TCP SYN/FIN packet dropped
580 6.2.0 Attack Network Access ALERT 558 TCP SYN/FIN packet dropped
581 5.9.0 Maintenance WAN Failover WARNING ‐‐‐
WLB Spill‐over started, config‐
ured threshold exceeded
581 6.0.5 Maintenance WAN Failover WARNING ‐‐‐
WLB Spill‐over started, config‐
ured threshold exceeded
581 6.2.0 Maintenance WAN Failover WARNING ‐‐‐
WLB Spill‐over started, config‐
ured threshold exceeded
582 5.9.0 Maintenance WAN Failover WARNING ‐‐‐ WLB Spill‐over stopped
582 6.0.5 Maintenance WAN Failover WARNING ‐‐‐ WLB Spill‐over stopped
582 6.2.0 Maintenance WAN Failover WARNING ‐‐‐ WLB Spill‐over stopped
583 5.9.0 Attack
Authenticated
Access ERROR 559 User login disabled from %s
64 |
583 6.0.5 Attack
Authenticated
Access ERROR 559 User login disabled from %s
583 6.2.0 Attack
Authenticated
Access ERROR 559 User login disabled from %s
584 5.9.0 System Error WAN Failover ALERT 651 WLB Failover in progress
584 6.0.5 System Error WAN Failover ALERT 651 WLB Failover in progress
584 6.2.0 System Error WAN Failover ALERT 651 WLB Failover in progress
585 5.9.0 System Error WAN Failover ALERT 653 WLB Resource is now available
585 6.0.5 System Error WAN Failover ALERT 653 WLB Resource is now available
585 6.2.0 System Error WAN Failover ALERT 653 WLB Resource is now available
586 5.9.0 System Error WAN Failover ALERT 654 WLB Resource failed
586 6.0.5 System Error WAN Failover ALERT 654 WLB Resource failed
586 6.2.0 System Error WAN Failover ALERT 654 WLB Resource failed
587 5.9.0 User Activity VPN IKE WARNING ‐‐‐ Header verification failed
587 6.0.5 User Activity VPN IKE WARNING ‐‐‐ Header verification failed
587 6.2.0 User Activity VPN IKE WARNING ‐‐‐ Header verification failed
588 5.9.0 Maintenance DHCP Client INFO ‐‐‐
Received DHCP offer packet has
errors
588 6.0.5 Maintenance DHCP Client INFO ‐‐‐
Received DHCP offer packet has
errors
588 6.2.0 Maintenance DHCP Client INFO ‐‐‐
Received DHCP offer packet has
errors
589 5.9.0 Maintenance DHCP Client INFO ‐‐‐
Received response packet for
DHCP request has errors
589 6.0.5 Maintenance DHCP Client INFO ‐‐‐
Received response packet for
DHCP request has errors
589 6.2.0 Maintenance DHCP Client INFO ‐‐‐
Received response packet for
DHCP request has errors
590 5.9.0
LAN UDP | LAN
TCP Network Access NOTICE ‐‐‐ IP type %s packet dropped
590 6.0.5
LAN UDP | LAN
TCP Network Access NOTICE ‐‐‐ IP type %s packet dropped
590 6.2.0
LAN UDP | LAN
TCP Network Access NOTICE ‐‐‐ IP type %s packet dropped
591 5.9.0 Attack PPP Dial‐Up ERROR 566
Maximum sequential failed dial
attempts (10) to a single dial‐up
number: %s
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 65
591 6.0.5 Attack PPP Dial‐Up ERROR 566
Maximum sequential failed dial
attempts (10) to a single dial‐up
number: %s
591 6.2.0 Attack PPP Dial‐Up ERROR 566
Maximum sequential failed dial
attempts (10) to a single dial‐up
number: %s
592 5.9.0 Attack PPP Dial‐Up ERROR 567
Regulatory requirements pro‐
hibit %s from being re‐dialed
for 30 minutes
592 6.0.5 Attack PPP Dial‐Up ERROR 567
Regulatory requirements pro‐
hibit %s from being re‐dialed
for 30 minutes
592 6.2.0 Attack PPP Dial‐Up ERROR 567
Regulatory requirements pro‐
hibit %s from being re‐dialed
for 30 minutes
593 5.9.0 Maintenance PPPoE INFO ‐‐‐
Received PPPoE Active Discov‐
ery Offer
593 6.0.5 Maintenance PPPoE INFO ‐‐‐
Received PPPoE Active Discov‐
ery Offer
593 6.2.0 Maintenance PPPoE INFO ‐‐‐
Received PPPoE Active Discov‐
ery Offer
594 5.9.0 Maintenance PPPoE INFO ‐‐‐
Received PPPoE Active Discov‐
ery Session_confirmation
594 6.0.5 Maintenance PPPoE INFO ‐‐‐
Received PPPoE Active Discov‐
ery Session_confirmation
594 6.2.0 Maintenance PPPoE INFO ‐‐‐
Received PPPoE Active Discov‐
ery Session_confirmation
595 5.9.0 Maintenance PPPoE INFO ‐‐‐
Sending PPPoE Active Discov‐
ery Request
595 6.0.5 Maintenance PPPoE INFO ‐‐‐
Sending PPPoE Active Discov‐
ery Request
595 6.2.0 Maintenance PPPoE INFO ‐‐‐
Sending PPPoE Active Discov‐
ery Request
596 5.9.0 Debug PPTP DEBUG ‐‐‐ PPTP decode failure
596 6.0.5 Debug PPTP DEBUG ‐‐‐ PPTP decode failure
596 6.2.0 Debug PPTP DEBUG ‐‐‐ PPTP decode failure
597 5.9.0 Debug Network Access INFO ‐‐‐ ICMP packet allowed
597 6.0.5 Debug Network Access INFO ‐‐‐ ICMP packet allowed
597 6.2.0 Debug Network Access INFO ‐‐‐ ICMP packet allowed
66 |
598 5.9.0 Debug Network Access INFO ‐‐‐ ICMP packet from LAN allowed
598 6.0.5 Debug Network Access INFO ‐‐‐ ICMP packet from LAN allowed
598 6.2.0 Debug Network Access INFO ‐‐‐ ICMP packet from LAN allowed
599 5.9.0 System Error Firewall Hardware ERROR 655 Diagnostic Code G
599 6.0.5 System Error Firewall Hardware ERROR 655 Diagnostic Code G
599 6.2.0 System Error Firewall Hardware ERROR 655 Diagnostic Code G
600 5.9.0 System Error Firewall Hardware ERROR 656 Diagnostic Code H
600 6.0.5 System Error Firewall Hardware ERROR 656 Diagnostic Code H
600 6.2.0 System Error Firewall Hardware ERROR 656 Diagnostic Code H
601 5.9.0 System Error Firewall Hardware ERROR 657 Diagnostic Code I
601 6.0.5 System Error Firewall Hardware ERROR 657 Diagnostic Code I
601 6.2.0 System Error Firewall Hardware ERROR 657 Diagnostic Code I
602 5.9.0 Debug Network Access INFO ‐‐‐ DNS packet allowed
602 6.0.5 Debug Network Access INFO ‐‐‐ DNS packet allowed
602 6.2.0 Debug Network Access INFO ‐‐‐ DNS packet allowed
603 5.9.0 System Error L2TP Server ERROR 661
Adding L2TP IP pool Address
object Failed.
603 6.0.5 System Error L2TP Server ERROR 661
Adding L2TP IP pool Address
object Failed.
603 6.2.0 System Error L2TP Server ERROR 661
Adding L2TP IP pool Address
object Failed.
605 5.9.0 User Activity VPN IKE WARNING ‐‐‐
Received unencrypted packet in
crypto active state
605 6.0.5 User Activity VPN IKE WARNING ‐‐‐
Received unencrypted packet in
crypto active state
605 6.2.0 User Activity VPN IKE WARNING ‐‐‐
Received unencrypted packet in
crypto active state
606 5.9.0 Attack
Intrusion Detec‐
tion ALERT 568
Spank attack multicast packet
dropped
606 6.0.5 Attack
Intrusion Detec‐
tion ALERT 568
Spank attack multicast packet
dropped
606 6.2.0 Attack
Intrusion Detec‐
tion ALERT 568
Spank attack multicast packet
dropped
607 5.9.0 Debug | UDP VPN IKE INFO ‐‐‐
Received ISAKMP packet des‐
tined to port %s
607 6.0.5 Debug | UDP VPN IKE INFO ‐‐‐
Received ISAKMP packet des‐
tined to port %s
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 67
607 6.2.0 Debug | UDP VPN IKE INFO ‐‐‐
Received ISAKMP packet des‐
tined to port %s
608 5.9.0 Attack
Intrusion Detec‐
tion ALERT 569 IPS Detection Alert: %s
608 6.0.5 Attack
Intrusion Detec‐
tion ALERT 569 IPS Detection Alert: %s
608 6.2.0 Attack
Intrusion Detec‐
tion ALERT 569 IPS Detection Alert: %s
609 5.9.0 Attack
Intrusion Detec‐
tion ALERT 570 IPS Prevention Alert: %s
609 6.0.5 Attack
Intrusion Detec‐
tion ALERT 570 IPS Prevention Alert: %s
609 6.2.0 Attack
Intrusion Detec‐
tion ALERT 570 IPS Prevention Alert: %s
610 5.9.0 Maintenance Crypto Test ERROR ‐‐‐ Crypto Hardware AES test failed
610 6.0.5 Maintenance Crypto Test ERROR ‐‐‐ Crypto Hardware AES test failed
610 6.2.0 Maintenance Crypto Test ERROR ‐‐‐ Crypto Hardware AES test failed
614 5.9.0 Maintenance Security Services WARNING 571
Received IPS Alert: Your Intru‐
sion Prevention (IDP) subscRIP‐
tion has expired.
614 6.0.5 Maintenance Security Services WARNING 571
Received IPS Alert: Your Intru‐
sion Prevention (IDP) subscRIP‐
tion has expired.
614 6.2.0 Maintenance Security Services WARNING 571
Received IPS Alert: Your Intru‐
sion Prevention (IDP) subscRIP‐
tion has expired.
615 5.9.0 WLAN IDS WLAN IDS WARNING 904 WLAN client null probing
615 6.0.5 WLAN IDS WLAN IDS WARNING 904 WLAN client null probing
615 6.2.0 WLAN IDS WLAN IDS WARNING 904 WLAN client null probing
616 5.9.0 Debug VPN IKE ERROR ‐‐‐ Payload processing failed
616 6.0.5 Debug VPN IKE ERROR ‐‐‐ Payload processing failed
616 6.2.0 Debug VPN IKE ERROR ‐‐‐ Payload processing failed
617 5.9.0 Maintenance Wireless INFO ‐‐‐
WLAN not in AP mode, DHCP
server will not provide lease to
clients on WLAN
617 6.0.5 Maintenance Wireless INFO ‐‐‐
WLAN not in AP mode, DHCP
server will not provide lease to
clients on WLAN
68 |
617 6.2.0 Maintenance Wireless INFO ‐‐‐
WLAN not in AP mode, DHCP
server will not provide lease to
clients on WLAN
618 5.9.0 Debug Bootp DEBUG ‐‐‐
BOOTP server response relayed
to remote device
618 6.0.5 Debug Bootp DEBUG ‐‐‐
BOOTP server response relayed
to remote device
618 6.2.0 Debug Bootp DEBUG ‐‐‐
BOOTP server response relayed
to remote device
619 5.9.0 Maintenance Bootp INFO ‐‐‐
BOOTP Client IP address on LAN
conflicts with remote device IP,
deleting IP address from
remote table
619 6.0.5 Maintenance Bootp INFO ‐‐‐
BOOTP Client IP address on LAN
conflicts with remote device IP,
deleting IP address from
remote table
619 6.2.0 Maintenance Bootp INFO ‐‐‐
BOOTP Client IP address on LAN
conflicts with remote device IP,
deleting IP address from
remote table
620 5.9.0 Maintenance Bootp INFO ‐‐‐
BOOTP reply relayed to local
device
620 6.0.5 Maintenance Bootp INFO ‐‐‐
BOOTP reply relayed to local
device
620 6.2.0 Maintenance Bootp INFO ‐‐‐
BOOTP reply relayed to local
device
622 5.9.0 VoIP VoIP INFO ‐‐‐ VoIP Call Connected
622 6.0.5 VoIP VoIP INFO ‐‐‐ VoIP Call Connected
622 6.2.0 VoIP VoIP INFO ‐‐‐ VoIP Call Connected
623 5.9.0 VoIP VoIP INFO ‐‐‐ VoIP Call Disconnected
623 6.0.5 VoIP VoIP INFO ‐‐‐ VoIP Call Disconnected
623 6.2.0 VoIP VoIP INFO ‐‐‐ VoIP Call Disconnected
624 5.9.0 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Admission Reject
624 6.0.5 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Admission Reject
624 6.2.0 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Admission Reject
625 5.9.0 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Admission Confirm
625 6.0.5 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Admission Confirm
625 6.2.0 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Admission Confirm
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 69
626 5.9.0 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Admission Request
626 6.0.5 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Admission Request
626 6.2.0 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Admission Request
627 5.9.0 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Bandwidth Reject
627 6.0.5 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Bandwidth Reject
627 6.2.0 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Bandwidth Reject
628 5.9.0 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Disengage Confirm
628 6.0.5 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Disengage Confirm
628 6.2.0 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Disengage Confirm
629 5.9.0 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Gatekeeper Reject
629 6.0.5 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Gatekeeper Reject
629 6.2.0 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Gatekeeper Reject
630 5.9.0 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Location Confirm
630 6.0.5 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Location Confirm
630 6.2.0 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Location Confirm
631 5.9.0 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Location Reject
631 6.0.5 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Location Reject
631 6.2.0 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Location Reject
632 5.9.0 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Registration Reject
632 6.0.5 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Registration Reject
632 6.2.0 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Registration Reject
633 5.9.0 VoIP VoIP DEBUG ‐‐‐ H.323/H.225 Setup
633 6.0.5 VoIP VoIP DEBUG ‐‐‐ H.323/H.225 Setup
633 6.2.0 VoIP VoIP DEBUG ‐‐‐ H.323/H.225 Setup
634 5.9.0 VoIP VoIP DEBUG ‐‐‐ H.323/H.225 Connect
634 6.0.5 VoIP VoIP DEBUG ‐‐‐ H.323/H.225 Connect
634 6.2.0 VoIP VoIP DEBUG ‐‐‐ H.323/H.225 Connect
635 5.9.0 VoIP VoIP DEBUG ‐‐‐ H.323/H.245 Address
635 6.0.5 VoIP VoIP DEBUG ‐‐‐ H.323/H.245 Address
635 6.2.0 VoIP VoIP DEBUG ‐‐‐ H.323/H.245 Address
636 5.9.0 VoIP VoIP DEBUG ‐‐‐ H.323/H.245 End Session
636 6.0.5 VoIP VoIP DEBUG ‐‐‐ H.323/H.245 End Session
636 6.2.0 VoIP VoIP DEBUG ‐‐‐ H.323/H.245 End Session
637 5.9.0 VoIP VoIP DEBUG ‐‐‐ VoIP %s Endpoint added
637 6.0.5 VoIP VoIP DEBUG ‐‐‐ VoIP %s Endpoint added
637 6.2.0 VoIP VoIP DEBUG ‐‐‐ VoIP %s Endpoint added
638 5.9.0 VoIP VoIP DEBUG ‐‐‐ VoIP %s Endpoint removed
70 |
638 6.0.5 VoIP VoIP DEBUG ‐‐‐ VoIP %s Endpoint removed
638 6.2.0 VoIP VoIP DEBUG ‐‐‐ VoIP %s Endpoint removed
639 5.9.0 VoIP VoIP WARNING ‐‐‐
VoIP %s Endpoint not added ‐
configured 'public' endpoint
limit reached
639 6.0.5 VoIP VoIP WARNING ‐‐‐
VoIP %s Endpoint not added ‐
configured 'public' endpoint
limit reached
639 6.2.0 VoIP VoIP WARNING ‐‐‐
VoIP %s Endpoint not added ‐
configured 'public' endpoint
limit reached
640 5.9.0 VoIP VoIP DEBUG ‐‐‐
H.323/RAS Unknown Message
Response
640 6.0.5 VoIP VoIP DEBUG ‐‐‐
H.323/RAS Unknown Message
Response
640 6.2.0 VoIP VoIP DEBUG ‐‐‐
H.323/RAS Unknown Message
Response
641 5.9.0 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Disengage Reject
641 6.0.5 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Disengage Reject
641 6.2.0 VoIP VoIP DEBUG ‐‐‐ H.323/RAS Disengage Reject
642 5.9.0 VoIP VoIP DEBUG ‐‐‐
H.323/RAS Unregistration
Reject
642 6.0.5 VoIP VoIP DEBUG ‐‐‐
H.323/RAS Unregistration
Reject
642 6.2.0 VoIP VoIP DEBUG ‐‐‐
H.323/RAS Unregistration
Reject
643 5.9.0 VoIP VoIP DEBUG ‐‐‐ SIP Request
643 6.0.5 VoIP VoIP DEBUG ‐‐‐ SIP Request
643 6.2.0 VoIP VoIP DEBUG ‐‐‐ SIP Request
644 5.9.0 VoIP VoIP DEBUG ‐‐‐ SIP Response
644 6.0.5 VoIP VoIP DEBUG ‐‐‐ SIP Response
644 6.2.0 VoIP VoIP DEBUG ‐‐‐ SIP Response
645 5.9.0 VoIP VoIP WARNING ‐‐‐
SIP Register expiration exceeds
configured Signaling inactivity
time out
645 6.0.5 VoIP VoIP WARNING ‐‐‐
SIP Register expiration exceeds
configured Signaling inactivity
time out
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 71
645 6.2.0 VoIP VoIP WARNING ‐‐‐
SIP Register expiration exceeds
configured Signaling inactivity
time out
646 5.9.0 System Error Firewall Event ALERT 5238
Packet dropped; connection
limit for this source IP address
has been reached
646 6.0.5 System Error Firewall Event ALERT 5238
Packet dropped; connection
limit for this source IP address
has been reached
646 6.2.0 System Error Firewall Event ALERT 5238
Packet dropped; connection
limit for this source IP address
has been reached
647 5.9.0 System Error Firewall Event ALERT 5239
Packet dropped; connection
limit for this destination IP
address has been reached
647 6.0.5 System Error Firewall Event ALERT 5239
Packet dropped; connection
limit for this destination IP
address has been reached
647 6.2.0 System Error Firewall Event ALERT 5239
Packet dropped; connection
limit for this destination IP
address has been reached
648 5.9.0 Attack VPN IPsec ERROR 572
Packet destination not in VPN
Access list
648 6.0.5 Attack VPN IPsec ERROR 572
Packet destination not in VPN
Access list
648 6.2.0 Attack VPN IPsec ERROR 572
Packet destination not in VPN
Access list
651 5.9.0 Debug IPComp DEBUG ‐‐‐ IPComp connection interrupt
651 6.0.5 Debug IPComp DEBUG ‐‐‐ IPComp connection interrupt
651 6.2.0 Debug IPComp DEBUG ‐‐‐ IPComp connection interrupt
652 5.9.0
TCP | UDP |
ICMP IPComp NOTICE ‐‐‐ IPComp packet dropped
652 6.0.5
TCP | UDP |
ICMP IPComp NOTICE ‐‐‐ IPComp packet dropped
652 6.2.0
TCP | UDP |
ICMP IPComp NOTICE ‐‐‐ IPComp packet dropped
653 5.9.0 Debug IPComp DEBUG ‐‐‐
IPComp packet dropped; wait‐
ing for pending IPComp connec‐
tion
72 |
653 6.0.5 Debug IPComp DEBUG ‐‐‐
IPComp packet dropped; wait‐
ing for pending IPComp connec‐
tion
653 6.2.0 Debug IPComp DEBUG ‐‐‐
IPComp packet dropped; wait‐
ing for pending IPComp connec‐
tion
654 5.9.0 System Error Firewall Logging CRITICAL ‐‐‐
Maximum events per second
threshold exceeded
654 6.0.5 System Error Firewall Logging CRITICAL ‐‐‐
Maximum events per second
threshold exceeded
654 6.2.0 System Error Firewall Logging CRITICAL ‐‐‐
Maximum events per second
threshold exceeded
655 5.9.0 System Error Firewall Logging CRITICAL ‐‐‐
Maximum syslog data per sec‐
ond threshold exceeded
655 6.0.5 System Error Firewall Logging CRITICAL ‐‐‐
Maximum syslog data per sec‐
ond threshold exceeded
655 6.2.0 System Error Firewall Logging CRITICAL ‐‐‐
Maximum syslog data per sec‐
ond threshold exceeded
656 5.9.0 System Error Firewall Logging WARNING ‐‐‐
SMTP POP‐Before‐SMTP
authentication failed
656 6.0.5 System Error Firewall Logging WARNING ‐‐‐
SMTP POP‐Before‐SMTP
authentication failed
656 6.2.0 System Error Firewall Logging WARNING ‐‐‐
SMTP POP‐Before‐SMTP
authentication failed
657 5.9.0 Maintenance Network INFO ‐‐‐
Syslog Server cannot be
reached
657 6.0.5 Maintenance Network INFO ‐‐‐
Syslog Server cannot be
reached
657 6.2.0 Maintenance Network INFO ‐‐‐
Syslog Server cannot be
reached
658 5.9.0 System Error VPN IKE WARNING ‐‐‐
IKE Responder: Proposed IKE ID
mismatch
658 6.0.5 System Error VPN IKE WARNING ‐‐‐
IKE Responder: Proposed IKE ID
mismatch
658 6.2.0 System Error VPN IKE WARNING ‐‐‐
IKE Responder: Proposed IKE ID
mismatch
659 5.9.0 System Error VPN Client ERROR ‐‐‐
IKE Responder: IP Address
already exists in the DHCP relay
table. Client traffic not allowed.
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 73
659 6.0.5 System Error VPN Client ERROR ‐‐‐
IKE Responder: IP Address
already exists in the DHCP relay
table. Client traffic not allowed.
659 6.2.0 System Error VPN Client ERROR ‐‐‐
IKE Responder: IP Address
already exists in the DHCP relay
table. Client traffic not allowed.
660 5.9.0 System Error VPN Client ERROR ‐‐‐
IKE Responder: %s Policy does
not allow static IP for Virtual
Adapter.
660 6.0.5 System Error VPN Client ERROR ‐‐‐
IKE Responder: %s Policy does
not allow static IP for Virtual
Adapter.
660 6.2.0 System Error VPN Client ERROR ‐‐‐
IKE Responder: %s Policy does
not allow static IP for Virtual
Adapter.
661 5.9.0 User Activity VPN IKE ERROR ‐‐‐
Received notify:
INVALID_PAYLOAD
661 6.0.5 User Activity VPN IKE ERROR ‐‐‐
Received notify:
INVALID_PAYLOAD
661 6.2.0 User Activity VPN IKE ERROR ‐‐‐
Received notify:
INVALID_PAYLOAD
662 5.9.0 Attack
Intrusion Detec‐
tion ERROR 6434
Drop WLAN traffic from non‐
SonicPoint devices
662 6.0.5 Attack
Intrusion Detec‐
tion ERROR 6434
Drop WLAN traffic from non‐
SonicPoint devices
662 6.2.0 Attack
Intrusion Detec‐
tion ERROR 6434
Drop WLAN traffic from non‐
SonicPoint devices
665 5.9.0 0 PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Dialing not
allowed by schedule. %s
665 6.0.5 0 PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Dialing not
allowed by schedule. %s
665 6.2.0 0 PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Dialing not
allowed by schedule. %s
666 5.9.0 0 PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Connection dis‐
connected as scheduled.
666 6.0.5 0 PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Connection dis‐
connected as scheduled.
666 6.2.0 0 PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Connection dis‐
connected as scheduled.
667 5.9.0 SonicPoint SonicPoint INFO ‐‐‐ SonicPoint Status
74 |
667 6.0.5 SonicPoint SonicPoint INFO ‐‐‐ SonicPoint Status
667 6.2.0 SonicPoint SonicPoint INFO ‐‐‐ SonicPoint Status
668 5.9.0 Maintenance High Availability INFO ‐‐‐ HA Peer Firewall Rebooted
668 6.0.5 Maintenance High Availability INFO ‐‐‐ HA Peer Firewall Rebooted
668 6.2.0 Maintenance High Availability INFO ‐‐‐ HA Peer Firewall Rebooted
669 5.9.0 System Error High Availability ERROR 663
Error Rebooting HA Peer Fire‐
wall
669 6.0.5 System Error High Availability ERROR 663
Error Rebooting HA Peer Fire‐
wall
669 6.2.0 System Error High Availability ERROR 663
Error Rebooting HA Peer Fire‐
wall
670 5.9.0 System Error High Availability ERROR 664
License of HA pair doesn't
match: %s
670 6.0.5 System Error High Availability ERROR 664
License of HA pair doesn't
match: %s
670 6.2.0 System Error High Availability ERROR 664
License of HA pair doesn't
match: %s
671 5.9.0 System Error High Availability ERROR 665
Primary received reboot signal
from Secondary
671 6.0.5 System Error High Availability ERROR 665
Primary received reboot signal
from Secondary
671 6.2.0 System Error High Availability ERROR 665
Primary received reboot signal
from Secondary
672 5.9.0 System Error High Availability ERROR 666
Secondary received reboot sig‐
nal from Primary
672 6.0.5 System Error High Availability ERROR 666
Secondary received reboot sig‐
nal from Primary
672 6.2.0 System Error High Availability ERROR 666
Secondary received reboot sig‐
nal from Primary
674 5.9.0 System Error High Availability INFO ‐‐‐
Success to reach Interface %s
probe
674 6.0.5 System Error High Availability INFO ‐‐‐
Success to reach Interface %s
probe
674 6.2.0 System Error High Availability INFO ‐‐‐
Success to reach Interface %s
probe
675 5.9.0 System Error High Availability ERROR 6234
Failure to reach Interface %s
probe
675 6.0.5 System Error High Availability ERROR 6234
Failure to reach Interface %s
probe
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 75
675 6.2.0 System Error High Availability ERROR 6234
Failure to reach Interface %s
probe
676 5.9.0 ‐‐‐ Multicast INFO ‐‐‐
IGMP V2 client joined multicast
Group : %s
676 6.0.5 ‐‐‐ Multicast INFO ‐‐‐
IGMP V2 client joined multicast
Group : %s
676 6.2.0 ‐‐‐ Multicast INFO ‐‐‐
IGMP V2 client joined multicast
Group : %s
677 5.9.0 ‐‐‐ Multicast INFO ‐‐‐
IGMP V3 client joined multicast
Group : %s
677 6.0.5 ‐‐‐ Multicast INFO ‐‐‐
IGMP V3 client joined multicast
Group : %s
677 6.2.0 ‐‐‐ Multicast INFO ‐‐‐
IGMP V3 client joined multicast
Group : %s
682 5.9.0 ‐‐‐ Multicast INFO ‐‐‐
IGMP Leave group message
Received on interface %s
682 6.0.5 ‐‐‐ Multicast INFO ‐‐‐
IGMP Leave group message
Received on interface %s
682 6.2.0 ‐‐‐ Multicast INFO ‐‐‐
IGMP Leave group message
Received on interface %s
683 5.9.0 ‐‐‐ Multicast NOTICE ‐‐‐
IGMP packet dropped, wrong
checksum received on inter‐
face %s
683 6.0.5 ‐‐‐ Multicast NOTICE ‐‐‐
IGMP packet dropped, wrong
checksum received on inter‐
face %s
683 6.2.0 ‐‐‐ Multicast NOTICE ‐‐‐
IGMP packet dropped, wrong
checksum received on inter‐
face %s
690 5.9.0 ‐‐‐ Multicast NOTICE ‐‐‐
Multicast UDP packet dropped,
no state entry
690 6.0.5 ‐‐‐ Multicast NOTICE ‐‐‐
Multicast UDP packet dropped,
no state entry
690 6.2.0 ‐‐‐ Multicast NOTICE ‐‐‐
Multicast UDP packet dropped,
no state entry
694 5.9.0 ‐‐‐ Multicast WARNING ‐‐‐
Multicast UDP packet dropped,
RTP stateful failed
694 6.0.5 ‐‐‐ Multicast WARNING ‐‐‐
Multicast UDP packet dropped,
RTP stateful failed
76 |
694 6.2.0 ‐‐‐ Multicast WARNING ‐‐‐
Multicast UDP packet dropped,
RTP stateful failed
701 5.9.0 ‐‐‐ Multicast DEBUG ‐‐‐
IGMP querier Router detected
on interface %s
701 6.0.5 ‐‐‐ Multicast DEBUG ‐‐‐
IGMP querier Router detected
on interface %s
701 6.2.0 ‐‐‐ Multicast DEBUG ‐‐‐
IGMP querier Router detected
on interface %s
706 5.9.0 ‐‐‐ Network Monitor ALERT 14005
Network Monitor: Host %s is
offline
706 6.0.5 ‐‐‐ Network Monitor ALERT 14005
Network Monitor: Host %s is
offline
706 6.2.0 ‐‐‐ Network Monitor ALERT 14005
Network Monitor: Host %s is
offline
707 5.9.0 ‐‐‐ Network Monitor ALERT 14006
Network Monitor: Host %s is
online
707 6.0.5 ‐‐‐ Network Monitor ALERT 14006
Network Monitor: Host %s is
online
707 6.2.0 ‐‐‐ Network Monitor ALERT 14006
Network Monitor: Host %s is
online
708 5.9.0 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid SEQ number; TCP packet
dropped
708 6.0.5 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid SEQ number; TCP packet
dropped
708 6.2.0 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid SEQ number; TCP packet
dropped
709 5.9.0 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid ACK number; TCP packet
dropped
709 6.0.5 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid ACK number; TCP packet
dropped
709 6.2.0 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid ACK number; TCP packet
dropped
712 5.9.0 Debug Network DEBUG ‐‐‐
TCP connection reject received;
TCP connection dropped
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 77
712 6.0.5 Debug Network DEBUG ‐‐‐
TCP connection reject received;
TCP connection dropped
712 6.2.0 Debug Network DEBUG ‐‐‐
TCP connection reject received;
TCP connection dropped
713 5.9.0 Debug Network DEBUG ‐‐‐
TCP connection abort received;
TCP connection dropped
713 6.0.5 Debug Network DEBUG ‐‐‐
TCP connection abort received;
TCP connection dropped
713 6.2.0 Debug Network DEBUG ‐‐‐
TCP connection abort received;
TCP connection dropped
714 5.9.0 Debug Network Access NOTICE ‐‐‐ EIGRP packet dropped
714 6.0.5 Debug Network Access NOTICE ‐‐‐ EIGRP packet dropped
714 6.2.0 Debug Network Access NOTICE ‐‐‐ EIGRP packet dropped
719 5.9.0 System Error VPN ERROR ‐‐‐
VPN policy count received
exceeds the limit; %s
719 6.0.5 System Error VPN ERROR ‐‐‐
VPN policy count received
exceeds the limit; %s
719 6.2.0 System Error VPN ERROR ‐‐‐
VPN policy count received
exceeds the limit; %s
720 5.9.0 Maintenance PPPoE INFO ‐‐‐ Sending LCP Echo Request
720 6.0.5 Maintenance PPPoE INFO ‐‐‐ Sending LCP Echo Request
720 6.2.0 Maintenance PPPoE INFO ‐‐‐ Sending LCP Echo Request
721 5.9.0 Maintenance PPPoE INFO ‐‐‐ Received LCP Echo Request
721 6.0.5 Maintenance PPPoE INFO ‐‐‐ Received LCP Echo Request
721 6.2.0 Maintenance PPPoE INFO ‐‐‐ Received LCP Echo Request
722 5.9.0 Maintenance PPPoE INFO ‐‐‐ Sending LCP Echo Reply
722 6.0.5 Maintenance PPPoE INFO ‐‐‐ Sending LCP Echo Reply
722 6.2.0 Maintenance PPPoE INFO ‐‐‐ Sending LCP Echo Reply
723 5.9.0 Maintenance PPPoE INFO ‐‐‐ Received LCP Echo Reply
723 6.0.5 Maintenance PPPoE INFO ‐‐‐ Received LCP Echo Reply
723 6.2.0 Maintenance PPPoE INFO ‐‐‐ Received LCP Echo Reply
724 5.9.0 ‐‐‐ Network Access INFO ‐‐‐
Guest Services drop traffic to
deny network
724 6.0.5 ‐‐‐ Network Access INFO ‐‐‐
Guest Services drop traffic to
deny network
724 6.2.0 ‐‐‐ Network Access INFO ‐‐‐
Guest Services drop traffic to
deny network
78 |
725 5.9.0 ‐‐‐ Network Access INFO ‐‐‐
Guest Services pass traffic to
access allow network
725 6.0.5 ‐‐‐ Network Access INFO ‐‐‐
Guest Services pass traffic to
access allow network
725 6.2.0 ‐‐‐ Network Access INFO ‐‐‐
Guest Services pass traffic to
access allow network
726 5.9.0 ‐‐‐ Network Access INFO ‐‐‐
WLAN max concurrent users
reached already
726 6.0.5 ‐‐‐ Network Access INFO ‐‐‐
WLAN max concurrent users
reached already
726 6.2.0 ‐‐‐ Network Access INFO ‐‐‐
WLAN max concurrent users
reached already
727 5.9.0 SonicPoint SonicPoint INFO ‐‐‐ SonicPoint Provision
727 6.0.5 SonicPoint SonicPoint INFO ‐‐‐ SonicPoint Provision
727 6.2.0 SonicPoint SonicPoint INFO ‐‐‐ SonicPoint Provision
728 5.9.0 Maintenance
Authenticated
Access INFO ‐‐‐ WLAN disabled by schedule
728 6.0.5 Maintenance
Authenticated
Access INFO ‐‐‐ WLAN disabled by schedule
728 6.2.0 Maintenance
Authenticated
Access INFO ‐‐‐ WLAN disabled by schedule
729 5.9.0 Maintenance
Authenticated
Access INFO ‐‐‐ WLAN enabled by schedule
729 6.0.5 Maintenance
Authenticated
Access INFO ‐‐‐ WLAN enabled by schedule
729 6.2.0 Maintenance
Authenticated
Access INFO ‐‐‐ WLAN enabled by schedule
732 5.9.0
TCP | UDP |
ICMP Wireless WARNING ‐‐‐
Packet dropped by WLAN SSL
VPN enforcement check
732 6.0.5
TCP | UDP |
ICMP Wireless WARNING ‐‐‐
Packet dropped by WLAN SSL
VPN enforcement check
732 6.2.0
TCP | UDP |
ICMP Wireless WARNING ‐‐‐
Packet dropped by WLAN SSL
VPN enforcement check
733 5.9.0 Maintenance Wireless INFO ‐‐‐ SSL VPN enforcement
733 6.0.5 Maintenance Wireless INFO ‐‐‐ SSL VPN enforcement
733 6.2.0 Maintenance Wireless INFO ‐‐‐ SSL VPN enforcement
734 5.9.0 ‐‐‐ Firewall Event INFO ‐‐‐
Source IP address connection
status: %s
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 79
734 6.0.5 ‐‐‐ Firewall Event INFO ‐‐‐
Source IP address connection
status: %s
734 6.2.0 ‐‐‐ Firewall Event INFO ‐‐‐
Source IP address connection
status: %s
735 5.9.0 ‐‐‐ Firewall Event INFO ‐‐‐
Destination IP address connec‐
tion status: %s
735 6.0.5 ‐‐‐ Firewall Event INFO ‐‐‐
Destination IP address connec‐
tion status: %s
735 6.2.0 ‐‐‐ Firewall Event INFO ‐‐‐
Destination IP address connec‐
tion status: %s
737 5.9.0 System Error Firewall Logging WARNING ‐‐‐
SMTP authentication prob‐
lem:%s
737 6.0.5 System Error Firewall Logging WARNING ‐‐‐
SMTP authentication prob‐
lem:%s
737 6.2.0 System Error Firewall Logging WARNING ‐‐‐
SMTP authentication prob‐
lem:%s
738 5.9.0 Maintenance PPPoE INFO ‐‐‐
PPPoE Client: Previous session
was connected for %s
738 6.0.5 Maintenance PPPoE INFO ‐‐‐
PPPoE Client: Previous session
was connected for %s
738 6.2.0 Maintenance PPPoE INFO ‐‐‐
PPPoE Client: Previous session
was connected for %s
744 5.9.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ RADIUS
communication problem
744 6.0.5 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ RADIUS
communication problem
744 6.2.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ RADIUS
communication problem
745 5.9.0 User Activity RADIUS INFO ‐‐‐
User login denied ‐ LDAP
authentication failure
745 6.0.5 User Activity RADIUS INFO ‐‐‐
User login denied ‐ LDAP
authentication failure
745 6.2.0 User Activity RADIUS INFO ‐‐‐
User login denied ‐ LDAP
authentication failure
746 5.9.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ LDAP server
Timeout
746 6.0.5 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ LDAP server
Timeout
80 |
746 6.2.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ LDAP server
Timeout
747 5.9.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ LDAP server
down or misconfigured
747 6.0.5 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ LDAP server
down or misconfigured
747 6.2.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ LDAP server
down or misconfigured
748 5.9.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ LDAP com‐
munication problem
748 6.0.5 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ LDAP com‐
munication problem
748 6.2.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ LDAP com‐
munication problem
749 5.9.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ invalid cre‐
dentials on LDAP server
749 6.0.5 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ invalid cre‐
dentials on LDAP server
749 6.2.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ invalid cre‐
dentials on LDAP server
750 5.9.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ insufficient
access on LDAP server
750 6.0.5 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ insufficient
access on LDAP server
750 6.2.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ insufficient
access on LDAP server
751 5.9.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ LDAP
schema mismatch
751 6.0.5 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ LDAP
schema mismatch
751 6.2.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ LDAP
schema mismatch
752 5.9.0 User Activity RADIUS WARNING ‐‐‐
Allowed LDAP server certificate
with wrong host name
752 6.0.5 User Activity RADIUS WARNING ‐‐‐
Allowed LDAP server certificate
with wrong host name
752 6.2.0 User Activity RADIUS WARNING ‐‐‐
Allowed LDAP server certificate
with wrong host name
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 81
753 5.9.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ LDAP server
name resolution failed
753 6.0.5 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ LDAP server
name resolution failed
753 6.2.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ LDAP server
name resolution failed
754 5.9.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ RADIUS
server name resolution failed
754 6.0.5 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ RADIUS
server name resolution failed
754 6.2.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ RADIUS
server name resolution failed
755 5.9.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ LDAP server
certificate not valid
755 6.0.5 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ LDAP server
certificate not valid
755 6.2.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ LDAP server
certificate not valid
756 5.9.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ TLS or local
certificate problem
756 6.0.5 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ TLS or local
certificate problem
756 6.2.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ TLS or local
certificate problem
757 5.9.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ LDAP direc‐
tory mismatch
757 6.0.5 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ LDAP direc‐
tory mismatch
757 6.2.0 User Activity RADIUS WARNING ‐‐‐
User login denied ‐ LDAP direc‐
tory mismatch
758 5.9.0 User Activity RADIUS WARNING ‐‐‐
LDAP server does not allow
CHAP
758 6.0.5 User Activity RADIUS WARNING ‐‐‐
LDAP server does not allow
CHAP
758 6.2.0 User Activity RADIUS WARNING ‐‐‐
LDAP server does not allow
CHAP
759 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
User login denied ‐ user already
logged in
82 |
759 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
User login denied ‐ user already
logged in
759 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
User login denied ‐ user already
logged in
760 5.9.0 ‐‐‐ Network Access NOTICE ‐‐‐
TCP handshake violation
detected; TCP connection
dropped
760 6.0.5 ‐‐‐ Network Access NOTICE ‐‐‐
TCP handshake violation
detected; TCP connection
dropped
760 6.2.0 ‐‐‐ Network Access NOTICE ‐‐‐
TCP handshake violation
detected; TCP connection
dropped
761 5.9.0 Maintenance Security Services INFO ‐‐‐
Access attempt from host out of
compliance with GSC Policy
761 6.0.5 Maintenance Security Services INFO ‐‐‐
Access attempt from host out of
compliance with GSC Policy
761 6.2.0 Maintenance Security Services INFO ‐‐‐
Access attempt from host out of
compliance with GSC Policy
762 5.9.0 Maintenance Security Services INFO ‐‐‐ GSC Policy out‐of‐date on host
762 6.0.5 Maintenance Security Services INFO ‐‐‐ GSC Policy out‐of‐date on host
762 6.2.0 Maintenance Security Services INFO ‐‐‐ GSC Policy out‐of‐date on host
763 5.9.0 Maintenance Security Services INFO 8627
Access attempt from host with‐
out GSC installed
763 6.0.5 Maintenance Security Services INFO 8627
Access attempt from host with‐
out GSC installed
763 6.2.0 Maintenance Security Services INFO 8627
Access attempt from host with‐
out GSC installed
766 5.9.0 Maintenance Security Services WARNING 8628
Failed to synchronize license
information with Licensing
Server. %s
766 6.0.5 Maintenance Security Services WARNING 8628
Failed to synchronize license
information with Licensing
Server. %s
766 6.2.0 Maintenance Security Services WARNING 8628
Failed to synchronize license
information with Licensing
Server. %s
773 5.9.0 System Error DDNS ERROR ‐‐‐ DDNS Failure: Provider %s
773 6.0.5 System Error DDNS ERROR ‐‐‐ DDNS Failure: Provider %s
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 83
773 6.2.0 System Error DDNS ERROR ‐‐‐ DDNS Failure: Provider %s
774 5.9.0 System Error DDNS ERROR ‐‐‐ DDNS Failure: Provider %s
774 6.0.5 System Error DDNS ERROR ‐‐‐ DDNS Failure: Provider %s
774 6.2.0 System Error DDNS ERROR ‐‐‐ DDNS Failure: Provider %s
776 5.9.0 Maintenance DDNS INFO ‐‐‐
DDNS Update success for
domain %s
776 6.0.5 Maintenance DDNS INFO ‐‐‐
DDNS Update success for
domain %s
776 6.2.0 Maintenance DDNS INFO ‐‐‐
DDNS Update success for
domain %s
777 5.9.0 System Error DDNS WARNING ‐‐‐ DDNS Warning: Provider %s
777 6.0.5 System Error DDNS WARNING ‐‐‐ DDNS Warning: Provider %s
777 6.2.0 System Error DDNS WARNING ‐‐‐ DDNS Warning: Provider %s
778 5.9.0 Maintenance DDNS INFO ‐‐‐
DDNS association %s taken
Offline locally
778 6.0.5 Maintenance DDNS INFO ‐‐‐
DDNS association %s taken
Offline locally
778 6.2.0 Maintenance DDNS INFO ‐‐‐
DDNS association %s taken
Offline locally
779 5.9.0 Maintenance DDNS INFO ‐‐‐ DDNS association %s added
779 6.0.5 Maintenance DDNS INFO ‐‐‐ DDNS association %s added
779 6.2.0 Maintenance DDNS INFO ‐‐‐ DDNS association %s added
780 5.9.0 Maintenance DDNS INFO ‐‐‐ DDNS association %s enabled
780 6.0.5 Maintenance DDNS INFO ‐‐‐ DDNS association %s enabled
780 6.2.0 Maintenance DDNS INFO ‐‐‐ DDNS association %s enabled
781 5.9.0 Maintenance DDNS INFO ‐‐‐ DDNS association %s disabled
781 6.0.5 Maintenance DDNS INFO ‐‐‐ DDNS association %s disabled
781 6.2.0 Maintenance DDNS INFO ‐‐‐ DDNS association %s disabled
782 5.9.0 Maintenance DDNS INFO ‐‐‐
DDNS Association %s put on
line
782 6.0.5 Maintenance DDNS INFO ‐‐‐
DDNS Association %s put on
line
782 6.2.0 Maintenance DDNS INFO ‐‐‐
DDNS Association %s put on
line
783 5.9.0 Maintenance DDNS INFO ‐‐‐
All DDNS associations have
been deleted
783 6.0.5 Maintenance DDNS INFO ‐‐‐
All DDNS associations have
been deleted
84 |
783 6.2.0 Maintenance DDNS INFO ‐‐‐
All DDNS associations have
been deleted
784 5.9.0 Maintenance DDNS INFO ‐‐‐
DDNS association %s deacti‐
vated
784 6.0.5 Maintenance DDNS INFO ‐‐‐
DDNS association %s deacti‐
vated
784 6.2.0 Maintenance DDNS INFO ‐‐‐
DDNS association %s deacti‐
vated
785 5.9.0 Maintenance DDNS INFO ‐‐‐ DDNS association %s deleted
785 6.0.5 Maintenance DDNS INFO ‐‐‐ DDNS association %s deleted
785 6.2.0 Maintenance DDNS INFO ‐‐‐ DDNS association %s deleted
786 5.9.0 ‐‐‐ DDNS INFO ‐‐‐ DDNS association %s updated
786 6.0.5 ‐‐‐ DDNS INFO ‐‐‐ DDNS association %s updated
786 6.2.0 ‐‐‐ DDNS INFO ‐‐‐ DDNS association %s updated
789 5.9.0 Attack
Intrusion Detec‐
tion ALERT 6435 IPS Detection Alert: %s
789 6.0.5 Attack
Intrusion Detec‐
tion ALERT 6435 IPS Detection Alert: %s
789 6.2.0 Attack
Intrusion Detec‐
tion ALERT 6435 IPS Detection Alert: %s
790 5.9.0 Attack
Intrusion Detec‐
tion ALERT 6436 IPS Prevention Alert: %s
790 6.0.5 Attack
Intrusion Detec‐
tion ALERT 6436 IPS Prevention Alert: %s
790 6.2.0 Attack
Intrusion Detec‐
tion ALERT 6436 IPS Prevention Alert: %s
791 5.9.0 ‐‐‐ DPI‐SSL INFO ‐‐‐ DPI‐SSL: %s
791 6.0.5 Network Access DPI‐SSL INFO ‐‐‐ DPI‐SSL: %s
791 6.2.0 ‐‐‐ DPI‐SSL INFO ‐‐‐ DPI‐SSL: %s
793 5.9.0 User Activity
Application Fire‐
wall ALERT 13201 Application Firewall Alert: %s
793 6.0.5 User Activity
Application Fire‐
wall ALERT 13201 Application Firewall Alert: %s
793 6.2.0 User Activity
Application Fire‐
wall ALERT 13201 Application Firewall Alert: %s
794 5.9.0 Attack
Intrusion Detec‐
tion ALERT 6437
Anti‐Spyware Prevention Alert:
%s
794 6.0.5 Attack
Intrusion Detec‐
tion ALERT 6437
Anti‐Spyware Prevention Alert:
%s
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 85
794 6.2.0 Attack
Intrusion Detec‐
tion ALERT 6437
Anti‐Spyware Prevention Alert:
%s
795 5.9.0 Attack
Intrusion Detec‐
tion ALERT 6438
Anti‐Spyware Detection Alert:
%s
795 6.0.5 Attack
Intrusion Detec‐
tion ALERT 6438
Anti‐Spyware Detection Alert:
%s
795 6.2.0 Attack
Intrusion Detec‐
tion ALERT 6438
Anti‐Spyware Detection Alert:
%s
796 5.9.0 Maintenance Security Services WARNING 8631 Anti‐Spyware Service Expired
796 6.0.5 Maintenance Security Services WARNING 8631 Anti‐Spyware Service Expired
796 6.2.0 Maintenance Security Services WARNING 8631 Anti‐Spyware Service Expired
797 5.9.0 ‐‐‐ RBL NOTICE ‐‐‐
Outbound connection to RBL‐
listed SMTP server dropped
797 6.0.5 ‐‐‐ RBL NOTICE ‐‐‐
Outbound connection to RBL‐
listed SMTP server dropped
797 6.2.0 ‐‐‐ RBL NOTICE ‐‐‐
Outbound connection to RBL‐
listed SMTP server dropped
798 5.9.0 ‐‐‐ RBL NOTICE ‐‐‐
Inbound connection from RBL‐
listed SMTP server dropped
798 6.0.5 ‐‐‐ RBL NOTICE ‐‐‐
Inbound connection from RBL‐
listed SMTP server dropped
798 6.2.0 ‐‐‐ RBL NOTICE ‐‐‐
Inbound connection from RBL‐
listed SMTP server dropped
799 5.9.0 ‐‐‐ RBL NOTICE ‐‐‐
SMTP server found on RBL
blacklist
799 6.0.5 ‐‐‐ RBL NOTICE ‐‐‐
SMTP server found on RBL
blacklist
799 6.2.0 ‐‐‐ RBL NOTICE ‐‐‐
SMTP server found on RBL
blacklist
800 5.9.0 ‐‐‐ RBL ERROR ‐‐‐
No valid DNS server specified
for RBL lookups
800 6.0.5 ‐‐‐ RBL ERROR ‐‐‐
No valid DNS server specified
for RBL lookups
800 6.2.0 ‐‐‐ RBL ERROR ‐‐‐
No valid DNS server specified
for RBL lookups
805 5.9.0 ‐‐‐ GMS INFO ‐‐‐ Interface statistics report
805 6.0.5 ‐‐‐ GMS INFO ‐‐‐ Interface statistics report
805 6.2.0 ‐‐‐ GMS INFO ‐‐‐ Interface statistics report
806 5.9.0 ‐‐‐ GMS INFO ‐‐‐ SonicPoint statistics report
86 |
806 6.0.5 ‐‐‐ GMS INFO ‐‐‐ SonicPoint statistics report
806 6.2.0 ‐‐‐ GMS INFO ‐‐‐ SonicPoint statistics report
809 5.9.0 Attack Security Services ALERT 8632 Gateway Anti‐Virus Alert: %s
809 6.0.5 Attack Security Services ALERT 8632 Gateway Anti‐Virus Alert: %s
809 6.2.0 Attack Security Services ALERT 8632 Gateway Anti‐Virus Alert: %s
810 5.9.0 Maintenance Security Services WARNING 8633
Gateway Anti‐Virus Service
expired
810 6.0.5 Maintenance Security Services WARNING 8633
Gateway Anti‐Virus Service
expired
810 6.2.0 Maintenance Security Services WARNING 8633
Gateway Anti‐Virus Service
expired
811 5.9.0 Maintenance PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Invalid DNS IP
address returned from Dial‐Up
ISP; overriding using dial‐up
profile settings
811 6.0.5 Maintenance PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Invalid DNS IP
address returned from Dial‐Up
ISP; overriding using dial‐up
profile settings
811 6.2.0 Maintenance PPP Dial‐Up INFO ‐‐‐
PPP Dial‐Up: Invalid DNS IP
address returned from Dial‐Up
ISP; overriding using dial‐up
profile settings
815 5.9.0 ‐‐‐ Network WARNING ‐‐‐
Too many gratuitous ARPs
detected
815 6.0.5 ‐‐‐ Network WARNING ‐‐‐
Too many gratuitous ARPs
detected
815 6.2.0 ‐‐‐ Network WARNING ‐‐‐
Too many gratuitous ARPs
detected
817 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
Incoming call received for
Remotely Triggered Dial‐out
session
817 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
Incoming call received for
Remotely Triggered Dial‐out
session
817 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
Incoming call received for
Remotely Triggered Dial‐out
session
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 87
818 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
Remotely Triggered Dial‐out
session started. Requesting
authentication
818 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
Remotely Triggered Dial‐out
session started. Requesting
authentication
818 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
Remotely Triggered Dial‐out
session started. Requesting
authentication
819 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
Incorrect authentication
received for Remotely Trig‐
gered Dial‐out
819 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
Incorrect authentication
received for Remotely Trig‐
gered Dial‐out
819 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
Incorrect authentication
received for Remotely Trig‐
gered Dial‐out
820 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
Successful authentication
received for Remotely Trig‐
gered Dial‐out
820 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
Successful authentication
received for Remotely Trig‐
gered Dial‐out
820 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
Successful authentication
received for Remotely Trig‐
gered Dial‐out
821 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
Authentication Timeout during
Remotely Triggered Dial‐out
session
821 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
Authentication Timeout during
Remotely Triggered Dial‐out
session
821 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
Authentication Timeout during
Remotely Triggered Dial‐out
session
822 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
Remotely Triggered Dial‐out
session ended. Valid WAN
bound data found. Normal dial‐
up sequence will commence
88 |
822 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
Remotely Triggered Dial‐out
session ended. Valid WAN
bound data found. Normal dial‐
up sequence will commence
822 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
Remotely Triggered Dial‐out
session ended. Valid WAN
bound data found. Normal dial‐
up sequence will commence
823 5.9.0 System Error High Availability ERROR ‐‐‐
Secondary will be shut down in
%s minutes
823 6.0.5 System Error High Availability ERROR ‐‐‐
Secondary will be shut down in
%s minutes
823 6.2.0 System Error High Availability ERROR ‐‐‐
Secondary will be shut down in
%s minutes
824 5.9.0 System Error High Availability ERROR ‐‐‐
Secondary shut down because
license is expired
824 6.0.5 System Error High Availability ERROR ‐‐‐
Secondary shut down because
license is expired
824 6.2.0 System Error High Availability ERROR ‐‐‐
Secondary shut down because
license is expired
825 5.9.0 System Error High Availability INFO ‐‐‐ Secondary active
825 6.0.5 System Error High Availability INFO ‐‐‐ Secondary active
825 6.2.0 System Error High Availability INFO ‐‐‐ Secondary active
826 5.9.0 ‐‐‐ High Availability ERROR ‐‐‐ %s
826 6.0.5 ‐‐‐ High Availability ERROR ‐‐‐ %s
826 6.2.0 ‐‐‐ High Availability ERROR ‐‐‐ %s
828 5.9.0 ‐‐‐ High Availability INFO ‐‐‐ %s
828 6.0.5 ‐‐‐ High Availability INFO ‐‐‐ %s
828 6.2.0 ‐‐‐ High Availability INFO ‐‐‐ %s
829 5.9.0 ‐‐‐ High Availability ALERT ‐‐‐ %s
829 6.0.5 ‐‐‐ High Availability ALERT ‐‐‐ %s
829 6.2.0 ‐‐‐ High Availability ALERT ‐‐‐ %s
830 5.9.0 ‐‐‐ High Availability NOTICE ‐‐‐ %s
830 6.0.5 ‐‐‐ High Availability NOTICE ‐‐‐ %s
830 6.2.0 ‐‐‐ High Availability NOTICE ‐‐‐ %s
832 5.9.0 ‐‐‐ DHCP Server INFO ‐‐‐
DHCP Scopes altered automati‐
cally due to change in network
settings for interface %s
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 89
832 6.0.5 ‐‐‐ DHCP Server INFO ‐‐‐
DHCP Scopes altered automati‐
cally due to change in network
settings for interface %s
832 6.2.0 ‐‐‐ DHCP Server INFO ‐‐‐
DHCP Scopes altered automati‐
cally due to change in network
settings for interface %s
833 5.9.0 System Error DHCP Server WARNING ‐‐‐
DHCP lease file in the storage is
corrupted; read failed
833 6.0.5 System Error DHCP Server WARNING ‐‐‐
DHCP lease file in the storage is
corrupted; read failed
833 6.2.0 System Error DHCP Server WARNING ‐‐‐
DHCP lease file in the storage is
corrupted; read failed
834 5.9.0 System Error DHCP Server WARNING ‐‐‐
Failed to write DHCP leases to
storage
834 6.0.5 System Error DHCP Server WARNING ‐‐‐
Failed to write DHCP leases to
storage
834 6.2.0 System Error DHCP Server WARNING ‐‐‐
Failed to write DHCP leases to
storage
835 5.9.0 Maintenance DHCP Server INFO ‐‐‐ DHCP leases written to storage
835 6.0.5 Maintenance DHCP Server INFO ‐‐‐ DHCP leases written to storage
835 6.2.0 Maintenance DHCP Server INFO ‐‐‐ DHCP leases written to storage
840 5.9.0 ‐‐‐ ARS INFO ‐‐‐ %s
840 6.0.5 ‐‐‐ ARS INFO ‐‐‐ %s
840 6.2.0 ‐‐‐ ARS INFO ‐‐‐ %s
841 5.9.0 ‐‐‐ ARS NOTICE ‐‐‐ %s
841 6.0.5 ‐‐‐ DHCP Server NOTICE ‐‐‐ %s
841 6.2.0 ‐‐‐ DHCP Server NOTICE ‐‐‐ %s
842 5.9.0 ‐‐‐ ARS DEBUG ‐‐‐ %s
842 6.0.5 ‐‐‐ ARS DEBUG ‐‐‐ %s
842 6.2.0 ‐‐‐ ARS DEBUG ‐‐‐ %s
847 5.9.0 Maintenance Network WARNING ‐‐‐
IP address conflict detected
from Ethernet address %s
847 6.0.5 Maintenance Network WARNING ‐‐‐
IP address conflict detected
from Ethernet address %s
847 6.2.0 Maintenance Network WARNING ‐‐‐
IP address conflict detected
from Ethernet address %s
848 5.9.0 User Activity VPN PKI INFO ‐‐‐ OCSP sending request.
848 6.0.5 User Activity VPN PKI INFO ‐‐‐ OCSP sending request.
90 |
848 6.2.0 User Activity VPN PKI INFO ‐‐‐ OCSP sending request.
849 5.9.0 User Activity VPN PKI ERROR ‐‐‐
OCSP send request message
failed.
849 6.0.5 User Activity VPN PKI ERROR ‐‐‐
OCSP send request message
failed.
849 6.2.0 User Activity VPN PKI ERROR ‐‐‐
OCSP send request message
failed.
850 5.9.0 User Activity VPN PKI INFO ‐‐‐ OCSP received response.
850 6.0.5 User Activity VPN PKI INFO ‐‐‐ OCSP received response.
850 6.2.0 User Activity VPN PKI INFO ‐‐‐ OCSP received response.
852 5.9.0 User Activity VPN PKI INFO ‐‐‐ OCSP Resolved Domain Name.
852 6.0.5 User Activity VPN PKI INFO ‐‐‐ OCSP Resolved Domain Name.
852 6.2.0 User Activity VPN PKI INFO ‐‐‐ OCSP Resolved Domain Name.
853 5.9.0 User Activity VPN PKI ERROR ‐‐‐
OCSP Failed to Resolve Domain
Name.
853 6.0.5 User Activity VPN PKI ERROR ‐‐‐
OCSP Failed to Resolve Domain
Name.
853 6.2.0 User Activity VPN PKI ERROR ‐‐‐
OCSP Failed to Resolve Domain
Name.
854 5.9.0 User Activity VPN PKI ERROR ‐‐‐
OCSP Internal error handling
received response.
854 6.0.5 User Activity VPN PKI ERROR ‐‐‐
OCSP Internal error handling
received response.
854 6.2.0 User Activity VPN PKI ERROR ‐‐‐
OCSP Internal error handling
received response.
856 5.9.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
SYN Flood Mode changed by
user to: Watch and report pos‐
sible SYN floods
856 6.0.5 Debug
Intrusion Detec‐
tion WARNING ‐‐‐
SYN Flood Mode changed by
user to: Watch and report pos‐
sible SYN floods
856 6.2.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
SYN Flood Mode changed by
user to: Watch and report pos‐
sible SYN floods
857 5.9.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
SYN Flood Mode changed by
user to: Watch and proxy WAN
connections when under attack
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 91
857 6.0.5 Debug
Intrusion Detec‐
tion WARNING ‐‐‐
SYN Flood Mode changed by
user to: Watch and proxy WAN
connections when under attack
857 6.2.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
SYN Flood Mode changed by
user to: Watch and proxy WAN
connections when under attack
858 5.9.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
SYN Flood Mode changed by
user to: Always proxy WAN con‐
nections
858 6.0.5 Debug
Intrusion Detec‐
tion WARNING ‐‐‐
SYN Flood Mode changed by
user to: Always proxy WAN con‐
nections
858 6.2.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
SYN Flood Mode changed by
user to: Always proxy WAN con‐
nections
859 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Possible SYN flood detected on
WAN IF %s ‐ switching to con‐
nection‐proxy mode
859 6.0.5 Debug
Intrusion Detec‐
tion ALERT ‐‐‐
Possible SYN flood detected on
WAN IF %s ‐ switching to con‐
nection‐proxy mode
859 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Possible SYN flood detected on
WAN IF %s ‐ switching to con‐
nection‐proxy mode
860 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐ Possible SYN Flood on IF %s
860 6.0.5 Debug
Intrusion Detec‐
tion ALERT ‐‐‐ Possible SYN Flood on IF %s
860 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐ Possible SYN Flood on IF %s
861 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
SYN flood ceased or flooding
machines blacklisted ‐ connec‐
tion proxy disabled
861 6.0.5 Debug
Intrusion Detec‐
tion ALERT ‐‐‐
SYN flood ceased or flooding
machines blacklisted ‐ connec‐
tion proxy disabled
861 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
SYN flood ceased or flooding
machines blacklisted ‐ connec‐
tion proxy disabled
92 |
862 5.9.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
SYN Flood blacklisting enabled
by user
862 6.0.5 Debug
Intrusion Detec‐
tion WARNING ‐‐‐
SYN Flood blacklisting enabled
by user
862 6.2.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
SYN Flood blacklisting enabled
by user
863 5.9.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
SYN Flood blacklisting disabled
by user
863 6.0.5 Debug
Intrusion Detec‐
tion WARNING ‐‐‐
SYN Flood blacklisting disabled
by user
863 6.2.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
SYN Flood blacklisting disabled
by user
864 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
SYN‐Flooding machine %s black‐
listed
864 6.0.5 Debug
Intrusion Detec‐
tion ALERT ‐‐‐
SYN‐Flooding machine %s black‐
listed
864 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
SYN‐Flooding machine %s black‐
listed
865 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Machine %s removed from SYN
flood blacklist
865 6.0.5 Debug
Intrusion Detec‐
tion ALERT ‐‐‐
Machine %s removed from SYN
flood blacklist
865 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Machine %s removed from SYN
flood blacklist
866 5.9.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
Possible SYN Flood on IF %s
continues
866 6.0.5 Debug
Intrusion Detec‐
tion WARNING ‐‐‐
Possible SYN Flood on IF %s
continues
866 6.2.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
Possible SYN Flood on IF %s
continues
867 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Possible SYN Flood on IF %s has
ceased
867 6.0.5 Debug
Intrusion Detec‐
tion ALERT ‐‐‐
Possible SYN Flood on IF %s has
ceased
867 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Possible SYN Flood on IF %s has
ceased
868 5.9.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
SYN Flood Blacklist on IF %s
continues
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 93
868 6.0.5 Debug
Intrusion Detec‐
tion WARNING ‐‐‐
SYN Flood Blacklist on IF %s
continues
868 6.2.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
SYN Flood Blacklist on IF %s
continues
869 5.9.0 Attack
Intrusion Detec‐
tion DEBUG ‐‐‐ TCP SYN received
869 6.0.5 Debug
Intrusion Detec‐
tion DEBUG ‐‐‐ TCP SYN received
869 6.2.0 Attack
Intrusion Detec‐
tion DEBUG ‐‐‐ TCP SYN received
872 5.9.0 User Activity Security Services NOTICE ‐‐‐ %s
872 6.0.5 User Activity Security Services NOTICE ‐‐‐ %s
872 6.2.0 User Activity Security Services NOTICE ‐‐‐ %s
874 5.9.0 User Activity VPN PKI ALERT ‐‐‐ CRL has expired
874 6.0.5 User Activity VPN PKI ALERT ‐‐‐ CRL has expired
874 6.2.0 User Activity VPN PKI ALERT ‐‐‐ CRL has expired
875 5.9.0 User Activity VPN PKI ALERT ‐‐‐ Failed to find certificate
875 6.0.5 User Activity VPN PKI ALERT ‐‐‐ Failed to find certificate
875 6.2.0 User Activity VPN PKI ALERT ‐‐‐ Failed to find certificate
876 5.9.0 User Activity VPN PKI ALERT ‐‐‐
CRL missing ‐ Issuer requires
CRL checking.
876 6.0.5 User Activity VPN PKI ALERT ‐‐‐
CRL missing ‐ Issuer requires
CRL checking.
876 6.2.0 User Activity VPN PKI ALERT ‐‐‐
CRL missing ‐ Issuer requires
CRL checking.
877 5.9.0 User Activity VPN PKI ALERT ‐‐‐
CRL validation failure for Root
Certificate
877 6.0.5 User Activity VPN PKI ALERT ‐‐‐
CRL validation failure for Root
Certificate
877 6.2.0 User Activity VPN PKI ALERT ‐‐‐
CRL validation failure for Root
Certificate
878 5.9.0 User Activity VPN PKI ALERT ‐‐‐ Cannot Validate Issuer Path
878 6.0.5 User Activity VPN PKI ALERT ‐‐‐ Cannot Validate Issuer Path
878 6.2.0 User Activity VPN PKI ALERT ‐‐‐ Cannot Validate Issuer Path
879 5.9.0 ‐‐‐ RF Management WARNING ‐‐‐
WLAN radio frequency threat
detected
879 6.0.5 ‐‐‐ RF Management WARNING ‐‐‐
WLAN radio frequency threat
detected
94 |
879 6.2.0 ‐‐‐ RF Management WARNING ‐‐‐
WLAN radio frequency threat
detected
880 5.9.0 Maintenance
Dynamic Address
Objects INFO ‐‐‐
Unable to resolve dynamic
address object
880 6.0.5 Maintenance
Dynamic Address
Objects INFO ‐‐‐
Unable to resolve dynamic
address object
880 6.2.0 Maintenance
Dynamic Address
Objects INFO ‐‐‐
Unable to resolve dynamic
address object
881 5.9.0 ‐‐‐ Firewall Logging NOTICE ‐‐‐ System clock manually updated
881 6.0.5 ‐‐‐ Firewall Logging NOTICE ‐‐‐ System clock manually updated
881 6.2.0 ‐‐‐ Firewall Logging NOTICE ‐‐‐ System clock manually updated
882 5.9.0 TCP Network Access DEBUG ‐‐‐
HTTP method detected; exam‐
ining stream for host header
882 6.0.5 TCP Network Access DEBUG ‐‐‐
HTTP method detected; exam‐
ining stream for host header
882 6.2.0 TCP Network Access DEBUG ‐‐‐
HTTP method detected; exam‐
ining stream for host header
883 5.9.0 TCP|UDP Network Access NOTICE ‐‐‐
IP Header checksum error;
packet dropped
883 6.0.5 TCP|UDP Network Access NOTICE ‐‐‐
IP Header checksum error;
packet dropped
883 6.2.0 TCP|UDP Network Access NOTICE ‐‐‐
IP Header checksum error;
packet dropped
884 5.9.0 TCP Network Access NOTICE ‐‐‐
TCP checksum error; packet
dropped
884 6.0.5 TCP Network Access NOTICE ‐‐‐
TCP checksum error; packet
dropped
884 6.2.0 TCP Network Access NOTICE ‐‐‐
TCP checksum error; packet
dropped
885 5.9.0 UDP Network Access NOTICE ‐‐‐
UDP checksum error; packet
dropped
885 6.0.5 UDP Network Access NOTICE ‐‐‐
UDP checksum error; packet
dropped
885 6.2.0 UDP Network Access NOTICE ‐‐‐
UDP checksum error; packet
dropped
886 5.9.0 UDP Network Access NOTICE ‐‐‐
ICMP checksum error; packet
dropped
886 6.0.5 UDP Network Access NOTICE ‐‐‐
ICMP checksum error; packet
dropped
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 95
886 6.2.0 UDP Network Access NOTICE ‐‐‐
ICMP checksum error; packet
dropped
887 5.9.0 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid header length; TCP
packet dropped
887 6.0.5 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid header length; TCP
packet dropped
887 6.2.0 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid header length; TCP
packet dropped
888 5.9.0 Debug Network DEBUG ‐‐‐
TCP packet received on non‐
existent/closed connection; TCP
packet dropped
888 6.0.5 Debug Network DEBUG ‐‐‐
TCP packet received on non‐
existent/closed connection; TCP
packet dropped
888 6.2.0 Debug Network DEBUG ‐‐‐
TCP packet received on non‐
existent/closed connection; TCP
packet dropped
889 5.9.0 Debug Network DEBUG ‐‐‐
TCP packet received without
mandatory SYN flag; TCP packet
dropped
889 6.0.5 Debug Network DEBUG ‐‐‐
TCP packet received without
mandatory SYN flag; TCP packet
dropped
889 6.2.0 Debug Network DEBUG ‐‐‐
TCP packet received without
mandatory SYN flag; TCP packet
dropped
890 5.9.0 Debug Network DEBUG ‐‐‐
TCP packet received without
mandatory ACK flag; TCP packet
dropped
890 6.0.5 Debug Network DEBUG ‐‐‐
TCP packet received without
mandatory ACK flag; TCP packet
dropped
890 6.2.0 Debug Network DEBUG ‐‐‐
TCP packet received without
mandatory ACK flag; TCP packet
dropped
96 |
891 5.9.0 Debug Network DEBUG ‐‐‐
TCP packet received on a clos‐
ing connection; TCP packet
dropped
891 6.0.5 Debug Network DEBUG ‐‐‐
TCP packet received on a clos‐
ing connection; TCP packet
dropped
891 6.2.0 Debug Network DEBUG ‐‐‐
TCP packet received on a clos‐
ing connection; TCP packet
dropped
892 5.9.0 Debug Network INFO ‐‐‐
TCP packet received with SYN
flag on an existing connection;
TCP packet dropped
892 6.0.5 Debug Network INFO ‐‐‐
TCP packet received with SYN
flag on an existing connection;
TCP packet dropped
892 6.2.0 Debug Network INFO ‐‐‐
TCP packet received with SYN
flag on an existing connection;
TCP packet dropped
893 5.9.0 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid SACK option length; TCP
packet dropped
893 6.0.5 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid SACK option length; TCP
packet dropped
893 6.2.0 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid SACK option length; TCP
packet dropped
894 5.9.0 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid MSS option length; TCP
packet dropped
894 6.0.5 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid MSS option length; TCP
packet dropped
894 6.2.0 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid MSS option length; TCP
packet dropped
895 5.9.0 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid option length; TCP
packet dropped
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 97
895 6.0.5 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid option length; TCP
packet dropped
895 6.2.0 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid option length; TCP
packet dropped
896 5.9.0 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid source port; TCP packet
dropped
896 6.0.5 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid source port; TCP packet
dropped
896 6.2.0 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid source port; TCP packet
dropped
897 5.9.0 Attack Network INFO ‐‐‐
TCP packet received with
invalid SYN Flood cookie; TCP
packet dropped
897 6.0.5 Debug Network INFO ‐‐‐
TCP packet received with
invalid SYN Flood cookie; TCP
packet dropped
897 6.2.0 Attack Network INFO ‐‐‐
TCP packet received with
invalid SYN Flood cookie; TCP
packet dropped
898 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
RST‐Flooding machine %s black‐
listed
898 6.0.5 Debug
Intrusion Detec‐
tion ALERT ‐‐‐
RST‐Flooding machine %s black‐
listed
898 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
RST‐Flooding machine %s black‐
listed
899 5.9.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
RST Flood Blacklist on IF %s con‐
tinues
899 6.0.5 Debug
Intrusion Detec‐
tion WARNING ‐‐‐
RST Flood Blacklist on IF %s con‐
tinues
899 6.2.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
RST Flood Blacklist on IF %s con‐
tinues
900 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Machine %s removed from RST
flood blacklist
900 6.0.5 Debug
Intrusion Detec‐
tion ALERT ‐‐‐
Machine %s removed from RST
flood blacklist
98 |
900 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Machine %s removed from RST
flood blacklist
901 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
FIN‐Flooding machine %s black‐
listed
901 6.0.5 Debug
Intrusion Detec‐
tion ALERT ‐‐‐
FIN‐Flooding machine %s black‐
listed
901 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
FIN‐Flooding machine %s black‐
listed
902 5.9.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
FIN Flood Blacklist on IF %s con‐
tinues
902 6.0.5 Debug
Intrusion Detec‐
tion WARNING ‐‐‐
FIN Flood Blacklist on IF %s con‐
tinues
902 6.2.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
FIN Flood Blacklist on IF %s con‐
tinues
903 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Machine %s removed from FIN
flood blacklist
903 6.0.5 Debug
Intrusion Detec‐
tion ALERT ‐‐‐
Machine %s removed from FIN
flood blacklist
903 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Machine %s removed from FIN
flood blacklist
904 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐ Possible RST Flood on IF %s
904 6.0.5 Debug
Intrusion Detec‐
tion ALERT ‐‐‐ Possible RST Flood on IF %s
904 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐ Possible RST Flood on IF %s
905 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐ Possible FIN Flood on IF %s
905 6.0.5 Debug
Intrusion Detec‐
tion ALERT ‐‐‐ Possible FIN Flood on IF %s
905 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐ Possible FIN Flood on IF %s
906 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Possible RST Flood on IF %s has
ceased
906 6.0.5 Debug
Intrusion Detec‐
tion ALERT ‐‐‐
Possible RST Flood on IF %s has
ceased
906 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Possible RST Flood on IF %s has
ceased
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 99
907 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Possible FIN Flood on IF %s has
ceased
907 6.0.5 Debug
Intrusion Detec‐
tion ALERT ‐‐‐
Possible FIN Flood on IF %s has
ceased
907 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Possible FIN Flood on IF %s has
ceased
908 5.9.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
Possible RST Flood on IF %s con‐
tinues
908 6.0.5 Debug
Intrusion Detec‐
tion WARNING ‐‐‐
Possible RST Flood on IF %s con‐
tinues
908 6.2.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
Possible RST Flood on IF %s con‐
tinues
909 5.9.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
Possible FIN Flood on IF %s con‐
tinues
909 6.0.5 Debug
Intrusion Detec‐
tion WARNING ‐‐‐
Possible FIN Flood on IF %s con‐
tinues
909 6.2.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
Possible FIN Flood on IF %s con‐
tinues
910 5.9.0 Debug Network WARNING ‐‐‐ Packet Dropped ‐ IP TTL expired
910 6.0.5 Debug Network WARNING ‐‐‐ Packet Dropped ‐ IP TTL expired
910 6.2.0 Debug Network WARNING ‐‐‐ Packet Dropped ‐ IP TTL expired
911 5.9.0 Maintenance
Dynamic Address
Objects INFO ‐‐‐
Added host entry to dynamic
address object
911 6.0.5 Maintenance
Dynamic Address
Objects INFO ‐‐‐
Added host entry to dynamic
address object
911 6.2.0 Maintenance
Dynamic Address
Objects INFO ‐‐‐
Added host entry to dynamic
address object
912 5.9.0 Maintenance
Dynamic Address
Objects INFO ‐‐‐
Removed host entry from
dynamic address object
912 6.0.5 Maintenance
Dynamic Address
Objects INFO ‐‐‐
Removed host entry from
dynamic address object
912 6.2.0 Maintenance
Dynamic Address
Objects INFO ‐‐‐
Removed host entry from
dynamic address object
913 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Phase 1 Authen‐
tication Method does not
match
913 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Phase 1 Authen‐
tication Method does not
match
100 |
913 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Phase 1 Authen‐
tication Method does not
match
914 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Phase 1 encryp‐
tion algorithm does not match
914 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Phase 1 encryp‐
tion algorithm does not match
914 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Phase 1 encryp‐
tion algorithm does not match
915 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Phase 1 encryp‐
tion algorithm keylength does
not match
915 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Phase 1 encryp‐
tion algorithm keylength does
not match
915 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Phase 1 encryp‐
tion algorithm keylength does
not match
916 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Phase 1 hash
algorithm does not match
916 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Phase 1 hash
algorithm does not match
916 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Phase 1 hash
algorithm does not match
917 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Phase 1 XAUTH
required but Policy has no user
name
917 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Phase 1 XAUTH
required but Policy has no user
name
917 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Phase 1 XAUTH
required but Policy has no user
name
918 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Phase 1 XAUTH
required but Policy has no user
password
918 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Phase 1 XAUTH
required but Policy has no user
password
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 101
918 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Phase 1 XAUTH
required but Policy has no user
password
919 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Phase 1 DH
Group does not match
919 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Phase 1 DH
Group does not match
919 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Phase 1 DH
Group does not match
920 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: AH authentica‐
tion algorithm does not match
920 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: AH authentica‐
tion algorithm does not match
920 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: AH authentica‐
tion algorithm does not match
921 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: ESP encryption
algorithm does not match
921 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: ESP encryption
algorithm does not match
921 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: ESP encryption
algorithm does not match
922 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: ESP authentica‐
tion algorithm does not match
922 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: ESP authentica‐
tion algorithm does not match
922 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: ESP authentica‐
tion algorithm does not match
923 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: AH authentica‐
tion key length does not match
923 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: AH authentica‐
tion key length does not match
923 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: AH authentica‐
tion key length does not match
924 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: ESP encryption
key length does not match
924 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: ESP encryption
key length does not match
924 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: ESP encryption
key length does not match
102 |
925 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: ESP authentica‐
tion key length does not match
925 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: ESP authentica‐
tion key length does not match
925 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: ESP authentica‐
tion key length does not match
926 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: AH authentica‐
tion key rounds does not match
926 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: AH authentica‐
tion key rounds does not match
926 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: AH authentica‐
tion key rounds does not match
927 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: ESP encryption
key rounds does not match
927 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: ESP encryption
key rounds does not match
927 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: ESP encryption
key rounds does not match
928 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: ESP authentica‐
tion key rounds does not match
928 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: ESP authentica‐
tion key rounds does not match
928 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: ESP authentica‐
tion key rounds does not match
930 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Remote party
Timeout ‐ Retransmitting IKE
Request.
930 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Remote party
Timeout ‐ Retransmitting IKE
Request.
930 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKE Initiator: Remote party
Timeout ‐ Retransmitting IKE
Request.
931 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKE Responder: Remote party
Timeout ‐ Retransmitting IKE
Request.
931 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKE Responder: Remote party
Timeout ‐ Retransmitting IKE
Request.
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 103
931 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKE Responder: Remote party
Timeout ‐ Retransmitting IKE
Request.
932 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: IPsec protocol
mismatch
932 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: IPsec protocol
mismatch
932 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: IPsec protocol
mismatch
933 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Initiator: Proposed IKE ID
mismatch
933 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Initiator: Proposed IKE ID
mismatch
933 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Initiator: Proposed IKE ID
mismatch
934 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Peer's local net‐
work does not match VPN Pol‐
icy's [Destination ]
934 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Peer's local net‐
work does not match VPN Pol‐
icy's [Destination ]
934 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Peer's local net‐
work does not match VPN Pol‐
icy's [Destination ]
935 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Peer's destina‐
tion network does not match
VPN Policy's [Local Network]
935 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Peer's destina‐
tion network does not match
VPN Policy's [Local Network]
935 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Peer's destina‐
tion network does not match
VPN Policy's [Local Network]
936 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Route table
overrides VPN Policy
936 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Route table
overrides VPN Policy
936 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: Route table
overrides VPN Policy
104 |
937 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Initiator: IKE proposal does
not match (Phase 1)
937 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Initiator: IKE proposal does
not match (Phase 1)
937 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Initiator: IKE proposal does
not match (Phase 1)
938 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Initiator: Send
IKE_SA_INIT Request
938 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Initiator: Send
IKE_SA_INIT Request
938 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Initiator: Send
IKE_SA_INIT Request
939 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Responder: Received
IKE_SA_INIT Request
939 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Responder: Received
IKE_SA_INIT Request
939 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Responder: Received
IKE_SA_INIT Request
940 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Initiator: Send IKE_AUTH
Request
940 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Initiator: Send IKE_AUTH
Request
940 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Initiator: Send IKE_AUTH
Request
941 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Responder: Received
IKE_AUTH Request
941 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Responder: Received
IKE_AUTH Request
941 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Responder: Received
IKE_AUTH Request
942 5.9.0 User Activity VPN IKE INFO ‐‐‐ IKEv2 Authentication successful
942 6.0.5 User Activity VPN IKE INFO ‐‐‐ IKEv2 Authentication successful
942 6.2.0 User Activity VPN IKE INFO ‐‐‐ IKEv2 Authentication successful
943 5.9.0 User Activity VPN IKE INFO ‐‐‐ IKEv2 Accept IKE SA Proposal
943 6.0.5 User Activity VPN IKE INFO ‐‐‐ IKEv2 Accept IKE SA Proposal
943 6.2.0 User Activity VPN IKE INFO ‐‐‐ IKEv2 Accept IKE SA Proposal
944 5.9.0 User Activity VPN IKE INFO ‐‐‐ IKEv2 Accept IPsec SA Proposal
944 6.0.5 User Activity VPN IKE INFO ‐‐‐ IKEv2 Accept IPsec SA Proposal
944 6.2.0 User Activity VPN IKE INFO ‐‐‐ IKEv2 Accept IPsec SA Proposal
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 105
945 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Initiator: Send
CREATE_CHILD_SA Request
945 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Initiator: Send
CREATE_CHILD_SA Request
945 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Initiator: Send
CREATE_CHILD_SA Request
946 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Responder: Received
CREATE_CHILD_SA Request
946 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Responder: Received
CREATE_CHILD_SA Request
946 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Responder: Received
CREATE_CHILD_SA Request
947 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Send delete IKE SA
Request
947 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Send delete IKE SA
Request
947 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Send delete IKE SA
Request
948 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received delete IKE SA
Request
948 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received delete IKE SA
Request
948 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received delete IKE SA
Request
949 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Send delete IPsec SA
Request
949 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Send delete IPsec SA
Request
949 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Send delete IPsec SA
Request
950 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received delete IPsec SA
Request
950 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received delete IPsec SA
Request
950 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received delete IPsec SA
Request
951 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Responder: Peer's desti‐
nation network does not match
VPN Policy's [Local Network]
106 |
951 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Responder: Peer's desti‐
nation network does not match
VPN Policy's [Local Network]
951 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Responder: Peer's desti‐
nation network does not match
VPN Policy's [Local Network]
952 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Responder: Peer's local
network does not match VPN
Policy's [Destination Network]
952 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Responder: Peer's local
network does not match VPN
Policy's [Destination Network]
952 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Responder: Peer's local
network does not match VPN
Policy's [Destination Network]
953 5.9.0 User Activity VPN IKE WARNING ‐‐‐ IKEv2 Payload processing error
953 6.0.5 User Activity VPN IKE WARNING ‐‐‐ IKEv2 Payload processing error
953 6.2.0 User Activity VPN IKE WARNING ‐‐‐ IKEv2 Payload processing error
954 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKEv2 Initiator: Negotiations
failed. Extra payloads present.
954 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKEv2 Initiator: Negotiations
failed. Extra payloads present.
954 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKEv2 Initiator: Negotiations
failed. Extra payloads present.
955 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKEv2 Initiator: Negotiations
failed. Missing required pay‐
loads.
955 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKEv2 Initiator: Negotiations
failed. Missing required pay‐
loads.
955 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKEv2 Initiator: Negotiations
failed. Missing required pay‐
loads.
956 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKEv2 Initiator: Negotiations
failed. Invalid input state.
956 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKEv2 Initiator: Negotiations
failed. Invalid input state.
956 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKEv2 Initiator: Negotiations
failed. Invalid input state.
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 107
957 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKEv2 Initiator: Negotiations
failed. Invalid output state.
957 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKEv2 Initiator: Negotiations
failed. Invalid output state.
957 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKEv2 Initiator: Negotiations
failed. Invalid output state.
958 5.9.0 User Activity VPN IKE WARNING ‐‐‐ IKEv2 Payload validation failed.
958 6.0.5 User Activity VPN IKE WARNING ‐‐‐ IKEv2 Payload validation failed.
958 6.2.0 User Activity VPN IKE WARNING ‐‐‐ IKEv2 Payload validation failed.
959 5.9.0 User Activity VPN IKE WARNING ‐‐‐ IKEv2 Unable to find IKE SA
959 6.0.5 User Activity VPN IKE WARNING ‐‐‐ IKEv2 Unable to find IKE SA
959 6.2.0 User Activity VPN IKE WARNING ‐‐‐ IKEv2 Unable to find IKE SA
960 5.9.0 User Activity VPN IKE WARNING ‐‐‐ IKEv2 Decrypt packet failed
960 6.0.5 User Activity VPN IKE WARNING ‐‐‐ IKEv2 Decrypt packet failed
960 6.2.0 User Activity VPN IKE WARNING ‐‐‐ IKEv2 Decrypt packet failed
961 5.9.0 User Activity VPN IKE WARNING ‐‐‐ IKEv2 Out of memory
961 6.0.5 User Activity VPN IKE WARNING ‐‐‐ IKEv2 Out of memory
961 6.2.0 User Activity VPN IKE WARNING ‐‐‐ IKEv2 Out of memory
962 5.9.0 User Activity VPN IKE ERROR ‐‐‐
IKEv2 Responder: Policy for
remote IKE ID not found
962 6.0.5 User Activity VPN IKE ERROR ‐‐‐
IKEv2 Responder: Policy for
remote IKE ID not found
962 6.2.0 User Activity VPN IKE ERROR ‐‐‐
IKEv2 Responder: Policy for
remote IKE ID not found
963 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKEv2 Process Message queue
failed
963 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKEv2 Process Message queue
failed
963 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKEv2 Process Message queue
failed
964 5.9.0 User Activity VPN IKE WARNING ‐‐‐ IKEv2 Invalid state
964 6.0.5 User Activity VPN IKE WARNING ‐‐‐ IKEv2 Invalid state
964 6.2.0 User Activity VPN IKE WARNING ‐‐‐ IKEv2 Invalid state
965 5.9.0 System Error VPN IKE ERROR ‐‐‐
IKE Responder: Client Policy has
no VPN Access Networks
assigned. Check Configuration.
108 |
965 6.0.5 System Error VPN IKE ERROR ‐‐‐
IKE Responder: Client Policy has
no VPN Access Networks
assigned. Check Configuration.
965 6.2.0 System Error VPN IKE ERROR ‐‐‐
IKE Responder: Client Policy has
no VPN Access Networks
assigned. Check Configuration.
966 5.9.0 User Activity VPN IKE WARNING ‐‐‐ IKEv2 Invalid SPI size
966 6.0.5 User Activity VPN IKE WARNING ‐‐‐ IKEv2 Invalid SPI size
966 6.2.0 User Activity VPN IKE WARNING ‐‐‐ IKEv2 Invalid SPI size
967 5.9.0 User Activity VPN IKE WARNING ‐‐‐ IKEv2 VPN Policy not found
967 6.0.5 User Activity VPN IKE WARNING ‐‐‐ IKEv2 VPN Policy not found
967 6.2.0 User Activity VPN IKE WARNING ‐‐‐ IKEv2 VPN Policy not found
968 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKEv2 IPsec proposal does not
match
968 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKEv2 IPsec proposal does not
match
968 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKEv2 IPsec proposal does not
match
969 5.9.0 User Activity VPN IKE WARNING ‐‐‐ IKEv2 IPsec attribute not found
969 6.0.5 User Activity VPN IKE WARNING ‐‐‐ IKEv2 IPsec attribute not found
969 6.2.0 User Activity VPN IKE WARNING ‐‐‐ IKEv2 IPsec attribute not found
970 5.9.0 User Activity VPN IKE WARNING ‐‐‐ IKEv2 IKE attribute not found
970 6.0.5 User Activity VPN IKE WARNING ‐‐‐ IKEv2 IKE attribute not found
970 6.2.0 User Activity VPN IKE WARNING ‐‐‐ IKEv2 IKE attribute not found
971 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKEv2 Peer is not responding.
Negotiation aborted.
971 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKEv2 Peer is not responding.
Negotiation aborted.
971 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKEv2 Peer is not responding.
Negotiation aborted.
972 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Initiator: Remote party
Timeout ‐ Retransmitting IKEv2
Request.
972 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Initiator: Remote party
Timeout ‐ Retransmitting IKEv2
Request.
972 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Initiator: Remote party
Timeout ‐ Retransmitting IKEv2
Request.
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 109
973 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Initiator: Received
IKE_SA_INT response
973 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Initiator: Received
IKE_SA_INT response
973 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Initiator: Received
IKE_SA_INT response
974 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Initiator: Received
IKE_AUTH response
974 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Initiator: Received
IKE_AUTH response
974 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Initiator: Received
IKE_AUTH response
975 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Initiator: Received
CREATE_CHILD_SA response
975 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Initiator: Received
CREATE_CHILD_SA response
975 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Initiator: Received
CREATE_CHILD_SA response
976 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Responder: Send
IKE_SA_INIT response
976 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Responder: Send
IKE_SA_INIT response
976 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Responder: Send
IKE_SA_INIT response
977 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Responder: Send
IKE_AUTH response
977 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Responder: Send
IKE_AUTH response
977 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Responder: Send
IKE_AUTH response
978 5.9.0 User Activity VPN IKE INFO ‐‐‐ IKEv2 negotiation complete
978 6.0.5 User Activity VPN IKE INFO ‐‐‐ IKEv2 negotiation complete
978 6.2.0 User Activity VPN IKE INFO ‐‐‐ IKEv2 negotiation complete
979 5.9.0 User Activity VPN IKE ERROR ‐‐‐
IKEv2 Function sendto() failed
to transmit packet.
979 6.0.5 User Activity VPN IKE ERROR ‐‐‐
IKEv2 Function sendto() failed
to transmit packet.
979 6.2.0 User Activity VPN IKE ERROR ‐‐‐
IKEv2 Function sendto() failed
to transmit packet.
110 |
980 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKEv2 Initiator: Proposed IKE ID
mismatch
980 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKEv2 Initiator: Proposed IKE ID
mismatch
980 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKEv2 Initiator: Proposed IKE ID
mismatch
981 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKEv2 IKE proposal does not
match
981 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKEv2 IKE proposal does not
match
981 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKEv2 IKE proposal does not
match
982 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received notify status
payload
982 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received notify status
payload
982 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received notify status
payload
983 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKEv2 Received notify error pay‐
load
983 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKEv2 Received notify error pay‐
load
983 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKEv2 Received notify error pay‐
load
984 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 No NAT device detected
between negotiating peers
984 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 No NAT device detected
between negotiating peers
984 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 No NAT device detected
between negotiating peers
985 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 NAT device detected
between negotiating peers
985 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 NAT device detected
between negotiating peers
985 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 NAT device detected
between negotiating peers
986 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
User login denied ‐ not allowed
by Policy rule
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 111
986 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
User login denied ‐ not allowed
by Policy rule
986 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
User login denied ‐ not allowed
by Policy rule
987 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
User login denied ‐ not found
locally
987 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
User login denied ‐ not found
locally
987 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
User login denied ‐ not found
locally
988 5.9.0 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ SSO agent
Timeout
988 6.0.5 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ SSO agent
Timeout
988 6.2.0 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ SSO agent
Timeout
989 5.9.0 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ SSO agent
configuration error
989 6.0.5 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ SSO agent
configuration error
989 6.2.0 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ SSO agent
configuration error
990 5.9.0 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ SSO agent
communication problem
990 6.0.5 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ SSO agent
communication problem
990 6.2.0 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ SSO agent
communication problem
991 5.9.0 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ SSO agent
name resolution failed
991 6.0.5 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ SSO agent
name resolution failed
991 6.2.0 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ SSO agent
name resolution failed
992 5.9.0 User Activity CIA WARNING ‐‐‐
SSO agent returned user name
too long
992 6.0.5 User Activity CIA WARNING ‐‐‐
SSO agent returned user name
too long
112 |
992 6.2.0 User Activity CIA WARNING ‐‐‐
SSO agent returned user name
too long
993 5.9.0 User Activity CIA WARNING ‐‐‐
SSO agent returned domain
name too long
993 6.0.5 User Activity CIA WARNING ‐‐‐
SSO agent returned domain
name too long
993 6.2.0 User Activity CIA WARNING ‐‐‐
SSO agent returned domain
name too long
994 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
Configuration mode administra‐
tion session started
994 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
Configuration mode administra‐
tion session started
994 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
Configuration mode administra‐
tion session started
995 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
Configuration mode administra‐
tion session ended
995 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
Configuration mode administra‐
tion session ended
995 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
Configuration mode administra‐
tion session ended
996 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
Read‐only mode GUI adminis‐
tration session started
996 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
Read‐only mode GUI adminis‐
tration session started
996 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
Read‐only mode GUI adminis‐
tration session started
997 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
Non‐config mode GUI adminis‐
tration session started
997 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
Non‐config mode GUI adminis‐
tration session started
997 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
Non‐config mode GUI adminis‐
tration session started
998 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
GUI administration session
ended
998 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
GUI administration session
ended
998 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
GUI administration session
ended
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 113
999 5.9.0 Blocked Sites Network Access INFO ‐‐‐
SSL Control: Website found in
blacklist
999 6.0.5 Blocked Sites Network Access INFO ‐‐‐
SSL Control: Website found in
blacklist
999 6.2.0 Blocked Sites Network Access INFO ‐‐‐
SSL Control: Website found in
blacklist
1000 5.9.0 Blocked Sites Network Access INFO ‐‐‐
SSL Control: Website found in
whitelist
1000 6.0.5 Blocked Sites Network Access INFO ‐‐‐
SSL Control: Website found in
whitelist
1000 6.2.0 Blocked Sites Network Access INFO ‐‐‐
SSL Control: Website found in
whitelist
1001 5.9.0 Blocked Sites Network Access INFO ‐‐‐ SSL Control: HTTPS via SSL2
1001 6.0.5 Blocked Sites Network Access INFO ‐‐‐ SSL Control: HTTPS via SSL2
1001 6.2.0 Blocked Sites Network Access INFO ‐‐‐ SSL Control: HTTPS via SSL2
1002 5.9.0 Blocked Sites Network Access INFO ‐‐‐
SSL Control: Certificate with
invalid date
1002 6.0.5 Blocked Sites Network Access INFO ‐‐‐
SSL Control: Certificate with
invalid date
1002 6.2.0 Blocked Sites Network Access INFO ‐‐‐
SSL Control: Certificate with
invalid date
1003 5.9.0 Blocked Sites Network Access INFO ‐‐‐
SSL Control: Self‐signed certifi‐
cate
1003 6.0.5 Blocked Sites Network Access INFO ‐‐‐
SSL Control: Self‐signed certifi‐
cate
1003 6.2.0 Blocked Sites Network Access INFO ‐‐‐
SSL Control: Self‐signed certifi‐
cate
1004 5.9.0 Blocked Sites Network Access INFO ‐‐‐
SSL Control: Weak cipher being
used
1004 6.0.5 Blocked Sites Network Access INFO ‐‐‐
SSL Control: Weak cipher being
used
1004 6.2.0 Blocked Sites Network Access INFO ‐‐‐
SSL Control: Weak cipher being
used
1005 5.9.0 Blocked Sites Network Access INFO ‐‐‐ SSL Control: Untrusted CA
1005 6.0.5 Blocked Sites Network Access INFO ‐‐‐ SSL Control: Untrusted CA
1005 6.2.0 Blocked Sites Network Access INFO ‐‐‐ SSL Control: Untrusted CA
1006 5.9.0 Blocked Sites Network Access INFO ‐‐‐
SSL Control: Certificate chain
not complete
114 |
1006 6.0.5 Blocked Sites Network Access INFO ‐‐‐
SSL Control: Certificate chain
not complete
1006 6.2.0 Blocked Sites Network Access INFO ‐‐‐
SSL Control: Certificate chain
not complete
1007 5.9.0 Blocked Sites Network Access INFO ‐‐‐
SSL Control: Failed to decode
Server Hello
1007 6.0.5 Blocked Sites Network Access INFO ‐‐‐
SSL Control: Failed to decode
Server Hello
1007 6.2.0 Blocked Sites Network Access INFO ‐‐‐
SSL Control: Failed to decode
Server Hello
1008 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
User logged out ‐ logout
detected by SSO
1008 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
User logged out ‐ logout
detected by SSO
1008 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
User logged out ‐ logout
detected by SSO
1009 5.9.0 System Error RADIUS ERROR ‐‐‐ Bind to LDAP server failed
1009 6.0.5 System Error RADIUS ERROR ‐‐‐ Bind to LDAP server failed
1009 6.2.0 System Error RADIUS ERROR ‐‐‐ Bind to LDAP server failed
1010 5.9.0 System Error RADIUS ALERT ‐‐‐
Using LDAP without TLS ‐ highly
insecure
1010 6.0.5 System Error RADIUS ALERT ‐‐‐
Using LDAP without TLS ‐ highly
insecure
1010 6.2.0 System Error RADIUS ALERT ‐‐‐
Using LDAP without TLS ‐ highly
insecure
1011 5.9.0 System Error RADIUS WARNING ‐‐‐
LDAP using non‐administrative
account ‐ VPN client user will
not be able to change pass‐
words
1011 6.0.5 System Error RADIUS WARNING ‐‐‐
LDAP using non‐administrative
account ‐ VPN client user will
not be able to change pass‐
words
1011 6.2.0 System Error RADIUS WARNING ‐‐‐
LDAP using non‐administrative
account ‐ VPN client user will
not be able to change pass‐
words
1012 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Responder: Send
CREATE_CHILD_SA response
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 115
1012 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Responder: Send
CREATE_CHILD_SA response
1012 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Responder: Send
CREATE_CHILD_SA response
1013 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Send delete IKE SA
response
1013 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Send delete IKE SA
response
1013 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Send delete IKE SA
response
1014 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Send delete IPsec SA
response
1014 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Send delete IPsec SA
response
1014 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Send delete IPsec SA
response
1015 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received delete IKE SA
response
1015 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received delete IKE SA
response
1015 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received delete IKE SA
response
1016 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received delete IPsec SA
response
1016 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received delete IPsec SA
response
1016 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received delete IPsec SA
response
1017 5.9.0
System Envi‐
ronment Firewall Hardware INFO ‐‐‐ 3G/4G %s device detected
1017 6.0.5
System Envi‐
ronment Firewall Hardware INFO ‐‐‐ 3G/4G %s device detected
1017 6.2.0
System Envi‐
ronment Firewall Hardware INFO ‐‐‐ 3G/4G %s device detected
1018 5.9.0 ‐‐‐ PPP INFO ‐‐‐ PPP message: %s
1018 6.0.5 ‐‐‐ PPP INFO ‐‐‐ PPP message: %s
1018 6.2.0 ‐‐‐ PPP INFO ‐‐‐ PPP message: %s
1019 5.9.0 User Activity PPP Dial‐Up INFO ‐‐‐ Chat started
1019 6.0.5 User Activity PPP Dial‐Up INFO ‐‐‐ Chat started
116 |
1019 6.2.0 User Activity PPP Dial‐Up INFO ‐‐‐ Chat started
1020 5.9.0 User Activity PPP Dial‐Up INFO ‐‐‐ Chat completed
1020 6.0.5 User Activity PPP Dial‐Up INFO ‐‐‐ Chat completed
1020 6.2.0 User Activity PPP Dial‐Up INFO ‐‐‐ Chat completed
1021 5.9.0 User Activity PPP Dial‐Up INFO ‐‐‐ Chat wrote '%s'
1021 6.0.5 User Activity PPP Dial‐Up INFO ‐‐‐ Chat wrote '%s'
1021 6.2.0 User Activity PPP Dial‐Up INFO ‐‐‐ Chat wrote '%s'
1022 5.9.0 User Activity PPP Dial‐Up INFO ‐‐‐ Chat %s
1022 6.0.5 User Activity PPP Dial‐Up INFO ‐‐‐ Chat %s
1022 6.2.0 User Activity PPP Dial‐Up INFO ‐‐‐ Chat %s
1023 5.9.0 User Activity PPP Dial‐Up INFO ‐‐‐ Chat failed: %s
1023 6.0.5 User Activity PPP Dial‐Up INFO ‐‐‐ Chat failed: %s
1023 6.2.0 User Activity PPP Dial‐Up INFO ‐‐‐ Chat failed: %s
1024 5.9.0 System Error PPP Dial‐Up ERROR ‐‐‐
Unable to send message to dial‐
up task
1024 6.0.5 System Error PPP Dial‐Up ERROR ‐‐‐
Unable to send message to dial‐
up task
1024 6.2.0 System Error PPP Dial‐Up ERROR ‐‐‐
Unable to send message to dial‐
up task
1026 5.9.0 User Activity PPP Dial‐Up ALERT ‐‐‐ 3G/4G Dial‐up: %s.
1026 6.0.5 User Activity PPP Dial‐Up ALERT ‐‐‐ 3G/4G Dial‐up: %s.
1026 6.2.0 User Activity PPP Dial‐Up ALERT ‐‐‐ 3G/4G Dial‐up: %s.
1027 5.9.0 User Activity PPP Dial‐Up ALERT 7643
3G/4G Dial‐up: data usage limit
reached for the '%s' billing
cycle. Disconnecting the ses‐
sion.
1027 6.0.5 User Activity PPP Dial‐Up ALERT 7643
3G/4G Dial‐up: data usage limit
reached for the '%s' billing
cycle. Disconnecting the ses‐
sion.
1027 6.2.0 User Activity PPP Dial‐Up ALERT 7643
3G/4G Dial‐up: data usage limit
reached for the '%s' billing
cycle. Disconnecting the ses‐
sion.
1028 5.9.0 System Error PPP Dial‐Up ALERT ‐‐‐
%s auto‐dial failed: Current
Connection Model is configured
as Ethernet Only
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 117
1028 6.0.5 System Error PPP Dial‐Up ALERT ‐‐‐
%s auto‐dial failed: Current
Connection Model is configured
as Ethernet Only
1028 6.2.0 System Error PPP Dial‐Up ALERT ‐‐‐
%s auto‐dial failed: Current
Connection Model is configured
as Ethernet Only
1029 5.9.0 Debug Network DEBUG ‐‐‐
TCP packet received with non‐
permitted option; TCP packet
dropped
1029 6.0.5 Debug Network DEBUG ‐‐‐
TCP packet received with non‐
permitted option; TCP packet
dropped
1029 6.2.0 Debug Network DEBUG ‐‐‐
TCP packet received with non‐
permitted option; TCP packet
dropped
1030 5.9.0 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid Window Scale option
length; TCP packet dropped
1030 6.0.5 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid Window Scale option
length; TCP packet dropped
1030 6.2.0 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid Window Scale option
length; TCP packet dropped
1031 5.9.0 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid Window Scale option
value; TCP packet dropped
1031 6.0.5 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid Window Scale option
value; TCP packet dropped
1031 6.2.0 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid Window Scale option
value; TCP packet dropped
1033 5.9.0 User Activity
Authenticated
Access WARNING ‐‐‐
Problem occurred during user
group membership retrieval
1033 6.0.5 User Activity
Authenticated
Access WARNING ‐‐‐
Problem occurred during user
group membership retrieval
1033 6.2.0 User Activity
Authenticated
Access WARNING ‐‐‐
Problem occurred during user
group membership retrieval
118 |
1035 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
User login denied ‐ password
expired
1035 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
User login denied ‐ password
expired
1035 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
User login denied ‐ password
expired
1036 5.9.0 User Activity VPN IKE ERROR ‐‐‐
IKE Responder: IKE Phase 1
exchange does not match
1036 6.0.5 User Activity VPN IKE ERROR ‐‐‐
IKE Responder: IKE Phase 1
exchange does not match
1036 6.2.0 User Activity VPN IKE ERROR ‐‐‐
IKE Responder: IKE Phase 1
exchange does not match
1037 5.9.0 ‐‐‐ PPP Dial‐Up INFO ‐‐‐ PPP Dial‐Up: Starting PPP
1037 6.0.5 ‐‐‐ PPP Dial‐Up INFO ‐‐‐ PPP Dial‐Up: Starting PPP
1037 6.2.0 ‐‐‐ PPP Dial‐Up INFO ‐‐‐ PPP Dial‐Up: Starting PPP
1038 5.9.0 ‐‐‐ PPP Dial‐Up INFO ‐‐‐
Dial‐up: Traffic generated by
'%s'
1038 6.0.5 ‐‐‐ PPP Dial‐Up INFO ‐‐‐
Dial‐up: Traffic generated by
'%s'
1038 6.2.0 ‐‐‐ PPP Dial‐Up INFO ‐‐‐
Dial‐up: Traffic generated by
'%s'
1039 5.9.0 ‐‐‐ PPP Dial‐Up INFO ‐‐‐
Dial‐up: Session initiated by
data packet
1039 6.0.5 ‐‐‐ PPP Dial‐Up INFO ‐‐‐
Dial‐up: Session initiated by
data packet
1039 6.2.0 ‐‐‐ PPP Dial‐Up INFO ‐‐‐
Dial‐up: Session initiated by
data packet
1040 5.9.0 ‐‐‐ DHCP Server ALERT ‐‐‐
DHCP Server: IP conflict
detected
1040 6.0.5 ‐‐‐ DHCP Server ALERT ‐‐‐
DHCP Server: IP conflict
detected
1040 6.2.0 ‐‐‐ DHCP Server ALERT ‐‐‐
DHCP Server: IP conflict
detected
1041 5.9.0 ‐‐‐ DHCP Server ALERT ‐‐‐
DHCP Server: Received DHCP
decline from client
1041 6.0.5 ‐‐‐ DHCP Server ALERT ‐‐‐
DHCP Server: Received DHCP
decline from client
1041 6.2.0 ‐‐‐ DHCP Server ALERT ‐‐‐
DHCP Server: Received DHCP
decline from client
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 119
1043 5.9.0 ‐‐‐ Firewall Hardware ERROR 5425
Power supply without redun‐
dancy
1043 6.0.5 ‐‐‐ Firewall Hardware ERROR 5425
Power supply without redun‐
dancy
1043 6.2.0 ‐‐‐ Firewall Hardware ERROR 5425
Power supply without redun‐
dancy
1044 5.9.0 ‐‐‐ High Availability INFO ‐‐‐ Discovered HA %s Firewall
1044 6.0.5 ‐‐‐ High Availability INFO ‐‐‐ Discovered HA %s Firewall
1044 6.2.0 ‐‐‐ High Availability INFO ‐‐‐ Discovered HA %s Firewall
1045 5.9.0 ‐‐‐ Firewall Event INFO ‐‐‐
Diagnostic Auto‐restart sched‐
uled for %s minutes from now
1045 6.0.5 ‐‐‐ Firewall Event INFO ‐‐‐
Diagnostic Auto‐restart sched‐
uled for %s minutes from now
1045 6.2.0 ‐‐‐ Firewall Event INFO ‐‐‐
Diagnostic Auto‐restart sched‐
uled for %s minutes from now
1046 5.9.0 ‐‐‐ Firewall Event INFO ‐‐‐
Diagnostic Auto‐restart can‐
celed
1046 6.0.5 ‐‐‐ Firewall Event INFO ‐‐‐
Diagnostic Auto‐restart can‐
celed
1046 6.2.0 ‐‐‐ Firewall Event INFO ‐‐‐
Diagnostic Auto‐restart can‐
celed
1047 5.9.0 ‐‐‐ Firewall Event INFO ‐‐‐
As per Diagnostic Auto‐restart
configuration Request, restart‐
ing system
1047 6.0.5 ‐‐‐ Firewall Event INFO ‐‐‐
As per Diagnostic Auto‐restart
configuration Request, restart‐
ing system
1047 6.2.0 ‐‐‐ Firewall Event INFO ‐‐‐
As per Diagnostic Auto‐restart
configuration Request, restart‐
ing system
1048 5.9.0 ‐‐‐
Authenticated
Access INFO ‐‐‐
User login denied ‐ password
doesn't meet constraints
1048 6.0.5 ‐‐‐
Authenticated
Access INFO ‐‐‐
User login denied ‐ password
doesn't meet constraints
1048 6.2.0 ‐‐‐
Authenticated
Access INFO ‐‐‐
User login denied ‐ password
doesn't meet constraints
1050 5.9.0 User Activity VPN INFO ‐‐‐ VPN policy %s is added
1050 6.0.5 ‐‐‐ VPN INFO ‐‐‐ VPN Policy Added
1050 6.2.0 User Activity VPN INFO ‐‐‐ VPN policy %s is added
120 |
1051 5.9.0 User Activity VPN INFO ‐‐‐ VPN policy %s is deleted
1051 6.0.5 ‐‐‐ VPN INFO ‐‐‐ VPN Policy Deleted
1051 6.2.0 User Activity VPN INFO ‐‐‐ VPN policy %s is deleted
1052 5.9.0 User Activity VPN INFO ‐‐‐ VPN policy %s is modified
1052 6.0.5 ‐‐‐ VPN INFO ‐‐‐ VPN Policy Modified
1052 6.2.0 User Activity VPN INFO ‐‐‐ VPN policy %s is modified
1053 5.9.0 ‐‐‐ Firewall Hardware ALERT 5418 PC Card removed.
1053 6.0.5 ‐‐‐ Firewall Hardware ALERT 5418 PC Card removed.
1053 6.2.0 ‐‐‐ Firewall Hardware ALERT 5418 PC Card removed.
1054 5.9.0 ‐‐‐ Firewall Hardware ALERT 5419 PC Card inserted.
1054 6.0.5 ‐‐‐ Firewall Hardware ALERT 5419 PC Card inserted.
1054 6.2.0 ‐‐‐ Firewall Hardware ALERT 5419 PC Card inserted.
1055 5.9.0 ‐‐‐ Firewall Hardware ALERT ‐‐‐ 3G/4G: No SIM detected
1055 6.0.5 ‐‐‐ Firewall Hardware ALERT ‐‐‐ 3G/4G: No SIM detected
1055 6.2.0 ‐‐‐ Firewall Hardware ALERT ‐‐‐ 3G/4G: No SIM detected
1057 5.9.0 ‐‐‐ High Availability INFO ‐‐‐ Peer firewall rebooting (%s)
1057 6.0.5 ‐‐‐ High Availability INFO ‐‐‐ Peer firewall rebooting (%s)
1057 6.2.0 ‐‐‐ High Availability INFO ‐‐‐ Peer firewall rebooting (%s)
1058 5.9.0 ‐‐‐ High Availability INFO ‐‐‐
Primary firewall rebooting itself
as it transitioned from Active to
Standby while Preempt
1058 6.0.5 ‐‐‐ High Availability INFO ‐‐‐
Primary firewall rebooting itself
as it transitioned from Active to
Standby while Preempt
1058 6.2.0 ‐‐‐ High Availability INFO ‐‐‐
Primary firewall rebooting itself
as it transitioned from Active to
Standby while Preempt
1059 5.9.0 ‐‐‐ High Availability INFO ‐‐‐
Secondary firewall rebooting
itself as it transitioned from
Active to Standby while Pre‐
empt
1059 6.0.5 ‐‐‐ High Availability INFO ‐‐‐
Secondary firewall rebooting
itself as it transitioned from
Active to Standby while Pre‐
empt
1059 6.2.0 ‐‐‐ High Availability INFO ‐‐‐
Secondary firewall rebooting
itself as it transitioned from
Active to Standby while Pre‐
empt
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 121
1060 5.9.0 ‐‐‐ Crypto Test ERROR ‐‐‐
Crypto SHA1 based DRNG KAT
test failed
1060 6.0.5 ‐‐‐ Crypto Test ERROR ‐‐‐
Crypto SHA1 based DRNG KAT
test failed
1060 6.2.0 ‐‐‐ Crypto Test ERROR ‐‐‐
Crypto SHA1 based DRNG KAT
test failed
1065 5.9.0 Maintenance Firewall Event INFO ‐‐‐
Successfully sent %s file to
remote backup server
1065 6.0.5 Maintenance Firewall Event INFO ‐‐‐
Successfully sent %s file to
remote backup server
1065 6.2.0 Maintenance Firewall Event INFO ‐‐‐
Successfully sent %s file to
remote backup server
1066 5.9.0 Maintenance Firewall Event INFO ‐‐‐
Failed to send file to remote
backup server, Error: %s
1066 6.0.5 Maintenance Firewall Event INFO ‐‐‐
Failed to send file to remote
backup server, Error: %s
1066 6.2.0 Maintenance Firewall Event INFO ‐‐‐
Failed to send file to remote
backup server, Error: %s
1068 5.9.0 ‐‐‐ DHCP Server WARNING ‐‐‐
Multiple DHCP Servers are
detected on network
1068 6.0.5 ‐‐‐ DHCP Server WARNING ‐‐‐
Multiple DHCP Servers are
detected on network
1068 6.2.0 ‐‐‐ DHCP Server WARNING ‐‐‐
Multiple DHCP Servers are
detected on network
1070 5.9.0 ‐‐‐ Firewall Event INFO ‐‐‐
Invalid DNS Server will not be
accepted by the dynamic client
1070 6.0.5 ‐‐‐ Firewall Event INFO ‐‐‐
Invalid DNS Server will not be
accepted by the dynamic client
1070 6.2.0 ‐‐‐ Firewall Event INFO ‐‐‐
Invalid DNS Server will not be
accepted by the dynamic client
1071 5.9.0 ‐‐‐ Firewall Event CRITICAL ‐‐‐
DHCP Server sanity check
passed %s
1071 6.0.5 ‐‐‐ Firewall Event CRITICAL ‐‐‐
DHCP Server sanity check
passed %s
1071 6.2.0 ‐‐‐ Firewall Event CRITICAL ‐‐‐
DHCP Server sanity check
passed %s
1072 5.9.0 ‐‐‐ Firewall Event CRITICAL ‐‐‐
DHCP Server sanity check failed
%s
122 |
1072 6.0.5 ‐‐‐ Firewall Event CRITICAL ‐‐‐
DHCP Server sanity check failed
%s
1072 6.2.0 ‐‐‐ Firewall Event CRITICAL ‐‐‐
DHCP Server sanity check failed
%s
1073 5.9.0 User Activity CIA WARNING ‐‐‐ SSO agent returned error
1073 6.0.5 User Activity CIA WARNING ‐‐‐ SSO agent returned error
1073 6.2.0 User Activity CIA WARNING ‐‐‐ SSO agent returned error
1074 5.9.0 ‐‐‐ L2TP Client INFO ‐‐‐ L2TP Tunnel Negotiation %s
1074 6.0.5 ‐‐‐ L2TP Client INFO ‐‐‐ L2TP Tunnel Negotiation %s
1074 6.2.0 ‐‐‐ L2TP Client INFO ‐‐‐ L2TP Tunnel Negotiation %s
1075 5.9.0 User Activity CIA ALERT ‐‐‐ SSO agent is down
1075 6.0.5 User Activity CIA ALERT ‐‐‐ SSO agent is down
1075 6.2.0 User Activity CIA ALERT ‐‐‐ SSO agent is down
1076 5.9.0 User Activity CIA ALERT ‐‐‐ SSO agent is up
1076 6.0.5 User Activity CIA ALERT ‐‐‐ SSO agent is up
1076 6.2.0 User Activity CIA ALERT ‐‐‐ SSO agent is up
1077 5.9.0 ‐‐‐ SonicPoint‐N INFO ‐‐‐ SonicPoint‐N Status
1077 6.0.5 ‐‐‐ SonicPoint‐N INFO ‐‐‐ SonicPoint‐N Status
1077 6.2.0 ‐‐‐ SonicPoint‐N INFO ‐‐‐ SonicPoint‐N Status
1078 5.9.0 ‐‐‐ SonicPoint‐N INFO ‐‐‐ SonicPoint‐N Provision
1078 6.0.5 ‐‐‐ SonicPoint‐N INFO ‐‐‐ SonicPoint‐N Provision
1078 6.2.0 ‐‐‐ SonicPoint‐N INFO ‐‐‐ SonicPoint‐N Provision
1079 5.9.0 ‐‐‐ SSL VPN INFO ‐‐‐ %s
1079 6.0.5 ‐‐‐ SSL VPN INFO ‐‐‐ %s
1079 6.2.0 ‐‐‐ SSL VPN INFO ‐‐‐ %s
1080 5.9.0 ‐‐‐
Authenticated
Access INFO ‐‐‐
SSL VPN zone remote user login
allowed
1080 6.0.5 ‐‐‐
Authenticated
Access INFO ‐‐‐
SSL VPN zone remote user login
allowed
1080 6.2.0 ‐‐‐
Authenticated
Access INFO ‐‐‐
SSL VPN zone remote user login
allowed
1081 5.9.0 Blocked Sites Network Access INFO ‐‐‐
SSL Control: Certificate with
MD5 Digest Signature Algo‐
rithm
1081 6.0.5 Blocked Sites Network Access INFO ‐‐‐
SSL Control: Certificate with
MD5 Digest Signature Algo‐
rithm
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 123
1081 6.2.0 Blocked Sites Network Access INFO ‐‐‐
SSL Control: Certificate with
MD5 Digest Signature Algo‐
rithm
1082 5.9.0 ‐‐‐ Anti‐Spam WARNING 13801 %s is operational.
1082 6.0.5 ‐‐‐ Anti‐Spam WARNING 13801 %s is operational.
1082 6.2.0 ‐‐‐ Anti‐Spam WARNING 13801 %s is operational.
1083 5.9.0 ‐‐‐ Anti‐Spam WARNING 13802 %s is unavailable.
1083 6.0.5 ‐‐‐ Anti‐Spam WARNING 13802 %s is unavailable.
1083 6.2.0 ‐‐‐ Anti‐Spam WARNING 13802 %s is unavailable.
1084 5.9.0 ‐‐‐ Anti‐Spam INFO 13803
Anti‐Spam service is enabled by
administrator.
1084 6.0.5 ‐‐‐ Anti‐Spam INFO 13803
Anti‐Spam service is enabled by
administrator.
1084 6.2.0 ‐‐‐ Anti‐Spam INFO 13803
Anti‐Spam service is enabled by
administrator.
1085 5.9.0 ‐‐‐ Anti‐Spam INFO 13804
Anti‐Spam service is disabled by
administrator.
1085 6.0.5 ‐‐‐ Anti‐Spam INFO 13804
Anti‐Spam service is disabled by
administrator.
1085 6.2.0 ‐‐‐ Anti‐Spam INFO 13804
Anti‐Spam service is disabled by
administrator.
1086 5.9.0 ‐‐‐ Anti‐Spam WARNING 13805
Your Anti‐Spam Service sub‐
scRIPtion has expired.
1086 6.0.5 ‐‐‐ Anti‐Spam WARNING 13805
Your Anti‐Spam Service sub‐
scRIPtion has expired.
1086 6.2.0 ‐‐‐ Anti‐Spam WARNING 13805
Your Anti‐Spam Service sub‐
scRIPtion has expired.
1087 5.9.0 ‐‐‐ Anti‐Spam WARNING 13806
SMTP connection limit is
reached. Connection is
dropped.
1087 6.0.5 ‐‐‐ Anti‐Spam WARNING 13806
SMTP connection limit is
reached. Connection is
dropped.
1087 6.2.0 ‐‐‐ Anti‐Spam WARNING 13806
SMTP connection limit is
reached. Connection is
dropped.
1088 5.9.0 ‐‐‐ Anti‐Spam WARNING 13807 Anti‐Spam Startup Failure ‐ %s
1088 6.0.5 ‐‐‐ Anti‐Spam WARNING 13807 Anti‐Spam Startup Failure ‐ %s
1088 6.2.0 ‐‐‐ Anti‐Spam WARNING 13807 Anti‐Spam Startup Failure ‐ %s
124 |
1089 5.9.0 ‐‐‐ Anti‐Spam WARNING 13808
Anti‐Spam Teardown Failure ‐
%s
1089 6.0.5 ‐‐‐ Anti‐Spam WARNING 13808
Anti‐Spam Teardown Failure ‐
%s
1089 6.2.0 ‐‐‐ Anti‐Spam WARNING 13808
Anti‐Spam Teardown Failure ‐
%s
1090 5.9.0 ‐‐‐ DHCP Server NOTICE ‐‐‐
DHCP Server: Received DHCP
message from untrusted relay
agent
1090 6.0.5 ‐‐‐ DHCP Server NOTICE ‐‐‐
DHCP Server: Received DHCP
message from untrusted relay
agent
1090 6.2.0 ‐‐‐ DHCP Server NOTICE ‐‐‐
DHCP Server: Received DHCP
message from untrusted relay
agent
1091 5.9.0 ‐‐‐ Anti‐Spam NOTICE 13809
Outbound connection to GRID‐
listed SMTP server dropped
1091 6.0.5 ‐‐‐ Anti‐Spam NOTICE 13809
Outbound connection to GRID‐
listed SMTP server dropped
1091 6.2.0 ‐‐‐ Anti‐Spam NOTICE 13809
Outbound connection to GRID‐
listed SMTP server dropped
1092 5.9.0 ‐‐‐ Anti‐Spam NOTICE 13810
Inbound connection from GRID‐
listed SMTP server dropped
1092 6.0.5 ‐‐‐ Anti‐Spam NOTICE 13810
Inbound connection from GRID‐
listed SMTP server dropped
1092 6.2.0 ‐‐‐ Anti‐Spam NOTICE 13810
Inbound connection from GRID‐
listed SMTP server dropped
1093 5.9.0 ‐‐‐ Anti‐Spam NOTICE 13811
SMTP server found on Reject
List
1093 6.0.5 ‐‐‐ Anti‐Spam NOTICE 13811
SMTP server found on Reject
List
1093 6.2.0 ‐‐‐ Anti‐Spam NOTICE 13811
SMTP server found on Reject
List
1094 5.9.0 ‐‐‐ Anti‐Spam ERROR 13812
No valid DNS server specified
for GRID lookups
1094 6.0.5 ‐‐‐ Anti‐Spam ERROR 13812
No valid DNS server specified
for GRID lookups
1094 6.2.0 ‐‐‐ Anti‐Spam ERROR 13812
No valid DNS server specified
for GRID lookups
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 125
1095 5.9.0 ‐‐‐ Anti‐Spam INFO 13813
Unprocessed E‐mail received
from MTA on Inbound SMTP
port
1095 6.0.5 ‐‐‐ Anti‐Spam INFO 13813
Unprocessed E‐mail received
from MTA on Inbound SMTP
port
1095 6.2.0 ‐‐‐ Anti‐Spam INFO 13813
Unprocessed E‐mail received
from MTA on Inbound SMTP
port
1097 5.9.0 ‐‐‐ VPN PKI NOTICE ‐‐‐ SCEP Client: %s
1097 6.0.5 ‐‐‐ VPN PKI NOTICE ‐‐‐ SCEP Client: %s
1097 6.2.0 ‐‐‐ VPN PKI NOTICE ‐‐‐ SCEP Client: %s
1098 5.9.0 ‐‐‐
Intrusion Detec‐
tion ALERT 6465
Possible DNS rebind attack
detected
1098 6.0.5 ‐‐‐
Intrusion Detec‐
tion ALERT 6465
Possible DNS rebind attack
detected
1098 6.2.0 ‐‐‐
Intrusion Detec‐
tion ALERT 6465
Possible DNS rebind attack
detected
1099 5.9.0 ‐‐‐
Intrusion Detec‐
tion ALERT 6466 DNS rebind attack blocked
1099 6.0.5 ‐‐‐
Intrusion Detec‐
tion ALERT 6466 DNS rebind attack blocked
1099 6.2.0 ‐‐‐
Intrusion Detec‐
tion ALERT 6466 DNS rebind attack blocked
1100 5.9.0 ‐‐‐ Network Monitor ALERT 14001
Network Monitor: Policy %s sta‐
tus is UP
1100 6.0.5 ‐‐‐ Network Monitor ALERT 14001
Network Monitor: Policy %s sta‐
tus is UP
1100 6.2.0 ‐‐‐ Network Monitor ALERT 14001
Network Monitor: Policy %s sta‐
tus is UP
1101 5.9.0 ‐‐‐ Network Monitor ALERT 14002
Network Monitor: Policy %s sta‐
tus is DOWN
1101 6.0.5 ‐‐‐ Network Monitor ALERT 14002
Network Monitor: Policy %s sta‐
tus is DOWN
1101 6.2.0 ‐‐‐ Network Monitor ALERT 14002
Network Monitor: Policy %s sta‐
tus is DOWN
1102 5.9.0 ‐‐‐ Network Monitor ALERT 14003
Network Monitor: Policy %s sta‐
tus is UNKNOWN
126 |
1102 6.0.5 ‐‐‐ Network Monitor ALERT 14003
Network Monitor: Policy %s sta‐
tus is UNKNOWN
1102 6.2.0 ‐‐‐ Network Monitor ALERT 14003
Network Monitor: Policy %s sta‐
tus is UNKNOWN
1103 5.9.0 ‐‐‐ Network Monitor ALERT 14004
Network Monitor: Host %s sta‐
tus is UNKNOWN
1103 6.0.5 ‐‐‐ Network Monitor ALERT 14004
Network Monitor: Host %s sta‐
tus is UNKNOWN
1103 6.2.0 ‐‐‐ Network Monitor ALERT 14004
Network Monitor: Host %s sta‐
tus is UNKNOWN
1104 5.9.0 ‐‐‐ Network Monitor INFO ‐‐‐
Network Monitor Policy %s
Added
1104 6.0.5 ‐‐‐ Network Monitor INFO ‐‐‐
Network Monitor Policy %s
Added
1104 6.2.0 ‐‐‐ Network Monitor INFO ‐‐‐
Network Monitor Policy %s
Added
1105 5.9.0 ‐‐‐ Network Monitor INFO ‐‐‐
Network Monitor Policy %s
Deleted
1105 6.0.5 ‐‐‐ Network Monitor INFO ‐‐‐
Network Monitor Policy %s
Deleted
1105 6.2.0 ‐‐‐ Network Monitor INFO ‐‐‐
Network Monitor Policy %s
Deleted
1106 5.9.0 ‐‐‐ Network Monitor INFO ‐‐‐
Network Monitor Policy %s
Modified
1106 6.0.5 ‐‐‐ Network Monitor INFO ‐‐‐
Network Monitor Policy %s
Modified
1106 6.2.0 ‐‐‐ Network Monitor INFO ‐‐‐
Network Monitor Policy %s
Modified
1107 5.9.0 System Error Firewall Event ALERT ‐‐‐ %s
1107 6.0.5 System Error Firewall Event ALERT ‐‐‐ %s
1107 6.2.0 System Error Firewall Event ALERT ‐‐‐ %s
1108 5.9.0 ‐‐‐ Anti‐Spam INFO ‐‐‐
Message blocked by Real‐Time
E‐mail Scanner
1108 6.0.5 ‐‐‐ Anti‐Spam INFO ‐‐‐
Message blocked by Real‐Time
E‐mail Scanner
1108 6.2.0 ‐‐‐ Anti‐Spam INFO ‐‐‐
Message blocked by Real‐Time
E‐mail Scanner
1109 5.9.0 ‐‐‐ VPN PKI INFO ‐‐‐ CSR Generation: %s
1109 6.0.5 ‐‐‐ VPN PKI INFO ‐‐‐ CSR Generation: %s
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 127
1109 6.2.0 ‐‐‐ VPN PKI INFO ‐‐‐ CSR Generation: %s
1110 5.9.0 ‐‐‐ DHCP Server INFO ‐‐‐ Assigned IP address %s
1110 6.0.5 ‐‐‐ DHCP Server INFO ‐‐‐ Assigned IP address %s
1110 6.2.0 ‐‐‐ DHCP Server INFO ‐‐‐ Assigned IP address %s
1111 5.9.0 ‐‐‐ DHCP Server INFO ‐‐‐ Released IP address %s
1111 6.0.5 ‐‐‐ DHCP Server INFO ‐‐‐ Released IP address %s
1111 6.2.0 ‐‐‐ DHCP Server INFO ‐‐‐ Released IP address %s
1112 5.9.0 ‐‐‐ FTP DEBUG ‐‐‐
FTP server accepted the con‐
nection
1112 6.0.5 ‐‐‐ FTP DEBUG ‐‐‐
FTP server accepted the con‐
nection
1112 6.2.0 ‐‐‐ FTP DEBUG ‐‐‐
FTP server accepted the con‐
nection
1113 5.9.0 ‐‐‐ FTP DEBUG ‐‐‐ FTP client user name was sent
1113 6.0.5 ‐‐‐ FTP DEBUG ‐‐‐ FTP client user name was sent
1113 6.2.0 ‐‐‐ FTP DEBUG ‐‐‐ FTP client user name was sent
1114 5.9.0 ‐‐‐ FTP DEBUG ‐‐‐
FTP client user logged in suc‐
cessfully
1114 6.0.5 ‐‐‐ FTP DEBUG ‐‐‐
FTP client user logged in suc‐
cessfully
1114 6.2.0 ‐‐‐ FTP DEBUG ‐‐‐
FTP client user logged in suc‐
cessfully
1115 5.9.0 ‐‐‐ FTP DEBUG ‐‐‐ FTP client user logged in failed
1115 6.0.5 ‐‐‐ FTP DEBUG ‐‐‐ FTP client user logged in failed
1115 6.2.0 ‐‐‐ FTP DEBUG ‐‐‐ FTP client user logged in failed
1116 5.9.0 ‐‐‐ FTP DEBUG ‐‐‐ FTP client user logged out
1116 6.0.5 ‐‐‐ FTP DEBUG ‐‐‐ FTP client user logged out
1116 6.2.0 ‐‐‐ FTP DEBUG ‐‐‐ FTP client user logged out
1117 5.9.0 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ SSO probe
failed
1117 6.0.5 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ SSO probe
failed
1117 6.2.0 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ SSO probe
failed
1118 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
User login denied ‐ Mail
Address(From/to) or SMTP
Server is not configured
128 |
1118 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
User login denied ‐ Mail
Address(From/to) or SMTP
Server is not configured
1118 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
User login denied ‐ Mail
Address(From/to) or SMTP
Server is not configured
1119 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
RADIUS user cannot use One
Time Password ‐ no mail
address set for equivalent local
user
1119 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
RADIUS user cannot use One
Time Password ‐ no mail
address set for equivalent local
user
1119 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
RADIUS user cannot use One
Time Password ‐ no mail
address set for equivalent local
user
1120 5.9.0 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ Terminal
Services agent Timeout
1120 6.0.5 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ Terminal
Services agent Timeout
1120 6.2.0 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ Terminal
Services agent Timeout
1121 5.9.0 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ Terminal
Services agent name resolution
failed
1121 6.0.5 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ Terminal
Services agent name resolution
failed
1121 6.2.0 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ Terminal
Services agent name resolution
failed
1122 5.9.0 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ No name
received from Terminal Services
agent
1122 6.0.5 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ No name
received from Terminal Services
agent
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 129
1122 6.2.0 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ No name
received from Terminal Services
agent
1123 5.9.0 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ Terminal
Services agent communication
problem
1123 6.0.5 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ Terminal
Services agent communication
problem
1123 6.2.0 User Activity
Authenticated
Access WARNING ‐‐‐
User login denied ‐ Terminal
Services agent communication
problem
1124 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
User logged out ‐ logout
reported by Terminal Services
agent
1124 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
User logged out ‐ logout
reported by Terminal Services
agent
1124 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
User logged out ‐ logout
reported by Terminal Services
agent
1125 5.9.0 User Activity High Availability INFO ‐‐‐
High Availability has been
enabled, Dial‐Up device(s) are
not supported in High Availabil‐
ity processing.
1125 6.0.5 ‐‐‐ High Availability INFO ‐‐‐
High Availability has been
enabled, Dial‐Up device(s) are
not supported in High Availabil‐
ity processing.
1125 6.2.0 User Activity High Availability INFO ‐‐‐
High Availability has been
enabled, Dial‐Up device(s) are
not supported in High Availabil‐
ity processing.
1126 5.9.0 User Activity High Availability ERROR ‐‐‐
The High Availability monitoring
IP configuration of Interface %s
is incorrect.
1126 6.0.5 ‐‐‐ High Availability ERROR ‐‐‐
The High Availability monitoring
IP configuration of Interface %s
is incorrect.
130 |
1126 6.2.0 User Activity High Availability ERROR ‐‐‐
The High Availability monitoring
IP configuration of Interface %s
is incorrect.
1127 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: ESP mode mis‐
match Local ‐ Tunnel Remote ‐
Transport
1127 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: ESP mode mis‐
match Local ‐ Tunnel Remote ‐
Transport
1127 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: ESP mode mis‐
match Local ‐ Tunnel Remote ‐
Transport
1128 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: ESP mode mis‐
match Local ‐ Transport
Remote ‐ Tunnel
1128 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: ESP mode mis‐
match Local ‐ Transport
Remote ‐ Tunnel
1128 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder: ESP mode mis‐
match Local ‐ Transport
Remote ‐ Tunnel
1131 5.9.0 ‐‐‐ Anti‐Spam DEBUG ‐‐‐ Probe Response Success ‐ %s
1131 6.0.5 ‐‐‐ Anti‐Spam DEBUG ‐‐‐ Probe Response Success ‐ %s
1131 6.2.0 ‐‐‐ Anti‐Spam DEBUG ‐‐‐ Probe Response Success ‐ %s
1132 5.9.0 ‐‐‐ Anti‐Spam DEBUG ‐‐‐ Probe Response Failure ‐ %s
1132 6.0.5 ‐‐‐ Anti‐Spam DEBUG ‐‐‐ Probe Response Failure ‐ %s
1132 6.2.0 ‐‐‐ Anti‐Spam DEBUG ‐‐‐ Probe Response Failure ‐ %s
1133 5.9.0 ‐‐‐ PPPoE INFO ‐‐‐ %s
1133 6.0.5 ‐‐‐ PPPoE INFO ‐‐‐ %s
1133 6.2.0 ‐‐‐ PPPoE INFO ‐‐‐ %s
1134 5.9.0 Maintenance PPTP INFO ‐‐‐ %s
1134 6.0.5 Maintenance PPTP INFO ‐‐‐ %s
1134 6.2.0 Maintenance PPTP INFO ‐‐‐ %s
1135 5.9.0 Maintenance L2TP Client INFO ‐‐‐ %s
1135 6.0.5 Maintenance L2TP Client INFO ‐‐‐ %s
1135 6.2.0 Maintenance L2TP Client INFO ‐‐‐ %s
1138 5.9.0 ‐‐‐ Anti‐Spam DEBUG ‐‐‐
Received unauthenticated GRID
response
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 131
1138 6.0.5 ‐‐‐ Anti‐Spam DEBUG ‐‐‐
Received unauthenticated GRID
response
1138 6.2.0 ‐‐‐ Anti‐Spam DEBUG ‐‐‐
Received unauthenticated GRID
response
1139 5.9.0 ‐‐‐ Anti‐Spam DEBUG ‐‐‐
Invalid key or serial number
used for GRID response
1139 6.0.5 ‐‐‐ Anti‐Spam DEBUG ‐‐‐
Invalid key or serial number
used for GRID response
1139 6.2.0 ‐‐‐ Anti‐Spam DEBUG ‐‐‐
Invalid key or serial number
used for GRID response
1140 5.9.0 ‐‐‐ Anti‐Spam DEBUG ‐‐‐
Invalid key version used for
GRID response
1140 6.0.5 ‐‐‐ Anti‐Spam DEBUG ‐‐‐
Invalid key version used for
GRID response
1140 6.2.0 ‐‐‐ Anti‐Spam DEBUG ‐‐‐
Invalid key version used for
GRID response
1141 5.9.0 ‐‐‐ Anti‐Spam DEBUG ‐‐‐ Host IP address not in GRID List
1141 6.0.5 ‐‐‐ Anti‐Spam DEBUG ‐‐‐ Host IP address not in GRID List
1141 6.2.0 ‐‐‐ Anti‐Spam DEBUG ‐‐‐ Host IP address not in GRID List
1142 5.9.0 ‐‐‐ Anti‐Spam DEBUG ‐‐‐
No response received from DNS
server
1142 6.0.5 ‐‐‐ Anti‐Spam DEBUG ‐‐‐
No response received from DNS
server
1142 6.2.0 ‐‐‐ Anti‐Spam DEBUG ‐‐‐
No response received from DNS
server
1143 5.9.0 ‐‐‐ Anti‐Spam DEBUG ‐‐‐
Not blacklisted as per configu‐
ration
1143 6.0.5 ‐‐‐ Anti‐Spam DEBUG ‐‐‐
Not blacklisted as per configu‐
ration
1143 6.2.0 ‐‐‐ Anti‐Spam DEBUG ‐‐‐
Not blacklisted as per configu‐
ration
1144 5.9.0 ‐‐‐ Anti‐Spam DEBUG ‐‐‐ Default to not blacklisted
1144 6.0.5 ‐‐‐ Anti‐Spam DEBUG ‐‐‐ Default to not blacklisted
1144 6.2.0 ‐‐‐ Anti‐Spam DEBUG ‐‐‐ Default to not blacklisted
1145 5.9.0 ‐‐‐ Anti‐Spam DEBUG ‐‐‐
Failed to insert entry into GRID
result IP cached table
1145 6.0.5 ‐‐‐ Anti‐Spam DEBUG ‐‐‐
Failed to insert entry into GRID
result IP cached table
132 |
1145 6.2.0 ‐‐‐ Anti‐Spam DEBUG ‐‐‐
Failed to insert entry into GRID
result IP cached table
1146 5.9.0 ‐‐‐ Anti‐Spam DEBUG ‐‐‐ Resolved ES Cloud ‐ %s
1146 6.0.5 ‐‐‐ Anti‐Spam DEBUG ‐‐‐ Resolved ES Cloud ‐ %s
1146 6.2.0 ‐‐‐ Anti‐Spam DEBUG ‐‐‐ Resolved ES Cloud ‐ %s
1147 5.9.0 ‐‐‐ Anti‐Spam DEBUG ‐‐‐ Updated ES Cloud Address ‐ %s
1147 6.0.5 ‐‐‐ Anti‐Spam DEBUG ‐‐‐ Updated ES Cloud Address ‐ %s
1147 6.2.0 ‐‐‐ Anti‐Spam DEBUG ‐‐‐ Updated ES Cloud Address ‐ %s
1148 5.9.0
Advanced
Switching
Advanced Switch‐
ing INFO ‐‐‐ %s
1148 6.0.5 ‐‐‐
Advanced Switch‐
ing INFO ‐‐‐ %s
1148 6.2.0
Advanced
Switching
Advanced Switch‐
ing INFO ‐‐‐ %s
1149 5.9.0 ‐‐‐ High Availability WARNING ‐‐‐
Your Active/Active Clustering
subscRIPtion has expired.
1149 6.0.5 ‐‐‐ High Availability WARNING ‐‐‐
Your Active/Active Clustering
subscRIPtion has expired.
1149 6.2.0 ‐‐‐ High Availability WARNING ‐‐‐
Your Active/Active Clustering
subscRIPtion has expired.
1150 5.9.0 User Activity CIA ALERT ‐‐‐ Terminal Services agent is down
1150 6.0.5 User Activity CIA ALERT ‐‐‐ Terminal Services agent is down
1150 6.2.0 User Activity CIA ALERT ‐‐‐ Terminal Services agent is down
1151 5.9.0 User Activity CIA ALERT ‐‐‐ Terminal Services agent is up
1151 6.0.5 User Activity CIA ALERT ‐‐‐ Terminal Services agent is up
1151 6.2.0 User Activity CIA ALERT ‐‐‐ Terminal Services agent is up
1152 5.9.0 ‐‐‐ High Availability ERROR ‐‐‐
Active/Active Clustering license
is not activated on the following
cluster units: %s
1152 6.0.5 ‐‐‐ High Availability ERROR ‐‐‐
Active/Active Clustering license
is not activated on the following
cluster units: %s
1152 6.2.0 ‐‐‐ High Availability ERROR ‐‐‐
Active/Active Clustering license
is not activated on the following
cluster units: %s
1153 5.9.0
Connection
Traffic SSL VPN INFO ‐‐‐ SSL VPN Traffic
1153 6.0.5
Connection
Traffic SSL VPN INFO ‐‐‐ SSL VPN Traffic
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 133
1153 6.2.0
Connection
Traffic SSL VPN INFO ‐‐‐ SSL VPN Traffic
1154 5.9.0 ‐‐‐
Application Con‐
trol Detection ALERT 15001
Application Control Detection
Alert: %s
1154 6.0.5 ‐‐‐
Application Con‐
trol Detection ALERT 15001
Application Control Detection
Alert: %s
1154 6.2.0 ‐‐‐
Application Con‐
trol Detection ALERT 15001
Application Control Detection
Alert: %s
1155 5.9.0 ‐‐‐
Application Con‐
trol Detection ALERT 15002
Application Control Prevention
Alert: %s
1155 6.0.5 ‐‐‐
Application Con‐
trol Detection ALERT 15002
Application Control Prevention
Alert: %s
1155 6.2.0 ‐‐‐
Application Con‐
trol Detection ALERT 15002
Application Control Prevention
Alert: %s
1156 5.9.0 ‐‐‐ Firewall Event ERROR ‐‐‐
Name Resolution for Syslog or
GMS failed.
1156 6.0.5 ‐‐‐ Firewall Event ERROR ‐‐‐
Name Resolution for Syslog or
GMS failed.
1156 6.2.0 ‐‐‐ Firewall Event ERROR ‐‐‐
Name Resolution for Syslog or
GMS failed.
1157 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
User account '%s' expired and
disabled
1157 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
User account '%s' expired and
disabled
1157 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
User account '%s' expired and
disabled
1158 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
User account '%s' expired and
pruned
1158 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
User account '%s' expired and
pruned
1158 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
User account '%s' expired and
pruned
1159 5.9.0 ‐‐‐ Security Services WARNING ‐‐‐
Received Alert: Your Visualiza‐
tion Control subscRIPtion has
expired.
1159 6.0.5 ‐‐‐ Security Services WARNING ‐‐‐
Received Alert: Your Visualiza‐
tion Control subscRIPtion has
expired.
134 |
1159 6.2.0 ‐‐‐ Security Services WARNING ‐‐‐
Received Alert: Your Visualiza‐
tion Control subscRIPtion has
expired.
1160 5.9.0 Maintenance Firewall Event DEBUG ‐‐‐
Attempt to contact Remote
backup server for upload
approval failed
1160 6.0.5 Maintenance Firewall Event DEBUG ‐‐‐
Attempt to contact Remote
backup server for upload
approval failed
1160 6.2.0 Maintenance Firewall Event DEBUG ‐‐‐
Attempt to contact Remote
backup server for upload
approval failed
1161 5.9.0 Maintenance Firewall Event DEBUG ‐‐‐
Backup remote server did not
approve upload Request
1161 6.0.5 Maintenance Firewall Event DEBUG ‐‐‐
Backup remote server did not
approve upload Request
1161 6.2.0 Maintenance Firewall Event DEBUG ‐‐‐
Backup remote server did not
approve upload Request
1162 5.9.0 System Error High Availability ALERT 664
Modules attached to HA units
do not match: %s
1162 6.0.5 System Error High Availability ALERT 664
Modules attached to HA units
do not match: %s
1162 6.2.0 System Error High Availability ALERT 664
Modules attached to HA units
do not match: %s
1163 5.9.0 ‐‐‐ E1/T1 Status INFO ‐‐‐ E1_T1 Layer 1 status: No signal
1163 6.0.5 ‐‐‐ None INFO ‐‐‐ E1_T1 Layer 1 status: No signal
1163 6.2.0 ‐‐‐ E1/T1 Status INFO ‐‐‐ E1_T1 Layer 1 status: No signal
1164 5.9.0 ‐‐‐ E1/T1 Status INFO ‐‐‐
E1_T1 Layer 1 status: No frame
synchronization
1164 6.0.5 ‐‐‐ None INFO ‐‐‐
E1_T1 Layer 1 status: No frame
synchronization
1164 6.2.0 ‐‐‐ E1/T1 Status INFO ‐‐‐
E1_T1 Layer 1 status: No frame
synchronization
1165 5.9.0 ‐‐‐ E1/T1 Status INFO ‐‐‐
E1_T1 Layer 1 status: No multi‐
frame synchronization
1165 6.0.5 ‐‐‐ None INFO ‐‐‐
E1_T1 Layer 1 status: No multi‐
frame synchronization
1165 6.2.0 ‐‐‐ E1/T1 Status INFO ‐‐‐
E1_T1 Layer 1 status: No multi‐
frame synchronization
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 135
1166 5.9.0 ‐‐‐ E1/T1 Status INFO ‐‐‐
E1_T1 Layer 1 status: Remote
alarm detected
1166 6.0.5 ‐‐‐ None INFO ‐‐‐
E1_T1 Layer 1 status: Remote
alarm detected
1166 6.2.0 ‐‐‐ E1/T1 Status INFO ‐‐‐
E1_T1 Layer 1 status: Remote
alarm detected
1167 5.9.0 ‐‐‐ E1/T1 Status INFO ‐‐‐
E1_T1 Layer 1 status: Controlled
slip
1167 6.0.5 ‐‐‐ None INFO ‐‐‐
E1_T1 Layer 1 status: Controlled
slip
1167 6.2.0 ‐‐‐ E1/T1 Status INFO ‐‐‐
E1_T1 Layer 1 status: Controlled
slip
1168 5.9.0 ‐‐‐ E1/T1 Status INFO ‐‐‐ E1_T1 Layer 1 status: OK
1168 6.0.5 ‐‐‐ None INFO ‐‐‐ E1_T1 Layer 1 status: OK
1168 6.2.0 ‐‐‐ E1/T1 Status INFO ‐‐‐ E1_T1 Layer 1 status: OK
1169 5.9.0 ‐‐‐
Bandwidth Opti‐
mization INFO ‐‐‐
WAN Acceleration device %s
found
1169 6.0.5 ‐‐‐ Unused DEBUG ‐‐‐
WAN Acceleration device %s
found
1169 6.2.0 ‐‐‐
Bandwidth Opti‐
mization INFO ‐‐‐
WAN Acceleration device %s
found
1170 5.9.0 ‐‐‐
Bandwidth Opti‐
mization ALERT ‐‐‐
WAN Acceleration device %s is
operational
1170 6.0.5 ‐‐‐ Unused DEBUG ‐‐‐
WAN Acceleration device %s is
operational
1170 6.2.0 ‐‐‐
Bandwidth Opti‐
mization ALERT ‐‐‐
WAN Acceleration device %s is
operational
1171 5.9.0 ‐‐‐
Bandwidth Opti‐
mization ALERT ‐‐‐
WAN Acceleration device %s is
no longer operational
1171 6.0.5 ‐‐‐ Unused DEBUG ‐‐‐
WAN Acceleration device %s is
no longer operational
1171 6.2.0 ‐‐‐
Bandwidth Opti‐
mization ALERT ‐‐‐
WAN Acceleration device %s is
no longer operational
1172 5.9.0 ‐‐‐
Bandwidth Opti‐
mization ALERT ‐‐‐
WAN Acceleration device %s is
being used
1172 6.0.5 ‐‐‐ Unused DEBUG ‐‐‐
WAN Acceleration device %s is
being used
1172 6.2.0 ‐‐‐
Bandwidth Opti‐
mization ALERT ‐‐‐
WAN Acceleration device %s is
being used
136 |
1173 5.9.0 ‐‐‐
Bandwidth Opti‐
mization ALERT ‐‐‐
WAN Acceleration device %s is
no longer being used
1173 6.0.5 ‐‐‐ Unused DEBUG ‐‐‐
WAN Acceleration device %s is
no longer being used
1173 6.2.0 ‐‐‐
Bandwidth Opti‐
mization ALERT ‐‐‐
WAN Acceleration device %s is
no longer being used
1174 5.9.0 ‐‐‐
Bandwidth Opti‐
mization WARNING ‐‐‐
Remote WAN Acceleration
device stopped responding to
probes
1174 6.0.5 ‐‐‐ Unused DEBUG ‐‐‐
Remote WAN Acceleration
device stopped responding to
probes
1174 6.2.0 ‐‐‐
Bandwidth Opti‐
mization WARNING ‐‐‐
Remote WAN Acceleration
device stopped responding to
probes
1175 5.9.0 ‐‐‐
Bandwidth Opti‐
mization WARNING ‐‐‐
Remote WAN Acceleration
device started responding to
probes
1175 6.0.5 ‐‐‐ Unused DEBUG ‐‐‐
Remote WAN Acceleration
device started responding to
probes
1175 6.2.0 ‐‐‐
Bandwidth Opti‐
mization WARNING ‐‐‐
Remote WAN Acceleration
device started responding to
probes
1176 5.9.0 ‐‐‐
Bandwidth Opti‐
mization WARNING ‐‐‐
Your WAN Acceleration Service
subscRIPtion has expired.
1176 6.0.5 ‐‐‐ Unused DEBUG ‐‐‐
Your WAN Acceleration Service
subscRIPtion has expired.
1176 6.2.0 ‐‐‐
Bandwidth Opti‐
mization WARNING ‐‐‐
Your WAN Acceleration Service
subscRIPtion has expired.
1177 5.9.0 Debug Network Access ALERT ‐‐‐
Malformed DNS packet
detected
1177 6.0.5 Debug Network Access ALERT ‐‐‐
Malformed DNS packet
detected
1177 6.2.0 Debug Network Access ALERT ‐‐‐
Malformed DNS packet
detected
1178 5.9.0 User Activity CIA ALERT ‐‐‐
A high percentage of the system
packet buffers are held waiting
for SSO
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 137
1178 6.0.5 User Activity CIA ALERT ‐‐‐
A high percentage of the system
packet buffers are held waiting
for SSO
1178 6.2.0 User Activity CIA ALERT ‐‐‐
A high percentage of the system
packet buffers are held waiting
for SSO
1179 5.9.0 User Activity CIA ALERT ‐‐‐
A user has a very high number
of connections waiting for SSO
1179 6.0.5 User Activity CIA ALERT ‐‐‐
A user has a very high number
of connections waiting for SSO
1179 6.2.0 User Activity CIA ALERT ‐‐‐
A user has a very high number
of connections waiting for SSO
1183 5.9.0 ‐‐‐ VPN IKE DEBUG ‐‐‐ Deleting IPsec SA. (Phase 2)
1183 6.0.5 ‐‐‐ VPN IKE DEBUG ‐‐‐ Deleting IPsec SA. (Phase 2)
1183 6.2.0 ‐‐‐ VPN IKE DEBUG ‐‐‐ Deleting IPsec SA. (Phase 2)
1184 5.9.0 ‐‐‐ DHCP Server WARNING ‐‐‐
Delete invalid scope because
port IP in the range of this DHCP
scope.
1184 6.0.5 ‐‐‐ DHCP Server WARNING ‐‐‐
Delete invalid scope because
port IP in the range of this DHCP
scope.
1184 6.2.0 ‐‐‐ DHCP Server WARNING ‐‐‐
Delete invalid scope because
port IP in the range of this DHCP
scope.
1185 5.9.0 ‐‐‐ DSL ALERT ‐‐‐ DSL: %s Device Up
1185 6.0.5 ‐‐‐ DSL ALERT ‐‐‐ DSL: %s Device Up
1185 6.2.0 ‐‐‐ DSL ALERT ‐‐‐ DSL: %s Device Up
1186 5.9.0 ‐‐‐ DSL ALERT ‐‐‐ DSL: %s Device Down
1186 6.0.5 ‐‐‐ DSL ALERT ‐‐‐ DSL: %s Device Down
1186 6.2.0 ‐‐‐ DSL ALERT ‐‐‐ DSL: %s Device Down
1187 5.9.0 ‐‐‐ DSL ALERT ‐‐‐ DSL: %s WAN is connected
1187 6.0.5 ‐‐‐ DSL ALERT ‐‐‐ DSL: %s WAN is connected
1187 6.2.0 ‐‐‐ DSL ALERT ‐‐‐ DSL: %s WAN is connected
1188 5.9.0 ‐‐‐ DSL ALERT ‐‐‐ DSL: %s WAN is initializing
1188 6.0.5 ‐‐‐ DSL ALERT ‐‐‐ DSL: %s WAN is initializing
1188 6.2.0 ‐‐‐ DSL ALERT ‐‐‐ DSL: %s WAN is initializing
1189 5.9.0 ‐‐‐ VPN IKE WARNING ‐‐‐
IKE Responder: Peer's pro‐
posed network does not match
VPN Policy's Network
138 |
1189 6.0.5 ‐‐‐ VPN IKE WARNING ‐‐‐
IKE Responder: Peer's pro‐
posed network does not match
VPN Policy's Network
1189 6.2.0 ‐‐‐ VPN IKE WARNING ‐‐‐
IKE Responder: Peer's pro‐
posed network does not match
VPN Policy's Network
1190 5.9.0 ‐‐‐ RADIUS INFO ‐‐‐
Added new LDAP mirror user
group: %s
1190 6.0.5 ‐‐‐ RADIUS INFO ‐‐‐
Added new LDAP mirror user
group: %s
1190 6.2.0 ‐‐‐ RADIUS INFO ‐‐‐
Added new LDAP mirror user
group: %s
1191 5.9.0 ‐‐‐ RADIUS INFO ‐‐‐
Deleted LDAP mirror user
group: %s
1191 6.0.5 ‐‐‐ RADIUS INFO ‐‐‐
Deleted LDAP mirror user
group: %s
1191 6.2.0 ‐‐‐ RADIUS INFO ‐‐‐
Deleted LDAP mirror user
group: %s
1192 5.9.0 ‐‐‐ RADIUS INFO ‐‐‐
Added a new member to an
LDAP mirror user group
1192 6.0.5 ‐‐‐ RADIUS INFO ‐‐‐
Added a new member to an
LDAP mirror user group
1192 6.2.0 ‐‐‐ RADIUS INFO ‐‐‐
Added a new member to an
LDAP mirror user group
1193 5.9.0 ‐‐‐ RADIUS INFO ‐‐‐
Removed a member from an
LDAP mirror user group
1193 6.0.5 ‐‐‐ RADIUS INFO ‐‐‐
Removed a member from an
LDAP mirror user group
1193 6.2.0 ‐‐‐ RADIUS INFO ‐‐‐
Removed a member from an
LDAP mirror user group
1194 5.9.0 ‐‐‐ High Availability ERROR ‐‐‐
Monitoring probe out interface
mismatch %s
1194 6.0.5 ‐‐‐ High Availability ERROR ‐‐‐
Monitoring probe out interface
mismatch %s
1194 6.2.0 ‐‐‐ High Availability ERROR ‐‐‐
Monitoring probe out interface
mismatch %s
1195 5.9.0
Security Ser‐
vices Security Services WARNING ‐‐‐
Received Alert: Your Firewall
Botnet Filter subscRIPtion has
expired.
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 139
1195 6.0.5
Security Ser‐
vices Security Services WARNING ‐‐‐
Received Alert: Your Firewall
Botnet Filter subscRIPtion has
expired.
1195 6.2.0
Security Ser‐
vices Security Services WARNING ‐‐‐
Received Alert: Your Firewall
Botnet Filter subscRIPtion has
expired.
1196 5.9.0 Maintenance Firewall Event ALERT ‐‐‐
Product maximum entries
reached ‐ %s
1196 6.0.5 Maintenance Firewall Event ALERT ‐‐‐
Product maximum entries
reached ‐ %s
1196 6.2.0 Maintenance Firewall Event ALERT ‐‐‐
Product maximum entries
reached ‐ %s
1197 5.9.0 ‐‐‐ Network Access NOTICE ‐‐‐ Nat Mapping
1197 6.0.5 ‐‐‐ Network Access NOTICE ‐‐‐ Nat Mapping
1197 6.2.0 ‐‐‐ Network Access NOTICE ‐‐‐ Nat Mapping
1198 5.9.0 ‐‐‐ GeoIP ALERT ‐‐‐
Initiator from country blocked:
%s
1198 6.0.5 ‐‐‐ GeoIP ALERT ‐‐‐
Initiator from country blocked:
%s
1198 6.2.0 ‐‐‐ GeoIP ALERT ‐‐‐
Initiator from country blocked:
%s
1199 5.9.0 ‐‐‐ GeoIP ALERT ‐‐‐
Responder from country
blocked: %s
1199 6.0.5 ‐‐‐ GeoIP ALERT ‐‐‐
Responder from country
blocked: %s
1199 6.2.0 ‐‐‐ GeoIP ALERT ‐‐‐
Responder from country
blocked: %s
1200 5.9.0 ‐‐‐ Botnet ALERT ‐‐‐
Suspected Botnet initiator
blocked: %s
1200 6.0.5 ‐‐‐ Botnet ALERT ‐‐‐
Suspected Botnet initiator
blocked: %s
1200 6.2.0 ‐‐‐ Botnet ALERT ‐‐‐
Suspected Botnet initiator
blocked: %s
1201 5.9.0 ‐‐‐ Botnet ALERT ‐‐‐
Suspected Botnet responder
blocked: %s
1201 6.0.5 ‐‐‐ Botnet ALERT ‐‐‐
Suspected Botnet responder
blocked: %s
1201 6.2.0 ‐‐‐ Botnet ALERT ‐‐‐
Suspected Botnet responder
blocked: %s
140 |
1202 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐ %s
1202 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐ %s
1202 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐ %s
1203 5.9.0 User Activity
Authenticated
Access WARNING ‐‐‐ %s
1203 6.0.5 User Activity
Authenticated
Access WARNING ‐‐‐ %s
1203 6.2.0 User Activity
Authenticated
Access WARNING ‐‐‐ %s
1204 5.9.0 User Activity
Authenticated
Access ERROR ‐‐‐ %s
1204 6.0.5 User Activity
Authenticated
Access ERROR ‐‐‐ %s
1204 6.2.0 User Activity
Authenticated
Access ERROR ‐‐‐ %s
1205 5.9.0 System Error High Availability ALERT ‐‐‐
On HA peer firewall, Interface
%s Link Is Up
1205 6.0.5 System Error High Availability ALERT ‐‐‐
On HA peer firewall, Interface
%s Link Is Up
1205 6.2.0 System Error High Availability ALERT ‐‐‐
On HA peer firewall, Interface
%s Link Is Up
1206 5.9.0 System Error High Availability ALERT ‐‐‐
On HA peer firewall, Interface
%s Link Is Down
1206 6.0.5 System Error High Availability ALERT ‐‐‐
On HA peer firewall, Interface
%s Link Is Down
1206 6.2.0 System Error High Availability ALERT ‐‐‐
On HA peer firewall, Interface
%s Link Is Down
1207 5.9.0 Maintenance High Availability INFO ‐‐‐
Peer firewall has reduced link
status. In event of failover, it
will operate with limited capa‐
bility.
1207 6.0.5 Maintenance High Availability INFO ‐‐‐
Peer firewall has reduced link
status. In event of failover, it
will operate with limited capa‐
bility.
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 141
1207 6.2.0 Maintenance High Availability INFO ‐‐‐
Peer firewall has reduced link
status. In event of failover, it
will operate with limited capa‐
bility.
1208 5.9.0 Maintenance High Availability INFO ‐‐‐
Peer firewall has equivalent link
status. In event of failover, it
will operate with equal capabil‐
ity.
1208 6.0.5 Maintenance High Availability INFO ‐‐‐
Peer firewall has equivalent link
status. In event of failover, it
will operate with equal capabil‐
ity.
1208 6.2.0 Maintenance High Availability INFO ‐‐‐
Peer firewall has equivalent link
status. In event of failover, it
will operate with equal capabil‐
ity.
1209 5.9.0 Attack MacIP Spoof ALERT ‐‐‐
MAC‐IP Anti‐spoof check
enforced for hosts
1209 6.0.5 Attack MacIP Spoof ALERT ‐‐‐
MAC‐IP Anti‐spoof check
enforced for hosts
1209 6.2.0 Attack MacIP Spoof ALERT ‐‐‐
MAC‐IP Anti‐spoof check
enforced for hosts
1210 5.9.0 Attack MacIP Spoof ALERT ‐‐‐
MAC‐IP Anti‐spoof cache not
found for this router
1210 6.0.5 Attack MacIP Spoof ALERT ‐‐‐
MAC‐IP Anti‐spoof cache not
found for this router
1210 6.2.0 Attack MacIP Spoof ALERT ‐‐‐
MAC‐IP Anti‐spoof cache not
found for this router
1211 5.9.0 Attack MacIP Spoof ALERT ‐‐‐
MAC‐IP Anti‐spoof cache found,
but it is not a router
1211 6.0.5 Attack MacIP Spoof ALERT ‐‐‐
MAC‐IP Anti‐spoof cache found,
but it is not a router
1211 6.2.0 Attack MacIP Spoof ALERT ‐‐‐
MAC‐IP Anti‐spoof cache found,
but it is not a router
1212 5.9.0 Attack MacIP Spoof ALERT ‐‐‐
MAC‐IP Anti‐spoof cache found,
but it is blacklisted device
1212 6.0.5 Attack MacIP Spoof ALERT ‐‐‐
MAC‐IP Anti‐spoof cache found,
but it is blacklisted device
1212 6.2.0 Attack MacIP Spoof ALERT ‐‐‐
MAC‐IP Anti‐spoof cache found,
but it is blacklisted device
142 |
1213 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Possible UDP flood attack
detected
1213 6.0.5 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Possible UDP flood attack
detected
1213 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Possible UDP flood attack
detected
1214 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Possible ICMP flood attack
detected
1214 6.0.5 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Possible ICMP flood attack
detected
1214 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Possible ICMP flood attack
detected
1215 5.9.0 Debug DHCP Relay INFO ‐‐‐
DHCP INFORM received from
remote device
1215 6.0.5 Debug DHCP Relay INFO ‐‐‐
DHCP INFORM received from
remote device
1215 6.2.0 Debug DHCP Relay INFO ‐‐‐
DHCP INFORM received from
remote device
1216 5.9.0 ‐‐‐ ‐‐‐ DEBUG ‐‐‐ IP Pool of the VPN Policy is Full
1216 6.0.5 ‐‐‐ ‐‐‐ DEBUG ‐‐‐ IP Pool of the VPN Policy is Full
1216 6.2.0 ‐‐‐ ‐‐‐ DEBUG ‐‐‐ IP Pool of the VPN Policy is Full
1217 5.9.0 ‐‐‐ ‐‐‐ DEBUG ‐‐‐
IP Pool of the VPN Policy is Not
Configured
1217 6.0.5 ‐‐‐ ‐‐‐ DEBUG ‐‐‐
IP Pool of the VPN Policy is Not
Configured
1217 6.2.0 ‐‐‐ ‐‐‐ DEBUG ‐‐‐
IP Pool of the VPN Policy is Not
Configured
1218 5.9.0 ‐‐‐ ‐‐‐ INFO ‐‐‐
MOBIKE: Update Peer Gateway
IP
1218 6.0.5 ‐‐‐ ‐‐‐ INFO ‐‐‐
MOBIKE: Update Peer Gateway
IP
1218 6.2.0 ‐‐‐ ‐‐‐ INFO ‐‐‐
MOBIKE: Update Peer Gateway
IP
1219 5.9.0 ‐‐‐ ‐‐‐ INFO ‐‐‐ IP Address is allocated for Client
1219 6.0.5 ‐‐‐ ‐‐‐ INFO ‐‐‐ IP Address is allocated for Client
1219 6.2.0 ‐‐‐ ‐‐‐ INFO ‐‐‐ IP Address is allocated for Client
1220 5.9.0 ‐‐‐ ‐‐‐ WARNING ‐‐‐ Invalid SNMP packet
1220 6.0.5 ‐‐‐ ‐‐‐ WARNING ‐‐‐ Invalid SNMP packet
1220 6.2.0 ‐‐‐ ‐‐‐ WARNING ‐‐‐ Invalid SNMP packet
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 143
1221 5.9.0 ‐‐‐ ‐‐‐ WARNING ‐‐‐ Invalid SNMPv3 engineID
1221 6.0.5 ‐‐‐ ‐‐‐ WARNING ‐‐‐ Invalid SNMPv3 engineID
1221 6.2.0 ‐‐‐ ‐‐‐ WARNING ‐‐‐ Invalid SNMPv3 engineID
1222 5.9.0 ‐‐‐ ‐‐‐ WARNING ‐‐‐ Invalid SNMPv3 User
1222 6.0.5 ‐‐‐ ‐‐‐ WARNING ‐‐‐ Invalid SNMPv3 User
1222 6.2.0 ‐‐‐ ‐‐‐ WARNING ‐‐‐ Invalid SNMPv3 User
1223 5.9.0 ‐‐‐ ‐‐‐ WARNING ‐‐‐ Invalid SNMPv3 Time Window
1223 6.0.5 ‐‐‐ ‐‐‐ WARNING ‐‐‐ Invalid SNMPv3 Time Window
1223 6.2.0 ‐‐‐ ‐‐‐ WARNING ‐‐‐ Invalid SNMPv3 Time Window
1225 5.9.0 ‐‐‐ ‐‐‐ INFO ‐‐‐ SNMP Packet Dropped
1225 6.0.5 ‐‐‐ ‐‐‐ INFO ‐‐‐ SNMP Packet Dropped
1225 6.2.0 ‐‐‐ ‐‐‐ INFO ‐‐‐ SNMP Packet Dropped
1226 5.9.0 ‐‐‐ ‐‐‐ INFO ‐‐‐ HTTPS Handshake: %s
1226 6.0.5 ‐‐‐ ‐‐‐ INFO ‐‐‐ HTTPS Handshake: %s
1226 6.2.0 ‐‐‐ ‐‐‐ INFO ‐‐‐ HTTPS Handshake: %s
1227 5.9.0 User Activity ‐‐‐ INFO ‐‐‐ Guest traffic quota exceeded
1227 6.0.5 User Activity ‐‐‐ INFO ‐‐‐ Guest traffic quota exceeded
1227 6.2.0 User Activity ‐‐‐ INFO ‐‐‐ Guest traffic quota exceeded
1229 5.9.0
TCP | UDP |
ICMP ‐‐‐ WARNING ‐‐‐
Packet dropped by wireless
Advanced IDP
1229 6.0.5
TCP | UDP |
ICMP ‐‐‐ WARNING ‐‐‐
Packet dropped by wireless
Advanced IDP
1229 6.2.0
TCP | UDP |
ICMP ‐‐‐ WARNING ‐‐‐
Packet dropped by wireless
Advanced IDP
1230 5.9.0 UDP ‐‐‐ NOTICE ‐‐‐
Failed on updating time from
NTP server
1230 6.0.5 UDP ‐‐‐ NOTICE ‐‐‐
Failed on updating time from
NTP server
1230 6.2.0 UDP ‐‐‐ NOTICE ‐‐‐
Failed on updating time from
NTP server
1231 5.9.0 UDP ‐‐‐ NOTICE ‐‐‐
Time update from NTP server
was successful
1231 6.0.5 UDP ‐‐‐ NOTICE ‐‐‐
Succeed in updating time from
NTP server
1231 6.2.0 UDP ‐‐‐ NOTICE ‐‐‐
Time update from NTP server
was successful
1232 5.9.0 UDP ‐‐‐ NOTICE ‐‐‐ NTP Request sent
1232 6.0.5 UDP ‐‐‐ NOTICE ‐‐‐ NTP Request sent
144 |
1232 6.2.0 UDP ‐‐‐ NOTICE ‐‐‐ NTP Request sent
1233 5.9.0 Debug ‐‐‐ NOTICE ‐‐‐
Unhandled link‐local or multi‐
cast IPv6 packet dropped
1233 6.0.5 Debug ‐‐‐ ALERT ‐‐‐
Unhandled link‐local or multi‐
cast IPv6 packet dropped
1233 6.2.0 Debug ‐‐‐ NOTICE ‐‐‐
Unhandled link‐local or multi‐
cast IPv6 packet dropped
1235 5.9.0 ‐‐‐ Network INFO ‐‐‐ Packet allowed by Access Rules
1235 6.0.5 ‐‐‐ Network INFO ‐‐‐ Packet allowed
1235 6.2.0 ‐‐‐ Network INFO ‐‐‐ Packet allowed: %s
1236 5.9.0 ‐‐‐ Security Services DEBUG ‐‐‐
Received Blacklisted Directive
from ‐ %s
1236 6.0.5 ‐‐‐ Security Services DEBUG ‐‐‐
Received Blacklisted Directive
from ‐ %s
1236 6.2.0 ‐‐‐ Security Services DEBUG ‐‐‐
Received Blacklisted Directive
from ‐ %s
1237 5.9.0 ‐‐‐ Security Services DEBUG ‐‐‐ Not Blacklisted by domain ‐ %s
1237 6.0.5 ‐‐‐ Security Services DEBUG ‐‐‐ Not Blacklisted by domain ‐ %s
1237 6.2.0 ‐‐‐ Security Services DEBUG ‐‐‐ Not Blacklisted by domain ‐ %s
1238 5.9.0 ‐‐‐ Security Services DEBUG ‐‐‐
No DNS response to domain ‐
%s
1238 6.0.5 ‐‐‐ Security Services DEBUG ‐‐‐
No DNS response to domain ‐
%s
1238 6.2.0 ‐‐‐ Security Services DEBUG ‐‐‐
No DNS response to domain ‐
%s
1239 5.9.0 ‐‐‐ Security Services DEBUG ‐‐‐
RBL DNS server responded with
error code ‐ %s
1239 6.0.5 ‐‐‐ Security Services DEBUG ‐‐‐
RBL DNS server responded with
error code ‐ %s
1239 6.2.0 ‐‐‐ Security Services DEBUG ‐‐‐
RBL DNS server responded with
error code ‐ %s
1240 5.9.0 ‐‐‐ ‐‐‐ INFO ‐‐‐ %s
1240 6.0.5 ‐‐‐ ‐‐‐ INFO ‐‐‐ %s
1240 6.2.0 ‐‐‐ ‐‐‐ INFO ‐‐‐ %s
1241 5.9.0 ‐‐‐ ‐‐‐ WARNING ‐‐‐ %s
1241 6.0.5 ‐‐‐ ‐‐‐ WARNING ‐‐‐ %s
1241 6.2.0 ‐‐‐ ‐‐‐ WARNING ‐‐‐ %s
1242 5.9.0 ‐‐‐ ‐‐‐ WARNING ‐‐‐ %s
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 145
1242 6.0.5 ‐‐‐ ‐‐‐ WARNING ‐‐‐ %s
1242 6.2.0 ‐‐‐ ‐‐‐ WARNING ‐‐‐ %s
1243 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
User login Failed ‐ An error has
occurred while sending your
one‐time password
1243 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
User login Failed ‐ An error has
occurred while sending your
one‐time password
1243 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
User login Failed ‐ An error has
occurred while sending your
one‐time password
1244 5.9.0 ‐‐‐ RADIUS WARNING ‐‐‐
Failed to add an LDAP mirror
user group
1244 6.0.5 ‐‐‐ RADIUS WARNING ‐‐‐
Failed to add an LDAP mirror
user group
1244 6.2.0 ‐‐‐ RADIUS WARNING ‐‐‐
Failed to add an LDAP mirror
user group
1245 5.9.0 ‐‐‐ RADIUS WARNING ‐‐‐
Failed to add a member to an
LDAP mirror user group
1245 6.0.5 ‐‐‐ RADIUS WARNING ‐‐‐
Failed to add a member to an
LDAP mirror user group
1245 6.2.0 ‐‐‐ RADIUS WARNING ‐‐‐
Failed to add a member to an
LDAP mirror user group
1246 5.9.0 ‐‐‐ RADIUS WARNING ‐‐‐
An LDAP user group nesting is
not being mirrored
1246 6.0.5 ‐‐‐ RADIUS WARNING ‐‐‐
An LDAP user group nesting is
not being mirrored
1246 6.2.0 ‐‐‐ RADIUS WARNING ‐‐‐
An LDAP user group nesting is
not being mirrored
1247 5.9.0 ‐‐‐ Firewall Hardware ALERT 17001
Physical interface utilization is
greater than 80% of the maxi‐
mum rated tolerance(for the
interface)for more than 10 sec‐
onds.
1247 6.0.5 ‐‐‐ Firewall Hardware ALERT 17001
Physical interface utilization is
greater than 80% of the maxi‐
mum rated tolerance(for the
interface)for more than 10 sec‐
onds.
146 |
1247 6.2.0 ‐‐‐ Firewall Hardware ALERT 17001
Physical interface utilization is
greater than 80% of the maxi‐
mum rated tolerance(for the
interface)for more than 10 sec‐
onds.
1248 5.9.0 ‐‐‐ Firewall Hardware ALERT 17002
CPU reaches 80% utilization for
more than 10 seconds.
1248 6.0.5 ‐‐‐ Firewall Hardware ALERT 17002
CPU reaches 80% utilization for
more than 10 seconds.
1248 6.2.0 ‐‐‐ Firewall Hardware ALERT 17002
CPU reaches 80% utilization for
more than 10 seconds.
1249 5.9.0 ‐‐‐ Firewall Hardware ALERT 17003
Current session count is more
than 50% of the supported
maximum.
1249 6.0.5 ‐‐‐ Firewall Hardware ALERT 17003
Current session count is more
than 50% of the supported
maximum.
1249 6.2.0 ‐‐‐ Firewall Hardware ALERT 17003
Current session count is more
than 50% of the supported
maximum.
1250 5.9.0 ‐‐‐ Firewall Hardware ALERT 17004
Current dynamic NAT transla‐
tion count is more than 50% of
the configured maximum.
1250 6.0.5 ‐‐‐ Firewall Hardware ALERT 17004
Total firewall throughput is
greater than 50% of the maxi‐
mum rated tolerance for more
than 10 seconds.
1250 6.2.0 ‐‐‐ Firewall Hardware ALERT 17004
Current dynamic NAT transla‐
tion count is more than 50% of
the configured maximum.
1251 5.9.0 ‐‐‐ Firewall Hardware ALERT 17005
Total firewall throughput is
greater than 50% of the maxi‐
mum rated tolerance for more
than 10 seconds.
1251 6.0.5 ‐‐‐ Firewall Hardware ALERT 17005
Current dynamic NAT transla‐
tion count is more than 50% of
the configured maximum.
1251 6.2.0 ‐‐‐ Firewall Hardware ALERT 17005
Total firewall throughput is
greater than 50% of the maxi‐
mum rated tolerance for more
than 10 seconds.
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 147
1252 5.9.0 ‐‐‐ VPN IKE INFO ‐‐‐
IPv6 VPN only support IKEv2
mode
1252 6.0.5 ‐‐‐ VPN IKE INFO ‐‐‐
IPv6 VPN only support IKEv2
mode
1252 6.2.0 ‐‐‐ VPN IKE INFO ‐‐‐
IPv6 VPN only support IKEv2
mode
1253 5.9.0 ‐‐‐ VPN IKE NOTICE ‐‐‐ IPv6 Tunnel packet dropped
1253 6.0.5 ‐‐‐ VPN IKE NOTICE ‐‐‐ IPv6 Tunnel packet dropped
1253 6.2.0 ‐‐‐ VPN IKE NOTICE ‐‐‐ IPv6 Tunnel packet dropped
1254 5.9.0 ‐‐‐ Network NOTICE ‐‐‐
ICMPv6 packet from LAN
dropped
1254 6.0.5 ‐‐‐ Network NOTICE ‐‐‐
ICMPv6 packet from LAN
dropped
1254 6.2.0 ‐‐‐ Network NOTICE ‐‐‐
ICMPv6 packet from LAN
dropped
1255 5.9.0 ‐‐‐ Network INFO ‐‐‐
ICMPv6 packet from LAN
allowed
1255 6.0.5 ‐‐‐ Network INFO ‐‐‐
ICMPv6 packet from LAN
allowed
1255 6.2.0 ‐‐‐ Network INFO ‐‐‐
ICMPv6 packet from LAN
allowed
1256 5.9.0 ‐‐‐ Network INFO ‐‐‐ ICMPv6 packet allowed
1256 6.0.5 ‐‐‐ Network INFO ‐‐‐ ICMPv6 packet allowed
1256 6.2.0 ‐‐‐ Network INFO ‐‐‐ ICMPv6 packet allowed
1257 5.9.0 ‐‐‐ Network NOTICE ‐‐‐
ICMPv6 packet dropped due to
policy
1257 6.0.5 ‐‐‐ Network NOTICE ‐‐‐
ICMPv6 packet dropped due to
policy
1257 6.2.0 ‐‐‐ Network NOTICE ‐‐‐
ICMPv6 packet dropped due to
policy
1258 5.9.0 ‐‐‐ ‐‐‐ DEBUG ‐‐‐ %s
1258 6.0.5 ‐‐‐ ‐‐‐ DEBUG ‐‐‐ %s
1258 6.2.0 ‐‐‐ ‐‐‐ DEBUG ‐‐‐ %s
1259 5.9.0 ‐‐‐ DHCP Server WARNING ‐‐‐
DHCPv6 lease file in the storage
is corrupted; read failed
1259 6.0.5 ‐‐‐ DHCP Server WARNING ‐‐‐
DHCPv6 lease file in the storage
is corrupted; read failed
1259 6.2.0 ‐‐‐ DHCP Server WARNING ‐‐‐
DHCPv6 lease file in the storage
is corrupted; read failed
148 |
1260 5.9.0 ‐‐‐ DHCP Server WARNING ‐‐‐
Failed to write DHCPv6 leases
to storage
1260 6.0.5 ‐‐‐ DHCP Server WARNING ‐‐‐
Failed to write DHCPv6 leases
to storage
1260 6.2.0 ‐‐‐ DHCP Server WARNING ‐‐‐
Failed to write DHCPv6 leases
to storage
1261 5.9.0 ‐‐‐ DHCP Server INFO ‐‐‐
DHCPv6 leases written to stor‐
age
1261 6.0.5 ‐‐‐ DHCP Server INFO ‐‐‐
DHCPv6 leases written to stor‐
age
1261 6.2.0 ‐‐‐ DHCP Server INFO ‐‐‐
DHCPv6 leases written to stor‐
age
1262 5.9.0 ‐‐‐ Network Access DEBUG ‐‐‐ YouTube for school enforced
1262 6.0.5 ‐‐‐ Network Access DEBUG ‐‐‐ YouTube for school enforced
1262 6.2.0 ‐‐‐ Network Access DEBUG ‐‐‐ YouTube for school enforced
1263 5.9.0 Maintenance AppServerEvent INFO ‐‐‐ AppFlow Server Event
1263 6.0.5 ‐‐‐ Unused INFO ‐‐‐ Appflow Server Event
1263 6.2.0 ‐‐‐ Unused INFO ‐‐‐ Appflow Server Event
1264 5.9.0 ‐‐‐
Bandwidth Opti‐
mization WARNING ‐‐‐
WLAN HTTP traffic not being
sent to WXA WebCache; zone
conflict
1264 6.0.5 ‐‐‐
Bandwidth Opti‐
mization WARNING ‐‐‐
WLAN HTTP traffic not being
sent to WXA WebCache; zone
conflict
1264 6.2.0 ‐‐‐
Bandwidth Opti‐
mization WARNING ‐‐‐
WLAN HTTP traffic not being
sent to WXA WebCache; zone
conflict
1265 5.9.0 ‐‐‐ Firewall Event WARNING ‐‐‐
SonicPoint association request
to License Manager failed: %s
1265 6.0.5 ‐‐‐ Firewall Event WARNING ‐‐‐
SonicPoint association request
to License Manager failed: %s
1265 6.2.0 ‐‐‐ Firewall Event WARNING ‐‐‐
SonicPoint association request
to License Manager failed: %s
1266 5.9.0 ‐‐‐ Firewall Event INFO ‐‐‐
SonicPoint association posted
successfully to License Manager
1266 6.0.5 ‐‐‐ Firewall Event INFO ‐‐‐
SonicPoint association posted
successfully to License Manager
1266 6.2.0 ‐‐‐ Firewall Event INFO ‐‐‐
SonicPoint association posted
successfully to License Manager
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 149
1267 5.9.0 User Activity VPN IKE DEBUG ‐‐‐ %s
1267 6.0.5 User Activity VPN IKE DEBUG ‐‐‐ %s
1267 6.2.0 User Activity VPN IKE DEBUG ‐‐‐ %s
1268 5.9.0
Firewall Set‐
tings Firewall Event NOTICE ‐‐‐ Firmware Update Failed
1268 6.0.5 ‐‐‐ ‐‐‐ NOTICE ‐‐‐ Firmware Update Failed
1268 6.2.0
Firewall Set‐
tings Firewall Event NOTICE ‐‐‐ Firmware Update Failed
1269 5.9.0
Firewall Set‐
tings Firewall Event NOTICE ‐‐‐ Firmware Update Success
1269 6.0.5 ‐‐‐ ‐‐‐ NOTICE ‐‐‐ Firmware Update Success
1269 6.2.0
Firewall Set‐
tings Firewall Event NOTICE ‐‐‐ Firmware Update Success
1270 5.9.0 Maintenance ‐‐‐ INFO ‐‐‐ Crypto DH test success
1270 6.0.5 Maintenance ‐‐‐ INFO ‐‐‐ Crypto DH test success
1270 6.2.0 Maintenance ‐‐‐ INFO ‐‐‐ Crypto DH test success
1271 5.9.0 Maintenance ‐‐‐ INFO ‐‐‐ Crypto Hmac‐MD5 test success
1271 6.0.5 Maintenance ‐‐‐ INFO ‐‐‐ Crypto Hmac‐MD5 test success
1271 6.2.0 Maintenance ‐‐‐ INFO ‐‐‐ Crypto Hmac‐MD5 test success
1272 5.9.0 Maintenance ‐‐‐ INFO ‐‐‐
Crypto hardware DES test suc‐
cess
1272 6.0.5 Maintenance ‐‐‐ INFO ‐‐‐
Crypto hardware DES test suc‐
cess
1272 6.2.0 Maintenance ‐‐‐ INFO ‐‐‐
Crypto hardware DES test suc‐
cess
1273 5.9.0 Maintenance ‐‐‐ INFO ‐‐‐ Crypto MD5 test success
1273 6.0.5 Maintenance ‐‐‐ INFO ‐‐‐ Crypto MD5 test success
1273 6.2.0 Maintenance ‐‐‐ INFO ‐‐‐ Crypto MD5 test success
1274 5.9.0 ‐‐‐ ‐‐‐ INFO ‐‐‐
Crypto SHA1 based DRNG KAT
test success
1274 6.0.5 ‐‐‐ ‐‐‐ INFO ‐‐‐
Crypto SHA1 based DRNG KAT
test success
1274 6.2.0 ‐‐‐ ‐‐‐ INFO ‐‐‐
Crypto SHA1 based DRNG KAT
test success
1275 5.9.0 Maintenance ‐‐‐ INFO ‐‐‐ Crypto Hmac‐Sha1 test success
1275 6.0.5 Maintenance ‐‐‐ INFO ‐‐‐ Crypto Hmac‐Sha1 test success
1275 6.2.0 Maintenance ‐‐‐ INFO ‐‐‐ Crypto Hmac‐Sha1 test success
150 |
1276 5.9.0 Maintenance ‐‐‐ INFO ‐‐‐
Crypto hardware 3DES test suc‐
cess
1276 6.0.5 Maintenance ‐‐‐ INFO ‐‐‐
Crypto hardware 3DES test suc‐
cess
1276 6.2.0 Maintenance ‐‐‐ INFO ‐‐‐
Crypto hardware 3DES test suc‐
cess
1277 5.9.0 Maintenance ‐‐‐ INFO ‐‐‐ Crypto DES test success
1277 6.0.5 Maintenance ‐‐‐ INFO ‐‐‐ Crypto DES test success
1277 6.2.0 Maintenance ‐‐‐ INFO ‐‐‐ Crypto DES test success
1278 5.9.0 Maintenance ‐‐‐ ERROR ‐‐‐ Crypto AES test failed
1278 6.0.5 Maintenance ‐‐‐ ERROR ‐‐‐ Crypto AES test failed
1278 6.2.0 Maintenance ‐‐‐ ERROR ‐‐‐ Crypto AES test failed
1279 5.9.0 Maintenance ‐‐‐ INFO ‐‐‐ Crypto AES test success
1279 6.0.5 Maintenance ‐‐‐ INFO ‐‐‐ Crypto AES test success
1279 6.2.0 Maintenance ‐‐‐ INFO ‐‐‐ Crypto AES test success
1280 5.9.0 Maintenance ‐‐‐ INFO ‐‐‐ Crypto DRBG test success
1280 6.0.5 Maintenance ‐‐‐ INFO ‐‐‐ Crypto DRBG test success
1280 6.2.0 Maintenance ‐‐‐ INFO ‐‐‐ Crypto DRBG test success
1281 5.9.0 Maintenance ‐‐‐ ERROR ‐‐‐ Crypto DRBG test failed
1281 6.0.5 Maintenance ‐‐‐ ERROR ‐‐‐ Crypto DRBG test failed
1281 6.2.0 Maintenance ‐‐‐ ERROR ‐‐‐ Crypto DRBG test failed
1282 5.9.0 Maintenance ‐‐‐ INFO ‐‐‐
Crypto Hmac‐Sha256 test suc‐
cess
1282 6.0.5 Maintenance ‐‐‐ INFO ‐‐‐
Crypto Hmac‐Sha256 test suc‐
cess
1282 6.2.0 Maintenance ‐‐‐ INFO ‐‐‐
Crypto Hmac‐Sha256 test suc‐
cess
1283 5.9.0 Maintenance ‐‐‐ ERROR ‐‐‐ Crypto Hmac‐Sha256 test failed
1283 6.0.5 Maintenance ‐‐‐ ERROR ‐‐‐ Crypto Hmac‐Sha256 test failed
1283 6.2.0 Maintenance ‐‐‐ ERROR ‐‐‐ Crypto Hmac‐Sha256 test failed
1284 5.9.0 Maintenance ‐‐‐ INFO ‐‐‐ Crypto RSA test success
1284 6.0.5 Maintenance ‐‐‐ INFO ‐‐‐ Crypto RSA test success
1284 6.2.0 Maintenance ‐‐‐ INFO ‐‐‐ Crypto RSA test success
1285 5.9.0 Maintenance ‐‐‐ INFO ‐‐‐ Crypto Sha1 test success
1285 6.0.5 Maintenance ‐‐‐ INFO ‐‐‐ Crypto Sha1 test success
1285 6.2.0 Maintenance ‐‐‐ INFO ‐‐‐ Crypto Sha1 test success
1286 5.9.0 Maintenance ‐‐‐ INFO ‐‐‐ Crypto Sha256 test success
1286 6.0.5 Maintenance ‐‐‐ INFO ‐‐‐ Crypto Sha256 test success
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 151
1286 6.2.0 Maintenance ‐‐‐ INFO ‐‐‐ Crypto Sha256 test success
1287 5.9.0 Maintenance ‐‐‐ ERROR ‐‐‐ Crypto Sha256 test failed
1287 6.0.5 Maintenance ‐‐‐ ERROR ‐‐‐ Crypto Sha256 test failed
1287 6.2.0 Maintenance ‐‐‐ ERROR ‐‐‐ Crypto Sha256 test failed
1288 5.9.0 Maintenance ‐‐‐ INFO ‐‐‐
Crypto hardware AES test suc‐
cess
1288 6.0.5 Maintenance ‐‐‐ INFO ‐‐‐
Crypto hardware AES test suc‐
cess
1288 6.2.0 Maintenance ‐‐‐ INFO ‐‐‐
Crypto hardware AES test suc‐
cess
1289 5.9.0 Maintenance ‐‐‐ INFO ‐‐‐
Crypto hardware DES with SHA
test success
1289 6.0.5 Maintenance ‐‐‐ INFO ‐‐‐
Crypto hardware DES with SHA
test success
1289 6.2.0 Maintenance ‐‐‐ INFO ‐‐‐
Crypto hardware DES with SHA
test success
1290 5.9.0 Maintenance ‐‐‐ INFO ‐‐‐
Crypto hardware 3DES with SHA
test success
1290 6.0.5 Maintenance ‐‐‐ INFO ‐‐‐
Crypto hardware 3DES with SHA
test success
1290 6.2.0 Maintenance ‐‐‐ INFO ‐‐‐
Crypto hardware 3DES with SHA
test success
1299 5.9.0 Maintenance ‐‐‐ ALERT ‐‐‐
Ndpp SelfTest write/read
encrypt/decrypt successsfully
1299 6.0.5 Maintenance ‐‐‐ ALERT ‐‐‐
Ndpp SelfTest write/read
encrypt/decrypt successsfully
1299 6.2.0 Maintenance ‐‐‐ ALERT ‐‐‐
Ndpp SelfTest write/read
encrypt/decrypt successsfully
1300 5.9.0 Maintenance ‐‐‐ ALERT ‐‐‐
Ndpp SelfTest write/read
encrypt/decrypt failure
1300 6.0.5 Maintenance ‐‐‐ ALERT ‐‐‐
Ndpp SelfTest write/read
encrypt/decrypt failure
1300 6.2.0 Maintenance ‐‐‐ ALERT ‐‐‐
Ndpp SelfTest write/read
encrypt/decrypt failure
1301 5.9.0 Debug Network Access ALERT ‐‐‐
Source or Destination IPv6
address is reserved by RFC
4291. Packet is dropped
152 |
1301 6.0.5 Debug Network Access ALERT ‐‐‐
Source or Destination IPv6
address is reserved by RFC
4291. Packet is dropped
1301 6.2.0 Debug Network Access ALERT ‐‐‐
Source or Destination IPv6
address is reserved by RFC
4291. Packet is dropped
1302 5.9.0 Debug Network Access ALERT ‐‐‐
Destination IPv6 address is
unspecified. Packet is dropped
1302 6.0.5 Debug Network Access ALERT ‐‐‐
Destination IPv6 address is
unspecified. Packet is dropped
1302 6.2.0 Debug Network Access ALERT ‐‐‐
Destination IPv6 address is
unspecified. Packet is dropped
1303 5.9.0 Debug Network Access ALERT ‐‐‐
Source IPv6 address is unspeci‐
fied but this packet is not
Neighbor Solicitation message
for DAD. Packet is dropped
1303 6.0.5 Debug Network Access ALERT ‐‐‐
Source IPv6 address is unspeci‐
fied but this packet is not
Neighbor Solicitation message
for DAD. Packet is dropped
1303 6.2.0 Debug Network Access ALERT ‐‐‐
Source IPv6 address is unspeci‐
fied but this packet is not
Neighbor Solicitation message
for DAD. Packet is dropped
1304 5.9.0 Debug Network Access ALERT ‐‐‐
Packet is dropped due to NDPP
rules.
1304 6.0.5 Debug Network Access ALERT ‐‐‐
Packet is dropped due to NDPP
rules.
1304 6.2.0 Debug Network Access ALERT ‐‐‐
Packet is dropped due to NDPP
rules.
1305 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder : VPN Policy for
IKE ID not found
1305 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder : VPN Policy for
IKE ID not found
1305 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder : VPN Policy for
IKE ID not found
1306 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder : VPN Policy for
gateway address not found
1306 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Responder : VPN Policy for
gateway address not found
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 153
1306 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Responder : VPN Policy for
gateway address not found
1307 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Initiator : VPN Policy for IKE
ID not found
1307 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Initiator : VPN Policy for IKE
ID not found
1307 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Initiator : VPN Policy for IKE
ID not found
1308 5.9.0 User Activity VPN IKE WARNING ‐‐‐
IKE Initiator : VPN Policy for
gateway address not found
1308 6.0.5 User Activity VPN IKE WARNING ‐‐‐
IKE Initiator : VPN Policy for
gateway address not found
1308 6.2.0 User Activity VPN IKE WARNING ‐‐‐
IKE Initiator : VPN Policy for
gateway address not found
1309 5.9.0 ‐‐‐ Firewall Event WARNING ‐‐‐
HA association request to
License Manager failed: %s
1309 6.0.5 ‐‐‐ Firewall Event WARNING ‐‐‐
HA association request to
License Manager failed: %s
1309 6.2.0 ‐‐‐ Firewall Event WARNING ‐‐‐
HA association request to
License Manager failed: %s
1310 5.9.0 ‐‐‐ Firewall Event INFO ‐‐‐
HA association posted success‐
fully to License Manager
1310 6.0.5 ‐‐‐ Firewall Event INFO ‐‐‐
HA association posted success‐
fully to License Manager
1310 6.2.0 ‐‐‐ Firewall Event INFO ‐‐‐
HA association posted success‐
fully to License Manager
1311 5.9.0 ‐‐‐ DHCP Server ALERT ‐‐‐
DHCP Server: Resources of this
pool ran out. Client Info: %s
1311 6.0.5 ‐‐‐ DHCP Server ALERT ‐‐‐
DHCP Server: Resources of this
pool ran out. Client Info: %s
1311 6.2.0 ‐‐‐ DHCP Server ALERT ‐‐‐
DHCP Server: Resources of this
pool ran out. Client Info: %s
1312 5.9.0 ‐‐‐ VPN IKE INFO ‐‐‐
IKEv2: Peer's IP Version of Traf‐
fic Selector does not match with
ours
1312 6.0.5 ‐‐‐ VPN IKE INFO ‐‐‐
IKEv2: Peer's IP Version of Traf‐
fic Selector does not match with
ours
154 |
1312 6.2.0 ‐‐‐ VPN IKE INFO ‐‐‐
IKEv2: Peer's IP Version of Traf‐
fic Selector does not match with
ours
1313 5.9.0 ‐‐‐ ‐‐‐ INFO ‐‐‐ NAT policy added
1313 6.0.5 ‐‐‐ ‐‐‐ INFO ‐‐‐ NAT policy added
1313 6.2.0 ‐‐‐ ‐‐‐ INFO ‐‐‐ NAT policy added
1314 5.9.0 ‐‐‐ ‐‐‐ INFO ‐‐‐ NAT policy modified
1314 6.0.5 ‐‐‐ ‐‐‐ INFO ‐‐‐ NAT policy modified
1314 6.2.0 ‐‐‐ ‐‐‐ INFO ‐‐‐ NAT policy modified
1315 5.9.0 ‐‐‐ ‐‐‐ INFO ‐‐‐ NAT policy deleted
1315 6.0.5 ‐‐‐ ‐‐‐ INFO ‐‐‐ NAT policy deleted
1315 6.2.0 ‐‐‐ ‐‐‐ INFO ‐‐‐ NAT policy deleted
1316 5.9.0 ‐‐‐ Network ALERT ‐‐‐
Possible ARP attack from MAC
address %s
1316 6.0.5 ‐‐‐ Network ALERT ‐‐‐
Possible ARP attack from MAC
address %s
1316 6.2.0 ‐‐‐ Network ALERT ‐‐‐
Possible ARP attack from MAC
address %s
1317 5.9.0 ‐‐‐ Firewall Hardware ALERT 5426 %s
1317 6.0.5 ‐‐‐ Firewall Hardware ALERT 5426 %s
1317 6.2.0 ‐‐‐ Firewall Hardware ALERT 5426 %s
1318 5.9.0 ‐‐‐ Firewall Hardware ALERT 5427 %s
1318 6.0.5 ‐‐‐ Firewall Hardware ALERT 5427 %s
1318 6.2.0 ‐‐‐ Firewall Hardware ALERT 5427 %s
1319 5.9.0 ‐‐‐ Firewall Hardware ALERT 5428 %s
1319 6.0.5 ‐‐‐ Firewall Hardware ALERT 5428 %s
1319 6.2.0 ‐‐‐ Firewall Hardware ALERT 5428 %s
1320 5.9.0 ‐‐‐ Firewall Hardware ALERT 5429 %s
1320 6.0.5 ‐‐‐ Firewall Hardware ALERT 5429 %s
1320 6.2.0 ‐‐‐ Firewall Hardware ALERT 5429 %s
1321 5.9.0 ‐‐‐ Firewall Hardware ALERT 5430 %s
1321 6.0.5 ‐‐‐ Firewall Hardware ALERT 5430 %s
1321 6.2.0 ‐‐‐ Firewall Hardware ALERT 5430 %s
1322 5.9.0 ‐‐‐ Firewall Hardware ALERT 5431 %s
1322 6.0.5 ‐‐‐ Firewall Hardware ALERT 5431 %s
1322 6.2.0 ‐‐‐ Firewall Hardware ALERT 5431 %s
1323 5.9.0 ‐‐‐ Firewall Hardware ALERT 5432 %s
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 155
1323 6.0.5 ‐‐‐ Firewall Hardware ALERT 5432 %s
1323 6.2.0 ‐‐‐ Firewall Hardware ALERT 5432 %s
1324 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received Dead Peer
Detection Request
1324 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received Dead Peer
Detection Request
1324 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received Dead Peer
Detection Request
1325 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received Dead Peer
Detection Response
1325 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received Dead Peer
Detection Response
1325 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received Dead Peer
Detection Response
1326 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Send Dead Peer Detection
Request
1326 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Send Dead Peer Detection
Request
1326 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Send Dead Peer Detection
Request
1327 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Send Dead Peer Detection
Response
1327 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Send Dead Peer Detection
Response
1327 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Send Dead Peer Detection
Response
1328 5.9.0 User Activity VPN IKE INFO ‐‐‐ IKEv2 Send Invalid SPI Request
1328 6.0.5 User Activity VPN IKE INFO ‐‐‐ IKEv2 Send Invalid SPI Request
1328 6.2.0 User Activity VPN IKE INFO ‐‐‐ IKEv2 Send Invalid SPI Request
1329 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received Invalid SPI
Request
1329 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received Invalid SPI
Request
1329 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received Invalid SPI
Request
1330 5.9.0 User Activity VPN IKE INFO ‐‐‐ IKEv2 Send Invalid SPI Response
1330 6.0.5 User Activity VPN IKE INFO ‐‐‐ IKEv2 Send Invalid SPI Response
1330 6.2.0 User Activity VPN IKE INFO ‐‐‐ IKEv2 Send Invalid SPI Response
156 |
1331 5.9.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received Invalid SPI
Response
1331 6.0.5 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received Invalid SPI
Response
1331 6.2.0 User Activity VPN IKE INFO ‐‐‐
IKEv2 Received Invalid SPI
Response
1332 5.9.0 Maintenance Firewall Event ALERT ‐‐‐ NDPP mode is changed to %s
1332 6.0.5 Maintenance Firewall Event ALERT ‐‐‐ NDPP mode is changed to %s
1332 6.2.0 Maintenance Firewall Event ALERT ‐‐‐ NDPP mode is changed to %s
1333 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐ %s
1333 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐ %s
1333 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐ %s
1334 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐ %s
1334 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐ %s
1334 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐ %s
1335 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐ %s
1335 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐ %s
1335 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐ %s
1336 5.9.0
Firewall Set‐
tings Firewall Event INFO ‐‐‐ Certification %s
1336 6.0.5
Firewall Set‐
tings Firewall Event INFO ‐‐‐ Certification %s
1336 6.2.0
Firewall Set‐
tings Firewall Event INFO ‐‐‐ Certification %s
1337 5.9.0
Firewall Set‐
tings Firewall Event INFO ‐‐‐ %s
1337 6.0.5
Firewall Set‐
tings Firewall Event INFO ‐‐‐ %s
1337 6.2.0
Firewall Set‐
tings Firewall Event INFO ‐‐‐ %s
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 157
1338 5.9.0
Firewall Set‐
tings Firewall Event INFO ‐‐‐ User %s password is changed
1338 6.0.5
Firewall Set‐
tings Firewall Event INFO ‐‐‐ User %s password is changed
1338 6.2.0
Firewall Set‐
tings Firewall Event INFO ‐‐‐ User %s password is changed
1339 5.9.0
Firewall Set‐
tings Firewall Event INFO ‐‐‐ Password rule %s is changed
1339 6.0.5
Firewall Set‐
tings Firewall Event INFO ‐‐‐ Password rule %s is changed
1339 6.2.0
Firewall Set‐
tings Firewall Event INFO ‐‐‐ Password rule %s is changed
1340 5.9.0
Firewall Set‐
tings Firewall Event INFO ‐‐‐
User Inactive timeout is
changed to %s
1340 6.0.5
Firewall Set‐
tings Firewall Event INFO ‐‐‐
User Inactive timeout is
changed to %s
1340 6.2.0
Firewall Set‐
tings Firewall Event INFO ‐‐‐
User Inactive timeout is
changed to %s
1341 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐ %s
1341 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐ %s
1341 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐ %s
1342 5.9.0 User Activity
Authenticated
Access INFO ‐‐‐
Update administrator/user
lockout params ‐ %s
1342 6.0.5 User Activity
Authenticated
Access INFO ‐‐‐
Update administrator/user
lockout params ‐ %s
1342 6.2.0 User Activity
Authenticated
Access INFO ‐‐‐
Update administrator/user
lockout params ‐ %s
1343 5.9.0 User Activity VPN INFO ‐‐‐ VPN Policy %s
1343 6.0.5 User Activity VPN INFO ‐‐‐ VPN Policy %s
1343 6.2.0 User Activity VPN INFO ‐‐‐ VPN Policy %s
1344 5.9.0 System Error Firewall Event INFO ‐‐‐ %s
1344 6.0.5 System Error Firewall Event INFO ‐‐‐ %s
1344 6.2.0 System Error Firewall Event INFO ‐‐‐ %s
1345 5.9.0 ‐‐‐ Crypto Test INFO ‐‐‐ Crypto Sha384 test success
1345 6.0.5 ‐‐‐ Crypto Test INFO ‐‐‐ Crypto Sha384 test success
1345 6.2.0 ‐‐‐ Crypto Test INFO ‐‐‐ Crypto Sha384 test success
158 |
1346 5.9.0 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto Sha384 test failed
1346 6.0.5 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto Sha384 test failed
1346 6.2.0 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto Sha384 test failed
1347 5.9.0 ‐‐‐ Crypto Test INFO ‐‐‐ Crypto Sha512 test success
1347 6.0.5 ‐‐‐ Crypto Test INFO ‐‐‐ Crypto Sha512 test success
1347 6.2.0 ‐‐‐ Crypto Test INFO ‐‐‐ Crypto Sha512 test success
1348 5.9.0 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto Sha512 test failed
1348 6.0.5 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto Sha512 test failed
1348 6.2.0 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto Sha512 test failed
1349 5.9.0 ‐‐‐ Crypto Test INFO ‐‐‐ Crypto Ikev1 test success
1349 6.0.5 ‐‐‐ Crypto Test INFO ‐‐‐ Crypto Ikev1 test success
1349 6.2.0 ‐‐‐ Crypto Test INFO ‐‐‐ Crypto Ikev1 test success
1350 5.9.0 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto Ikev1 test failed
1350 6.0.5 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto Ikev1 test failed
1350 6.2.0 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto Ikev1 test failed
1351 5.9.0 ‐‐‐ Crypto Test INFO ‐‐‐ Crypto Ikev2 test success
1351 6.0.5 ‐‐‐ Crypto Test INFO ‐‐‐ Crypto Ikev2 test success
1351 6.2.0 ‐‐‐ Crypto Test INFO ‐‐‐ Crypto Ikev2 test success
1352 5.9.0 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto Ikev2 test failed
1352 6.0.5 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto Ikev2 test failed
1352 6.2.0 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto Ikev2 test failed
1353 5.9.0 ‐‐‐ Crypto Test INFO ‐‐‐ Crypto SSH test success
1353 6.0.5 ‐‐‐ Crypto Test INFO ‐‐‐ Crypto SSH test success
1353 6.2.0 ‐‐‐ Crypto Test INFO ‐‐‐ Crypto SSH test success
1354 5.9.0 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto SSH test failed
1354 6.0.5 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto SSH test failed
1354 6.2.0 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto SSH test failed
1355 5.9.0 ‐‐‐ Crypto Test INFO ‐‐‐ Crypto SNMP test success
1355 6.0.5 ‐‐‐ Crypto Test INFO ‐‐‐ Crypto SNMP test success
1355 6.2.0 ‐‐‐ Crypto Test INFO ‐‐‐ Crypto SNMP test success
1356 5.9.0 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto SNMP test failed
1356 6.0.5 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto SNMP test failed
1356 6.2.0 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto SNMP test failed
1357 5.9.0 ‐‐‐ Crypto Test INFO ‐‐‐ Crypto TLS 1.0/1.1 test success
1357 6.0.5 ‐‐‐ Crypto Test INFO ‐‐‐ Crypto TLS 1.0/1.1 test success
1357 6.2.0 ‐‐‐ Crypto Test INFO ‐‐‐ Crypto TLS 1.0/1.1 test success
1358 5.9.0 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto TLS 1.0/1.1 test failed
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 159
1358 6.0.5 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto TLS 1.0/1.1 test failed
1358 6.2.0 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto TLS 1.0/1.1 test failed
1359 5.9.0 ‐‐‐ Crypto Test INFO ‐‐‐
Crypto Hmac‐Sha384 test suc‐
cess
1359 6.0.5 ‐‐‐ Crypto Test INFO ‐‐‐
Crypto Hmac‐Sha384 test suc‐
cess
1359 6.2.0 ‐‐‐ Crypto Test INFO ‐‐‐
Crypto Hmac‐Sha384 test suc‐
cess
1360 5.9.0 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto Hmac‐Sha384 test failed
1360 6.0.5 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto Hmac‐Sha384 test failed
1360 6.2.0 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto Hmac‐Sha384 test failed
1361 5.9.0 ‐‐‐ Crypto Test INFO ‐‐‐
Crypto Hmac‐Sha512 test suc‐
cess
1361 6.0.5 ‐‐‐ Crypto Test INFO ‐‐‐
Crypto Hmac‐Sha512 test suc‐
cess
1361 6.2.0 ‐‐‐ Crypto Test INFO ‐‐‐
Crypto Hmac‐Sha512 test suc‐
cess
1362 5.9.0 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto Hmac‐Sha512 test failed
1362 6.0.5 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto Hmac‐Sha512 test failed
1362 6.2.0 ‐‐‐ Crypto Test ERROR ‐‐‐ Crypto Hmac‐Sha512 test failed
1363 5.9.0
802.11b Man‐
agement Wireless ALERT ‐‐‐ Wireless Flood Attack
1363 6.0.5
802.11b Man‐
agement Wireless ALERT ‐‐‐ Wireless Flood Attacking
1363 6.2.0
802.11b Man‐
agement Wireless ALERT ‐‐‐ Wireless Flood Attack
1364 5.9.0 ‐‐‐ VPN PKI ALERT ‐‐‐ Cert Payload processing failed
1364 6.0.5 ‐‐‐ VPN PKI ALERT ‐‐‐ Cert Payload processing failed
1364 6.2.0 ‐‐‐ VPN PKI ALERT ‐‐‐ Cert Payload processing failed
1365 5.9.0 ‐‐‐ DPI‐SSL NOTICE ‐‐‐ DPI‐SSL: %s
1365 6.0.5 ‐‐‐ DPI‐SSL NOTICE ‐‐‐ DPI‐SSL: %s
1365 6.2.0 ‐‐‐ DPI‐SSL NOTICE ‐‐‐ DPI‐SSL: %s
1366 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
TCP‐Flooding machine %s black‐
listed
1366 6.0.5 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
TCP‐Flooding machine %s black‐
listed
1366 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
TCP‐Flooding machine %s black‐
listed
160 |
1367 5.9.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
TCP Flood Blacklist on IF %s con‐
tinues
1367 6.0.5 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
TCP Flood Blacklist on IF %s con‐
tinues
1367 6.2.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
TCP Flood Blacklist on IF %s con‐
tinues
1368 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Machine %s removed from TCP
flood blacklist
1368 6.0.5 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Machine %s removed from TCP
flood blacklist
1368 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Machine %s removed from TCP
flood blacklist
1369 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐ Possible TCP Flood on IF %s
1369 6.0.5 Attack
Intrusion Detec‐
tion ALERT ‐‐‐ Possible TCP Flood on IF %s
1369 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐ Possible TCP Flood on IF %s
1370 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Possible TCP Flood on IF %s has
ceased
1370 6.0.5 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Possible TCP Flood on IF %s has
ceased
1370 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Possible TCP Flood on IF %s has
ceased
1371 5.9.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
Possible TCP Flood on IF %s con‐
tinues
1371 6.0.5 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
Possible TCP Flood on IF %s con‐
tinues
1371 6.2.0 Attack
Intrusion Detec‐
tion WARNING ‐‐‐
Possible TCP Flood on IF %s con‐
tinues
1372 5.9.0 ‐‐‐ RADIUS WARNING ‐‐‐
LDAP mirroring overflow: too
many user groups
1372 6.0.5 ‐‐‐ RADIUS WARNING ‐‐‐
LDAP mirroring overflow: too
many user groups
1372 6.2.0 ‐‐‐ RADIUS WARNING ‐‐‐
LDAP mirroring overflow: too
many user groups
1373 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
IPv6 fragment dropped, invalid
length (<1280 Bytes)
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 161
1373 6.0.5 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
IPv6 fragment dropped, invalid
length (<1280 Bytes)
1373 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
IPv6 fragment dropped, invalid
length (<1280 Bytes)
1374 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
IGMP packet dropped, incom‐
plete fragments
1374 6.0.5 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
IGMP packet dropped, incom‐
plete fragments
1374 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
IGMP packet dropped, incom‐
plete fragments
1375 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
UDP fragment dropped,
exceeds maximum IP datagram
size (>65535)
1375 6.0.5 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
UDP fragment dropped,
exceeds maximum IP datagram
size (>65535)
1375 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
UDP fragment dropped,
exceeds maximum IP datagram
size (>65535)
1376 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Nestea/Teardrop attack
dropped
1376 6.0.5 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Nestea/Teardrop attack
dropped
1376 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐
Nestea/Teardrop attack
dropped
1377 5.9.0 ‐‐‐ Anti‐Spam ALERT ‐‐‐
SHLO verification failed with
this client IP ‐ %s
1377 6.0.5 ‐‐‐ Anti‐Spam ALERT ‐‐‐
SHLO verification failed with
this client IP ‐ %s
1377 6.2.0 ‐‐‐ Anti‐Spam ALERT ‐‐‐
SHLO verification failed with
this client IP ‐ %s
1378 5.9.0 ‐‐‐ Anti‐Spam ALERT ‐‐‐
Possible replay attack with this
client IP ‐ %s
1378 6.0.5 ‐‐‐ Anti‐Spam ALERT ‐‐‐
Possible replay attack with this
client IP ‐ %s
1378 6.2.0 ‐‐‐ Anti‐Spam ALERT ‐‐‐
Possible replay attack with this
client IP ‐ %s
1379 5.9.0 ‐‐‐
Bandwidth Opti‐
mization WARNING ‐‐‐
WXA association request to
License Manager failed: %s
162 |
1379 6.0.5 ‐‐‐ Unused WARNING ‐‐‐
WXA association request to
License Manager failed: %s
1379 6.2.0 ‐‐‐
Bandwidth Opti‐
mization WARNING ‐‐‐
WXA association request to
License Manager failed: %s
1380 5.9.0 ‐‐‐
Bandwidth Opti‐
mization INFO ‐‐‐
WXA association posted suc‐
cessfully to License Manager
1380 6.0.5 ‐‐‐ Unused INFO ‐‐‐
WXA association posted suc‐
cessfully to License Manager
1380 6.2.0 ‐‐‐
Bandwidth Opti‐
mization INFO ‐‐‐
WXA association posted suc‐
cessfully to License Manager
1381 5.9.0 ‐‐‐ Security Services WARNING 15003
Received App‐Control Alert:
Your Application Control sub‐
scRIPtion has expired.
1381 6.0.5 ‐‐‐ Security Services WARNING 15003
Received App‐Control Alert:
Your Application Control sub‐
scRIPtion has expired.
1381 6.2.0 ‐‐‐ Security Services WARNING 15003
Received App‐Control Alert:
Your Application Control sub‐
scRIPtion has expired.
1382 5.9.0 User Activity Unused INFO 5609 Configuration succeeded: %s
1382 6.0.5 User Activity Unused INFO 5609 Configuration succeeded: %s
1382 6.2.0 User Activity Firewall Logging INFO 5609 Configuration succeeded: %s
1383 5.9.0 User Activity Unused INFO 5610 Configuration failed: %s
1383 6.0.5 User Activity Unused INFO 5610 Configuration failed: %s
1383 6.2.0 User Activity Firewall Logging INFO 5610 Configuration failed: %s
1384 5.9.0 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid Timestamps option
length; TCP packet dropped
1384 6.0.5 Debug Unused DEBUG ‐‐‐
TCP packet received with
invalid Timestamps option
length; TCP packet dropped
1384 6.2.0 Debug Network DEBUG ‐‐‐
TCP packet received with
invalid Timestamps option
length; TCP packet dropped
1385 5.9.0 Debug Network DEBUG ‐‐‐
TCP packet received with
wrapped sequence number;
TCP packet dropped
1385 6.0.5 Debug Unused DEBUG ‐‐‐
TCP packet received with
wrapped sequence number;
TCP packet dropped
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 163
1385 6.2.0 Debug Network DEBUG ‐‐‐
TCP packet received with
wrapped sequence number;
TCP packet dropped
1387 5.9.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐ TCP Null Flag dropped
1387 6.0.5 Attack
Intrusion Detec‐
tion ALERT ‐‐‐ TCP Null Flag dropped
1387 6.2.0 Attack
Intrusion Detec‐
tion ALERT ‐‐‐ TCP Null Flag dropped
1388 5.9.0 Attack VPN IPsec ALERT ‐‐‐ IPSec VPN Decryption Failed
1388 6.0.5 Attack VPN IPsec ALERT ‐‐‐ IPSec VPN Decryption Failed
1388 6.2.0 Attack VPN IPsec ALERT ‐‐‐ IPSec VPN Decryption Failed
1389 5.9.0 Maintenance Security Services INFO ‐‐‐
Access attempt from host with‐
out Client CF agent installed
1389 6.0.5 Maintenance Unused INFO ‐‐‐
Access attempt from host with‐
out Client CF agent installed
1389 6.2.0 Maintenance Security Services INFO ‐‐‐
Access attempt from host with‐
out Client CF agent installed
1390 5.9.0 Maintenance Security Services INFO ‐‐‐
Client CF agent out‐of‐date on
host
1390 6.0.5 Maintenance Unused INFO ‐‐‐
Client CF agent out‐of‐date on
host
1390 6.2.0 Maintenance Security Services INFO ‐‐‐
Client CF agent out‐of‐date on
host
1391 5.9.0 Attack Unused ALERT ‐‐‐ Packet Data
1391 6.0.5 Attack Unused ALERT ‐‐‐ Packet Data
1391 6.2.0 Attack Security Services ALERT ‐‐‐ Packet Data
1392 5.9.0 Maintenance Unused ALERT 5243 Blade up:%s
1392 6.0.5 Maintenance Firewall Event ALERT 5243 Blade up:%s
1392 6.2.0 Maintenance Unused ALERT 5243 Blade up:%s
1393 5.9.0 Maintenance Unused ALERT 5244 Blade down:%s
1393 6.0.5 Maintenance Firewall Event ALERT 5244 Blade down:%s
1393 6.2.0 Maintenance Unused ALERT 5244 Blade down:%s
1394 5.9.0 ‐‐‐
Bandwidth Opti‐
mization ERROR ‐‐‐ WXA Startup Failure ‐ %s
1394 6.0.5 ‐‐‐ Unused ERROR ‐‐‐ WXA Startup Failure ‐ %s
1394 6.2.0 ‐‐‐
Bandwidth Opti‐
mization ERROR ‐‐‐ WXA Startup Failure ‐ %s
164 |
1395 5.9.0 ‐‐‐
Bandwidth Opti‐
mization WARNING ‐‐‐ WXA Get Failure ‐ %s
1395 6.0.5 ‐‐‐ Unused WARNING ‐‐‐ WXA Get Failure ‐ %s
1395 6.2.0 ‐‐‐
Bandwidth Opti‐
mization WARNING ‐‐‐ WXA Get Failure ‐ %s
1396 5.9.0 ‐‐‐
Bandwidth Opti‐
mization NOTICE ‐‐‐ WXA Parse Failure ‐ %s
1396 6.0.5 ‐‐‐ Unused NOTICE ‐‐‐ WXA Parse Failure ‐ %s
1396 6.2.0 ‐‐‐
Bandwidth Opti‐
mization NOTICE ‐‐‐ WXA Parse Failure ‐ %s
1397 5.9.0 ‐‐‐
Bandwidth Opti‐
mization NOTICE ‐‐‐ WXA Register Failure ‐ %s
1397 6.0.5 ‐‐‐ Unused NOTICE ‐‐‐ WXA Register Failure ‐ %s
1397 6.2.0 ‐‐‐
Bandwidth Opti‐
mization NOTICE ‐‐‐ WXA Register Failure ‐ %s
1398 5.9.0 ‐‐‐
Bandwidth Opti‐
mization NOTICE ‐‐‐ WXA Unregister Failure ‐ %s
1398 6.0.5 ‐‐‐ Unused NOTICE ‐‐‐ WXA Unregister Failure ‐ %s
1398 6.2.0 ‐‐‐
Bandwidth Opti‐
mization NOTICE ‐‐‐ WXA Unregister Failure ‐ %s
1399 5.9.0 ‐‐‐
Bandwidth Opti‐
mization NOTICE ‐‐‐ WXA Probe Failure ‐ %s
1399 6.0.5 ‐‐‐ Unused NOTICE ‐‐‐ WXA Probe Failure ‐ %s
1399 6.2.0 ‐‐‐
Bandwidth Opti‐
mization NOTICE ‐‐‐ WXA Probe Failure ‐ %s
1400 5.9.0 ‐‐‐
Bandwidth Opti‐
mization ALERT ‐‐‐ WXA Create Failure ‐ %s
1400 6.0.5 ‐‐‐ Unused ALERT ‐‐‐ WXA Create Failure ‐ %s
1400 6.2.0 ‐‐‐
Bandwidth Opti‐
mization ALERT ‐‐‐ WXA Create Failure ‐ %s
1401 5.9.0 ‐‐‐
Bandwidth Opti‐
mization WARNING ‐‐‐ WXA Set Failure ‐ %s
1401 6.0.5 ‐‐‐ Unused WARNING ‐‐‐ WXA Set Failure ‐ %s
1401 6.2.0 ‐‐‐
Bandwidth Opti‐
mization WARNING ‐‐‐ WXA Set Failure ‐ %s
1402 5.9.0 ‐‐‐
Bandwidth Opti‐
mization ERROR ‐‐‐ WXA Delete Failure ‐ %s
1402 6.0.5 ‐‐‐ Unused ERROR ‐‐‐ WXA Delete Failure ‐ %s
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 165
1402 6.2.0 ‐‐‐
Bandwidth Opti‐
mization ERROR ‐‐‐ WXA Delete Failure ‐ %s
1403 5.9.0 ‐‐‐
Bandwidth Opti‐
mization INFO ‐‐‐ WXA Enable ‐ %s
1403 6.0.5 ‐‐‐ Unused INFO ‐‐‐ WXA Enable ‐ %s
1403 6.2.0 ‐‐‐
Bandwidth Opti‐
mization INFO ‐‐‐ WXA Enable ‐ %s
1404 5.9.0 ‐‐‐
Bandwidth Opti‐
mization INFO ‐‐‐ WXA Disable ‐ %s
1404 6.0.5 ‐‐‐ Unused INFO ‐‐‐ WXA Disable ‐ %s
1404 6.2.0 ‐‐‐
Bandwidth Opti‐
mization INFO ‐‐‐ WXA Disable ‐ %s
1405 5.9.0 ‐‐‐
Bandwidth Opti‐
mization WARNING ‐‐‐ WXA Request Failure ‐ %s
1405 6.0.5 ‐‐‐ Unused WARNING ‐‐‐ WXA Request Failure ‐ %s
1405 6.2.0 ‐‐‐
Bandwidth Opti‐
mization WARNING ‐‐‐ WXA Request Failure ‐ %s
1406 5.9.0 ‐‐‐ Unused INFO ‐‐‐
General DHCPv6 Client Informa‐
tion [%s]
1406 6.0.5 ‐‐‐ Unused INFO ‐‐‐
General DHCPv6 Client Informa‐
tion [%s]
1406 6.2.0 ‐‐‐ DHCP Client INFO ‐‐‐
General DHCPv6 Client Informa‐
tion [%s]
1407 5.9.0 ‐‐‐ Unused DEBUG ‐‐‐
DHCPv6 Client sent message
[%s]
1407 6.0.5 ‐‐‐ Unused DEBUG ‐‐‐
DHCPv6 Client sent message
[%s]
1407 6.2.0 ‐‐‐ DHCP Client DEBUG ‐‐‐
DHCPv6 Client sent message
[%s]
1408 5.9.0 ‐‐‐ Unused DEBUG ‐‐‐
DHCPv6 Client received mes‐
sage [%s]
1408 6.0.5 ‐‐‐ Unused DEBUG ‐‐‐
DHCPv6 Client received mes‐
sage [%s]
1408 6.2.0 ‐‐‐ DHCP Client DEBUG ‐‐‐
DHCPv6 Client received mes‐
sage [%s]
1409 5.9.0 ‐‐‐ Unused DEBUG ‐‐‐
DHCPv6 Client Duplicate
Address Detection [%s]
1409 6.0.5 ‐‐‐ Unused DEBUG ‐‐‐
DHCPv6 Client Duplicate
Address Detection [%s]
166 |
1409 6.2.0 ‐‐‐ DHCP Client DEBUG ‐‐‐
DHCPv6 Client Duplicate
Address Detection [%s]
1410 5.9.0 ‐‐‐ Unused DEBUG ‐‐‐
DHCPv6 Client waiting reply
timeout [%s]
1410 6.0.5 ‐‐‐ Unused DEBUG ‐‐‐
DHCPv6 Client waiting reply
timeout [%s]
1410 6.2.0 ‐‐‐ DHCP Client DEBUG ‐‐‐
DHCPv6 Client waiting reply
timeout [%s]
1411 5.9.0 ‐‐‐ Unused DEBUG ‐‐‐ Router Advertisement flags [%s]
1411 6.0.5 ‐‐‐ Unused DEBUG ‐‐‐ Router Advertisement flags [%s]
1411 6.2.0 ‐‐‐ DHCP Client DEBUG ‐‐‐ Router Advertisement flags [%s]
1412 5.9.0 ‐‐‐ Unused INFO ‐‐‐
DHCPv6 Client got a new lease
[%s]
1412 6.0.5 ‐‐‐ Unused INFO ‐‐‐
DHCPv6 Client got a new lease
[%s]
1412 6.2.0 ‐‐‐ DHCP Client INFO ‐‐‐
DHCPv6 Client got a new lease
[%s]
1413 5.9.0 ‐‐‐ Unused INFO ‐‐‐
DHCPv6 Client released lease
[%s]
1413 6.0.5 ‐‐‐ Unused INFO ‐‐‐
DHCPv6 Client released lease
[%s]
1413 6.2.0 ‐‐‐ DHCP Client INFO ‐‐‐
DHCPv6 Client released lease
[%s]
1414 5.9.0 ‐‐‐ Unused INFO ‐‐‐
DHCPv6 Server assigned lease
%s
1414 6.0.5 ‐‐‐ Unused INFO ‐‐‐
DHCPv6 Server assigned lease
%s
1414 6.2.0 ‐‐‐ DHCP Server INFO ‐‐‐
DHCPv6 Server assigned lease
%s
1415 5.9.0 ‐‐‐ Unused INFO ‐‐‐
DHCPv6 Server released lease
%s
1415 6.0.5 ‐‐‐ Unused INFO ‐‐‐
DHCPv6 Server released lease
%s
1415 6.2.0 ‐‐‐ DHCP Server INFO ‐‐‐
DHCPv6 Server released lease
%s
1416 5.9.0 ‐‐‐ Unused INFO ‐‐‐
DHCPv6 Server received
DHCPv6 Decline from client %s
1416 6.0.5 ‐‐‐ Unused INFO ‐‐‐
DHCPv6 Server received
DHCPv6 Decline from client %s
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 167
1416 6.2.0 ‐‐‐ DHCP Server INFO ‐‐‐
DHCPv6 Server received
DHCPv6 Decline from client %s
1417 5.9.0 ‐‐‐ Unused WARNING ‐‐‐
DHCPv6 Server: Resources of
this pool ran out. Client Info: %s
1417 6.0.5 ‐‐‐ Unused WARNING ‐‐‐
DHCPv6 Server: Resources of
this pool ran out. Client Info: %s
1417 6.2.0 ‐‐‐ DHCP Server WARNING ‐‐‐
DHCPv6 Server: Resources of
this pool ran out. Client Info: %s
1418 5.9.0 ‐‐‐ Unused INFO ‐‐‐
DHCPv6 Server: Add a new
scope (%s)
1418 6.0.5 ‐‐‐ Unused INFO ‐‐‐
DHCPv6 Server: Add a new
scope (%s)
1418 6.2.0 ‐‐‐ DHCP Server INFO ‐‐‐
DHCPv6 Server: Add a new
scope (%s)
1419 5.9.0 ‐‐‐ Unused INFO ‐‐‐
DHCPv6 Server: Delete scope
(%s)
1419 6.0.5 ‐‐‐ Unused INFO ‐‐‐
DHCPv6 Server: Delete scope
(%s)
1419 6.2.0 ‐‐‐ DHCP Server INFO ‐‐‐
DHCPv6 Server: Delete scope
(%s)
1420 5.9.0 ‐‐‐ Unused DEBUG ‐‐‐
DHCPv6 Server received mes‐
sage (%s)
1420 6.0.5 ‐‐‐ Unused DEBUG ‐‐‐
DHCPv6 Server received mes‐
sage (%s)
1420 6.2.0 ‐‐‐ DHCP Server DEBUG ‐‐‐
DHCPv6 Server received mes‐
sage (%s)
1421 5.9.0 ‐‐‐ Unused DEBUG ‐‐‐
DHCPv6 Server sent message
(%s)
1421 6.0.5 ‐‐‐ Unused DEBUG ‐‐‐
DHCPv6 Server sent message
(%s)
1421 6.2.0 ‐‐‐ DHCP Server DEBUG ‐‐‐
DHCPv6 Server sent message
(%s)
1422 5.9.0 ‐‐‐ Unused WARNING ‐‐‐
IPv6 address conflict detected
from Ethernet address %s
1422 6.0.5 ‐‐‐ Unused WARNING ‐‐‐
IPv6 address conflict detected
from Ethernet address %s
1422 6.2.0 ‐‐‐ Network WARNING ‐‐‐
IPv6 address conflict detected
from Ethernet address %s
168 |
Log > SyslogIn addition to the standard event log, the Dell SonicWALL security appliance can send a detailed log to an external Syslog server. The Dell SonicWALL Syslog captures all log activity and includes every connection source and destination IP address, IP service, and number of bytes transferred. Syslog Analyzers such as Dell SonicWALL ViewPoint, Analyzer, or WebTrends Firewall Suite can be used to sort, analyze, and graph the Syslog data.
For more information on configuring the Log > Syslog page, refer to the SonicOS Administrator’s Guide.
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 169
Index of Syslog Tag Field DescriptionsThis section provides an alphabetical listing of Syslog tags and the associated field descrip-tion. For more information about the “pri” Syslog Tag, see Table 3: Priority Level on page 182. The value here is taken from the “Priority Level” column of the Index of Log Event Messages on page 2. For more information about the “c” Syslog Tag, see Legacy Category on page 178.
TagTags for Arc-
SightField Description
<ddd>Syslog message prefix
The beginning of each syslog message has a string of the form <ddd> where ddd is a decimal number indicating facility and priority of the message
af_polid Application FilterDisplays the Application Filter Policy ID
af_policy Application Filter Displays the Application Policy name
af_type Application Filter
Displays the Application Policy type such as:
SMTP Client Request
HTTP Client Request
HTTP Server Response
FTP Client Request
FTP Client Upload File
FTP Client Download File
POP3 Client Request
POP3 Server Response
FTP Data Transfer
IPS Content
App Control Content
Custom Policy Type
CFS
af_service Application FilterDisplays the Application Policy service name
170 |
af_action Application Filter
Displays the Application Policy action such as
HTTP Block Page
HTTP Redirect
Bandwidth Management
Disable E-Mail Attachment
FTP Notification Reply
Reset/Drop
Block SMTP E-Mail
Bypass DPI
CFS Block Page
Packet Monitor
af_objectApplication policy object name
Displays the custom Application Policy object name
aiActive Interface via GMS heartbeat
Displays the Active WAN Interface. Normally it is Primary WAN but in a failover, it displays the value of the failover default outbound WAN interface, if there’s more than one WAN. When there is only one WAN interface, it is always Primary WAN regardless of the link state
app appNumeric applica-tion ID
Indicates the application for the applied syslog. Only displays when Flow Reporting is enabled.
appcat appcatApplication Con-trol
Display the application category when Application Control is enabled
appid appid Application IDDisplay the application ID when Appli-cation Control is enabled
appNameNon-Signature Application Name
Indicates the non-signature Application Name that matches the Application ID “app” or “f” of the Syslog.
arg arg URLUsed to render a URL: arg represents the URL path name part
bcastRx bcastRxInterface statis-tics report
Displays the broadcast packets received
bcastTx bcastTxInterface statis-tics report
Displays the broadcast packets trans-mitted
bytesRx bytesRxInterface statis-tics report
Displays the bytes received
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 171
bytesTx bytesTxInterface statis-tics report
Displays the bytes transmitted
c catMessage cate-gory (legacy only)
Indicates the legacy category number (Note: We are not currently sending new category information.)
category category Blocking code description
Applicable only when CFS is enabled, indicates the category of the blocked content such as “Gambling”. This works in conjunction with “code” Blocking code.
catid Rule category Indicates the category ID of the rule
cdur cn3LabelConnection Duration
Displays the connection duration
changeSWGMSchan-geUrl
Configuration change webpage
Displays the basename of the firewall web page that performed the last con-figuration change
code reason Blocking code Indicates the CFS block code category
icmpCode cn2ICMP type and code
Indicates the ICMP code
connsFirewall status report via GMS heartbeat
Indicates the number of connections in use
contentOb-ject
Application Filter Indicates rule name
cs4Interface Statis-tics
Display interface statistics
deviceOut-boundInterface
InterfaceIndicates interface on which the packet leaves the device
deviceInbound-Interface
InterfaceIndicates interface on which the packet enters the device
dpt Port Display destination port
dnpt NAT’ed Port Display NAT’ed destination port
dst dst DestinationDestination IP address, and optionally, port, network interface, and resolved name.
dstV6 dst DestinationDestination IPv6 address, and option-ally, port, network interface, and resolved name.
172 |
dstname request URLDisplays the URL of accessed Web-sites and hosts
dstname dstname NotesIndicates additional information such as description of forbidden/deleted email attachments
dstZonecs4Label (desti-nation)
Destination zone name
Displays destination zone
dur cs6labelNumeric, ses-sion duration in seconds
Indicates the duration in units of sec-onds that a session is connected
dynFirewall status report via GMS heartbeat
Displays the HA and dialup connection state (rendered as “h.d” where “h” is “n” (not enabled), “b” (backup), or “p” (pri-mary) and “d” is “1” (enabled) or “0” (disabled))
f flowTypeNumeric flow type
Indicates the flow type when Flow Reporting is disabled
fw Firewall WAN IP Indicates the WAN IP Address
fwlanFirewall status report via GMS heartbeat
Indicates the LAN zone IP address
gcat gcat Group categoryDisplay event group category when using Enhanced Syslog
goodRx-Bytes
goodRxBytesSonicPoint statis-tics report
Indicates the well formed bytes received
goodTx-Bytes
goodTxBytesSonicPoint statis-tics report
Indicates the well formed bytes trans-mitted
iFirewall status report via GMS heartbeat
Displays the GMS message interval in seconds
id=firewallWebTrends pre-fix
Syntactic sugar for WebTrends (and GMS by habit)
if ifInterface statis-tics report
Displays the interface on which statis-tics are reported
ipscat ipscat IPS message Displays the IPS category
ipspri ipspri IPS message Displays the IPS priority
licFirewall status report via GMS heartbeat
Indicates the number of licenses for firewalls with limited modes
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 173
m Message ID Provides the message ID number
mac smac or dmac MAC addressProvides the source or destination MAC address
mailFrom Email sender Originator of the email
msg msg Message
Displays the message which is com-posed of either or both a predefined message and a dynamic message con-taining a string %s or numeric %d argu-ment
n cnt Message countIndicates the number of times event occurs
natDst cs2Label NAT destination IP
Displays the NAT’ed destination IP address
natDstV6 cs2Label NAT destination IPv6
Displays the NAT’ed destination IPv6 address
natSrc cs1Label NAT source IP Displays the NAT’ed source IP address
natSrcV6 cs1Label NAT source IPv6Displays the NAT’ed source IPv6 address
note cs6 Additional Information
Additional information that is application-dependent
npcs cs5 URL
Applicable only when Network Packet Capture System (NPCS Solera) is enabled, displays URL of an NPCS object
op requestMethod HTTP OP codeDisplays the HTTP operation (GET, POST, etc.) of web site hit
pri Message priorityDisplays the event priority level (0=emergency..7=debug)
proto protoProtocol and ser-vice
Displays the protocol information (ren-dered as “proto=[protocol]” or just “[proto]/[service]”)
ptFirewall status report via GMS heartbeat
Displays the HTTP/HTTPS manage-ment port (rendered as “hhh.sss”)
radio radioSonicPoint statis-tics report
Displays the SonicPoint radio on which event occurred
rcptTo recipient Indicates the email recipient
174 |
rcvd in Bytes receivedIndicates the number of bytes received within connection
result outcomeHTTP Result code
Displays the HTTP result code (200, 403, etc.) of web site hit
rpkt cn1Label Packet received Display the number of packet received
rule cs1 Rule IDDisplays the Access Rule number causing packet drop. The policy index includes Address Object names
sent out Bytes sentDisplays the number of bytes sent within connection
sess cs5LabelPre-defined string indicating session type
Applies to syslogs with an associated user session being tracked by the UTM
sid sidIPS or Anti-Spy-ware message
Provides either IPS or Anti-Spyware signature ID
snFirewall serial number
Indicates the device serial number
spkt cn2Label Packet sent Display the number of packets sent
spt Port Displays source port
spycat spycatAnti-Spyware message
Displays the Anti-Spyware category
spypri spypriAnti-Spyware message
Displays the Anti-Spyware priority
snpt NAT source port Display NAT’ed source port
src src SourceIndicates the source IP address, and optionally, port, network interface, and resolved name.
srcZonecs3Label (source)
Source zone name
Displays source zone
station stationSonicPoint statis-tics report
Displays the client (station) on which event occurred
time Time Reports the time of event
type cn1ICMP type and code
Indicates the ICMP type
ucastRx ucastRxInterface statis-tics report
Displays the unicast packets received
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 175
Examples of Standard Syslogs
The following examples show the content of the Syslog packet. This type of message can be viewed on the Syslog server or any packet analyzer application. Note that this is the Default Syslog Format.
id=firewall123 sn=0017C5991784 time="2013-03-20 11:56:53" fw=10.0.203.108 pri=6 c=1024 m=97 n=1 src=1.2.3.4:5432:X0 dst=4.3.2.1:2345:X1 proto=tcp/2345 op=1 sent=9876 rcvd=6789 result=403 dstname=http: arg=//www.gui.log.eng.sonicwall.com code=20 Category="Online Banking"
id=firewall123 sn=0017C5991784 time="2013-03-20 11:57:04" fw=10.0.203.108 pri=6 c=262144 m=98 msg="Connection Opened" n=1437 usr="admin" src=192.168.168.1:61505:X0 dst=192.168.168.168:443:X0 proto=tcp/https sent=52
id=firewall123 sn=0017C5991784 time="2013-03-20 11:57:06" fw=10.0.203.108 pri=6 c=1024 m=537 msg="Connection Closed" n=3683 usr="admin" src=192.168.168.1:61505:X0 dst=192.168.168.168:443:X0 proto=tcp/https sent=1519 rcvd=951 spkt=7 rpkt=8 cdur=2133
id=firewall123 sn=0017C5991784 time="2013-03-20 11:56:53" fw=10.0.203.108 pri=1 c=32 m=609 msg="IPS Prevention Alert: P2P BitTorrent -- Peer Sync" sid=1994 ipscat=P2P ipspri=3 P2P BitTorrent -- Peer Sync, SID: 1994, Priority: Low n=1 src=1.2.3.4:5432:X0 dst=4.3.2.1:2345:X1
id=firewall123 sn=0017C5991784 time="2013-01-29 23:38:24" bid=1 fw=10.8.70.22 pri=1 c=16 m=793 msg="App Rules Alert" af_polid=1 af_policy="test" af_type="SMTP Client Request" af_service="SMTP (Send E-Mail)" af_action="No Action" n=0 src=10.10.10.245:50613:X0 dst=10.8.41.228:25:X1"
ucastTx ucastTxInterface statis-tics report
Displays the unicast packets transmit-ted
unsynchedFirewall status report via GMS heartbeat
Reports the time since last local change in seconds
usestand-bysa
Firewall status report via GMS heartbeat
Displays whether standby SA is in use (“1” or “0”) for GMS management
usr (or user) susr UserDisplays the user name (“user” is the tag used by WebTrends)
vpnpolicy cs2 (source)Source VPN pol-icy name
Displays the source VPN policy name of event
vpnpoli-cyDst
cs3 (destination)Destination VPN policy name
Displays the destination VPN policy name of event
176 |
id=firewall123 sn=0017C5991784 mgmtip=10.0.203.108 time="2013-03-20 20:14:30 UTC" fw=10.0.203.108 m=96 n=25 i=60 lic=0 unsynched=893 pt=80.443 usestandbysa=0 dyn=n.n ai=1 fwlan=192.168.168.168 conns=0
Examples of ArcSight Syslog
The following examples show the content of the Syslog packet. This type of message can be viewed on the Syslog server or any packet analyzer application.
MAR 20 2013 19:07:43 0017C5991784 CEF:0|SonicWALL|NSA 2400|5.9.0.0-d_75o|97|Syslog Website Accessed|4|cat=1024 gcat=2 src=1.2.3.4 spt=5432 deviceInboundInterface=X0 cs1Label=1.2.4.5 snpt=1 dst=4.3.2.1 dpt=2345 deviceOutboundInterface=X1 cs2Label=5.4.3.2 dnpt=2 proto=tcp/2345 out=9876 in=6789 requestMethod=1 outcome=403 request=http://www.gui.log.eng.sonicwall.com reason=20 Category-"Online Banking"
MAR 20 2013 19:07:49 0017C5991784 CEF:0|SonicWALL|NSA 2400|5.9.0.0-d_75o|98|Syslog Connection Logged|4|cat=262144 gcat=2 src=192.168.168.1 spt=61693 deviceInboundInterface=X0 dst=192.168.168.168 dpt=443 deviceOutboundInterface=X0 susr="admin" proto=tcp/https out=52 cnt=1570
MAR 20 2013 19:07:52 0017C5991784 CEF:0|SonicWALL|NSA 2400|5.9.0.0-d_75o|537|Syslog Close|4|cat=1024 gcat=2 smac=00:00:c5:b3:6b:e5 src=192.168.168.1 spt=61693 deviceInboundInterface=X0 cs3Label=Trusted dst=192.168.168.168 dpt=443 deviceOutboundInterface=X0 cs4Label=Trusted susr="admin" proto=tcp/https out=1519 in=967 cn2Label=7 cn1Label=8 cn3Label=2333 cnt=3815
MAR 20 2013 19:07:43 0017C5991784 CEF:0|SonicWALL|NSA 2400|5.9.0.0-d_75o|609|IDP Prevention Alert|9|cat=32 gcat=3 src=1.2.3.4 spt=5432 deviceInboundInterface=X0 cs1Label=1.2.4.5 snpt=1 dst=4.3.2.1 dpt=2345 deviceOutboundInterface=X1 cs2Label=5.4.3.2 dnpt=2 msg="IPS Prevention Alert: P2P BitTorrent -- Peer Sync, SID: 1994, Priority: Low" cnt=3
MAR 20 2013 19:07:43 0017C5991784 CEF:0|SonicWALL|NSA 2400|5.9.0.0-d_75o|793|Application Firewall Alert|9|cat=16 gcat=10 src=1.2.3.4 spt=5432 deviceInboundInterface=X0 dst=4.3.2.1 dpt=2345 deviceOutboundInterface=X1 msg="Application Firewall Alert: Policy: foobar, Action Type: Block SMTP E-Mail - Send Error Reply, Mail From: an unknown string of unknown length" cnt=3
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 177
Table of ValuesThis section can be used as a reference for understanding different categories and their descriptions.
Legacy Categories
The following table describes the Legacy categories shared in all SonicOS releases.
Table 1 Legacy Category
ID (used in Syslog) Name Description
0 Event is not Legacy Category, not backward compatible.
1 System Maintenance Logs general system activity, such as system activations.
2 System Errors Logs problems with DNS or Email.
4 Blocked Web Sites Logs Web sites or news groups blocked by the Content Filter List or by customized filtering.
8 Blocked Java Etc Logs Java, ActiveX, and Cookies blocked by the Dell SonicWALL security appliance.
16 User Activity Logs successful and unsuccessful log in attempts.
32 Attacks Logs messages showing Denial of Service attacks, such as SYN Flood, Ping of Death, and IP Spoofing.
64 Dropped TCP Logs blocked incoming TCP connections.
128 Dropped UDP Logs blocked incoming UDP packets.
256 Dropped ICMP Logs blocked incoming ICMP packets.
512 Network Debug Logs NetBIOS broadcasts, ARP resolution problems, and NAT resolution problems. Also, detailed messages for VPN connections are displayed to assist the network administrator with troubleshooting problems with active VPN tunnels. Network Debug information is intended for experienced network administrators.
1024 Syslog Only — For Traffic Reporting
Used for Syslog only to report HTTP connections opened and closed, and bytes transferred.
2048 Dropped LAN TCP Used for Syslog only to report that the TCP packet is dropped due to LAN management policy.
178 |
Expanded Categories
The following table displays expanded category information, also known as the SonicOS Category, for all firmware releases and platforms.
Table 2 Expanded Categories
4096 Dropped LAN UDP Used for Syslog only to report that the UDP packet is dropped due to LAN management policy.
8192 Dropped LAN ICMP Used for Syslog only to report that the ICMP packet is dropped due to LAN management policy.
32768 Modem Debug Logs Modem Debug activity.
65536 VPN Tunnel Status Logs status information on VPN tunnels.
131072 802.11 Management Logs WLAN IEEE 802.11 connections.
262144 Syslog Only — For Traffic Reporting
Used for Syslog only to report that the Network Traffic is logged when connection is opened.
524288 System Environment Logs system environment activity.
1048576 Expanded — VOIP Activity Used for Syslog only to log VoIP H.323/RAS, H.323/H.225, and H.323/H.245 activity.
2097152 Expanded — WLAN IDS Activity
Used for Syslog only to log WLAN IDS activity.
4194304 Expanded — SonicPoint Activity
Used for Syslog only to log SonicPoint activity.
ID (used in Syslog) Name Description
Category Description
802.11 Management Logs 802.11 management activity
Advanced Routing Logs Advanced Routing activity
Advanced Switching Logs Advanced Switching activity
Anti-Spam Service Logs the Anti-Spam service
App Flow Server Logs App Flow Server activity
App Rules Logs App Rules activity
Application Control Logs Application Control activity
Attacks Logs messages showing Denial of Service attacks, such as SYN Flood, Ping of Death, and IP Spoofing.
Authenticated Access Logs Authenticated Access activity
WAN Acceleration Logs the WAN Acceleration activity
Blocked Java Etc Logs Java, ActiveX, and Cookies blocked
Blocked WebSites Logs Websites blocked
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 179
BOOTP Logs Bootstrap Protocol (BOOTP) activity
Botnet Blocking Logs the Botnet Blocking activity
SSO Agent Authentication Logs the SSO Agent Authentication activity
Crypto Test Logs Crypto Test activity
DDNS Logs Dynamic Domain Name System (DDNS) activity
Denied LAN IP Logs LAN IP denied activity
DHCP Client Logs DHCP Client activity
DHCP Relay Logs DHCP Relay activity
DHCP Server Logs DHCP Server activity
DPI-SSL Logs the Deep Packet Inspection of Secure Socket Layer (DPI-SSL) activity
Dropped ICMP Logs blocked incoming Internet Control Message Protocol (ICMP) packet activity
Dropped TCP Logs blocked incoming Transmission Control Protocol (TCP) connection activity
Dropped UDP Logs blocked incoming User Datagram Protocol (UDP) packet activity
DSL Logs DSL activity
Dynamic Address Objects Logs Dynamic Address Object activity
E1-T1 Logs E1-T1 activity
Firewall Event Logs Firewall Event alerts and activity
Firewall Hardware Logs Firewall Hardware alerts and activity
Firewall Logging Logs other Firewall-related activity
Firewall Rule Logs Firewall Rule alerts and activity
FTP Logs File Transfer Protocol (FTP) activity
Geolocation Logs the Geolocation service activity
GMS Logs Dell SonicWALL Global Management System (GMS) activity
High Availability Logs High Availability activity
Intrusion Prevention Logs Intrusion Prevention activity
IPComp Logs IP Compression (IPComp) activity
IPNet Logs IPNet activity
IPv6 Tunnel Logs IPv6 activity
L2TP Client Logs Layer 2 Tunnel Protocol (L2TP) client activity
L2TP Server Logs Layer 2 Tunnel Protocol (L2TP) server activity
MAC-IP Anti-Spoof Logs the MAC-IP Spoofing activity
Modem Logs the Modem activity
Modem Debug Logs the Modem Debug activity
180 |
MSAD Logs Microsoft Active Directory (MSAD) activity
Multicast Logs Multicast activity
Network Logs Network activity
Network Debug Logs NetBios broadcasts, ARP resolution problems, and NAT resolution problems.
Network Access Logs successful and unsuccessful Network Access activity
Network Monitor Logs Network Monitor activity
Network Traffic Logs Network Traffic activity
PPP Logs Point-to-Point Protocol (PPP) activity
PPP Dial-Up Logs Point-to-Point Protocol (PPP) Dial-Up activity
PPPoE Logs Point-to-Point Protocol over Ethernet (PPPoE) activity
PPTP Logs Point-to-Point Tunneling Protocol (PPTP) activity
Remote Authentication Logs Remote Authentication activity
RBL Logs Realtime Black List (RBL) activity
RF Monitoring Logs RF Monitoring activity
RIP Logs Routing Information Protocol (RIP) activity
Security Services Logs Security Services activity
SNMP Logs the Simple Network Management Protocol (SNMP) activity
SonicPoint Logs the SonicPoint activity
SonicPointN Logs the SonicPointN activity
SSLVPN Logs Secure Socket Layer Virtual Private Network (SSLVPN) activity
System Environment Logs System Environment activity
System Errors Logs System Errors activity
System Maintenance Logs System Maintenance activity
User Activity Logs successful and unsuccessful log in attempts
VOIP Logs Voice over IP (VOIP) activity
VPN Logs Virtual Private Network (VPN) activity
VPN Tunnel Status Logs VPN Tunnel Status activity
VPN Client Logs VPN Client activity
VPN IKE Logs VPN IKE activity
VPN IPSec Logs VPN IP Security activity
WAN Availability Logs WAN Availability activity
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide | 181
Priority Level
The following table displays the Priority Number and Name for Syslog Tags. The value here is taken from the “Priority Level” column of the Index of Log Event Messages on page 2, or the “pri” tag in Index of Syslog Tag Field Descriptions on page 170. For example, a tag with “pri=0” means Emergency Priority.
Table 3 Priority Level
Wireless Logs Wireless activity
WLAN IDS Logs Wireless LAN Intrusion Detection System (IDS) activity
Priority Number Priority Name
0 Emergency
1 Alert
2 Critical
3 Error
4 Warning
5 Notice
6 Info
7 Debug
182 |
| 183