Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Event logging automatically begins when the SonicWALL security appliance is powered on and con-
figured. SonicOS supports a traffic log containing entries with multiple fields.
Log event messages provide operational informational and debugging information to help you diag-
nose problems with communication lines, internal hardware, or your firmware configuration.
Note: For the SonicOS CLI console display, use the show log command to display log events. Refer
to the SonicOS CLI Reference Guide located on the SonicWALL Web site:
<http://www.sonicwall.com/support/documentation.html>
1. Violence 7. Cult
Reset filters
Note: If you select only one Group Filter checkbox, the filter logic will remain the same. Selecting only
the Priority-Group Filter checkbox provides you with the following filter logic:
(Priority) && Category && Source && Destination
Configuration Example: Using the ‘Priority’ Group Filter and ‘Category Group’ Filter
To set the log filter logic to display log event messages with a priority level of Emergency or a category
event type of Attack:
1. Select the ‘Priority’ group filter checkbox.
2. Select the ‘Category’ group filter checkbox.
3. Select Emergency from the filter-Priority Value pull-down menu.
4. Select Attacks from the filter-Category Value pull-down menu.
Figure 4 illustrates the SonicOS filter logic updated as follows:
(Priority || Category) && Source && Destination
Figure 4 SonicOS Log Group Filters
A filter logic using the boolean expression “||” is less restrictive than the default filter logic using the
boolean expression “&&”. With the boolean expression “||”, log event messages are displayed if they
match either filter values. With the boolean expression “&&”, log event messages are displayed if they
match both filter values.
Note: You can export a log to a file with applied filter settings.
Time and Date Stamp Category Source IP Address Log Event Notes
%s Ethernet Port Down Represents a character string. [WAN | LAN | DMZ] Ethernet Port
Down
The cache is full; %u open Represents a numerical string. The cache is full; [40,000] open
connections; some will be dropped connections; some will be dropped
Each log event message described in the following table provides the following log event details:
• SonicOS Category—Displays the SonicOS Software category event type.
• Legacy Category—Displays the SonicWALL Firmware Software category event type.
• Priority Level—Displays the level of urgency of the log event message.
• Log Message ID Number—Displays the ID number of the log event message.
• SNMP Trap Type—Displays the SNMP Trap ID number of the log event message.
Log Event SonicOS Legacy Priority Log SNMP Log Event Type
Message Category Category Level Message Trap
ID Type
Number
#Web site hit Network Traffic Connection Traffic Information 97 --- Standard HTTP Traffic
Report
%s Ethernet Port Firewall Event System Error Error 333 641 Simple
Message String
Down
%s Ethernet Port Up Firewall Event System Error Warning 332 640 Simple
Message String
A prior version of Firewall Event System Error Warning 572 648 Simple
preferences was
loaded because the
most recent
preferences file was
inaccessible
Access rule added Security Services User Activity Information 440 --- Simple Rule
Access rule deleted Firewall Rule User Activity Information 442 --- Simple Rule String
Access rule Firewall Rule User Activity Information 441 --- Simple Rule
modified
Access to proxy Network Access Blocked Sites Notice 60 705 Standard Note Blocked
server denied
ActiveX access Network Access Blocked Code Notice 18 --- Standard Note Blocked
denied
Add an attack Firewall Event Attack Error 143 525 Simple String
message
Adding Dynamic Network --- Information 813 --- Standard Note ENET
Entry for Bound
MAC Address
Adding L2TP IP L2TP Server System Error Error 603 661 Simple
pool Address object
Failed.
Allowed LDAP RADIUS User Activity Warning 752 --- Standard Note String
server certificate
with wrong host
name
ARP request packet Network --- Information 717 --- Standard Note ENET
received
ARP request packet Network --- Information 715 --- Standard Note ENET
sent
ARP response Network --- Information 716 --- Standard Note ENET
packet received
ARP response Network --- Information 718 --- Standard Note ENET
packet sent
Association Flood WLAN IDS WLAN IDS Alert 548 903 Simple Destination
from WLAN station
Backup active High Availability System Error Information 825 --- Simple
Backup firewall High Availability System Error Error 152 619 Simple
being preempted by
Primary
Backup firewall has High Availability Maintenance Information 145 --- Simple
transitioned to
Active
Backup going High Availability System Error Error 170 622 Simple
Active in preempt
mode after reboot
Backup missed High Availability System Error Error 149 616 Simple
heartbeats from
Primary
Backup received High Availability System Error Error 151 618 Simple
error signal from
Primary
Backup received High Availability System Error Error 672 666 Simple
reboot signal from
Primary
Backup shut down High Availability System Error Error 824 --- Simple
because license is
expired
Backup will be shut High Availability System Error Error 823 --- Simple Message String
down in %s minutes
Bad CRL format VPN PKI User Activity Alert 277 --- Simple Destination
Blocked Quick VPN Client System Error Error 505 660 Standard
Mode for Client
using Default KeyID
Broadcast packet Network Access Debug Debug 46 --- Standard Note Protocol
dropped
Cannot connect to VPN PKI User Activity Alert 274 --- Simple Destination
the CRL server
Cannot Validate VPN PKI User Activity Alert 878 --- Simple Destination
Issuer Path
Certificate on VPN PKI User Activity Alert 279 --- Simple Destination
Revoked list (CRL)
Computed hash VPN IKE User Activity Warning 410 --- Standard Destination
does not match
hash received from
peer
Connection Closed Network Traffic Connection Traffic Information 537 --- Standard Traffic Report
Connection Opened Network Traffic Connection Information 98 --- Standard Note Protocol
Connection timed VPN PKI User Activity Alert 273 --- Simple Destination
out
Cookie removed Network Access Blocked Code Notice 21 --- Standard String Service
CRL has expired VPN PKI User Activity Alert 874 --- Simple Destination
CRL loaded from VPN PKI User Activity Information 270 --- Simple Destination
CRL missing - VPN PKI User Activity Alert 876 --- Simple Destination
Issuer requires CRL
checking.
CRL validation VPN PKI User Activity Alert 877 --- Simple Destination
failure for Root
Certificate
Crypto DES test Crypto Test Maintenance Error 360 --- Simple
failed
Crypto MD5 test Crypto Test Maintenance Error 370 --- Simple
failed
Crypto RSA test Crypto Test Maintenance Error 364 --- Simple
failed
Crypto Sha1 test Crypto Test Maintenance Error 365 --- Simple
failed
DDNS Failure: DDNS System Error Error 774 --- Simple Message String
Provider %s
DDNS Failure: DDNS System Error Error 775 --- Simple Message String
Provider %s
DDNS Failure: DDNS System Error Error 773 --- Simple Message String
Provider %s
DDNS Warning: DDNS System Error Warning 777 --- Simple Message String
Provider %s
Deleting IPSec SA VPN IKE User Activity Information 92 --- Standard Note SPI
DHCP Client did not DHCP Client Maintenance Information 109 --- Standard
get DHCP ACK.
DHCP Client failed DHCP Client Maintenance Information 119 --- Standard
to verify and lease
has expired. Go to
INIT state.
DHCP Client got a DHCP Client Maintenance Information 121 --- Standard Destination
new IP address
lease.
DHCP Client got DHCP Client Maintenance Information 111 --- Standard Destination
ACK from server.
DHCP Client got DHCP Client Maintenance Information 110 --- Standard
NACK.
DHCP Client is DHCP Client Maintenance Information 112 --- Standard Destination
declining address
offered by the
server.
DHCP Client DHCP Client Maintenance Information 113 --- Standard Destination
sending REQUEST
and going to
REBIND state.
DHCP Client DHCP Client Maintenance Information 114 --- Standard Destination
sending REQUEST
and going to
RENEW state.
DHCP DISCOVER DHCP Relay Debug Information 474 --- Standard Destination
received from
remote device
DHCP lease DHCP Relay Maintenance Warning 228 --- Standard Destination
dropped. Lease
from Central
Gateway conflicts
with Relay IP
DHCP lease relayed DHCP Relay Maintenance Information 223 --- Standard Destination
to local device
DHCP lease relayed DHCP Relay Debug Information 225 --- Standard Destination
to remote device
DHCP lease to LAN DHCP Relay Maintenance Information 226 --- Standard Destination
device
conflicts with
remote device,
deleting remote IP
entry
DHCP NAK received DHCP Relay Debug Information 477 --- Standard Destination
from server
DHCP OFFER DHCP Relay Debug Information 476 --- Standard Destination
received from
server
DHCP Ranges Firewall Event --- Information 832 --- Simple Message String
altered
automatically due to
change in network
settings for
interface %s
DHCP RELEASE DHCP Relay Debug Information 224 --- Standard Destination
received from
remote device
DHCP RELEASE DHCP Relay Maintenance Information 222 --- Standard Destination
relayed to Central
Gateway
DHCP REQUEST DHCP Relay Debug Information 473 --- Standard Destination
received from
remote device
DHCP Server not DHCP Client Maintenance Information 106 --- Standard
available. Did not
get any DHCP
OFFER.
Diagnostic Firewall System Error Error 517 642 Simple Note String
Hardware
Code D
Diagnostic VPN IPSec System Error Error 61 609 Standard Note Code
Code E
Diagnostic Firewall System Error Error 164 621 Simple Note String
Hardware
Code F
Diagnostic Firewall System Error Error 599 655 Simple Note String
Hardware
Code G
Diagnostic Firewall System Error Error 600 656 Simple Note String
Hardware
Code H
Diagnostic Firewall System Error Error 601 657 Simple Note String
Hardware
Code I
DNS packet allowed Network Access Debug Information 602 --- Standard Policy
Dynamic IPSec VPN IPSec User Activity Information 62 --- Standard Destination
client connected
EIGRP packet Network Access Debug Notice 714 --- Standard Note String
dropped
Error Rebooting HA High Availability System Error Error 669 663 Simple
Peer Firewall
Error High Availability System Error Error 158 662 Simple Message String
synchronizing HA
peer firewall (%s)
Failed payload VPN IKE User Activity Warning 405 --- Standard
validation
Failed payload VPN IKE User Activity Warning 404 --- Standard
verification after
decryption.
Possible
preshared key
mismatch
Failed to find VPN PKI User Activity Alert 875 --- Simple Destination
certificate
Failed to get CRL VPN PKI User Activity Alert 271 --- Simple Destination
from
Failed to Process VPN PKI User Activity Alert 276 --- Simple Destination
CRL from
Failure to reach High Availability System Error Error 675 647 Simple Message String
Interface %s probe
Found Rogue WLAN IDS WLAN IDS Alert 546 901 Simple Destination
Access Point
Found Rogue WLAN IDS WLAN IDS Alert 556 901 Simple Destination
Access Point
Fragmented packet Network TCP | UDP | ICMP Notice 28 --- Standard Note Protocol
dropped
FTP: PASV Intrusion Attack Alert 528 556 Standard Note String
Detection
response bounce
attack dropped.
FTP: PORT bounce Intrusion Attack Alert 527 555 Standard Note String
Detection
attack dropped.
Global VPN VPN Client System Error Information 529 643 Standard
Client connection is
not allowed.
Appliance is not
registered.
Global VPN VPN Client System Error Information 494 658 Standard
Client License
Exceeded:
Connection denied.
Global VPN VPN Client User Activity Information 604 --- Standard Destination
Client version
cannot enforce
personal firewall.
Minimum Version
required is 2.1
Got DHCP OFFER. DHCP Client Maintenance Information 107 --- Standard Destination
Selecting.
Guest account '%s' Authentication User Activity Information 558 --- Standard Message
Access String
created
Guest account '%s' Authentication User Activity Information 559 --- Standard Message
Access String
deleted
Guest account '%s' Authentication User Activity Information 560 --- Standard Message
Access String
disabled
Guest account '%s' Authentication User Activity Information 561 --- Standard Message
Access String
re-enabled
Guest account '%s' Authentication User Activity Information 563 --- Standard Message
Access String
re-generated
Guest login denied. Authentication User Activity Information 557 --- Standard Message
Access String
Guest '%s' is
already logged in.
Please try again
later.
H.323/H.225 Setup VoIP VoIP Debug 633 --- Standard Note String
H.323/H.245 End VoIP VoIP Debug 636 --- Standard Note String
Session
HTTP Firewall Event Maintenance Information 340 --- Simple Note String
management port
has changed
HTTP method Network Access TCP Debug 882 --- Standard Policy
detected;
examining stream
for host header
HTTPS Firewall Event Maintenance Information 341 --- Simple Note String
management port
has changed
ICMP packet Network Access Debug Information 597 --- Standard Policy
allowed
ICMP packet Network Access ICMP Notice 523 --- Standard ICMP Service
dropped
ICMP packet from Network Access Debug Information 598 --- Standard ICMP Service
LAN allowed
ICMP packet from Network Access LAN ICMP | LAN Notice 175 --- Standard ICMP Service
TCP
LAN dropped
IGMP Packet Not Multicast --- Notice 687 --- Standard Message
String
handled. Packet
type: %s
IGMP state table Multicast --- Debug 692 --- Standard Message
String
entry time out,
deleting interface:
%s for multicast
address: %s
IGMP state table Multicast --- Debug 693 --- Standard Message
String
entry time out,
deleting VPN
SPI:%s for Multicast
address: %s
IGMP V3 reord type: Multicast --- Debug 689 --- Standard Message
String
%s not
Handled
IKE ID mismatch %s VPN IKE Debug Debug 658 --- Simple Message String
IKE Initiator: VPN IKE User Activity Information 372 --- Standard Note String
Accepting IPSec
proposal (Phase 2)
IKE Initiator: VPN IKE User Activity Information 445 --- Standard Destination
Accepting peer
lifetime. (Phase 1)
IKE Initiator: VPN IKE User Activity Information 354 --- Standard Destination
Aggressive Mode
complete (Phase 1).
IKE Initiator: Main VPN IKE User Activity Information 353 --- Standard Destination
Mode complete
(Phase 1)
IKE Initiator: VPN IKE User Activity Warning 401 --- Standard Destination
Received notify.
NO_PROPOSAL_
CHOSEN
IKE Initiator: Start VPN IKE User Activity Information 358 --- Standard
Aggressive Mode
negotiation
(Phase 1)
IKE Initiator: Start VPN IKE User Activity Information 351 --- Standard
Main Mode
negotiation
(Phase 1)
IKE Initiator: Start VPN IKE User Activity Information 346 --- Standard
Quick Mode
(Phase 2).
IKE Initiator: Using VPN IKE User Activity Information 543 --- Standard Destination
secondary gateway
to
negotiate
IKE negotiation VPN IKE User Activity Information 403 --- Standard
aborted due to
timeout
IKE Responder: %s VPN Client System Error Error 660 --- Standard Message
String
policy does not
allow static IP for
Virtual Adapter.
IKE Responder: VPN IKE User Activity Information 87 --- Standard Note String
Accepting IPSec
proposal
(Phase 2)
IKE Responder: VPN IKE User Activity Information 373 --- Standard Destination
Aggressive Mode
complete
(Phase 1)
IKE Responder: AH VPN IKE User Activity Warning 258 544 Standard
Perfect
Forward Secrecy
mismatch
IKE Responder: VPN IKE User Activity Warning 260 546 Standard
Algorithms and/or
keys do not match
IKE Responder: VPN IKE Attack Error 516 553 Standard Note String
Default LAN
gateway is not set
but peer is
proposing to use
this SA as a default
route
IKE Responder: VPN IKE User Activity Warning 253 539 Standard Note String
Default LAN
gateway is set but
peer is not
proposing to use
this SA as a default
route
IKE Responder: VPN IKE User Activity Warning 259 545 Standard
ESP Perfect
Forward Secrecy
mismatch
IKE Responder: IKE VPN IKE User Activity Warning 402 --- Standard Destination
proposal does not
match (Phase 1)
IKE Responder: VPN IKE User Activity Warning 88 523 Standard Note String
IPSec proposal
does not match
(Phase 2)
IKE Responder: VPN IKE User Activity Information 357 --- Standard Destination
Main Mode
complete
(Phase 1)
IKE Responder: VPN IKE Debug Warning 342 --- Standard Message
Number
Mode %d - not
transport mode.
Xauth is required
but not supported
by peer.
IKE Responder: VPN IKE User Activity Warning 249 535 Standard Message
Number
Mode %d - not
tunnel mode
IKE Responder: No VPN IKE User Activity Warning 252 538 Standard Note String
match for
proposed remote
network address
IKE Responder: No VPN IKE User Activity Warning 250 536 Standard Note String
matching Phase 1
ID found for
proposed remote
network
IKE Responder: VPN IKE User Activity Warning 418 549 Standard Note String
Proposed local
network is 0.0.0.0
but SA has no LAN
Default
Gateway
IKE Responder: VPN IKE User Activity Warning 251 537 Standard
Proposed remote
network is 0.0.0.0
but not DHCP relay
nor default route
IKE Responder: VPN IKE User Activity Information 356 --- Standard
Received
Aggressive Mode
request (Phase 1)
IKE Responder: VPN IKE User Activity Information 355 --- Standard
Received Main
Mode request
(Phase 1)
IKE Responder: VPN IKE User Activity Warning 255 541 Standard Note String
Tunnel
terminates inside
firewall but
proposed local
network is not
inside firewall
IKE Responder: VPN IKE User Activity Warning 256 542 Standard Note String
Tunnel
terminates on DMZ
but
proposed local
network is on LAN
IKE Responder: VPN IKE User Activity Warning 257 543 Standard Note String
Tunnel terminates
on LAN but pro-
posed local network
is on DMZ
IKE Responder: VPN IKE User Activity Warning 254 540 Standard Note String
Tunnel
terminates
outside firewall but
proposed local
network is not NAT
public address
IKE Responder: VPN IKE User Activity Warning 345 548 Standard Note String
Tunnel
terminates
outside firewall but
proposed remote
network is not NAT
public address
IKE SA lifetime VPN IKE User Activity Information 350 --- Standard
expired.
Illegal IPSec SPI VPN IPSec User Activity Information 65 --- Standard Destination
Imported VPN SA is Firewall Event Maintenance Warning 348 --- Standard Note String
invalid -
disabled
Incompatible IPSec VPN IPSec User Activity Information 69 --- Standard Destination
Security
Association
Interface %s Link Is Firewall Event System Error Error 566 647 Simple Message String
Down
Interface %s Link Is Firewall Event System Error Warning 565 646 Simple Message String
Up
Interface IP Firewall Event Maintenance Information 568 --- Simple Message String
Assignment:
Binding and
initializing %s
Interface IP Firewall Event Maintenance Information 567 --- Simple Message String
Assignment
changed:
Shutting down %s
Invalid VLAN packet Network --- Alert 836 --- Standard Note String
dropped
IP spoof detected DHCP Relay Attack Error 229 533 Standard Note ENET
on packet to
Central Gateway,
packet dropped
IP type %s packet Network Access LAN UDP | LAN Notice 590 --- Standard Message
TCP String
dropped
IPS Detection Alert: Intrusion Attack Alert 608 569 Standard IDP Message
Detection String
%s
IPS Detection Alert: Intrusion Attack Alert 789 573 Standard Message
Detection String
%s
IPSec (AH) packet VPN IPSec TCP | UDP | ICMP Notice 534 --- Standard Note String
dropped
IPSec (AH) packet VPN IPSec Debug Debug 536 --- Standard
dropped; waiting for
pending IPSec
connection
IPSec (ESP) packet VPN IPSec TCP | UDP | ICMP Notice 533 --- Standard Note String
dropped
IPSec (ESP) packet VPN IPSec Debug Debug 535 --- Standard
dropped; waiting for
pending IPSec
connection
IPSec packet Network Access TCP | UDP | ICMP Notice 40 --- Standard
dropped
IPSec packet from VPN IPSec Maintenance Information 247 --- Standard Destination
an illegal host
IPSec packet from VPN IPSec Attack Error 70 510 Standard Destination
or to an illegal host
IPSEC Replay VPN IPSec Attack Alert 180 531 Standard Note String
Detected
Issuer match failed VPN PKI User Activity Alert 278 --- Simple Destination
Java access denied Network Access Blocked Code Notice 19 --- Standard Note Blocked
L2TP PPP Authenti- L2TP Client Maintenance Information 212 --- Simple
cation Failed
L2TP PPP Down L2TP Client Maintenance Information 211 --- Simple
L2TP PPP link down L2TP Client Maintenance Information 217 --- Simple
L2TP Server: L2TP Server Maintenance Information 337 --- Standard Destination
Deleting the L2TP
active Session
L2TP Server: L2TP Server Maintenance Information 336 --- Standard Destination
Deleting the
Tunnel
L2TP Server: L2TP L2TP Server Maintenance Information 309 --- Standard Destination
Session
Established.
L2TP Server: L2TP L2TP Server Maintenance Information 308 --- Standard Destination
Tunnel Established.
L2TP Server: L2TP Server Maintenance Information 338 --- Standard Destination
Retransmission
Timeout, Deleting
the Tunnel
L2TP Server: User L2TP Server Maintenance Information 344 --- Standard Destination
Name
authentication
Failure locally.
L2TP Server: Local L2TP Server Maintenance Information 312 --- Standard Destination
Authentication
Failure
L2TP Server: Local L2TP Server Maintenance Information 318 --- Standard Destination
Authentication
Success.
L2TP Server: L2TP Server Maintenance Information 319 --- Standard Destination
Radius
Authentication
Success
L2TP Server: L2TP Server Maintenance Information 311 --- Standard Destination
Radius reports
Authentication
Failure
L2TP Server: Call L2TP Server Maintenance Information 334 --- Standard Destination
Disconnect from
Remote.
L2TP Server: Tunnel L2TP Server Maintenance Information 335 --- Standard Destination
Disconnect from
Remote.
License of HA pair High Availability System Error Error 670 664 Simple
doesn't match
Local user login Authentication User Activity Information 31 --- Standard String Service
Access
allowed
Local user login Authentication User Activity Information 32 --- Standard String Service
Access
denied due to bad
credentials
Locked-out user Authentication User Activity Information 438 --- Standard Note String
Access
logins allowed -
lockout period
expired
Log Debug Firewall Event Debug Error 142 --- Simple String
Login screen timed Authentication User Activity Information 34 --- Standard String Service
Access
out
MAC address Network --- Notice 814 --- Standard Note ENET
collides with Static
ARP Entry with
Bound MAC
address; packet
dropped
Maximum events Firewall Logging System Error Critical 654 --- Simple
per second
threshold exceeded
Maximum syslog Firewall Logging System Error Critical 655 --- Simple
data per second
threshold exceeded
NAT device may not VPN IPSec Maintenance Information 266 --- Simple
support IPSec AH
passthrough
NAT Discovery: No VPN IKE User Activity Information 241 --- Standard
NAT/NAPT device
detected between
IPSec Security
gateways
NAT Discovery: VPN IKE User Activity Information 240 --- Standard
Local IPSec
Security Gateway
behind a NAT/NAPT
Device
NAT Discovery: VPN IKE User Activity Information 239 --- Standard
Peer IPSec
Security Gateway
behind a NAT/NAPT
Device
NAT Discovery: VPN IKE User Activity Information 242 --- Standard
Peer IPSec
Security Gateway
doesn't support
VPN NAT Traversal
Newsgroup access Network Access Blocked Sites Notice 17 704 Standard Note Blocked
allowed
Newsgroup access Network Access Blocked Sites Notice 15 702 Standard Note Blocked
denied
No Certificate for VPN PKI User Activity Alert 280 --- Simple Destination
Not enough VPN PKI User Activity Warning 272 --- Simple Destination
memory to hold the
CRL
OCSP Failed to VPN PKI User Activity Error 853 --- Standard Note String
Resolve Domain
Name.
OCSP Internal error VPN PKI User Activity Error 854 --- Standard Note String
handling received
response.
OCSP received VPN PKI User Activity Error 851 --- Standard Note String
response error.
OCSP received VPN PKI User Activity Information 850 --- Standard Note String
response.
OCSP Resolved VPN PKI User Activity Information 852 --- Standard Note String
Domain Name.
OCSP send request VPN PKI User Activity Error 849 --- Standard Note String
message failed.
OCSP sending VPN PKI User Activity Information 848 --- Standard Note String
request.
Packet dropped by Wireless TCP | UDP | ICMP Warning 488 --- Standard Destination
WLAN guest check
Packet dropped by Wireless TCP | UDP | ICMP Warning 495 --- Standard Destination
WLAN VPN
traversal check
Packet dropped. VPN System Error Alert 739 --- Standard Note String
No firewall rule
associated with
VPN policy.
PKI Failure: Loaded VPN PKI Maintenance Error 469 --- Simple
but could not verify
certificate
PKI Failure: Loaded VPN PKI Maintenance Error 470 --- Simple
the certificate but
could not verify it's
chain
PKI Failure: The VPN PKI Maintenance Error 462 --- Simple
certificate chain is
circular
PKI Failure: The VPN PKI Maintenance Error 463 --- Simple
certificate chain is
incomplete
PKI Failure: The VPN PKI Maintenance Error 468 --- Simple
certificate or a cer-
tificate in the chain
has a bad signature
PKI Failure: The VPN PKI Maintenance Error 466 --- Simple
certificate or a
certificate in the
chain has a
validity period in
the future
PKI Failure: The VPN PKI Maintenance Error 465 --- Simple
certificate or a
certificate in the
chain has expired
PKI Failure: The VPN PKI Maintenance Error 467 --- Simple
certificate or a
certificate in the
chain is corrupt
Please connect Firewall Event Maintenance Information 570 --- Simple Message String
interface %s to
another network to
function properly
Port configured to Network Access TCP | UDP | ICMP Warning 347 --- Standard Destination
receive IPSEC
ONLY. Drop packet
received in the
clear.
Possible port scan Intrusion Attack Alert 82 521 Standard Note String
Detection
dropped
Possible SYN Flood Intrusion --- Alert 860 --- Simple Message String
Detection
on IF %s
Possible SYN Flood Intrusion --- Warning 866 --- Simple Message String
Detection
on IF %s continues
Possible SYN Flood Intrusion --- Alert 867 --- Simple Message String
Detection
on IF %s has
ceased
PPP Dial-Up: PPP Dial-Up User Activity Information 306 --- Simple
Connect request
canceled
PPP Dial-Up: PPP Dial-Up User Activity Information 286 --- Simple Message String
Connected at %s
bps - starting PPP
PPP Dial-Up: Dial PPP Dial-Up Maintenance Information 324 --- Standard Message
String
initiated by %s
PPP Dial-Up: Dialed PPP Dial-Up User Activity Information 285 --- Simple
number did not
answer
PPP Dial-Up: Dialed PPP Dial-Up User Activity Information 284 --- Simple
number is busy
PPP Dial-Up: PPP Dial-Up --- Information 665 --- Standard Message
String
Dialing not allowed
by schedule. %s
PPP Dial-Up: PPP Dial-Up User Activity Information 281 --- Simple Message String
Dialing: %s
PPP Dial-Up: Idle PPP Dial-Up User Activity Information 297 --- Simple
time limit exceeded
-
disconnecting
PPP Dial-Up: PPP Dial-Up User Activity Information 303 --- Simple Message String
Initialization: %s
PPP Dial-Up: Link PPP Dial-Up User Activity Information 288 --- Simple
carrier lost
PPP Dial-Up: PPP Dial-Up User Activity Information 327 --- Simple
Maximum
connection time
exceeded -
disconnecting
PPP Dial-Up: No PPP Dial-Up User Activity Information 282 --- Simple
dialtone detected -
check
phone-line
connection
PPP Dial-Up: No PPP Dial-Up User Activity Information 283 --- Simple
link carrier detected
- check phone num-
ber
PPP Dial-Up: PPP PPP Dial-Up User Activity Information 301 --- Simple
link down
PPP Dial-Up: PPP PPP Dial-Up User Activity Information 300 --- Simple
link established
PPP Dial-Up: PPP Dial-Up User Activity Information 542 --- Simple Message String
Previous session
was connected for
%s
PPP Dial-Up: PPP Dial-Up User Activity Information 299 --- Standard
Received new IP
address
PPP Dial-Up: PPP Dial-Up User Activity Information 302 --- Simple
Shutting down link
PPP Dial-Up: The PPP Dial-Up Maintenance Information 330 --- Simple
profile in use
disabled VPN
networking.
PPP Dial-Up: WAN Failover User Activity Information 434 --- Simple
Trying to failover
but Alternate Pro-
file is manual
PPP Dial-Up: PPP Dial-Up User Activity Information 287 --- Simple
Unknown dialing
failure
PPP Dial-Up: User PPP Dial-Up User Activity Information 305 --- Simple
requested
connect
PPP Dial-Up: User PPP Dial-Up User Activity Information 304 --- Simple
requested
disconnect
PPP Dial-Up: VPN PPP Dial-Up Maintenance Information 331 --- Simple
networking
restored.
PPP: Starting CHAP PPP User Activity Information 294 --- Simple
authentication
PPP: Starting PAP PPP User Activity Information 295 --- Simple
authentication
Primary firewall has High Availability Maintenance Information 144 --- Simple
transitioned to
Active
Primary firewall has High Availability System Error Error 146 614 Simple
transitioned to Idle
Primary firewall High Availability System Error Error 153 620 Simple
preempting Backup
Primary missed High Availability System Error Error 148 615 Simple
heartbeats from
Backup
Primary received High Availability System Error Error 150 617 Simple
error signal from
Backup
Primary received High Availability System Error Error 671 665 Simple
reboot signal from
Backup
Probable port scan Intrusion Detec- Attack Alert 83 522 Standard Note String
tion
dropped
Probable TCP FIN Intrusion Detec- Attack Alert 177 528 Standard
tion
scan dropped
Probable TCP NULL Intrusion Detec- Attack Alert 179 530 Standard Note String
tion
scan dropped
Probable TCP Intrusion Detec- Attack Alert 178 529 Standard Note String
tion
XMAS scan
dropped
Probing WAN Failover System Error Alert 436 638 Standard Message
String
succeeded on %s
Problem loading the Security Services System Error Error 183 623 Simple
URL List; Appli-
ance not registered.
Problem loading the Security Services System Error Error 10 602 Standard Note Code
URL List; check
Filter settings
Problem loading the Security Services System Error Error 11 603 Simple
URL List; check
your DNS server
Problem loading the Security Services System Error Error 187 627 Simple
URL List; Flash
write failure.
Problem loading the Security Services System Error Error 186 626 Standard
URL List; Retrying
later.
Problem loading the Security Services System Error Error 184 624 Standard
URL List;
Subscription
expired.
Problem loading the Security Services System Error Error 185 625 Simple
URL List; Try
loading it again.
Real time clock Firewall System Error Warning 539 644 Simple
Hardware
battery failure Time
values may be
incorrect
Received a path Network User Activity Information 182 --- Standard Note SPI
MTU ICMP
message from
router/gateway
Received a path Network User Activity Information 188 --- Standard Note MTU
MTU ICMP
message from
router/gateway
Received AV Alert: Security Services Maintenance Warning 125 524 Simple Message String
%s
Received AV Alert: Security Services Maintenance Warning 482 552 Simple Message String
Your SonicWALL
Network Anti-Virus
subscription will
expire in 7 days. %s
Received CFS Alert: Security Services Maintenance Warning 490 563 Simple
Your SonicWALL
Content Filtering
subscription has
expired.
Received CFS Alert: Security Services Maintenance Warning 489 562 Simple
Your SonicWALL
Content Filtering
subscription will
expire in 7 days.
Received DHCP DHCP Client Maintenance Information 588 --- Standard Destination
offer packet has
errors
Received IKE SA VPN IKE User Activity Information 413 --- Standard
delete request
Received IPS Alert: Security Services Maintenance Warning 614 571 Simple
Your SonicWALL
Intrusion
Prevention (IDP)
subscription has
expired.
Received IPSEC SA VPN IKE User Activity Information 412 --- Standard Destination
delete request
Received notify: VPN IKE User Activity Information 414 --- Standard Destination
INVALID_COOKIES
Received notify: VPN IPSec User Activity Warning 483 --- Standard
INVALID_ID_INFO
Received notify: VPN IKE User Activity Error 661 --- Standard
INVALID_PAYLOAD
Received notify: VPN IKE User Activity Information 416 --- Standard Destination
INVALID_SPI
Received notify: VPN IKE User Activity Warning 409 --- Standard Destination
ISAKMP_AUTH_
FAILED
Received notify: VPN IKE User Activity Warning 411 --- Standard Destination
PAYLOAD_
MALFORMED
Received notify: VPN IKE User Activity Information 415 --- Standard Destination
RESPONDER_
LIFETIME
Received packet VPN IKE User Activity Warning 406 --- Standard
retransmission.
Drop duplicate
packet
Received response DHCP Client Maintenance Information 589 --- Standard Destination
packet for DHCP
request has errors
Request for Relay DHCP Relay Maintenance Information 230 --- Standard
IP Table from
Central Gateway
Requesting CRL VPN PKI User Activity Information 269 --- Simple Destination
from
RIP disabled on RIP Maintenance Information 419 --- Simple Message String
interface %s
RIPv1 enabled on RIP Maintenance Information 420 --- Simple Message String
interface %s
RIPv2 compatibility RIP Maintenance Information 422 --- Simple Message String
(broadcast) mode
enabled on
interface %s
Sending DHCP DHCP Client Maintenance Information 105 --- Standard Destination
DISCOVER.
Sending DHCP DHCP Client Maintenance Information 122 --- Standard Destination
RELEASE.
Sending DHCP DHCP Client Maintenance Information 116 --- Standard Destination
REQUEST
(Rebinding).
Sending DHCP DHCP Client Maintenance Information 117 --- Standard Destination
REQUEST
(Rebooting).
Sending DHCP DHCP Client Maintenance Information 115 --- Standard Destination
REQUEST
(Renewing).
Sending DHCP DHCP Client Maintenance Information 118 --- Standard Destination
REQUEST
(Verifying).
Sending DHCP DHCP Client Maintenance Information 108 --- Standard Destination
REQUEST.
Sent Relay IP Table DHCP Relay Maintenance Information 232 --- Standard
to Central Gateway
SIP Register VoIP VoIP Warning 645 --- Standard Note String
expiration exceeds
configured
Signaling inactivity
time out
SIP Request VoIP VoIP Debug 643 --- Standard Note String
SMTP server found RBL --- Notice 799 --- Standard Note String
on RBL blacklist
Starting IKE VPN IKE User Activity Information 90 --- Standard Note String
negotiation
Success to reach High Availability System Error Information 674 --- Simple Message String
Interface %s probe
SYN Flood Intrusion --- Warning 868 --- Simple Message String
Detection
Blacklist on IF %s
continues
System clock Firewall Logging --- Notice 881 --- Simple Note String
manually updated
TCP connection Network Debug Debug 713 --- Standard Note String
abort received; TCP
connection dropped
TCP connection Network Access LAN TCP Notice 173 --- Standard Service
from LAN denied
TCP connection Network Debug Debug 712 --- Standard Note String
reject received; TCP
connection dropped
TCP FIN packet Network Debug Debug 181 --- Standard Note String
dropped
TCP packet Network Debug Debug 891 --- Standard Note String
received on a
closing
connection; TCP
packet dropped
TCP packet Network Debug Debug 888 --- Standard Note String
received on
non-existent/closed
connection; TCP
packet dropped
TCP packet Network Debug Debug 709 --- Standard Note String
received with
invalid ACK
number; TCP
packet dropped
TCP packet Network Debug Debug 887 --- Standard Note String
received with
invalid header
length; TCP packet
dropped
TCP packet Network Debug Debug 894 --- Standard Note String
received with
invalid MSS option
length; TCP packet
dropped
TCP packet Network Debug Debug 895 --- Standard Note String
received with
invalid option
length; TCP packet
dropped
TCP packet Network Debug Debug 893 --- Standard Note String
received with
invalid SACK option
length; TCP packet
dropped
TCP packet Network Debug Debug 708 --- Standard Note String
received with
invalid SEQ
number; TCP
packet dropped
TCP packet Network Debug Debug 896 --- Standard Note String
received with
invalid source port;
TCP packet
dropped
TCP packet Network Debug Information 892 --- Standard Note String
received with SYN
flag on an existing
connection; TCP
packet dropped
TCP packet Network Debug Debug 890 --- Standard Note String
received without
mandatory ACK
flag; TCP packet
dropped
TCP packet Network Debug Debug 889 --- Standard Note String
received without
mandatory SYN
flag; TCP packet
dropped
TCP SYN received Intrusion Detec- --- Debug 869 --- Standard
tion
TCP Syn/Fin packet Network Access Attack Alert 580 558 Standard Note String
dropped
TCP Xmas Tree Intrusion Detec- Attack Alert 267 547 Standard
tion
dropped
The cache is full; Firewall Event System Error Error 53 607 Standard Message
Number
%u open
connections; some
will be dropped
The loaded content Security Services System Error Error 190 628 Simple
URL List has
expired.
The network WAN Failover System Error Warning 307 639 Standard Message
String
connection in use is
%s
The preferences file Firewall Event System Error Warning 573 649 Simple
is too large to be
saved in available
flash memory
Thermal Red Firewall Hard- System Environ- Alert 578 104 Simple
ware ment
Thermal Red Timer Firewall Hard- System Environ- Alert 579 105 Simple
ware ment
Exceeded
Thermal Yellow Firewall Hard- System Environ- Alert 577 103 Simple
ware ment
UDP packet from Network Access LAN UDP | LAN Notice 174 --- Standard Service
TCP
LAN dropped
Unknown protocol Network Access Debug Notice 41 --- Standard Note String
dropped
Unknown reason VPN PKI User Activity Error 275 --- Simple Destination
User logged out Authentication User Activity Information 263 --- Standard String Service
Access
User logged out - Authentication User Activity Information 265 --- Standard Note String
Access
inactivity timer
expired
User logged out - Authentication User Activity Information 264 --- Standard Note String
Access
max session time
exceeded
User logged out - Authentication User Activity Information 24 --- Standard Note String
Access
user disconnect
detected (heartbeat
timer expired)
User login denied - RADIUS User Activity Warning 750 --- Standard String Service
insufficient access
on LDAP server
User login denied - RADIUS User Activity Warning 749 --- Standard String Service
invalid credentials
on LDAP server
User login denied - RADIUS User Activity Information 745 --- Standard String Service
LDAP authentica-
tion failure
User login denied - RADIUS User Activity Warning 748 --- Standard String Service
LDAP communica-
tion problem
User login denied - RADIUS User Activity Warning 757 --- Standard String Service
LDAP directory mis-
match
User login denied - RADIUS User Activity Warning 751 --- Standard String Service
LDAP schema mis-
match
User login denied - RADIUS User Activity Warning 755 --- Standard String Service
LDAP server certifi-
cate not valid
User login denied - RADIUS User Activity Warning 753 --- Standard String Service
LDAP server name
resolution failed
User login denied - RADIUS User Activity Warning 746 --- Standard String Service
LDAP server time-
out
User login denied - RADIUS User Activity Information 243 --- Standard String Service
RADIUS authentica-
tion failure
User login denied - RADIUS User Activity Warning 744 --- Standard String Service
RADIUS communi-
cation problem
User login denied - RADIUS User Activity Information 245 --- Standard String Service
RADIUS configura-
tion error
User login denied - RADIUS User Activity Warning 754 --- Standard String Service
RADIUS server
name resolution
failed
User login denied - RADIUS User Activity Information 244 --- Standard String Service
RADIUS server
timeout
User login denied - RADIUS User Activity Warning 756 --- Standard String Service
TLS or local certifi-
cate problem
User login denied - RADIUS User Activity Information 246 --- Standard String Service
User has no
privileges for login
from that location
User login denied - Authentication User Activity Information 486 --- Standard Destination
Access
User has no
privileges for WLAN
guest service
User login denied Authentication User Activity Information 33 --- Standard String Service
Access
due to bad creden-
tials
User login disabled Authentication Attack Error 583 559 Standard Message
Access String
from %s
User login failed - Authentication User Activity Information 549 --- Standard Note String
Access
Guest service limit
reached
Virtual Access Point SonicPoint 802.11b Information 731 --- Simple Destination
Management
is disabled
Virtual Access Point SonicPoint 802.11b Information 730 --- Simple Destination
Management
is enabled
VoIP %s Endpoint VoIP VoIP Debug 637 --- Simple Message String
added
VoIP %s Endpoint VoIP VoIP Warning 639 --- Simple Message String
not added -
configured 'public'
endpoint limit
reached
VoIP %s Endpoint VoIP VoIP Debug 638 --- Simple Message String
removed
VoIP Call VoIP VoIP Information 622 --- Standard Note String
Connected
VoIP Call VoIP VoIP Information 623 --- Standard Note String
Disconnected
Voltages Out of Firewall Hard- System Environ- Error 575 101 Simple
ware ment
Tolerance
VPN Client Policy VPN Client User Activity Information 371 --- Standard Destination
Provisioning
VPN Log Debug VPN IKE Debug Information 172 --- Simple String
VPN policy count VPN System Error Error 719 --- Simple Message String
received exceeds
the limit; %s
VPN zone remote Authentication User Activity Information 237 --- Standard String Service
Access
user login allowed
WAN Interface not Firewall Event Maintenance Information 498 --- Simple
setup
Wan IP Changed Firewall Event System Error Warning 138 636 Standard
WAN zone remote Authentication User Activity Information 238 --- Standard String Service
Access
user login allowed
WARNING: DHCP DHCP Relay Maintenance Information 227 --- Standard Destination
lease relayed from
Central Gateway
conflicts with IP in
Static Devices list
Web access request Network Access TCP Notice 524 --- Standard Policy
dropped
Web management Network Access User Activity Notice 526 --- Standard Service
request allowed
Web site access Network Access Blocked Sites Notice 16 703 Standard Note Blocked
allowed
Web site access Network Access Blocked Sites Error 14 701 Standard Note Blocked
denied
WLAN client null WLAN IDS WLAN IDS Warning 615 904 Standard Destination
probing
WLAN drop traffic Network Access --- Information 724 --- Standard Note String
to deny network
WLAN Guest Authentication User Activity Information 551 --- Standard Note String
Access
Account Timeout
WLAN Guest Idle Authentication User Activity Information 564 --- Standard Note String
Access
Timeout
WLAN max Network Access --- Information 726 --- Standard Note String
concurrent users
reached already
WLAN pass traffic Network Access --- Information 725 --- Standard Note String
to access allow
network
WLAN sequence WLAN IDS WLAN IDS Warning 547 902 Simple Destination
number out of order
WLB Failback WAN Failover System Error Alert 435 652 Standard Message
String
initiated by %s
WLB Failover in WAN Failover System Error Alert 584 651 Standard
progress
WLB Resource WAN Failover System Error Alert 586 654 Standard
failed
WLB Resource is WAN Failover System Error Alert 585 653 Standard
now available
WPA MIC Failure Wireless 802.11b Warning 663 --- Simple Destination
Management
WPA Radius Server Wireless 802.11b Information 664 --- Simple Destination
Management
Timeout
XAUTH Failed with VPN Client User Activity Information 140 --- Standard Destination
VPN client,
Authentication
failure
XAUTH Failed with VPN Client User Activity Information 141 --- Standard Destination
VPN client, Cannot
Contact RADIUS
Server
XAUTH Succeeded VPN Client User Activity Error 139 --- Standard Destination
with VPN client
<ddd> Syslog message prefix The beginning of each syslog message has a
string of the form <ddd> where ddd is a decimal
number indicating facility and priority of the mes-
sage. (See [1] Section 4.1.1)
c Message category (legacy only) Indicates the legacy category number (Note: We
are not currently sending new category informa-
tion.)
change Configuration change webpage Displays the basename of the firewall web page
that performed the last configuration change
cpuUtil Firewall status report Displays the CPU utilization (not in use)
dstname Destination URL Displays the URL of web site hit and other legacy
destination strings
dyn Firewall status report Displays the HA and dialup connection state (ren-
dered as “h.d” where “h” is “n” (not enabled), “b”
(backup), or “p” (primary) and “d” is “1” (enabled)
or “0” (disabled))
goodRxBytes SonicPoint statistics report Indicates the well formed bytes recevied
goodTxBytes SonicPoint statistics report Indicates the well formed bytes transmitted
lic Firewall status report Indicates the number of licenses for firewalls with
limited modes
msg Static message with dynamic string Displays a message using the predefined mes-
sage string containing a “%s” and a dynamic
string argument.
msg Static message with dynamic num- Displays a message using the predefined string
ber string containing a “%s” and a dynamic numeric
argument.
radio SonicPoint statistics report Displays the SonicPoint radio on which event
occurred
ramUtil Firewall status report Displays the RAM utilization (not in use)
result HTTP Result code Displays the HTTP result code (200, 403, etc.) of
web site hit
sent Bytes sent Displays the number of bytes sent within connec-
tion
station SonicPoint statistics report Displays the client (station) on which event
occurred
unsynched Firewall status report Reports the time since last local change in sec-
onds
usesstandbysa Firewall status report Displays whether standby SA is in use (“1” or “0”)
for GMS management
usr (or user) User Displays the user name (“user” is the tag used by
WebTrends)
vpnpolicy VPN policy name Displays the VPN policy name of event
© 2002 SonicWALL, Inc. SonicWALL is a registered trademark of SonicWALL, Inc. Other product and company names mentioned herein may be
trademarks and/ or registered trademarks of their respective companies. Specifications and descriptions subject to change with out notice.
P/ N 232-000827-00
Rev B 10/05