FortiGate Log Message Reference

FortiGate ® Log Message Reference
FortiOS 4.0 MR3
The FortiGate Log Message Reference is published every maintenance release, and contains only information
that was gathered at the date of publication.
FortiGate Log Message Reference
Version 4.0 MR3
21 November 2011
01-430-112804-20111121
© Copyright 2011 Fortinet, Inc. All rights reserved. No part of this publication including text, examples,
diagrams or illustrations may be reproduced, transmitted, or translated in any form or by any means,
electronic, mechanical, manual, optical or otherwise, for any purpose, without prior written permission of
Fortinet, Inc.
Trademarks
ABACAS, APSecure, Dynamic Threat Prevention System (DTPS), FortiAnalyzer®, FortiASIC, FortiBIOS,
FortiBridge, FortiClient®, FortiDB™, FortiGate®, FortiGate Unified Threat Management System,
FortiGuard®, FortiGuard-Antispam, FortiGuard-Antivirus, FortiGuard-Intrusion, FortiGuard-Web, FortiLog,
FortiMail®, FortiManager®, Fortinet®, FortiOS®, FortiPartner, FortiProtect, FortiReporter, FortiResponse,
FortiScan, FortiShield, FortiVoIP, FortiWeb, and FortiWiFi are trademarks of Fortinet, Inc. in the United
States and/or other countries. The names of actual companies and products mentioned herein may be the
trademarks of their respective owners.
Contents
Introduction
19
Before you begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
How this reference is organized . . . . . . . . . . . . . . . . . . . . . . . . . .
19
19
Document conventions and other information . . . . . . . . . . . . . . . . . . . . .
20
Traffic
21
2 .
3 .
4 .
5 .
6 .
7 .
8 .
9 .
10
11
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Event-Administration
32001
32002
32003
32004
32006
32007
32008
32010
32011
32012
32013
32014
32015
32016
32017
32020
32021
32022
32086
32087
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
22
24
26
28
30
32
34
35
36
37
39
40
40
41
41
42
43
43
44
45
47
48
50
50
51
53
53
54
54
55
55
3
Contents
32140
32141
32095
32101
32102
32103
32104
32105
32120
32121
32122
32123
32124
32125
32126
32127
32128
32129
32130
32131
32132
32133
32134
32135
32136
32137
32138
32139
32140
32141
32142
32143
32144
32145
32148
32149
32150
32151
32152
32153
32154
32155
32156
32157
32158
32161
4
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
56
57
57
59
60
62
62
62
63
67
68
72
73
74
74
75
76
77
77
78
78
80
80
81
81
82
83
83
91
92
93
96
97
98
99
100
100
101
101
101
102
102
103
103
107
107
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Contents
32162
32168
32170
32171
32172
32180
32200
32301
32302
32400
32401
32545
32546
32547
32548
32549
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Event-System
20001
20002
20003
20004
20007
20010
20031
20032
20033
20034
20035
20036
20037
20038
20039
20040
20041
20042
20043
20044
20045
20046
20047
20048
20049
20050
20051
5
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
108
108
109
111
113
114
114
115
115
115
116
117
117
117
118
118
119
120
122
122
123
123
123
124
124
124
124
125
125
126
126
126
127
127
127
128
128
128
128
129
129
129
129
130
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Contents
20052
20053
20054
20055
20056
20057
20058
20059
20060
20061
20062
20063
20064
20065
20066
20067
20068
20069
20070
20071
20072
20073
20074
20075
20076
20077
20078
20079
20080
20081
20082
20083
20084
20090
20099
20100
20101
20110
20111
20200
20201
20202
20203
22000
22001
22002
6
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
130
130
130
131
131
131
131
132
132
132
132
133
133
133
133
134
134
134
135
135
135
136
136
136
136
137
137
137
137
138
138
138
139
139
139
140
140
142
142
142
143
143
144
144
145
145
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Contents
22003
22004
22005
22006
22009
22010
22011
22012
22013
22100
22101
22102
22103
22200
22201
22202
22203
22800
22801
22802
22803
22804
22805
22806
22901
22902
22903
22911
22912
22913
22914
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Event-DHCP service
146
146
146
146
147
147
148
148
149
149
150
151
151
151
152
152
152
153
153
154
154
155
155
155
156
156
156
157
157
157
158
159
26001 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
26002 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Event-Firewall authentication
38001
38002
38003
38004
38005
38010
38011
7
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
161
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
162
164
167
167
169
169
170
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Contents
38012
38020
38021
38022
38026
38027
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Event-Wireless
43520
43521
43522
43524
43525
43526
.
.
.
.
.
.
.
.
.
.
.
.
177
Event-IPsec negotiation
37120
37121
37122
37123
37124
37125
37126
37127
37128
37129
37130
37131
37132
37133
37134
37135
37136
37137
37138
37139
37184
37185
37186
37187
37188
37189
37190
37191
8
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
171
171
172
174
175
175
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
178
178
179
179
180
181
183
184
185
186
187
188
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
207
209
210
211
212
213
214
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Contents
37192
37193
37194
37195
37196
37197
37198
37199
37200
37201
37202
37203
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Event-L2TP/PPP/PPPoE
29001
29002
29003
29004
29009
29015
29016
29022
29024
30004
30005
30006
30007
30008
30009
31004
31005
31006
31007
31008
31009
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
227
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Event-SSL VPN
39424
39425
39426
41984
41985
41986
41987
9
.
.
.
.
.
.
.
.
.
.
.
.
.
.
215
216
217
218
219
220
221
222
223
224
225
226
228
228
229
229
229
230
230
230
230
231
231
231
232
232
233
233
233
234
234
235
235
237
238
239
240
240
241
241
242
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Contents
41988
39936
39937
39938
39939
39940
39941
39942
39943
39944
39945
39946
39947
39948
39949
39950
39951
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Event-VIP SSL
45001
45003
45005
45007
45009
45011
45012
45013
45015
45017
45019
45023
45027
45029
45031
45032
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Event-DNS
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
242
243
244
244
245
245
246
246
247
247
248
248
249
250
251
252
252
253
254
255
255
256
257
258
258
259
259
260
261
263
263
264
265
266
267
44288 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Event-config
269
44544 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
44545 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
44546 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
10
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Contents
44547 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
Event-auth
43008
43009
43010
43011
43012
43013
43014
43015
43016
43017
43018
43019
43020
43021
43022
43023
43024
43025
43026
43027
43028
43029
43030
273
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Event-wad
40960
48001
48003
48005
48007
48009
48011
48012
48013
48015
48017
48019
48023
48027
48029
48031
11
274
275
276
277
278
279
280
280
281
282
283
283
284
285
285
285
286
286
287
288
289
290
291
293
294
295
295
296
296
297
297
298
298
299
299
300
300
301
301
302
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Contents
48032
48100
48101
48102
48123
48124
48127
48129
48131
48132
48200
48201
48205
48300
48301
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Event-LDB-monitor
46000
46001
46002
46003
46004
46005
46100
46101
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
303
304
304
305
305
306
307
307
308
308
309
309
310
310
311
313
Event-nac-quarantine
314
314
315
315
316
316
317
317
319
43776 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
Event-his-performance
321
40704 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Event-HA
37888
37889
37890
37891
37892
37893
37894
37895
37896
37897
12
323
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
324
324
324
325
325
326
326
326
327
327
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Contents
37898
37899
37900
37901
37902
37903
37904
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Event-pattern
328
328
329
329
330
330
331
333
41000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
41001 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Event-RADIUS
38656
38657
38658
38659
38660
38661
38662
38663
38664
38665
38666
38667
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
337
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Event-notification
338
338
338
339
339
339
340
340
341
341
342
342
343
38400 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
38401 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345
38402 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
Event-amc-intf-bypass
347
47201 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
47202 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
Event-GTP
41216
41217
41218
41219
41220
41221
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
349
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
350
351
353
354
355
356
13
Contents
41222 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358
Event-MMS-Stats
359
43264 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
Event-VoIP
361
44032
44033
44034
44035
44036
44037
44038
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Data Leak Prevention
24576
24577
24578
24579
. . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
377
Application Control
28672
28673
28674
28675
28676
28677
28678
28688
28689
28690
28704
28705
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
14
378
380
382
382
383
385
Antivirus
8192
8193
8194
8195
8196
8197
362
364
366
370
371
373
375
386
388
390
392
394
396
398
400
402
404
406
408
411
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
412
414
416
418
420
422
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Contents
8198
8199
8457
8458
8448
8449
8450
8451
8452
8453
8454
8455
8456
8704
8705
8706
8707
8960
8961
8962
8963
8964
8965
8966
8967
8968
8969
8970
8971
8972
8973
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
16384
16385
16386
18432
18433
18434
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Attack
424
426
428
430
432
435
438
440
442
444
447
449
451
453
455
457
459
461
463
465
467
469
471
473
475
477
479
481
483
485
487
489
Email filter
490
492
494
496
498
500
503
20480 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504
20481 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506
20482 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
15
Contents
20483
20484
20491
20485
20486
20487
20488
20489
20490
20492
20493
20494
20495
20496
20497
20498
20499
20500
20501
20503
20504
20505
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Webfilter
12288
12289
12290
12291
12305
12544
12545
12546
12547
12548
12549
12550
12551
12552
12553
12554
12555
12556
12557
12558
12559
16
510
512
514
516
518
520
522
524
526
528
530
532
534
536
538
540
542
544
546
548
550
552
555
556
558
560
562
564
566
568
570
572
574
576
578
580
580
581
582
583
584
585
585
586
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Contents
13056
13312
13313
13314
12800
12801
13601
13602
13568
13573
13584
13315
13316
12802
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Netscan logs
4096
4097
4098
4099
4100
4101
4102
4103
4104
4105
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
615
DLP archives
32768
32776
32770
32772
32774
32769
32782
32783
32784
32785
32786
32787
32788
32789
32790
32791
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
588
590
592
594
596
598
600
602
604
606
608
610
612
614
616
616
617
618
619
619
620
620
621
622
623
624
626
628
630
632
634
636
638
641
644
647
649
652
655
658
661
17
Contents
32792 .
32793 .
32777 .
32794 .
32795 .
32796 .
32797 .
32798 .
32800 .
328001 .
32778 .
32779 .
32780 .
32781 .
32771 .
32773 .
32775 .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Appendix
663
665
667
669
671
673
675
677
679
683
685
687
689
691
693
695
697
700
Document conventions . . . . . . . .
IP addresses . . . . . . . . . . .
Example Network configuration .
Cautions, Notes and Tips . . . .
Typographical conventions . . . .
CLI command syntax conventions
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
700
700
702
703
703
703
Entering FortiOS configuration data
Entering text strings (names). .
Entering numeric values . . . .
Selecting options from a list . .
Enabling or disabling options. .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
705
705
706
706
706
.
.
.
.
.
Registering your Fortinet product. . . . . . . . . . . . . . . . . . . . . . . . . . . . 706
Fortinet products End User License Agreement . . . . . . . . . . . . . . . . . . . . 706
Training . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707
Documentation . . . . . . . . . . . . . . . . . . . .
Fortinet Tools and Documentation CD . . . . . .
Fortinet Knowledge Base . . . . . . . . . . . .
Comments on Fortinet technical documentation
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
707
707
707
707
Customer service and technical support . . . . . . . . . . . . . . . . . . . . . . . . 707
18
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Introduction
This reference provides detailed information about all log messages that are recorded by
the FortiGate unit. It is intended for administrators that are already logging FortiGate
features and require information about a specific log message that was recorded, such as
an event-administration log message with the log ID 41990.
This chapter includes the following topics:
•
Before you begin
•
Document conventions and other information
Before you begin
Before you begin using this guide, take a moment to note the following:
•
The information in this reference applies to all FortiGate units and models currently
running FortiOS 4.0 and higher.
•
You have enabled logging of FortiGate features. If you have not chosen a log device, or
have not enabled logging of FortiGate features, see the Logging and Reporting chapter
in the FortiOS Handbook.
•
Each log message is written similar to how it appears in the log viewer table, but based
on the Raw format. For more information, see the Logging and Reporting chapter in
the FortiOS Handbook.
•
FortiOS Carrier log messages are included and is indicated within the table, in the
Firmware version row.
•
This reference contains detailed information for each log message field; however, this
reference contains only information gathered at publication and, as a result, not every
log message field contains detailed information. More detailed information will be
available in future releases of this reference.
•
The UTM-related logs, such as antivirus and IPS, are located in the new log file called
UTM log. This is reflected in the web-based manager, where you can view these log
messages in Log&Report > Log & Archive Access > UTM Log.
How this reference is organized
This document describes what log messages are recorded by the FortiGate unit.
The following chapters are grouped by log type with the exception of the event log, and
include only log messages for that log type. The event log type chapters are grouped by
subtype, for example event-system, due to the large amount of subtypes associated with
the event log.
•
Traffic
•
Event-Administration
•
Event-System
•
Event-DHCP service
•
Event-Firewall authentication
•
Event-Wireless
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
19
Document conventions and other information
•
Event-IPsec negotiation
•
Event-L2TP/PPP/PPPoE
•
Event-SSL VPN
•
Event-VIP SSL
•
Event-DNS
•
Event-config
•
Event-auth
•
Event-wad
•
Event-LDB-monitor
•
Event-nac-quarantine
•
Event-his-performance
•
Event-HA
•
Event-pattern
•
Event-RADIUS
•
Event-notification
•
Event-amc-intf-bypass
•
Event-GTP
•
Event-MMS-Stats
•
Event-VoIP
•
Data Leak Prevention
•
Application Control
•
Antivirus
•
Attack
•
Email filter
•
Webfilter
•
Netscan logs
•
DLP archives
Introduction
Document conventions and other information
The document conventions, as well as additional information, are located in the appendix
section of this reference. See “Appendix” on page 700.
20
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Traffic
Traffic log messages record the network traffic going through the FortiGate unit.
In the policyid field of traffic log messages, the number may be zero because any policy that is
automatically added by the FortiGate unit is indexed as zero. For more information, see the Fortinet
Knowledge Base article, Firewall policy=0.
2
3
4
5
6
7
8
9
10
11
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
21
Traffic
2
Message ID
2
Log SubType
Allowed
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Allowed traffic log message
Fields
Field Description
status
The session status. This field displays accept in this field, which indicates that
the session has been allowed by the unit.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
dir_disp
The direction of the sessions. Org displays if a session is not a child session
or the child session originated in the same direction as the master session.
Reply displays if a differen direction is taken from the master session.
tran_disp
The packet is source NAT translated (snat) or destination NAT translated
(dnat). This field can also contain noop.
src
The source IP address.
srcname
The name of the source or the source IP address.
src_port
The source port of the TCP or UDP traffic. The source protocol is zero for
other types of traffic.
dst
The destination IP address.
dstname
The destination name or destination IP address.
dst_country
The country name for the destination IP address. This name is used when
geography-based filtering is configured for the firewall address used in the
firewall policy.
dst_port
The destination port number of the TCP or UDP traffic. The destination port is
zero for other types of traffic.
tran_ip
The translated IP in NAT mode. For Transparent mode, it is zero.
tran_port
The translated port number in NAT mode. For Transparent mode, it is zero.
tran_sip
The translated source IP address.
tran_sport
The translated source port.
service
The IP network service that applies to the session or packet. The services
displayed correspond to the services configured in the firewall policy.
proto
The protocol number that applies to the session or packet. The protocol
number in the packet header that identifies the next level protocol. Protocol
number’s are assigned by the Internet Assigned Number Authority (IANA).
app_type
The application or program used. If there was no program used to create the
traffic, then it is empty and displays N/A. The following are the application
types that can appear in this field:
• N/A (is unknown
type)
• Skype
• WinNY
• AIM
• BitTorrent
• ICQ
• eDonKey
• MSN
• Gnutella
• Yahoo
• KaZaa
22
duration
This represents the value in seconds.
rule
The rule number.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Traffic
policyid
The ID number of the firewall policy that applies to the session or packet. Any
policy that is automatically added by the FortiGate will have an index number
of zero.
custom
The log field that a user has created. This is referred to as a custom log field
because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if the
firewall policy does not use an identity-based policy; otherwise, it displays the
number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall
policy.
sent
The total number of bytes sent.
rcvd
The total number of bytes received.
shaper_drop_sent
The number of sent traffic shaper bytes that were dropped.
shaper_drop_rcvd
The number of received traffic shaper bytes that were dropped.
perip_drop
The number of per-IP traffic shaper bytes that were dropped.
shaper_sent_name
The name of the traffic shaper sending the bytes.
shaper_rcvd_name
The name of the traffic shaper receiving the bytes.
perip_name
The name of the per-IP traffic shaper.
sent_pkt
The total number of packets sent during the session
rcvd_pkt
The total number of packets received during the session.
vpn
The name of the VPN tunnel used by the traffic.
vpn_type
The type of VPN tunnel that the traffic is flowing through. This field can be any
one of the following:
• ipsec-static
• ipsec-dynamic
• ipsec-ddns
• sslvpn
vpn_tunnel
The VPN tunnel.
src_int
The interface where the through traffic comes in. For outgoing traffic
originating from the firewall, it is unknown.
dst_int
The interface where the through traffic goes to the public or Internet.
SN
The session number of the log message.
app
The name of the application that triggered the action within the control list. For
example, SSL.
app_cat
The application category that the application is associated with.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
23
Traffic
3
Message ID
3
Log SubType
Violation
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
Traffic violation log message
Fields
Field Description
status
The status of the session. This field always displays deny in this field and indicates
that the session has been blocked by the unit.
vd
The virtual domain where the traffic was logged. If no virtual domains are enabled
and configured, this field contains the virtual domain, root.
src
The source IP address.
srcname
The name of the source or the source IP address.
src_port
The source port of the TCP or UDP traffic. The source protocol is zero for other
types of traffic.
dst
The destination IP address.
dstname
The destination name or destination IP address.
dst_country
The country name for the destination IP address. This name is used when
geography-based filtering is configured for the firewall address used in the firewall
policy.
dst_port
The destination port number of the TCP or UDP traffic. The destination port is zero
for other types of traffic.
service
The IP network service that applies to the session or packet. The services displayed
correspond to the services configured in the firewall policy.
proto
The protocol number that applies to the session or packet. The protocol number in
the packet header that identifies the next level protocol. Protocol number’s are
assigned by the Internet Assigned Number Authority (IANA).
app_type
The application or program used. If there was no program used to create the traffic,
then it is empty and displays N/A. The following are the application types that can
appear in this field:
• N/A (is unknown type)
• Skype
• WinNY
• AIM
• BitTorrent
• ICQ
• eDonKey
• MSN
• Gnutella
• Yahoo
• KaZaa
24
duration
This represents the value in seconds.
rule
The rule number.
policyid
The ID number of the firewall policy that applies to the session or packet. Any policy
that is automatically added by the FortiGate will have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom log field
because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if the firewall
policy does not use an identity-based policy; otherwise, it displays the number of the
identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
sent
The total number of bytes sent.
rcvd
The total number of bytes received.
shaper_drop_sent
The number of sent traffic shaper bytes that were dropped.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Traffic
shaper_drop_rcvd
The number of received traffic shaper bytes that were dropped.
perip_drop
The number of per-IP traffic shaper bytes that were dropped.
shaper_sent_name
The name of the traffic shaper sending the bytes.
shaper_rcvd_name
The name of the traffic shaper receiving the bytes.
perip_name
The name of the per-IP traffic shaper.
vpn
The name of the VPN tunnel used by the traffic.
vpn_type
The type of VPN tunnel that the traffic is flowing through. This field can be any one
of the following:
vpn_tunnel
• ipsec-static
• ipsec-dynamic
• ipsec-ddns
• sslvpn
The VPN tunnel.
The type of VPN tunnel that the traffic is flowing through. This field can be any one
of the following:
src_int
The interface where the through traffic comes in. For outgoing traffic originating from
the firewall, it is unknown.
dst_int
The interface where the through traffic goes to the public or Internet.
SN
The session number of the log message.
app
The name of the application that triggered the action within the control list. For
example, SSL.
app_cat
The application category that the application is associated with.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
msg
The log message information. This is usually a sentence and explains the activity
and/or action taken.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display MSISDN
of the phone that sent the MMS message. This field will always display N/A in
FortiOS.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
25
Traffic
4
Message ID
4
Log Subtype
Traffic - Other
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Traffic other log message
Fields
Field Description
status
The status of the session. This field always displays start in this field and indicates
that the session has started.
vd
The virtual domain where the traffic was logged. If no virtual domains are enabled
and configured, this field contains the virtual domain, root.
src
The source IP address.
srcname
The name of the source or the source IP address.
src_port
The source port of the TCP or UDP traffic. The source protocol is zero for other
types of traffic.
dst
The destination IP address.
dstname
The destination name or destination IP address.
dst_country
The country name for the destination IP address. This name is used when
geography-based filtering is configured for the firewall address used in the firewall
policy.
dst_port
The destination port number of the TCP or UDP traffic. The destination port is zero
for other types of traffic.
tran_ip
The translated IP in NAT mode. For Transparent mode, it is zero.
tran_port
The translated port number in NAT mode. For Transparent mode, it is zero.
tran_sip
The translated source IP address.
tran_sport
The translated source port.
service
The IP network service that applies to the session or packet. The services
displayed corresponds to the services configured in the firewall policy.
proto
The protocol number that applies to the session or packet. The protocol number in
the packet header that identifies the next level protocol. Protocol number’s are
assigned by the Internet Assigned Number Authority (IANA).
app_type
The application or program used. If there was no program used to create the traffic,
then it is empty and displays N/A. The following are the application types that can
appear in this field:
• NA
• Skype
• WinNY
• AIM
• BitTorrent
• ICQ
• eDonKey
• MSN
• Gnutella
• Yahoo
• KaZaa
26
duration
This represents the value in seconds.
rule
The rule number.
policyid
The ID number of the firewall policy that applies to the session or packet. Any
policy that is automatically added by the FortiGate will have an index number of
zero.
custom
The log field that a user has created. This is referred to as a custom log field
because the name can be anything, for example, hq.
sent
The total number of bytes sent.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Traffic
rcvd
The total number of bytes received.
shaper_drop_sent
The number of sent traffic shaper bytes that were dropped.
shaper_drop_rcvd
The number of received traffic shaper bytes that were dropped.
perip_drop
The number of per-IP traffic shaper bytes that were dropped.
shaper_sent_name
The name of the traffic shaper sending the bytes.
shaper_rcvd_name
The name of the traffic shaper receiving the bytes.
perip_name
The name of the per-IP traffic shaper.
vpn
The name of the VPN tunnel used by the traffic.
vpn_type
The type of VPN tunnel that the traffic is flowing through. This field can be any one
of the following:
• ipsec-static
• ipsec-dynamic
• ipsec-ddns
• sslvpn
The VPN tunnel.
vpn_tunnel
The type of VPN tunnel that the traffic is flowing through. This field can be any one
of the following:
src_int
The interface where the through traffic comes in. For outgoing traffic originating
from the firewall, it is unknown.
dst_int
The interface where the through traffic goes to the public or Internet.
SN
The session number of the log message.
app
The name of the application that triggered the action within the control list. For
example, SSL.
app_cat
The application category that the application is associated with.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always display
N/A in FortiOS.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
27
Traffic
5
Message ID
5
Log Subtype
Other
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Traffic allowed ICMP log message
Fields
Field Description
status
The session status. This field displays accept in this field, which indicates that
the session has been allowed by the unit.
vd
The virtual domain where the traffic was logged. If no virtual domains are
enabled and configured, this field contains the virtual domain, root.
dir_disp
The direction of the sessions. Org displays if a session is not a child session or
the child session originated in the same direction as the master session. Reply
displays if a differen direction is taken from the master session.
tran_disp
The packet is source NAT translated (snat) or destination NAT translated (dnat).
This field can also contain noop.
src
The source IP address.
srcname
The name of the source or the source IP address.
src_port
The source port of the TCP or UDP traffic. The source protocol is zero for other
types of traffic.
dst
The destination IP address.
dstname
The destination name or destination IP address.
dst_country
The country name for the destination IP address. This name is used when
geography-based filtering is configured for the firewall address used in the
firewall policy.
dst_port
The destination port number of the TCP or UDP traffic. The destination port is
zero for other types of traffic.
tran_ip
The translated IP in NAT mode. For Transparent mode, it is zero.
tran_port
The translated port number in NAT mode. For Transparent mode, it is zero.
tran_sip
The translated source IP address.
tran_sport
The translated source port.
service
The IP network service that applies to the session or packet. The services
displayed corresponds to the services configured in the firewall policy.
proto
The protocol number that applies to the session or packet. The protocol number
in the packet header that identifies the next level protocol. Protocol number’s are
assigned by the Internet Assigned Number Authority (IANA).
app_type
The application or program used. If there was no program used to create the
traffic, then it is empty and displays N/A. The following are the application types
that can appear in this field:
• NA
• Skype
• WinNY
• AIM
• BitTorrent
• ICQ
• eDonKey
• MSN
• Gnutella
• Yahoo
• KaZaa
28
duration
This represents the value in seconds.
rule
The rule number.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Traffic
policyid
The ID number of the firewall policy that applies to the session or packet. Any
policy that is automatically added by the FortiGate will have an index number of
zero.
custom
The log field that a user has created. This is referred to as a custom log field
because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if the
firewall policy does not use an identity-based policy; otherwise, it displays the
number of the identity-based policy entry that the traffic matched. This number is
not globally unique, it is only locally unique within a given firewall policy.
sent
The total number of bytes sent.
rcvd
The total number of bytes received.
shaper_drop_sent
The number of sent traffic shaper bytes that were dropped.
shaper_drop_rcvd
The number of received traffic shaper bytes that were dropped.
perip_drop
The number of per-IP traffic shaper bytes that were dropped.
shaper_sent_name
The name of the traffic shaper sending the bytes.
shaper_rcvd_name
The name of the traffic shaper receiving the bytes.
perip_name
The name of the per-IP traffic shaper.
sent_pkt
The number of sent packets.
rcvd_pkt
The number of received packets.
vpn
The name of the VPN tunnel used by the traffic.
vpn_type
The type of VPN tunnel that the traffic is flowing through. This field can be any
one of the following:
• ipsec-static
• ipsec-dynamic
• ipsec-ddns
• sslvpn
vpn_tunnel
The VPN tunnel.
src_int
The interface where the through traffic comes in. For outgoing traffic originating
from the firewall, it is unknown.
dst_int
The interface where the through traffic goes to the public or Internet.
SN
The session number of the log message.
app
The name of the application that triggered the action within the control list. For
example, SSL.
app_cat
The application category that the application is associated with.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always display
N/A in FortiOS.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
29
Traffic
6
Message ID
6
Log Subtype
Other
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Deny internal ICMP log message
Fields
Field Description
status
The status of the session. This field always displays deny in this field and indicates
that the session has been blocked by the unit.
vd
The virtual domain where the traffic was logged. If no virtual domains are enabled
and configured, this field contains the virtual domain, root.
src
The source IP address.
srcname
The name of the source or the source IP address.
src_port
The source port of the TCP or UDP traffic. The source protocol is zero for other
types of traffic.
dst
The destination IP address.
dstname
The destination name or destination IP address.
dst_country
The country name for the destination IP address. This name is used when
geography-based filtering is configured for the firewall address used in the firewall
policy.
dst_port
The destination port number of the TCP or UDP traffic. The destination port is zero
for other types of traffic.
service
The IP network service that applies to the session or packet. The services
displayed corresponds to the services configured in the firewall policy.
proto
The protocol number that applies to the session or packet. The protocol number in
the packet header that identifies the next level protocol. Protocol number’s are
assigned by the Internet Assigned Number Authority (IANA).
app_type
The application or program used. If there was no program used to create the traffic,
then it is empty and displays N/A. The following are the application types that can
appear in this field:
• NA
• Skype
• WinNY
• AIM
• BitTorrent
• ICQ
• eDonKey
• MSN
• Gnutella
• Yahoo
• KaZaa
30
duration
This represents the value in seconds.
rule
The rule number.
policyid
The ID number of the firewall policy that applies to the session or packet. Any
policy that is automatically added by the FortiGate will have an index number of
zero.
custom
The log field that a user has created. This is referred to as a custom log field
because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if the
firewall policy does not use an identity-based policy; otherwise, it displays the
number of the identity-based policy entry that the traffic matched. This number is
not globally unique, it is only locally unique within a given firewall policy.
sent
The total number of bytes sent.
rcvd
The total number of bytes received.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Traffic
shaper_drop_sent
The number of sent traffic shaper bytes that were dropped.
shaper_drop_rcvd
The number of received traffic shaper bytes that were dropped.
perip_drop
The number of per-IP traffic shaper bytes that were dropped.
shaper_sent_name
The name of the traffic shaper sending the bytes.
shaper_rcvd_name
The name of the traffic shaper receiving the bytes.
perip_name
The name of the per-IP traffic shaper.
vpn
The name of the VPN tunnel used by the traffic.
vpn_type
The type of VPN tunnel that the traffic is flowing through. This field can be any one
of the following:
• ipsec-static
• ipsec-dynamic
• ipsec-ddns
• sslvpn
vpn_tunnel
The VPN tunnel.
src_int
The interface where the through traffic comes in. For outgoing traffic originating
from the firewall, it is unknown.
dst_int
The interface where the through traffic goes to the public or Internet.
SN
The session number of the log message.
app
The name of the application that triggered the action within the control list. For
example, SSL.
app_cat
The application category that the application is associated with.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
msg
The log message information. This is usually a sentence and explains the activity
and/or action taken.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display MSISDN
of the phone that sent the MMS message. This field will always display N/A in
FortiOS.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
31
Traffic
7
Message ID
7
Log Subtype
Other
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
Deny external ICMP log message
Fields
Field Description
status
The status of the session. This field always displays deny in this field and
indicates that the session has been blocked by the unit.
vd
The virtual domain where the traffic was logged. If no virtual domains are
enabled and configured, this field contains the virtual domain, root.
src
The source IP address.
srcname
The name of the source or the source IP address.
src_port
The source port of the TCP or UDP traffic. The source protocol is zero for other
types of traffic.
dst
The destination IP address.
dstname
The destination name or destination IP address.
dst_country
The country name for the destination IP address. This name is used when
geography-based filtering is configured for the firewall address used in the
firewall policy.
dst_port
The destination port number of the TCP or UDP traffic. The destination port is
zero for other types of traffic.
tran_ip
The translated IP in NAT mode. For Transparent mode, it is zero.
tran_port
The translated port number in NAT mode. For Transparent mode, it is zero.
service
The IP network service that applies to the session or packet. The services
displayed corresponds to the services configured in the firewall policy.
proto
The protocol number that applies to the session or packet. The protocol number
in the packet header that identifies the next level protocol. Protocol number’s
are assigned by the Internet Assigned Number Authority (IANA).
app_type
The application or program used. If there was no program used to create the
traffic, then it is empty and displays N/A. The following are the application types
that can appear in this field:
• NA
• Skype
• WinNY
• AIM
• BitTorrent
• ICQ
• eDonKey
• MSN
• Gnutella
• Yahoo
• KaZaa
32
duration
This represents the value in seconds.
rule
The rule number.
policyid
The ID number of the firewall policy that applies to the session or packet. Any
policy that is automatically added by the FortiGate will have an index number of
zero.
custom
The log field that a user has created. This is referred to as a custom log field
because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if the
firewall policy does not use an idenity-based policy; otherwise, it displays the
number of the identity-based policy entry that the traffic matched. This number
is not globally unique, it is only locally unique within a given firewall policy.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Traffic
sent
The total number of bytes sent.
rcvd
The total number of bytes received.
shaper_drop_sent
The number of sent traffic shaper bytes that were dropped.
shaper_drop_rcvd
The number of received traffic shaper bytes that were dropped.
perip_drop
The number of per-IP traffic shaper bytes that were dropped.
shaper_sent_name
The name of the traffic shaper sending the bytes.
shaper_rcvd_name
The name of the traffic shaper receiving the bytes.
perip_name
The name of the per-IP traffic shaper.
vpn
The name of the VPN tunnel used by the traffic.
vpn_type
The type of VPN tunnel that the traffic is flowing through. This field can be any
one of the following:
• ipsec-static
• ipsec-dynamic
• ipsec-ddns
• sslvpn
vpn_tunnel
The VPN tunnel.
src_int
The interface where the through traffic comes in. For outgoing traffic originating
from the firewall, it is unknown.
dst_int
The interface where the through traffic goes to the public or Internet.
SN
The session number of the log message.
app
The name of the application that triggered the action within the control list. For
example, SSL.
app_cat
The application category that the application is associated with.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always display
N/A in FortiOS.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
33
Traffic
8
34
Message ID
8
Log Subtype
Traffic - WAN opt
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
WAN optimization traffic log message
Fields
Field Description
vd
The virtual domain where the traffic was logged. If no virtual domains are
enabled and configured, this field contains the virtual domain, root.
src
The source IP address.
srcname
The name of the source or the IP address.
src_port
The source port of the TCP or UDP traffic. The source protocol is zero for other
types of traffic.
dst
The destination IP address.
dstname
The destination name or destination IP address.
dst_country
The country name for the destination IP address. This name is used when
geography-based filtering is configured for the firewall address used in the
firewall policy.
dst_port
The destination port number of the TCP or UDP traffic. The destination port is
zero for other types of traffic.
wanopt_app_type
The type of WAN optimization that was used. This field can contain any one of
the following:
• web-cache
• ftp
• cifs
• mapi
• tcp
• http
• web-proxy
• ftp-proxy
duration
This represents the value in seconds.
rule
The rule number.
policyid
The ID number of the firewall policy that applies to the session or packet. Any
policy that is automatically added by the FortiGate will have an index number of
zero.
identidx
The identity-based policy identification number. This field displays zero if the
firewall policy does not use an identity-based policy; otherwise, it displays the
number of the identity-based policy entry that the traffic matched. This number
is not globally unique, it is only locally unique within a given firewall policy.
identity index.
wan_in
This field always displays WAN in.
wan_out
This field always displays WAN out.
lan_in
This field always displays LAN in.
lan_out
This field always displays LAN out.
src_int
The name of the interface used by the source.
dst_int
The name of the interface used by the destination.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Traffic
9
Message ID
9
Log Subtype
Web cache
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Web cache traffic log message
Fields
Field Description
vd
The virtual domain where the traffic was logged. If no virtual domains are
enabled and configured, this field contains the virtual domain, root.
src
The source IP address.
srcname
The name of the source or the source IP address.
src_port
The source port of the TCP or UDP traffic. The source protocol is zero for
other types of traffic.
dst
The destination IP address.
dstname
The destination name or destination IP address.
dst_country
The country name for the destination IP address. This name is used when
geography-based filtering is configured for the firewall address used in the
firewall policy.
dst_port
The destination port number of the TCP or UDP traffic. The destination port is
zero for other types of traffic.
wanopt_app_type
The WAN Opt application type.
•
web-cache
• cifs
•
tcp
• ftp
•
mapi
• http
•
web-proxy
ftp-proxy
duration
This represents the value in seconds.
rule
The rule number.
policyid
The ID number of the firewall policy that applies to the session or packet. Any
policy that is automatically added by the FortiGate will have an index number
of zero.
identidx
The identity-based policy identification number. This field displays zero if the
firewall policy does not use an identity-based policy; otherwise, it displays the
number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall
policy.
wan_in
This field always displays WAN in.
wan_out
This field always displays WAN out.
lan_in
This field always displays LAN in.
lan_out
This field always displays LAN out.
src_int
The name of the interface used by the source.
dst_int
The name of the interface used by the destination.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
35
Traffic
10
Message ID
10
Log Subtype
explicit-proxy-traffic
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Explicit proxy traffic log message
Fields
Field Description
vd
The virtual domain where the traffic was logged. If no virtual domains are
enabled and configured, this field contains the virtual domain, root.
src
The source IP address.
srcname
The name of the source or the source IP address.
src_port
The source port of the TCP or UDP traffic. The source protocol is zero for
other types of traffic.
dst
The destination IP address.
dstname
The destination name or destination IP address.
dst_port
The destination port number of the TCP or UDP traffic. The destination port is
zero for other types of traffic.
wanopt_app_type
The type of WAN Opt application. This can be any one of the following:
• web-cache
• cifs
• tfp
• ftp
• mapi
• http
• web-proxy
36
duration
This represents the value in seconds.
rule
The rule number.
policyid
The ID number of the firewall policy that applies to the session or packet. Any
policy that is automatically added by the FortiGate will have an index number
of zero.
identidx
The identity-based policy identification number. This field displays zero if the
firewall policy does not use an identity-based policy; otherwise, it displays the
number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall
policy.
wan_in
This field always displays WAN in.
wan_out
This field always displays WAN out.
lan_in
This field always displays LAN in.
lan_out
This field always displays LAN out.
src_int
The name of the interface used by the source.
dst_int
The name of the interface used by the destination.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Traffic
11
Message ID
11
Log Subtype
failed-conn
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
Failed connection attempts
Fields
Field Description
vd
The virtual domain where the traffic was logged. If no virtual domains are
enabled and configured, this field contains the virtual domain, root.
src
The source IP address.
srcname
The name of the source or the source IP address.
src_port
The source port of the TCP or UDP traffic. The source protocol is zero for
other types of traffic.
src_int
The source interface name.
dst
The destination IP address.
dstname
The destination name or destination IP address.
dst_port
The destination port number of the TCP or UDP traffic. The destination port is
zero for other types of traffic.
dst_int
The destination interface name.
policyid
The ID number of the firewall policy that applies to the session or packet. Any
policy that is automatically added by the FortiGate will have an index number
of zero.
custom
The log field that a user has created. This is referred to as a custom log field
because the name can be anything, for example, hq.
action
The action that was taken by the unit. This can be any one of the following:
• dns – a DNS lookup
•
ip – an IP connection
• url – a URL connection
SN
The session number of the log message.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
37
Traffic
38
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
Event-Administration log messages record what administration users are configuring on the FortiGate unit,
and what is occurring on the FortiGate unit. For example, memory storage is becoming full.
32001
32087
32152
32003
32123
32153
32004
32124
32155
32008
32125
32156
32010
32126
32157
32010
32127
32158
32011
32128
32161
32012
32129
32162
32013
32130
32168
32014
32131
32170
32015
32132
32171
32016
32133
32172
32017
32134
32180
32020
32135
32200
32021
32136
32545
32022
32137
32546
32095
32138
32547
32101
32139
32548
32102
32140
32549
32103
32141
32104
32142
32105
32143
32016
32144
32017
32145
32120
32148
32121
32149
32122
32150
32086
32151
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
39
Event-Administration
32001
Message ID
32001
Log Subtype
Admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An administrator successfully logged into the FortiGate unit.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
action
This field always contains login.
status
This field always contains success.
reason
The reason for the event. This field is either timeout or exit, depending on
the action taken.
profile
The administrator’s access profile.
msg
Administrator <admin_name> logged in successfully from
<ui(<ip_address>).
32002
40
Message ID
32002
Log Subtype
Admin
Severity
Alert
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what is in the msg field, the meaning can be any one of the
following:
• There is alarm testing occurring.
• The administrator failed to log in.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
Note: If this is an alarm test, this field will contain cli.
action
This field always contains login.
status
This field always contains failed
reason
The reason for the event. This field always contains test.
profile
The administrator’s access profile.
msg
This field contains any one of the following:
• Alarm testing
• Administrator <admin_name> login failed from <ui>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32003
Message ID
32003
Log Subtype
Admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what the msg field contains, the meaning can be any one of
the following:
• An administrator was successfully logged out because of inactivity. The
FortiGate unit automatically logged them out.
• An administrator successfully logged out of the user interface.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
action
This field always contains logout.
status
This field always contains success.
reason
The reason for the event. This field is either timeout or exit, depending on
the action taken.
msg
This field contains any one of the following:
• Administrator <admin_name> timed out from <ui(<ip_address>)>
• Administrator <admin_name> logged out from <ui<ip_address>)>
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains information.
32004
Message ID
32004
Log Subtype
Admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The meaning can be one of the following, depending on the msg field:
• Alarm testing is occurring on the FortiGate unit.
• System has entered error-mode.
Fields
Field Description
action
This field always contains error-mode.
reason
The reason for the trigger. This field can contain self-test if the log message
is about alarm testing.
msg
This field contains any one of the following:
• Alarm testing is occurring on the FortiGate unit
• System enters error mode due to <string>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
41
Event-Administration
32006
42
Message ID
32006
Log Subtype
Admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what is in the msg field, the meaning can be any one of the
following:
• The user has entered the specified virtual domain.
• The FortiGate unit ‘s system has started.
Fields
Field Description
user
The name of the user creating the traffic. In this log message, it is an
administrator, or an administrator that has the super_admin profile.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 access the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
action
This field always contains vdom-switch.
reason
This field always contains none.
msg
This field contains any one of the following:
• User <user_name> has entered the virtual domain
<virtual_domain_name>.
• FortiGate started
Message ID
32006
Log Subtype
Admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGate unit has started.
Fields
Field Description
msg
Fortigate started.
vd
The name of the virtual domain where the action occurred in. If no virtual
domain exist, this field always contains root.
pri
The priority level. This field always contains information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32007
Message ID
32007
Log Subtype
Admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The super admin has left the specified virtual domain.
Fields
Field Description
user
The name of the user creating the traffic. In this log message, it is an
administrator, or an administrator that has the super_admin profile.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
action
This field always contains vdom-switch.
reason
This field always contains none.
msg
User <user_name> has left the virtual domain <virtual_domain_name>
Message ID
32007
Log Subtype
Admin
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGate unit cannot store the configuration file because the local
drive does not have enough space left.
Fields
Field Description
msg
Cannot store config due to short of flash space: require <number_blocks>
blocks, only <number_blocks> free blocks left on flash disk.
32008
Message ID
32008
Log Subtype
Admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The specified user has viewed the specified log files in memory or on the
disk.
Fields
Field Description
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
log
The name of the log file.
msg
This field can be any of the following:
• User <user_name. has viewed the memory logs from <ui>.
• User <user_name> has viewed disk logs from <ui>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
43
Event-Administration
32010
44
Message ID
32010
Log Subtype
Admin
Severity
Emergency
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on the content in the msg field, the meaning can be any one of
the following:
• The log roll has reach the maximum number.
• The amount of logs exceeds the disk size and the rolled log file was
deleted.
• The log disk has reached a specific percentage point that, once passed,
the system will either overwrite the logs or stop logging.
• The log is full.
• The space in memory for logs is full.
Fields
Field Description
msg
This field contains any of the following:
• Disk has rolled the max number of times, it will not roll logs again until
deleting of the old rolled logs
• Disk log exceeds <percentage> of disk size. Deleted rolled log file name
<log_name>
• DLP archive is <percentage> full.System will overwrite old DLP archive.
• Log disk is <percentage> full. System will stop logging.
• Log is <percentage> full.
• Memory <percentage> log is <percentage> full.
• Disk logs exceeed full final warning threshold. Deleted rolled log file <file
name>
• Disk logs exceed full final warning threshold. Deleted rolled packet
directory <directory>
• Disk logs eceeed full final warning threshold. Deleted rolled dlp-archive
directory <directory>
Message ID
32010
Log Subtype
Admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on the content in the msg field, the meaning can be any one of
the following:
• The system uploads the oldest log files because the storage is to
capacity.
• The system deletes the oldest log files, then uploads another group of log
files.
• The system deletes the uploaded log files.
Fields
Field Description
action
This field always contains delete. This only appears when the system has
deleted uploaded logs.
msg
This field contains any of the following:
• <string> is <string> full.System will upload oldest <number> logs.
• <string> is <string> full.System will delete oldest <number> uploaded
logs, and upload another oldest <number> un-uploaded logs.
• System deleted logs that are uploaded
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32011
Message ID
32011
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The disk log has rolled.
Fields
Field Description
action
The action the FortiGate unit took. This field always contains roll-log.
reason
The reason for rolling the log file. This field contains schedule because the
log was rolled at a specified date and time that was previously configured.
log
The type of log that was rolled. This field contains all.
msg
Disk log has rolled.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The level of priority. This field always contains notice.
log
This field always contains all.
Message ID
32011
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The disk log has rolled.
Fields
Field Description
action
The action the FortiGate unit took. This field always contains roll-log.
reason
The reason for rolling the log file. This field contains file-size.
log
The type of log that was rolled.
msg
Disk log has rolled.
Message ID
32011
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The disk log has rolled.
Fields
Field Description
action
The action the FortiGate unit took. This field always contains roll-log.
reason
The reason for rolling the log file. This field contains log-format-change.
log
The type of log that was rolled.
msg
Disk log has rolled.
Message ID
32011
Log Subtype
Admin
Severity
Emergency
Firmware version
FortiOS 4.0 MR3
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
45
Event-Administration
46
Meaning
Depending on the content in the msg field, this field contains any one of the
following:
• The system’s memory is full and that is why the system entered error
mode.
• The disk is filled to capacity with log files, and that is why the system
entered error mode.
• The system entered error mode but it is unclear as to why.
Fields
Field Description
action
The action the FortiGate unit took. This field always contains error-mode
reason
The reason for rolling the log file. This field contains memory-log-full, disklog full or unknown.
msg
This field contains any one of the following:
• CC error: Memory logs are full. System entered error mode.
• CC error: Disk logs are full. System entered error mode.
• CC error: Unknown. System entered error mode.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32012
Message ID
32012
Log Subtype
Admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGate system is exiting out of error mode.
Fields
Field Description
action
The action the FortiGate unit took. This field always contains exit-errormode.
msg
System existing out of error mode.
Message ID
32012
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The log disk is almost full, and will resume archiving log data.
Fields
Field Description
msg
Log disk is under <string> full. System will resume logging content archive
data.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
47
Event-Administration
32013
Message ID
32013
Log Subtype
Admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A user has cleared the disk log from either the web-based manager or CLI.
Fields
Field Description
user
The name of the user creating the traffic.
log
The log identification number.
msg
User <user_name> has cleared disk log from <ui>
Message ID
32013
Log Subtype
Admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what appears in the msg field, the meaning can be any one
of the following:
• A user has deleted rolled log files.
• A user cleared all current logs.
• A user has cleared FortiGuard Analysis Service logs from the specified
location.
• A user has removed filtered data from memory logs.
• A user cleared logs associated with the FortiGuard Analysis Service.
• A user has removed filtered data from disk logs.
• A user has deleted one rolled log file from either the web-based manager
or CLI.
• A user has cleared current logs from the disk.
Fields
Field Description
user
The name of the user creating the traffic. For this log message, it can be
user or administrator.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
period
The period’s information. This field does not always show in all 32013 log
messages.
log
The log identification number.
msg
This field contains any one of the following:
• User <user_name> has deleted rolled <integer> log files from <ui>
• User <user_name> has cleared all current logs <percentage_memory>
from <ui>
• User <user_name> has cleared logs (FortiGuard Log) from <ui>
• A user has cleared FortiGuard logs from the specified location.
• User <administrator_name> has cleared logs (FortiGuard Analysis
Service) from <ui>
• User <user_name> has removed filtered data from memory logs from
<ui>
• User <user_name> has cleared logs (FortiGuard Analysis Service) from
<ui>
48
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
• User <user_name> has removed filtered data from disk logs from <ui>
• User <user_name> has deleted 1 rolled <rolled_interger> log file
(<log_file_name>) from <ui>
• User has deleted 1 rolled <string> log (disk) from <ui>
• User <user_name> has cleared current <string> log (disk) from <ui>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
49
Event-Administration
32014
Message ID
32014
Log Subtype
Admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what appears in the msg field, the meaning can be any one
of the following:
• The FDS support license is expiring.
• The FDS AV license is expiring.
• The FDS IPS license is expiring.
• The FortiGuard customer support license expires in the specified number
of days.
• The FortiGuard Antivirus update license will expire in the specified
number of days.
• The FortiGuard IPS update license will expire in the specified number of
days.
• The FortiGuard web filtering license will expire in the specified number of
days.
• The FortiGuard anti-spam license will expire in the specified number of
days.
• The FortiGuard Analysis Service license will expire in the specified
number of days.
• The FortiGuard Management Service license will expire in the specified
number of days
Fields
Field Description
msg
This field contains any one of the following:
• FDS support license will expire in <integer> day(s)
• FDS AV license will expire in <integer> day(s)
• FDS IPS license will expire in <integer> day(s)
• FortiGuard customer support license will expire in <value> day(s)
• FortiGuard AV update license will expire in <value> day(s)
• FortiGuard IPS update license will expire in <value> day(s)
• FortiGuard web filtering license will expire in <value> day(s)
• FortiGuard anti-spam license will expire in <value> day(s)
• FortiGuard analysis service license will expire in <value> day(s)
• FortiGuard management service license will expire in <value> day(s)
32015
50
Message ID
32015
Log Subtype
Admin
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
Log disk is full.
Fields
Field Description
msg
Log disk is <percentage> full
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32016
Message ID
32016
Log Subtype
Admin
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGuard disk quota is full and the system will either overwrite or stop
logging when the quota is used.
Fields
Field Description
msg
FortiGuard disk quota is <value> use. System will {overwrite | no log} once
passed all quota is used.
Message ID
32016
Log Subtype
Admin
Severity
Emergency
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGuard Analysis Service disk quota is full and the system will either
overwrite or stop logging when the quota is used.
Fields
Field Description
msg
FortiGuard Analysis Service disk quota is <value> used. System will
{overwrite | no log} once passed all quota is used.
Message ID
32016
Log Subtype
Admin
Severity
Emergency
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGuard Analysis Service disk quota is full.
Fields
Field Description
msg
FortiGuard Analysis Service disk quota is <value> used.
Message ID
32016
Log Subtype
Admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGuard Analysis Service disk quota is full.
Fields
Field Description
msg
FortiGuard Analysis Service disk quota is <value> used. System will
{overwrite | no log} once the full quota is used.
Message ID
32016
Log Subtype
Admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGate unit has stopped logging to the FortiGuard Analysis server
because of the amount of disk quota that has been used. Logging will
resume after an amount of time has passed, in seconds.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
51
Event-Administration
52
Fields
Field Description
msg
FortiGuard Analysis Service disk quota is <value> used. System stops
logging until <seconds> later.
Message ID
32016
Log Subtype
Admin
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The user failed to view logs from a specified location.
Fields
Field Description
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
msg
This field contains any one of the following:
• User <user_name> failed to access the <log_file_name> logs from <ui>
• User <user_name> failed to access the <log_file_name> logs from <ui>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32017
Message ID
32017
Log Subtype
Admin
Severity
Alert
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what appears in the msg field, the meaning can be any one
of the following:
• The FortiGuard daily quota is reached.
• The FortiGuard Analysis Service daily quota is full.
Fields
Field Description
msg
This field contains any one of the following:
• FortiGuard daily quota is reached. System stops logging until <value>
sec later.
• FortiGuard Analysis Service daily quota is reached. System stops logging
until <seconds> sec later.
32020
Log Subtype
Admin
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
A corrupted MAC packet was detected.
Fields
Field Description
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
action
The action information.
status
The status information.
reason
The reason information.
profile
The name of the profile that was used to detect and take action.
msg
Corrupted MAC packet detected.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
53
Event-Administration
32021
Message ID
32021
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The user disabled the virtual domain root from the web-based manager,
CLI or console.
Fields
Field Description
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
msg
User <user_name> disabled virtual domain root from <ui ip_address>>
32022
54
Message ID
32022
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator enabled a virtual domain.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
msg
User <admin_name> enabled virtual domain <vd_name> from
<ui(<ip_address>)>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32086
Message ID
32086
Log Subtype
Admin
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The system has been changed to Transparent mode (LCD) from the LCD
interface.
Fields
Field Description
user
The administrator who is creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
Note: In this log message, this field always contains lcd.
action
The action that was taken.
status
This field always contains success.
msg
System has been changed to transparent mode LCD via LCD.
32087
Message ID
32087
Log Subtype
Admin
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The system has been changed to NAT/Route mode (LCD) from the LCD
interface.
Fields
Field Description
user
The administrator who is creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
Note: In this log message, this field always contains lcd.
action
The action that was taken.
status
This field always contains success.
msg
System has been changed to NAT mode LCD via LCD.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
55
Event-Administration
32140
56
Message ID
32140
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator changed the operation mode to Transparent.
Fields
Field Description
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
field
This field contains mode.
old_value
The mode that the FortiGate unit was previously in. This field contains
either NAT or TP, depending on what mode the FortiGate unit was
previously in.
new_value
The mode that the FortiGate unit is now in. This field contains either NAT or
TP, depending on what mode the FortiGate unit was changed to.
msg
User <administrator_name> changed to TP opmode from
<ui>(<ip_address>
Message ID
32140
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator changed the global settings on the FortiGate unit,
allowing virtual domain configuration.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password
on the FortiGate-51B (IP address is 10.10.20.5). This field shows their
point-of-entry in this field, GUI(10.10.20.5).
action
The status of the virtual domain feature. This field always contains enable.
field
This field always contains virtual-domain.
msg
User <admin_name> changed global settings from <ui(<ip_address>)>
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains notice.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32141
Message ID
32141
Log Subtype
Admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The specified interface received a new DHCP lease address.
Fields
Field Description
msg
interface <interface_name> gets a DHCP lease, ip:<ip_address>,
mask:<netmask>, gateway:<gateway_ip>, lease expires:<day_of_week>
<month> <date> <hh:mm:ss:> <yyyy>
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
pri
The priority level. This field is always information.
id
The identification number.
32095
Message ID
32095
Log Subtype
Admin
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The specified administrator has performed a specified action on the FortiGate
unit.
Fields
Field Description
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
action
The type of action that the FortiGate unit took. This field contains any one of the
following:
• reboot
• shutdown
• reload
• backup
• factory_reset
• restore (all types of configuration files)
• upgrade (upgrade the
firmware)
• switch_mode
• download (all types of
configuration files)
• upload
• clear_mlog (clear all log in
memory buffer)
• del_log (delete log)
• update (virus or IPS
signatures)
• downgrade (downgrade the firmware)
• del_session (delete session)
• bootup
status
This field contains either success or failure.
msg
<action_type OR file_name> by user <administrator_name> via <ui>
Note: The beginning of the sentence depends on what type of action was taken,
and if a file was downloaded or not.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
57
Event-Administration
58
Message ID
32095
Log Subtype
Admin
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
A user has downloaded a log file from the firewall from the within the web-based
manager.
Fields
Field Description
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
Note: In this log message, the location is the web-based manager.
action
The type of action that the FortiGate unit took. This field contains any one of the
following:
• reboot
• shutdown
• reload
• backup
• factory_reset
• restore (all types of configuration files)
• upgrade (upgrade the
firmware)
• switch_mode
• download (all types of
configuration files)
• upload
• clear_mlog (clear all log in
memory buffer)
• del_log (delete log)
• update (virus or IPS
signatures)
• downgrade (downgrade the firmware)
• del_session (delete session)
• bootup
status
This field contains either success or failure.
hash
The hash information.
file
The name of the log file.
msg
<action_type OR file_name> by user <administrator_name> via <ui>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32101
Message ID
32101
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added a new access profile.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
profile
The name of the administration access profile that was created.
msg
User <administrator_name> added new access profile <string> from {GUI | CLI |
console}
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
pri
The priority level. This field always contains notice.
Message ID
32101
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator changed the configuration from the LCD interface.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
msg
<administrator_name> by <ui>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
59
Event-Administration
32102
60
Message ID
32102
Log Subtype
Admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added a local certificate and is being generated.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
msg
User <admin_name> made a change via <ui(<ip_address>)>: VPN local
certificate <cert_name> has been generated.
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
pri
The priority level. This field always contains information.
module
This field always contains VPN.
submodule
This field always contains cert-local.
Message ID
32102
Log Subtype
Admin
Severity
(Variable): can be any severity level
Firmware version
FortiOS 4.0 MR3
Meaning
A user has changed the configuration.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
module
The module information.
submodule
The submodule information.
msg
User <admin_name> made a change from <ui>
Message ID
32102
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A new firmware image is available from FortiGuard.
Fields
Field Description
user
This field always contains system.
action
The action that was taken. This field always contains firmware.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
status
The status of the firmware. This field always contains new.
msg
New firmware is available from FortiGuard.
Message ID
32102
Log Subtype
Admin
Severity
(Variable): can be any severity level
Firmware version
FortiOS 4.0 MR3
Meaning
A user has changed the configuration for a specific submodule from a specific
location.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
module
The module information.
submodule
The submodule information.
msg
User <admin_name> made a change via <ui>: <ip_address>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
61
Event-Administration
32103
Message ID
32103
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A user deleted an access profile.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
profile
The name of the access profile.
msg
User <administrator_name> deleted an access profile <profile_name> from
<string>
32104
Message ID
32104
Log Subtype
Admin
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
An administrator has failed to update the FortiGate unit.
Fields
Field Description
admin
The name of the administrator creating the traffic.
msg
FortiGate <string> failed
32105
62
Message ID
32105
Log Subtype
Admin
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what appears in the msg field, the meaning can be any one of the
following:
• An administrator has update the databases and engines successfully.
• An administrator has updated AV database successfully.
• An administrator has updated the IDS database successfully.
Fields
Field Description
admin
The name of the administrator creating the traffic.
status
This field always contains update.
virdb
This field always contains yes.
msg
This field contains any one of the following:
• Fortigate <string> virdb(<value>) idsdb(<value>) aven(<value>) idsen(<value>)
from <string>
• Fortigate updated virdb (<value>)
• Fortigate updated idsdb (<value>)
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32120
Message ID
32120
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added a UTM profile.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
action
The type of action that occurred. In this log message, this field can contain add.
msg
Administrator <admin_name> added an <utm_profile_type> <utm_profile_name>
from <ui(<ip_address>)>.
Note: The UTM profile type can be a sensor, such as DLP or IPS.
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
pri
The priority level. This field always contains notice.
cmdb_obj
The type of profile that was used. For example, antivirus.profile.
name
The name of the profile that was used. For example, av_1.
Message ID
32120
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator edited the settings within another administrator.
Fields
Field Description
user
The name of the administrator who is creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
msg
Administrator <admin_name> edited the settings of administrator <admin_name>
from <ui(<ip_address>)>
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
pri
The priority level. This field always contains notice.
name
The name of the administrator whose settings were modified within their account.
Message ID
32120
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added an admin user.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
63
Event-Administration
64
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
msg
User <admin_name> added an admin user <admin_name> from
<ui(<ip_address>)>
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
pri
The priority level. This field always contains notice.
name
The name of the administrator who was added.
Message ID
32120
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added a new interface.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
msg
User <admin_name> added a new interface <interface_name> from
<ui(<ip_address>)>
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
pri
The priority level. This field always contains notice.
intf
The name of the new interface. For example, interface_1
Message ID
32120
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator modified the settings within another administrator’s account.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
msg
Administrator <admin_name> edited the settings of administrator <admin_name>
from <ui(<ip_address>)>
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
pri
The priority level. This field always contains notice.
name
The name of the administrator who had their settings modified by another
administrator.
Message ID
32120
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator modified the settings within another administrator’s account.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
msg
User <admin_name> added a user group <user_group_name> from
<ui(<ip_address>)>
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
pri
The priority level. This field always contains notice.
name
The name of the new user group.
Message ID
32120
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added a new Directory Server (FSAE) entry.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
msg
User <admin_name> added a Directory Server (FSAE) entry <fsae_entry_name>
from <ui(<ip_address>)>
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
pri
The priority level. This field always contains notice.
name
The name of the new FSAE entry.
server
The FSAE’s IP address.
Message ID
32120
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added a new report dataset.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
65
Event-Administration
66
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
name
The name of the report dataset.
msg
User <admin_name> added a report dataset <dataset_name> from <ui>
Message ID
32120
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added a new report chart widget.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
name
The name of the report chart.
msg
User <admin_user> added a report chart widget <chart_name> from <ui>
Message ID
32120
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added report summary entry.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
name
The name of the report summary entry that were added.
msg
User <admin_name> added a report summary entry <summary_entry> from <ui>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32121
Message ID
32121
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator modified settings within a UTM profile.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
action
The type of action that occurred. This field always contains modify.
msg
Administrator <admin_name> changed a <utm_profile_type>
<utm_profile_name> from <ui(<ip_address>)>
Note: The UTM profile can be a sensor, such as DLP or IPS.
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
pri
The priority level. This field is always notice.
cmdb_obj
The type of profile that was used. For example, antivirus.profile.
name
The name of the profile that was used. For example, av_1.
Message ID
32121
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator changed the interface setting.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
intf
The name of the interface of the originating traffic.
field
This field contains either status or mtu.
old
This field contains either up or down.
new
This field contains either up or down.
msg
This field contains any one of the following:
• User <administrator_name> changed the status of interface {internal | external |
dmz | <other>...} from <ui>
• User <administrator_name> changed the mtu setting of interface
<interface_name> from <ui>
• User <administrator_name> changed the ip setting of the interface
<interface_name> from <ui>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
67
Event-Administration
32122
68
Message ID
32122
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator deleted the specified interface.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
msg
User <administrator_name> deleted interface <interface_name> from
<ui(<ip_address>)>
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
pri
The priority level. This field always contains notice.
intf
The name of the interface that was removed.
Message ID
32122
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator deleted the specified interface.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
name
The name of the administrator who was deleted.
msg
User <administrator_name> deleted an admin user <user_name> from <ui>
Message ID
32122
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An administrator deleted another administrator’s account.
Fields
Field Description
user
The administrator who is creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
msg
User <admin_name> deleted user <admin_user> from <ui(<ip_address>)>
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
pri
The priority level. This field always contains notice.
name
The name of the administrator who was deleted by another administrator.
Message ID
32122
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator deleted an IPsec manualkey.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
name
The name of the manual key that was deleted by the administrator.
remote-gw
The IP address of the remote gateway.
msg
User <administrator_name> deleted an ipsec manualkey <manualkey_name>
from <ui>
Message ID
32122
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator deleted an FSAE entry.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
msg
User <administrator_name> deleted a Directory Service (FSAE) entry
<fsae_entry_name> from <ui(<ip_address>)>
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
pri
The priority level. This field always contains notice.
name
The name of the entry that was remove from the list.
server
The removed FSAE’s IP address.
Message ID
32122
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
69
Event-Administration
70
Meaning
Depending on what appears in the msg field, the meaning can be any one of the
following:
• An administrator deleted a CA certificate.
• An administrator has removed all CA certificates.
• An administrator deleted a local certificate.
• An administrator deleted all local certificates.
• An administrator deleted a CRL certificate.
• An administrator deleted all CRLs.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
name
The name of the administrator who deleted or removed the certificate.
msg
This field contains any one of the following:
• User <administrator_name> removed a CA certificate <certificate_name> from
<ui>
• User <administrator_name> removed all CA certificates from <ui>
• User <administrator_name> deleted a local certificate <certificate_name> from
<ui>
• User <administrator_name> removed all local certificates from <ui>
• User <administrator_name> removed a CRL certificate <certifcate_name> from
<ui>
• User <administrator_name> removed all CRL certificates from <ui>
Message ID
32122
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator deleted a dataset.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
name
The name of the report dataset.
msg
User <admin_name> delete a report dataset <dataset_name> from <ui>
Message ID
32122
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator deleted a chart widget.
Fields
Field Description
user
The name of the administrator creating the traffic.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
name
The name of the report chart widget.
msg
User <admin_name> delete a report chart widget <chart_name> from <ui>
Message ID
32122
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator deleted a chart widget.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
name
The name of the report summary entry.
msg
User <admin_name> delete a report summary entry <summary_entry> from <ui>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
71
Event-Administration
32123
72
Message ID
32123
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added the specified static route entry.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
status
The status of the route entry. This field contains up.
msg
User <administrator_name> added new static routing entry <seq_number> from
<ui(<ip_address>)>
dst
The destination IP address.
seq
The number that describes where the entry is in the static route entry table.
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
pri
The priority level. This field always contains notice.
device
The interface that will be using the static route.
distance
The distance number.
priority
The priority number.
flags
The flags information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32124
Message ID
32124
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator made the specified changes to the static route entry.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
seq
The sequence number or the number of the order of that entry within the list.
old_device
The previous interface.
old_distance
The previous hops’ number.
old_priority
The previous administrative priority.
old_dst
The previous destination IP address.
old_status
The previous status. This field contains either up or down.
old_flags
The previous flag string.
new_device
The new interface.
new_distance
The new hops’ number.
new_priority
The new administrative priority.
new_dst
The new destination IP address.
new_status
The new status. This field contains either up or down.
new_flags
The new flag information.
msg
User <administrator_name> changed the setting of a new static routing entry from
<ui>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
73
Event-Administration
32125
Message ID
32125
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator deleted the specified static route entry.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
seq
The NAT identification number. For example, the first entry in the table is 1, so this
field displays 1.
device
The interface.
distance
The hops’ number information.
priority
The administrative priority.
dst
The destination IP address.
status
The status. This field contains either up or down.
flags
The flag information.
msg
User <administrator_name> deleted a static routing entry from <ui>
32126
74
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An administrator added a firewall policy.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on the
FortiGate-51B (IP address is 10.10.20.5). This field shows their point-of-entry in
this field, GUI(10.10.20.5).
msg
User <administrator_name> added <iptype> firewall central-nat policy
<nat_id_number> from <ui(<ip_address>)>.
seq
The NAT identification number. For example, the first entry in the table is 1, so
this field dsplays 1.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains notice.
orig-addr
The original source IP address.
nat-ippool
The name of translated IP pool that was applied to the entry.
orig-port
The original source port number.
nat-port
The translated port number range.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32127
Message ID
32127
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An administrator modified a firewall policy.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
msg
User <admin_name> changed IPv4 firewall policy <policy_id_number>
from <ui(<ip_address>)>.
seq
The firewall policy identification number.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field is always notice.
sintf
The name of the source interface or zone applied to the firewall policy.
dstintf
The name of the destination interface or zone applied to the firewall policy.
saddr
The firewall policy’s select source address. For example if you selected all,
then all appears in this field.
daddr
The firewall policy’s selected destination address. For example, if you
selected all, then all appears in this field.
act
The type of action applied to the firewall policy. For example, ACCEPT.
nat
This field contains either no or yes.
iptype
The type of IP address. This can be ipv4 or ipv6, depending if you have
configured IPv4 addresses or IPv6 addresses.
schd
The type of firewall schedule that was selected for that firewall policy.
srv
The type of firewall service applied to the firewall policy. For example, ANY.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
75
Event-Administration
32128
76
Message ID
32128
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator deleted a firewall policy.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
seq
The firewall policy identification number.
sintf
The name of the source interface.
dintf
The name of the destination interface.
saddr
The source IP address.
daddr
The destination IP address.
schd
The name of the schedule.
srv
The network service.
act
The type of action applied to the firewall policy. For example, ACCEPT.
nat
This field contains either no or yes.
log
The log identification number.
iptype
The type of IP address, such as IPv6. This field always contains ipv6.
msg
User <administrator_name> deleted a firewall policy from <ui>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32129
Message ID
32129
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added a local user.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
status
The status of the local user. This field always contains enable.
msg
User <admin_name. added local user <user_name> from
<ui(<ip_address>)>
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains notice.
name
The name of the new local user.
32130
Message ID
32130
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added a new local administrator. The administrator
changed the specified settings for a local administrator.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
name
The name of the new local administrator.
old_status
The old_status information.
new_status
The new_status information.
passwd
The password information.
msg
User <administrator_name> changed a local user’s setting from <ui>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
77
Event-Administration
32131
Message ID
32131
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added a new local administrator. The administrator
changed the specified settings for a local administrator.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
name
The name of the new administrator.
status
This field contains either enable or disable.
msg
User <administrator_name> deleted a local user <administrator_name>
deleted a local user from <ui>
32132
78
Message ID
32132
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added a RADIUS server.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
msg
User <admin_name> added radius server <radius_name> from
<ui(<ip_address>)>
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains notice.
name
The name of the new RADIUS server.
server
The RADIUS server’s IP address.
Message ID
32132
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added a TACACS+ server
Fields
Field Description
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
msg
User <admin_name> added TACACS+ server <tacacs+_name> from
<ui(<ip_address>)>
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains notice.
name
The name of the new TACACS+ server.
server
The TACACS+ server’s IP address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
79
Event-Administration
32133
Message ID
32133
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator made the specified changes to the RADIUS server entry
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
name
The name of the administrator.
old_server
The previous server’s IP address.
new_server
The new server’s IP address.
secret
The server’s encrypted password.
msg
User <administrator_name> changed a radius server
<radius_server_name> setting from <ui>
32134
80
Message ID
32134
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator deleted the RADIUS server from the server list.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
name
The name of the administrator.
server
The server’s IP address.
msg
User <administrator_name> deleted a radius server
<radius_server_name> from <ui>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32135
Message ID
32135
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added a new LDAP server to the list.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
msg
User <admin_name> added ldap server <ldap_name> from
<ui(<ip_address>)>
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains notice.
name
The name of the new LDAP server.
server
The LDAP server’s IP address.
32136
Message ID
32136
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator made the specified changes to an LDAP server entry.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
name
The name of the administrator.
old_server
The previous server’s IP address.
old_port
The previous server’s port number.
old_cn
The previous CN value.
old_dn
The previous DN value.
new_server
The new server’s IP address.
new_port
The new server’s port number.
new_cn
The new CN value.
new_dn
The new DN value.
msg
User <administrator_name> changed an ldap server <ldap_server_name>
setting from <ui>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
81
Event-Administration
32137
82
Message ID
32137
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator deleted the LDAP server from the list.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
name
The name of the administrator.
server
The server’s IP address.
msg
User <administrator_name> deleted an ldap user from <ui>
Message ID
32137
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An IM/P2P user was deleted.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
name
The name of the administrator.
policy
The firewall policy identification number.
msg
User <user_name> deleted im/p2p <im/p2puser_name> user
<user_name> from <ui>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32138
Message ID
32138
Log Subtype
Admin
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator either rebooted or shut down the FortiGate unit.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their pointof-entry in this field, GUI(10.10.20.5).
action
This field is either reboot or shutdown.
msg
User <administrator_name> rebooted the device from <ui>. The reason is
“<reason>”
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains critical.
32139
Message ID
32139
Log Subtype
Admin
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator reset the FortiGate unit to its default settings.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
action
This field contains factory-reset.
msg
User <administrator_name> reset to the factory settings from <ui>
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains critical.
Message ID
32139
Log Subtype
Admin
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator or user formatted the log disk on the FortiGate unit.
Fields
Field Description
user
The name of the administrator creating the traffic.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
83
Event-Administration
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
action
This field always contains format-disk.
msg
User <administrator_name> formatted the log disk from <ui>
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains critical.
Message ID
32139
Log Subtype
Admin
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator restored a firmware image.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
action
This field contains any one of the following:
• restore-image
• restore-configuration
• restore-all-configuration
84
msg
User <administrator_name> restored the image from <ui(<ip_address> ->
<ip_address>)
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains critical.
Message ID
32139
Log Subtype
Admin
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what appears in the msg field, the meaning can be any one of
the following:
• The auto-install restored the configuration using the USB key.
• The auto-install restored the firmware image using the USB key.
Fields
Field Description
user
The name of the administrator creating the traffic. In this log message, this
field always contains auto-install. This means that the FortiGate unit
automatically installed the image itself.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
In this log message, this field always contains usb.
action
This field always contains restore-image.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
msg
This field contains any one of the following:
• User auto-install restored the configuration from usb (<ip_address>)
• User auto-install restored the image from usb (<ip_address> ->
<ip_address>)
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains critical.
Message ID
32139
Log Subtype
Admin
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
An administrator has updated either the virus engine and/or the IDS
database.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
action
This field contains update.
msg
This field contains any one of the following:
• User <administrator_name> requested a virus and IDS engine/definitions
update from <ui>
• User <administrator_name> requested an IDS engine/definitions update
from <ui>
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains critical.
Message ID
32139
Log Subtype
Admin
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what appears in the msg field, the meaning can be any one of
the following:
• The system encountered an error when trying to restore an image from the
FortiGuard Analysis and Management Service.
• The system restored an image from the FortiGuard Analysis and
Management Service.
• The system restored a template from the management station.
• The system failed to load a configuration file from the management
station.
Fields
Field Description
user
The name of the administrator creating the traffic. In this log message, this
field contains system.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
action
This field contains any one of the following:
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
85
Event-Administration
• restore-image
• restore-template
• restore-configuration
86
msg
This field contains any one of the following:
• System loaded an image from FortiGate Management, the new image has
an invalid CC signature.
• System restored the image from FortiGuard Management (<ip_address>
-> <ip_address>)
• System restored configuration template <template_name> from
management station.
• System failed to restore configuration from management station.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains critical.
Message ID
32139
Log Subtype
Admin
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what appears in the msg field, the meaning can be any one of
the following:
• The administrator loaded an image with a valid RSA signature from a
FortiManager unit, which includes a new public key.
• The administrator loaded a firmware image from a FortiManager unit and
that image has an invalid or no RSA signature.
• The administrator loaded an image with a valid RSA signature from a
FortiManager unit.
• The administrator updated the firmware image from a FortiManager unit.
Fields
Field Description
user
The name of the administrator creating the traffic. In this log message, this
field contains system.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
action
This field always contains update-image.
msg
This field contains any one of the following:
• User <user_name> loaded an image from FortiManager, the new image
does have a valid RSA signature with new public key.
• User <user_name> loaded an image from FortiManager, the new image
has an invalid RSA signature.
• User <user_name> loaded an image from FortiManager, the new image
does have a valid signature.
• User <user_name> loaded an image from FortiManager, the new image
does not have a valid RSA signature.
• User <user_name> updated the image from FortiManager (<ip_address>
-> <Ip_address>)
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains critical.
Message ID
32139
Log Subtype
Admin
Severity
Critical
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator loaded a diagnostic application.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
action
This field contains loaded-diag-app.
msg
User <administrator_name> loaded a diagnostic application from <ui> with
serial number <serial_number>. The executable result= <string>
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains critical.
Message ID
32139
Log Subtype
Admin
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what appears in the msg field, the meaning can be any one of
the following:
• The system loaded an image that contains an invalid RSA signature.
• The administrator uploaded an image with an invalid RSA signature.
• The administrator uploaded an image with a valid RSA signature and new
public key.
• The administrator uploaded an image with a valid RSA signature.
• The administrator uploaded an image that does not have a valid RSA
signature.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
action
This field contains loaded-image.
msg
This field contains any one of the following;
• System loaded an image from FortiGuard Management, the new image
has an invalid RSA signature
• User <administrator_name> loaded an image from <ui>, the new image
has an invalid signature.
• User <administrator_name> loaded an image from <ui>, the new image
does have a valid RSA signature with a new public key.
• User <administrator_name> loaded an image from <ui>, the new image
does have a valid RSA signature.
• User <administrator_name> loaded an image from <ui>, the new image
does not have a valid RSA signature.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains critical.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
87
Event-Administration
Message ID
32139
Log Subtype
Admin
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
Depening on what is in the msg field, the meanning can be any one of the
following:
• The administrator restored a FortiClient firmware image.
• The administrator updated the firmware.
• The administrator restored a firmware image.
• The administrator successfully restored the configuration file.
• The administrator failed to restore the configuration file.
• The administrator restored a complete configuration.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
action
This field contains any one of the following: restore-forticlient.
• restore-forticlient
• update
• restore-image
• restore-configuration
• restore-all-configuration
88
msg
This field contains any one of the following:
• User <administrator_name> restored the image <image_name> from <ui>
• User <administrator_name> updated the firmware from <ui>
• User <administrator_name> restored image from <ui>(<ip_address> ->
<ip_address>)>
• User <administrator_name> restored the configuration from <ui>
• User <administrator_name> failed to restored the configuration from <ui>
• User <administrator_name> restored all the configuration from <ui>
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains critical.
Message ID
32139
Log Subtype
Admin
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator either loaded a firmware image that does not support CC
mode or the image has an invalid CC signature.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
action
This field contains either loaded-image or update-image
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
msg
This field contains any one of the following:
• User <administrator_name> loaded the image from <ui> the new image
does not support CC mode.
• User <administrator_name> loaded an image from <ui>, the new image
has an invalid CC signature.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains critical.
Message ID
32139
Log Subtype
Admin
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator imported a certificate.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
action
This field contains import-certificate.
msg
User <administrator_name> imported the certificate from <ui>
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains critical.
Message ID
32139
Log Subtype
Admin
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator loaded a firmware image from a FortiManager unit and
that image has an invalid RSA signature.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
Note: For this log message, the location is FortiManager.
action
This field always contains update-image.
msg
User <user_name> loaded an image from FortiManager, the new image has
an invalid RSA signature.
Message ID
32139
Log Subtype
Admin
Severity
Critical
Firmware version
FortiOS 4.0 MR3
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
89
Event-Administration
90
Meaning
Depending on what is in the msg field, the meaning can be any one of the
following:
• The system uploaded a firmware image from the FortiGuard Analysis and
Management Service, however, the image has an invalid CC signature.
• The system uploaded a firmware image from the FortiGuard Analysis and
Management Service, however, the image has an invalid RSA signature.
• The system uploaded a firmware image from the FortiGuard Analysis and
Management Service, and the image has a valid RSA signature with new
public key.
• The system uploaded a firmware image from the FortiGuard Analysis and
Management Service, and the image has a valid RSA signature.
• The system uploaded a firmware image from the FortiGuard Analysis and
Management Service, and the image does not has a valid RSA signature.
• The system restored a firmware image from FortiGuard Analysis and
Management Service.
Fields
Field Description
user
The name of the administrator creating the traffic. For this log message, the
user is the FortiGate system, or system.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
action
This field contains any one of the following: .
•
restore-image
•
restore-image
• loaded-image
msg
This field contains any one of the following:
• System loaded an image from FortiGuard Management, the new image
has an invalid CC signature.
• System loaded an image from FortiGuard Management, the new image
has an invalid RSAsignature.
• System loaded an image from FortiGuard Management, the new image
does have a valid RSA signature with new public key.
• System loaded an image from FortiGuard Management, the new image
does have a valid RSA signature.
• System loaded an image from FortiGuard Management, the new image
does not have a valid RSA signature.
• System restored the image from FortiGuard Management
(<firmware_build> -> <firmware_build>)
Message ID
32139
Log Subtype
Admin
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what is in the msg field, the meaning can be any one of the
following:
• The system restored the specified script.
• The system restored a configuration file from the management station.
• The system failed to restore a configuration file from the management
station.
• The system failed to upgrade a firmware image.
• The system failed to restore a firmware image from the management
station.
Fields
Field Description
user
The name of the administrator creating the traffic. For this log message, the
user is the FortiGate system, or system.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
action
This field contains any one of the following:
• restore-script
• restore-cfg
• restore-<string>
• update-image
msg
This field contains any one of the following:
• System restored script <script_name> from management station.
• System restored <string> file <string> from management station.
• System failed to restore <string> file <string> from management station.
• User <user_name> loaded an image from <ui>, System upgrade failed
due to failed operation file.
• System failed to restore <string> file <string> from management station.
Message ID
32139
Log Subtype
Admin
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what is in the msg field, the meaning can be any one of the
following:
• The administrator formatted the RAID disk.
• The administrator enabled the RAID disk.
• The administrator disabled the RAID disk.
Fields
Field Description
user
The name of the administrator creating the traffic. For this log message, the
user is the FortiGate system, or system.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
action
This field contains any one of the following:
• format-rebuild-level
• enable-raid
• disable-raid
msg
This field contains any one of the following:
• User <user-name> formatted the RAID disk from <ui>
• User <user_name> enabled RAID from <ui>
• User <user_name> disabled RAID from <ui>
32140
Message ID
32140
Log Subtype
Admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator changed a global setting.
Fields
Field Description
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
91
Event-Administration
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
field
The type of field within the Administration Settings page that was
changed. For example, if you changed the idle timeout, located in
Timeout Settings, this field would contain timeout.
This field contains any one of the following:
• mode
• virtual-domain
• hostname
• ip-overlap
• timeout
• detection-interval
old_value
The previous setting for the type of field before it was changed. For
example, if you changed the idle timeout from the default time, 5m
would appear in this field.
new_value
The new setting for the type of field that was changed.
msg
User <administrator_name> changed <field_type> global setting to
<new_value> from <ui>.
Message ID
32140
Log Subtype
Admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator changed the user authentication settings.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
field
The type of action that was taken. This field always contains authtimeout.
old_value
The previous timeout period within the authentication settings.
new_value
The new time out period within the authentication settings.
msg
User <admin_name> changed auth-timeout user setting to
<new_value> from <ui(<ip_address>)>
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
pri
The priority level. This field always contains notice.
32141
92
Message ID
32141
Log Subtype
Admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The specified interface has received a new DHCP address. The
address expires at the specified time.
Fields
Field Description
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
id
The identification number.
msg
interface <interface_name> gets a DHCP lease, ip:<ip_address>,
mask:<netmask>, gateway:<gateway_address>, lease
expires:<name_day><name_month> <date> <hh:mm:ss> <yyyy>
32142
Message ID
32142
Log Subtype
Admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what appears in the msg field, the meaning can be any
one of the following:
• The administrator backed up the current configuration to a file.
• The administrator backed up the specified file.
• The administrator failed to back up the specified file.
• The administrator backed up all the logs.
• A configuration file was automatically backed up to the management
station successfully.
• The administrator failed to back up all log files.
• The system backed up the configuration file to the FortiGuard
Analysis and Management Service, per a request from the FortiGuard
Analysis and Management Service portal.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
The type of action that was taken by the administrator. This field always
contains backup.
reason
The reason for the trigger. For this log message, the service portal of the
FortiGuard Analysis and Management Services was used.
msg
This field contains any one of the following.
• User <administrator_name> backed up the configuration from <ui>
• User <administrator_name> backed up <file_name> log from <ui>
• User <administrator_name> failed to backup <file_name> log from
<ui>
• User <administrator_name> backed up all the logs from <ui>
• Automatic configuration backup to Management Station succeeded
• User <administrator_name> failed to back up all the logs from <ui>
• System backed up configuration to Management Station per service
portal request.
Message ID
32142
Log Subtype
Admin
Severity
Warning
Firmware version
FortiOS 4.0 MR3
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
93
Event-Administration
94
Meaning
Depending on what appears in the msg field, the meaning can be any
one of the following:
• The administrator backed up a standardized error output by SCP.
• The administrator backed up a batch of mode commands by SCP.
• The administrator failed to update the antivirus package by SCP.
• The administrator successfully updated the antivirus package by SCP.
• The administrator successfully update the IPS package by SCP.
• The administrator failed to update the IPS package by SCP.
• The administrator failed to update the DLP fingerprint database by
SCP.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
Note: For this log message, location is FortiManager or the
FortiManager unit.
action
The type of action that was taken by the administrator. This field
contains either update or backup.
msg
This field contains any one of the following.
• User <user_name> backed up the result of batch mode commands by
SCP.
• User <user_name> backed up the result of batch mode commands by
SCP.
• User <user_name> failed to update AV package by SCP.
• User <user_name> updated AV package by SCP.
• User <user_name> failed to update IPS package by SCP.
• User <user_name> updated IPS package by SCP.
• User <user_name> failed to update DLP fingerprint database by SCP.
Message ID
32142
Log Subtype
Admin
Severity
Alert
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator deleted a configuration revision from the database.
Fields
Field Description
action
The type of action that was taken by the administrator. This field always
contains delete.
status
This field always contains success.
msg
<configuration_revision_name> has been deleted from revision
database.
Message ID
32142
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what is in the msg field, the meaning can be any one of
the following:
• The administrator backed up a configuration file to the management
station.
• The administrator deleted a configuration file from the local hard disk.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
The type of action that was taken by the administrator. This field is either
backup or delete.
status
This field always contains success.
msg
This field contains any one of the following:
• User <user_name> backed up the configuration from <ui> to
management station.
• User <user_name> delete the <string> from <string> from flash disk.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
95
Event-Administration
32143
96
Message ID
32143
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator loaded the wrong image type.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
The type of action that was taken by the administrator. This field always
contains loaded-image.
msg
User <administrator_name> loaded a wrong image from <ui>
Message ID
32143
Log Subtype
Admin
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator changed the policy routing entry.
Fields
Field Description
user
The name of administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
msg
User <administrator_name> changed policy routing entry
<incoming_interface> from <ui(<ip_address>)>
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
pri
The priority level. This field always contains notice.
old_iff
The previous incoming interface.
new_iff
The new incoming interface.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32144
Message ID
32144
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An administrator added a policy routing entry.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
msg
User <admin_name> added policy routing entry
<outgoing_interface_name> from <ui(<ip_address>)>
src
The source IP address.
dst
The destination IP address.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
pri
The priority level. This field always contains notice.
iff
The “if” interface. In the policy routing entry, you must specify the
interface “if”.
ipproto
The IP protocol number.
ports
The destination port range. For example ports 1-65535.
off
The outgoing interface. This is the interface that was chosen in the
section Force traffic to: on the New Routing Policy page.
gw
The gateway IP address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
97
Event-Administration
32145
98
Message ID
32145
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An administrator deleted a policy routing entry.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
iff
The name of the incoming interface.
src
The source IP address.
dst
The destination IP address.
proto
The name of the protocol.
ports
The range of port numbers.
off
The outgoing interface.
gw
The gateway IP address.
msg
User <administrator_name> deleted a policy routing entry
Message ID
32145
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Found a new neighbor.
Fields
Field Description
msg
Found a new connection to <connection_name> (<connection_ip>)
Message ID
32145
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Lost a neighbor.
Fields
Field Description
msg
Found a new connection to <connection_name> (<connection_ip>)
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32148
Message ID
32148
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An administrator required a CRL update.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
The type of action that was taken. This field is always crl-update.
crl
The name of the CRL.
msg
User <administrator_name> requested a CRL update from <ui>
Message ID
32148
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The specified administrator changed a configuration.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
The type of action the administrator took.
obj
The object information.
entry
The entry information.
msg
Administrator <administrator_name> of <location> from {GUI CLI}
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
99
Event-Administration
32149
Message ID
32149
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A command failure occurred.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
ret
The ret value information.
msg
Command failed: <value>. Return code <value>
32150
100
Message ID
32150
Log Subtype
Admin
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
An administrator changed the password of another administrator.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
The action that was taken by the user. This field always contains
password-changed
field
This field always contains password.
msg
Admin user <admin_name> changed password of admin user
<admin_user>
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
pri
The priority level. This field always contains warning.
admin-user
The name of the administrator who had their password changed.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32151
Message ID
32151
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what is in the msg field, the meaning can be any one of
the following:
• A new firewall local-in policy was added.
• A new IPv6 firewll local-in policy was added.
Fields
Field Description
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
32152
Message ID
32152
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what is in the msg field, the meaning can be any one of
the following:
• A firewall local-in policy’s setting was changed.
• An IPv6 firewall local-in policy’s setting was changed.
Fields
Field Description
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
32153
Message ID
32153
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what is in the msg field, the meaning can be any one of
the following:
• A firewall local-in policy was deleted.
• An IPv6 firewall local-in policy was deleted.
Fields
Field Description
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
101
Event-Administration
32154
Message ID
32154
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator uploaded a FortiToken.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
msg
User <user_name> has uploaded a FortiToken file.
32155
102
Message ID
32155
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator has requested to activate the specified FortiToken.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
This field always contains fortitoken-activate.
serialno
The serial number of the FortiToken device.
msg
User <user_name> has requested to activate FortiToken <serialno>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32156
Message ID
32156
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiToken has been activiated by FortiGuard.
Fields
Field Description
action
This field always contains fortitoken-activate
serialno
The serial number of the FortiToken device.
status
The status of the activation process.
msg
Activation of FortiToken <serialno> <status>.
32157
Message ID
32157
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added an email filter IP black/white list entry.
Fields
Fields Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
status
The status of the UTM profile. This field always contains enabled.
ip
The IP address.
msg
User <admin_name> added antispam IP black/white entry <ip_address>
from <ui(<ip_address>)>
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains notice.
Message ID
32157
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added an email address black/white list entry.
Fields
Fields Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
status
The status of the UTM profile. This field always contains enabled.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
103
Event-Administration
104
ip
The IP address.
msg
User <admin_name> added email black/white entry <email_address> from
<ui(<ip_address>)>
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains notice.
email-pattern
The email address entry. For example, [email protected].
Message ID
32157
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added a banned word to the email filtering banned word
list.
Fields
Fields Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
status
The status of the UTM profile. This field always contains enabled.
msg
User <admin_name> added antispam banned word entry <banned_word>
from <ui(<ip_address>)>
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains notice.
pattern
The banned word entry.
Message ID
32157
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added an URL address to the URL filter.
Fields
Fields Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
status
The status of the UTM profile. This field always contains enabled.
ip
The IP address.
msg
User <admin_name> added URL filter entry <url_address> from
<ui(<ip_address>)>
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains notice.
url
The URL address that was entered.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
Message ID
32157
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added a banned word entry to the web content filter list.
Fields
Fields Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
status
The status of the UTM profile. This field always contains enabled.
msg
User <admin_name> added webfilter banned word entry <banned_word>
from <ui(<ip_address>)>
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains notice.
word
The word or words that was added to the webfilter content filter list.
lang
The type of language applied to the entry. For example, Western.
pattern_type
The type of pattern applied to the word. For example, wildcard.
Message ID
32157
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added an email address to the email address black/white
list.
Fields
Fields Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
email-pattern
The email address of the new entry in the list.
status
The status of the UTM profile. This field always contains enabled.
msg
User <admin_name> added antispam email black/white entry
<email_address> from <ui(<ip_address>)>
Message ID
32157
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added an email address to the email address black/white
list.
Fields
Fields Description
user
The name of the administrator creating the traffic.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
105
Event-Administration
ui
106
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
action
This field always contains fortitoken-synchronize.
serialno
The serial number of the FortiToken device.
status
The status of the synchronization process.
msg
User <admin_name> resynchronized FortiToken <serialno> with result:
<status>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32158
Message ID
32158
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator deleted a word from within a web content filter list.
Fields
Fields Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
word
The web filter word that was deleted from within the list.
lang
The type of language that was chosen. For example, Western.
pattern_type
The type of pattern that was chosen, for example, Regular Expression.
status
The status of the word within the list before it was deleted. This field always
contains enabled.
msg
User <admin_name> deleted webfilter banned word entry <word> from
<ui(<ip_address>)>
32161
Message ID
32161
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator changed the specified sensor.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
msg
User <admin_name> changed sensor <ips_sensor_name>
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
107
Event-Administration
32162
Message ID
32162
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator changed the specified sensor.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
msg
User <admin_name> changed sensor <dos_sensor_name>
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level.
32168
108
Message ID
32168
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator failed to add a new entry because the VDOM property
limit has been reached.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
msg
Adding new entry failed: vdom property limit has been reached when user
<user_name> adds <vdom> from <ui>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32170
Message ID
32170
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An administrator added a new multicast firewall policy.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example, the
user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
The type of action that occurred. This field can contain config-add.
status
The status of the action. This field contains success.
reason
The reason for taking the action. This field contains none.
msg
User <admin_name> added multicast firewall policy <policy_number>
from <ui(<ip_address>)>
new_id
The new firewall policy identification number for the new multicast firewall
policy.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains notice.
new_srcintf
The new source interface that was applied to the new multicast firewall
policy.
new_dintf
The new destination interface that was applied to the new multicast firewall
policy.
new_saddr
The new source address that was applied to the policy.
new_daddr
The new destination IP address. that was applied to the policy.
new_nat_addr
The new NAT IP address that was applied to the policy.
new_dnat_addr
The new DNAT IP address that was applied to the policy.
new_action
The type of action that was applied.
new_proto
The type of protocol that was applied.
new_start_port
The new start port number. For example port 1.
new_end_port
The new end port number. For example, port 655535
Message ID
32170
Log Subtype
Admin
Severity
Alert
Firmware version
FortiOS 4.0 MR3
Meaning
An alarm was triggered.
Fields
Field Description
action
The type of action that occurred. This field always contains alarm.
alarmid
The alarm’s identification number.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
109
Event-Administration
110
groupid
The group identification number.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32171
Message ID
32171
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An administrator modified a multicast firewall policy.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example, the
user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
The type of action that occurred. This field can contain config-edit.
status
The status of the action. This field contains success.
reason
The reason for taking the action. This field contains none.
msg
User <admin_name> changed multicast firewall policy <policy_number>
from <ui(<ip_address>)>
pol_id
The multicast firewall policy identification number.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains notice.
old_srcintf
The previous source interface.
old_dintf
The previous destination interface.
old_saddr
The previous source IP address.
old_daddr
The previous destination IP address.
old_action
The previous type of action that was applied.
old_start_port
The previous start port number.
old_end_port
The previous end port number.
new_srcintf
The new source interface that was applied to the new multicast firewall
policy.
new_dintf
The new destination interface that was applied to the new multicast firewall
policy.
new_saddr
The new source address that was applied to the policy.
new_daddr
The new destination IP address. that was applied to the policy.
new_nat_addr
The new NAT IP address that was applied to the policy.
new_dnat_addr
The new DNAT IP address that was applied to the policy.
new_action
The type of action that was applied.
new_proto
The type of protocol that was applied.
new_start_port
The new start port number. For example port 1.
new_end_port
The new end port number. For example, port 655535
Message ID
32171
Log Subtype
Admin
Severity
Alert
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
111
Event-Administration
112
Firmware version
FortiOS 4.0 MR3
Meaning
An alarm was triggered.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example, the
user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
The type of action that occurred. This field always contains alarm.-ack
alarmid
The alarm’s identification number.
groupid
The group identification number.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32172
Message ID
32172
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An administrator deleted a multicast firewall policy.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example, the
user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
This field can contain config-delete.
status
The status of the action. This field contains success.
reason
The reason for taking the action. This field contains none.
msg
User <admin_name> removed multicast firewall policy <policy_number>
from <ui(<ip_address>)>
old_id
The multicast firewall policy identification number.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains notice.
old_srcintf
The previous source interface.
old_dintf
The previous destination interface.
old_saddr
The previous source IP address.
old_daddr
The previous destination IP address.
old_action
The previous type of action. that was applied.
old_start_port
The previous start port number.
old_end_port
The previous end port number.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
113
Event-Administration
32180
Message ID
32180
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator failed to backup the configuration from the management
station, or the FortiGate unit’s automatic backup to the management
station failed.
The meaning can also be that there was a failed backup of the
configuration file after the system upgraded.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example, the
user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
This field contains backup.
status
The status of the action. This field contains failure.
msg
This field contains any one of the following:
• User <admin_name> failed to backup the configuration from <ui> to
management station.
• Automatic configuration backup to Management Station failed.
• Failed to backup configuration after system upgrading: <string>
32200
Message ID
32200
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator uploaded the new web filter list specified in the “upload”
field.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example, the
user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
upload
This field contains any one of the following:
• url-exempt-list
• url-block-list
• word-block-list
114
num
The num value information.
msg
User <administrator_name> uploaded <upload_type> from <ui>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32301
Message ID
32301
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added a virtual domain.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
action
This field contains add-vdom.
msg
Virtual domain <vd_name> is added.
32302
Message ID
32302
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator deleted a virtual domain.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
action
This field always contains del-vdom.
msg
Virtual domain <vd_name> is deleted.
32400
Message ID
32400
Log Subtype
Admin
Severity
Alert
Firmware version
FortiOS 4.0 MR3
Meaning
The configuration changed.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
msg
Configuraiton is changed in the admin session.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
115
Event-Administration
32401
116
Message ID
32401
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator added an application control list.
Fields
Field Description
user
The administrator who is creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
action
This field contains add.
msg
Administrator <admin_name> added an application control list
<app_crtl_list_name> from <ui(<ip_address>)>
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains notice.
name
The name of the application control list.
Message ID
32401
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The administrator modified settings within an application control list.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
action
This field always contains edit.
msg
Administrator <admin_name> edited an application control list
<default_app_name> from <ui(<ip_address>)>
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
pri
The priority level. This field always contains notice.
name
The name of the application control list.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Administration
32545
Message ID
32545
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The system was restarted because it was scheduled to.
Fields
Field Description
user
The name of the administrator creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
action
This field always contains reboot.
msg
System will reboot due to scheduled daily restart.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
32546
Message ID
32546
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The archive log files are being uploaded to the FortiAnalyzer unit.
Fields
Field Description
action
This field always contains upload_request
msg
Content Archive data has been uploaded to FortiAnalyzer.
32547
Message ID
32547
Log Subtype
Admin
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
The content archive file failed to upload.
Fields
Field Description
action
This field always contains upload_request
msg
Content Archive data failed to upload to <string>.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
117
Event-Administration
32548
Message ID
32548
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The upload of memory logs to a remote server failed because it reached the
maximum capacity.
Fields
Field Description
action
This field always contains upload_request
msg
Uploading memory logs to remote logging server(s) because it reached
<percentage> percent full
32549
118
Message ID
32549
Log Subtype
Admin
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The upload of memory logs to a remote server occurred as scheduled.
Fields
Field Description
action
This field always contains upload_request
msg
Uploading memory logs to remote logging server(s) as scheduled
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-System
Event-System log messages record events that occur in the FortiGate system, such as administrators
logging in and out, or events occurring on the interfaces.
20001
20058
20201
20002
20059
20202
20003
20060
20203
20004
20061
22000
20007
20062
22001
20010
20063
22002
20031
20064
22003
20032
20065
22004
20033
20066
22005
20034
20067
22006
20035
20068
22009
20036
20069
22010
20037
20070
22011
20038
20071
22012
20039
20072
22013
20040
20073
22100
20041
20074
22101
20042
20075
22102
20043
20076
22103
20044
20077
22800
20045
20078
22801
20046
20079
22802
20047
20080
22803
20048
20081
22804
20049
20082
22805
20050
20083
22806
20051
20084
22901
20052
20099
22902
20053
20100
22903
20054
20101
22911
20055
20110
22912
20056
20111
22913
20057
20200
22914
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
119
Event-System
20001
120
Message ID
20001
Log Subtype
System
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The routing information has changed because of the gateway’s status, up or
down.
Fields
Field Description
interface
This field contains any one of the following:
• internal
• external
• dmz
• other
status
This field contains either up or down.
msg
Ping server is {up | down}
Message ID
20001
Log Subtype
System
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what appears in the msg field, the meaning can be any one of
the following:
• There is a problem contacting the modem. Verify the modem connection
and settings.
• The FortiGate unit has attempted to redial the IPS from the modem and
could not connect after the set number of redial attempts. You must reset the
modem to attempt the connection.
• The wireless user has been disconnected.
• A client was accepted.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contain root.
msg
This field contains any one of the following:
• Problem contacting the modem
• modem: Redial limit exceeded… giving up
• Client <wireless_user> is disassociated.
• Accepted associated from <client_name>
Message ID
20001
Log Subtype
System
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what appears in the msg field, the meaning can be any one of
the following:
• Client <client_name> does 1X – The client does 1X
• Client <client_name> does WPA – The client does WPA.
Fields
Field Description
msg
This field contains any one of the following:
• Client <client_name> does 1X
• Client <client_name> does WPA
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-System
Message ID
20001
Log Subtype
System
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
Routing information is changed because the gateway is up/down.
Fields
Field Description
interface
The name of the interface.
status
The status information.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
Message ID
20001
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
A gateway’s status.
Fields
Field Description
interface
The name of the interface.
gw_group
The gateway group information.
status
The status information.
gw_status
The gateway status.
msg
The status of <gateway> for gateway group <gw_group> is <information>
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
121
Event-System
20002
Message ID
20002
Log Subtype
System
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The domain name configured for an alert email recipient cannot be resolved.
Verify the email addresses to ensure that it is correct.
Fields
Field Description
user
This field always contains system
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
action
The type of action taken by the FortiGate unit.
status
This field always contains failure.
msg
Can’t resolve the IP address of <email_address>
20003
122
Message ID
20003
Log Subtype
System
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Failed to send an alert email.
You can verify the email addresses configured for alert emails and see if that
solves the problem.
Fields
Field Description
user
This field always contains system
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
action
The type of action taken by the FortiGate unit. This field always contains
alert-email.
status
This field always contains failure.
count
The number of times the same event was detected within a short period of
time.
msg
Failed to send alert email from <ip_address> to <ip_address>.
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-System
20004
Message ID
20004
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The policy is too big for the system to handle.
Fields
Field Description
user
This field always contains system
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
status
This field always contains failure.
msg
Policy <policy_id> is too big for system, it’s installed partially.
20007
Message ID
20007
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The socket is exhausted.
Fields
Field Description
service
The type of service. This field always contains kernel.
status
This field always contains failure.
proto
The protocol information.
src
The source IP address.
src_port
The source port number.
nat
The NAT information.
dst
The destination IP address.
dst_port
The destination port number.
msg
NAT port is exhausted.
20010
Message ID
20010
Log Subtype
System
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
A RADIUS IPC error.
Fields
Field Description
msg
Unable to initialize RADIUS IPS (<value>)
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
123
Event-System
20031
Message ID
20031
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGate unit’s flash memory is full in the specified sector.
You can delete logs stored to the local disk, and perform other maintenance
to free memory space.
Fields
Field Description
msg
Interface <interface_name> Out of memory in <memory_sector>.
20032
Message ID
20032
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGate unit cannot find the specified interface by name.
You can check configuration of the interface and check any physical
connections to solve the problem.
Fields
Field Description
msg
Interface <interface_name> not found in <memory_sector>.
20033
Message ID
20033
Log Subtype
System
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An interface uses Mobile IPv6 extensions.
Fields
Field Description
msg
Using Mobile IPv6 extensions.
20034
124
Message ID
20034
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The minimum time allowed between sending unsolicited multicast router
advertisements from the specified interface (using Mobile IPv6 extensions)
must be configured within the specified range because it is not currently in the
specified range.
The range is specified in seconds.
Fields
Field Description
msg
MinRtrAdvInterval for <interface> must be between <start_range_seconds>
and <end_range_seconds>
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-System
Message ID
20034
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The minimum time allowed between sending unsolicited multicast router
advertisements from the specified interface (using Mobile IPv6 extensions)
must be configured within the specified range because it is not currently in the
specified range.
The range is specified in seconds.
Fields
Field Description
msg
MinRtrAdvInterval for <interface_name> must be between
<start_range_seconds> and <end_range_seconds>
20035
Message ID
20035
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The minimum time allowed between sending unsolicited multicast router
advertisements from the specified interface must be configured within the
specified range. Range is specified in seconds.
You can reconfigure the router according to MinRtrAdvInterval to solve this
problem.
Fields
Field Description
msg
MinRtrAdvInterval must be between <start_range_seconds> and
<end_range_seconds> for <interface_name>
20036
Message ID
20036
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The maximum time allowed between sending unsolicited multicast router
advertisements from the specified interface, using Mobile IPv6 extensions,
must be configured within the specified range.
The range is specified in seconds.
Fields
Field Description
msg
MaxRtrAdvInterval for <interface_name> must be between
<start_range_seconds> and <end_range_seconds>
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
125
Event-System
20037
Message ID
20037
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The maximum time allowed between sending unsolicited multicast router
advertisements from the specified interface must be configured within the
specified range. Range is specified in seconds.
You can reconfigure the router according to MaxRtrAdvInterval to solve this
problem.
Fields
Field Description
msg
MaxRtrAdvInterval must be between <start_range_seconds> and
<end_range_seconds> for <interface_name>
20038
Message ID
20038
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The value placed in MTU options sent by the router must be either zero or
between the specified range for the specified interface. A value of zero
indicates that no MTU options are sent.
You can reconfigure the router according to range to solve this problem.
Fields
Field Description
msg
AdvLinkMTU must be zero or between <start_range_bytes> and
<end_range_bytes> for <interface_name>
20039
126
Message ID
20039
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The value placed in MTU options sent by the router must be either zero or
greater than the specified value for the specified interface. A value of zero
indicates that no MTU options are sent.
You can reconfigure the router according to range to solve this problem.
Fields
Field Description
msg
AdvLinkMTU must be zero or greater than <value_bytes> for
<interface_name>
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-System
20040
Message ID
20040
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The value to be placed in the Reachable Time field in the Router
Advertisement message sent by the router must be less than the specified
value for the specified interface. A value of zero means unspecified by this
router.
You can reconfigure the router according to the specified value to solve this
problem.
Fields
Field Description
msg
AdvReachableTime must be less than <value> for <interface_name>
20041
Message ID
20041
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The default value to be placed in the CurHopLimit field in the Router
Advertisements message sent by the router must not be greater than the
specified value for the specified interface.
You can reconfigure the router according to the specified value to solve this
problem.
Fields
Field Description
msg
AdvCurHopLimit must not be greater than <value_hop_limit> for
<interface_name>
20042
Message ID
20042
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The value to be placed in the Router Lifetime field of Router Advertisements
sent from the interface in seconds, must be either zero or between the
specified range. A value of zero indicates that the router is not to be used as
a default router.
You can reconfigure the router according to the specified range to solve this
problem.
Fields
Field Description
msg
AdvDefaultLifetime for <interface_name> must be zero or between
<start_range_seconds> and <end_range_seconds>
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
127
Event-System
20043
Message ID
20043
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
HomeAgentLifetime in Router Advertisement packet is out of range.
You can reconfigure the router according to the specified range to solve this
problem.
Fields
Field Description
msg
HomeAgentLifetime must be between <value> and <value> for
<interface_name>
20044
Message ID
20044
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
AdvHomeAgentFlag and HomeAgentLifetime in Router Advertisement packet
must be set with HomeAgentInfo.
You can reconfigure the router according to the specified range to solve this
problem.
Fields
Field Description
msg
AdvHomeAgentFlag must be set with HomeAgentInfo
20045
Message ID
20045
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
Prefix length is too long.
You can adjust packet prefix length to solve this problem.
Fields
Field Description
msg
Invalid prefix length for <string>
20046
128
Message ID
20046
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The value to be placed in the Valid Lifetime in the Prefix Information option, in
seconds, must be greater than the AdvPreferredLifetime.
You can adjust packet prefix length to solve this problem.
Fields
Field Description
msg
AdvValidLifetime must be greater than AdvPreferredLifetime for <string>
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-System
20047
Message ID
20047
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon failed to create an IPv6 socket.
Fields
Field Description
msg
Can’t create socket (AF_INET6): <string>
20048
Message ID
20048
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon failed to set IPV6_PKTINFO option.
Fields
Field Description
msg
Setsockopt(IPv6_PKTINFO): <string>
20049
Message ID
20049
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon failed to set IPV6_CHECKSUM
option.
Fields
Field Description
msg
Setsockopt(IPV6_CHECKSUM): <string>
20050
Message ID
20050
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon failed to set IPV6_UNICAST_HOPS
option.
Fields
Field Description
msg
Setsockopt(IPV6_UNICAST_HOPS): <string>
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
129
Event-System
20051
Message ID
20051
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon failed to set
IPV6_MULTICAST_HOPS option.
Fields
Field Description
msg
Setsockopt(IPV6_MULTICAST_HOPS): <string>
20052
Message ID
20052
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon failed to set IPV6_HOPLIMIT option.
Fields
Field Description
msg
Setsockopt (IPV6_HOPLIMIT): <string>
20053
Message ID
20053
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon failed to set ICMPV6_FILTER option.
Fields
Field Description
msg
Setsockopt(ICMPV6_FILTER): <string>
20054
130
Message ID
20054
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon received the specified signal and is
going to exit.
Fields
Field Description
msg
radvd receive signal=<value_signal>\n
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-System
20055
Message ID
20055
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon cannot create query to interface by
using cmf_query_create().
Fields
Field Description
msg
Can not create query to interface at <string>:<string>:<value>!
20056
Message ID
20056
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon encounters an internal error when it
uses cmf_query_for_each().
Fields
Field Description
msg
Interfal error in cmf_query_for_each()!
20057
Message ID
20057
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon failed to find a virtual interface by
interface index.
Fields
Field Description
msg
Interface <string>:<value> not found in the list!
20058
Message ID
20058
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon reloaded or unloaded the specified
interface.
Fields
Field Description
msg
This field contains any one of the following:
• Interface <string>: <value> reloaded!
• Interface <string>:<value> unloaded!
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
131
Event-System
20059
Message ID
20059
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon received a packet with no pkt_info.
Fields
Field Description
msg
Received packet with no pkt_info!
20060
Message ID
20060
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon received an ICMPv6 packet with
invalid length.
Fields
Field Description
msg
Received icmpv6 packet with invalid length: <value_bytes>
20061
Message ID
20061
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon received an unwanted type of
ICMPv6 packet.
Fields
Field Description
msg
icmpv6 filter failed
20062
132
Message ID
20062
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon received an ICMPv6 RA packet with
invalid length.
Fields
Field Description
msg
Received icmpv6 RA packet with invalid length. <value_bytes>
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-System
20063
Message ID
20063
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon received ICMPv6 RA packet with
non-linklocal source address..
Fields
Field Description
msg
Received icmpv6 RA packet with non-linklocal source address
20064
Message ID
20064
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon received ICMPv6 RS packet with
invalid length.
Fields
Field Description
msg
Received icmpv6 RS packet with invalid length: <value_bytes>
20065
Message ID
20065
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon received ICMPv6 RS/RA packet with
invalid code.
Fields
Field Description
msg
Received icmpv6 RS/RA packet with invalid code: <value_code>
20066
Message ID
20066
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon received ICMPv6 RS/RA packet with
wrong hoplimit.
Fields
Field Description
msg
Received RS or RA with invalid hoplimit <value_hops> from
<interface_name>
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
133
Event-System
20067
Message ID
20067
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The AdvCurHopLimit on the specified FortiGate interface does not agree with
the value on the specified remote interface. A value of zero means
unspecified by this router.
You should configure the interfaces with the same AdvCurHopLimit value to
correct the problem.
Fields
Field Description
msg
Our AdvCurHopLimit on <interface_name> doesn’t agree with
<interface_name>
20068
Message ID
20068
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The AdvManagerFlag value (True/False) on the specified FortiGate interface
does not agree with the value on the specified remote interface.
You should configure the interface with the same AdvManagerFlag value.
Fields
Field Description
msg
Our AdvManagerFlag on <interface_name> doesn’t agree with
<interface_name>
20069
134
Message ID
20069
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The AdvOtherConfigFlag value (True/False) on the specified FortiGate
interface does not agree with the value on the specified remote interface.
You should configure the interfaces with the same AdvOtherConfigFlag
value.
Fields
Field Description
msg
Our AdvOtherConfigFlag on <interface_name> doesn’t agree with
<interface_name>
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-System
20070
Message ID
20070
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The AdvReachableTime configured on the specified FortiGate interface does
not agree with the value on the specified remote interface. A value of zero
means unspecified by this router. The value must be no greater than
3,600,000 seconds or 1 hour.
You should configure the interfaces with the same AdvReachableTime value.
Fields
Field Description
msg
Our AdvReachableTime on <interface_name> doesn’t agree with
<interface_name>
20071
Message ID
20071
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The AdvRetransTimer value on the specified FortiGate interface does not
agree with the value on the specified remote interface. A value of zero means
unspecified (by this router).
You should configure the interfaces with the same AdvRetransTimer value.
Fields
Field Description
msg
our AdvRetransTimer on <interface_name> doesn’t agree with
<interface_name>
20072
Message ID
20072
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon found extra data in an RA packet
from the specified source.
Fields
Field Description
msg
trailing garbage in RA on <interface_name> from <interface_name>
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
135
Event-System
20073
Message ID
20073
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon found in an RA packet with no option
data from the specified source.
Fields
Field Description
msg
zero length option in RA on <interface_name> from <interface_name>
20074
Message ID
20074
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The option length is greater than the total length in an RA packet from the
specified source.
Fields
Field Description
msg
option length greater than total length in RA on <interface_name> from
<interface_name>
20075
Message ID
20075
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The AdvLinkMTU value on the specified FortiGate interface does not agree
with the specified remote interface. A value of zero indicates that no MTU
options are sent.
You should configure the interfaces with the same AdvLinkMTU value.
Fields
Field Description
msg
our AdvLinkMTU on <interface_name> doesn’t agree with <interface_name>
20076
136
Message ID
20076
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The AdvValidLifetime value on the specified FortiGate interface does not
agree with the value on the specified remote interface.
You should configure the interfaces with the same AdvValidLifetime value.
Fields
Field Description
msg
our AdvValidLifetime on <interface_name> for <value> doesn’t agree with
<interface_name>
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-System
20077
Message ID
20077
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The AdvPreferredLifetime value on the specified FortiGate interface does not
agree with the value on the specified remote interface.
You should configure the interfaces with the same AdvPreferredLifetime
value.
Fields
Field Description
msg
our AdvPreferredLifetime on <interface_name> for <value> doesn’t agree
with <interface_name>
20078
Message ID
20078
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon found the specified invalid option in
an RA packet from the specified source from a remote site.
Fields
Field Description
msg
Invalid option <value_option> in RA on <interface_name> from <location>
20079
Message ID
20079
Log Subtype
System
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon is ready to serve.
Fields
Field Description
msg
radvd started\n
20080
Message ID
20080
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
Recvmsg() in the IPv6 router advertisement daemon failed.
Fields
Field Description
msg
recvmsg: <string>
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
137
Event-System
20081
Message ID
20081
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The IPv6 router advertisement daemon received a packet with a wrong
IPV6_HOPLIMIT.
Fields
Field Description
msg
received a bogus IPV6_HOPLIMIT from the kernel! len=<value_bytes>,
data=<value>
20082
Message ID
20082
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what appears in the msg field, the meaning can be any one of
the following:
• The wrong IPv6 router advertisement daemon received a packet with a
wrong IPV6_PKINFO.
• The IPv6 router advertisement daemon failed to check whether we’ve
joined the all-routers multicast group.
Fields
Field Description
msg
This field contains any one of the following:
• received a bogus IPV6_PKINFO from the kernel! len=<value_bytes>,
index=<value_index>
• Problem checking all-routers membership on <interface_name>
20083
138
Message ID
20083
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The rounting advertisement failed to check if joined the all-routers
membership group.
Fields
Field Description
msg
problem checking all-routers membership on <interface_name>
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-System
20084
Message ID
20084
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what appears in the msg field, the meaning can be any one of
the following:
• Sendmsg () in the IPv6 router advertisement daemon failed.
• Sendmsg () in radvd failed.
Fields
Field Description
msg
sendmsg: <string>
20090
Message ID
20090
Log Subtype
System
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The interface link status has changed.
Fields
Field Description
intf
The name of the interface.
status
The status of the interface.
msg
interface <interface_name> link status is <status_type>
20099
Message ID
20099
Log Subtype
System
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The interface link status has changed.
Fields
Field Description
action
This field is always interface-stat-change.
status
This field contains either DOWN or UP.
msg
This field contains any one of the following:
• Link monitor: Interface <interface_name> was turned down
• Link monitor: Interface <interface_name> was turned up
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
139
Event-System
20100
Message ID
20099
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
FortiGuard Web Filtering category has been updated.
Fields
Field Description
msg
The FortiGuard Web Filtering category list has been updated. Please verify
the protection profile settings are still correct.
20101
140
Message ID
20101
Log Subtype
System
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Status of the file upload.
Fields
Field Description
action
This field always contains upload.
status
The status of the upload.
hash
The hash information.
file
The name of the file that was uploaded.
user
The name of the user creating the traffic.
server
The name of the server.
port
The number of the port.
msg
<file_name> upload reached the <string> state \n
Message ID
20101
Log Subtype
System
Severity
Variable
Firmware version
FortiOS 4.0 MR3
Meaning
File upload error.
Fields
Field Description
action
This field always contains upload.
status
The status of the upload.
file
The name of the file that was uploaded.
user
The name of the user creating the traffic.
server
The name of the server.
port
The number of the port.
Message ID
20101
Log Subtype
System
Severity
Critical.
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-System
Firmware version
FortiOS 4.0 MR3
Meaning
FortiGuard license is expired. You need to renew the FortiGuard license.
Fields
Field Description
msg
FortiGuard license is expired.
Message ID
20101
Log Subtype
System
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Status of the uploaded file.
Fields
Field Description
action
The type of upload being performed.
status
The status of the upload.
file
The name of the file that was uploaded.
user
The name of the user creating the traffic.
server
The IP address of the server.
port
The name of the port.
msg
<file_name> upload reached the <server_ip_address> state <status_name>
Message ID
20101
Log Subtype
System
Severity
Variable
Firmware version
FortiOS 4.0 MR3
Meaning
File upload error.
Fields
Field Description
action
This field always contains upload.
error
The type of error that occurred during the file’s uploading process.
file
The name of the file that was uploaded.
user
The name of the user creating the traffic.
server
The IP address of the server.
port
The name of the port.
msg
<file_name> upload error\ \n
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
141
Event-System
20110
Message ID
20110
Log Subtype
System
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A hp_api log message.
Fields
Field Description
msg
hp_api: Connection to ESPd has been initialized.
20111
Message ID
20111
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
A hp_api log message.
Fields
Field Description
msg
hp_api: Connection to ESPd has been reset, exiting.
20200
142
Message ID
20200
Log Subtype
System
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An administrator initiated a self-test type from a specific location.
Fields
Field Description
user
The name of the user creating the traffic. In this log message, it is the
administrator that is creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
action
This field always contains self-test.
test
The type of test that was taken.
msg
Administrator <administrator_name> initiates the <test_type> self-test from
<ui>
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-System
20201
Message ID
20201
Log Subtype
System
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An administrator initiated all self-tests from a specified location.
Fields
Field Description
user
The name of the user creating the traffic. In this log message, it is the
administrator that is creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
action
This field always contains self-test.
test
This field always contains all.
msg
Administrator <administrator_name> initiates all self-tests from <ui>
20202
Message ID
20202
Log Subtype
System
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The daemon started.
Fields
Field Description
action
This field always contains daemon-startup.
daemon
The type of daemon used.
pid
The PID number.
msg
Daemon <daemon_type> started.
Message ID
20202
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
There was an error when either partitioning the disk or formatting the disk.
Fields
Field Description
msg
Partitioning or formatting error (<string>) partition=<partition>
format=<format> label=<label>
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
143
Event-System
20203
Message ID
20203
Log Subtype
System
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The daemon was shut down.
Fields
Field Description
action
This field always contains daemon-shutdown.
daemon
The type of daemon used.
pid
The PID number.
msg
Daemon <daemon_type> shutdown.
22000
\
144
Message ID
22000
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what appears in the msg field, the meaning can be any one of
the following:
• Packet lengths do not match.
• The packet length does not match what is specified in the request header.
Fields
Field Description
msg
This field contains any one of the following:
• Packet length does not match that specified in the request header.
• lengths of packets does not match
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-System
22001
Message ID
22001
Log Subtype
System
Severity
Warning/Information
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what appears in the msg field, the meaning can be any one of
the following:
• The specified version of the URL agent is not supported.
• The specified version of the protocol is not supported.
• An administrator started to convert the current SQL format.
Fields
Field Description
action
The action that was taken.
admin
The name of the administrator.
ui
The location of the point-of-entry the user used to access the FortiGate unit
so that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
status
This field always contains started.
msg
This field contains any one of the following:
• version <agent_version_num> is not supported.
• Protocol version <version_number> is not supported.
• Administrator <administrator_name> started to convert existing logs to SQL
format from <ui>
22002
Message ID
22002
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what appears in the msg field, the meaning can be any one of
the following:
• Only HTTP is supported.
• Requests other than HTTP, HTTPS, FTP, MAIL, and AV are not supported.
• Request other than HTTP, HTTPS, FTP, MAIL, and AV are not supported.
• The conversion of the existing SQL logs failed.
• The administrator failed to conver the existing logs into SQL format.
Fields
Field Description
action
The action that was taken.
status
This field always contains failed.
reason
This field contains either sql-db-not-running or cannot-send-request.
msg
This field contains any one of the following:
• Other request <request_type> than http is not supported.
• Other requests <string> than http & ftp is not supported.
• Request type <type> is not supported
• Conversion of existing logs to SQL format failed to start because SQL DB is
not running.
• Conversion of existing logs to SQL format failed to start because request
cannot be sent.
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
145
Event-System
22003
Message ID
22003
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
Failed to set up a signal handler.
Fields
Field Description
msg
sigaction(<signal_handler>)failed: <string>
22004
Message ID
22004
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what the msg field contains, the meaning can be any one of
the following:
• The system failed to create a socket or failed to create a socket.
• The system failed to create a socket or failed to create a HA socket.
Fields
Field Description
msg
This field contains any one of the following:
• Socket () failed: <string>
• Socket () failed: <string>
22005
Message ID
22005
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The system failed to create a UDP socket to receive URL requests.
Fields
Field Description
msg
This field contains any one of the following:
• Failed to create a udp socket to relay URL requests: <string>
• failed to create a <value>/udp socket to receive URL request
22006
146
Message ID
22006
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The system failed to register for cmdb events.
Fields
Field Description
msg
Failed to register for cmdb events.
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-System
22009
Message ID
22009
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
Could not find antivirus profile by using ID.
Fields
Field Description
name
The name of the antivirus profile.
status
This field always contains failure.
msg
failed to find its AV protection profile
22010
Message ID
22010
Log Subtype
System
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what is in the msg field, it can contain any one of the following:
• The url filter has failed to send the rating result back to HTTP proxy.
• The HTTP proxy has crashed.
• The sendto () failed.
Fields
Field Description
process
The type of process that is being performed by the FortiGate unit.
reason
The reason for the trigger.
msg
This field contains any one of the following:
• <string> failed to send rating result
• failed to send urlfilter packet
• failed to send urlfilter packet because queue was full
• failed to send urlfilter packet <sent_number> times
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
147
Event-System
22011
Message ID
22011
Log Subtype
System
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The conversion of existing log files to SQL log files in the specified VDOM
started.
Fields
Field Description
action
The action that was taken.
status
This field always contains started.
files
The name of the logs files that are being converted.
msg
Conversion of existing logs to SQL format for vdom <vdom_name> started.
22012
148
Message ID
22012
Log Subtype
System
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what is in the msg field, the meaning can be any one of the
following:
• The SQL log database is full and cannot format any more logs.
• The SQL conversion failed because the log could not be opened.
Fields
Field Description
action
The action that was taken.
status
This field always contains failed.
reason
This field contains either sql-log-full or cannot-open-file.
file
The name of the log file being converted.
msg
This field contains any one of the following:
• Conversion of <log_file_name> to SQL format failed because SQL log is
full.
• Conversion of <log_file_name> to SQL format failed because the log file
cannto be opened.
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-System
22013
Message ID
22013
Log Subtype
System
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The conversion process finished and the logs are now in SQL format in the
specified VDOM.
Fields
Field Description
action
The action that was taken.
status
This field always contains ended
converted_files
The names of the converted log files.
entry
The entry information.
msg
Conversion of existing logs to SQL format for vdom <vdom_name> has been
finished.
22100
Message ID
22100
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
Quarantine has dropped a FortiAnalyzer transfer job due to limited memory.
Fields
Field Description
file
The name of the file.
size
The size of the file.
limit
The number of the set limit.
avail
The number for avail.
action
This field always contains content-archive.
status
This field always contains drop.
reason
This field always contains memory-limit.
msg
File <file_name> is not transferred to FortiAnalyzer due to exceeding memory
usage limit.
Message ID
22100
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
Quarantine dropped FortiAnalyzer transfer jobs because there was limited
available memory.
Fields
Field Description
count
The number of times the same event was detected within a short period of
time.
duration
The duration, or time lapse, in seconds.
limit
The number of the set limit.
used
The amount used.
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
149
Event-System
action
This field always contains content-archive.
status
This field always contains drop.
reason
This field always contains memory-limit.
msg
In the past <seconds> seconds, <value> files were not transferred to
FortiAnalyzer due to exceeding memory usage limit.
22101
150
Message ID
22101
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
Quarantine has dropped a FortiAnalyzer transfer job due to memory limit.
Fields
Field Description
file
The name of the file.
size
The size of the file.
limit
The number of the set limit.
avail
The number for avail.
action
This field always contains content-archive.
status
This field always contains drop.
reason
This field always contains memory-limit.
msg
File <file-name> is not transferred to FortiAnalyzer due to exceeding memory
usage limit.
Message ID
22101
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
Quarantine has dropped a FortiAnalyzer transfer job due to memory limit.
Fields
Field Description
file
The name of the file.
size
The size of the file.
action
This field always contains content-archive.
status
This field always contains fail.
msg
Failed to transfer file <file_name> to FortiAnalyzer <ip_address>
Message ID
22101
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
Failed to send a file to the FortiAnalyzer unit.
Fields
Field Description
file
The name of the file.
size
The size of the file.
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-System
action
The type of action taken by the FortiGate unit.
status
This field always contains fail.
msg
Failed to transfer file <file_name> to FortiAnalyzer <ip_address>
22102
Message ID
22102
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
Erroneous SMART status.
Fields
Field Description
msg
Log disk failure is imminent, logs should be backed up
22103
Message ID
22103
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGuard log buffer was reset because of a system overload. Current
log data and possibly old log data may be lost.
You must reopen FortiGuard log pipe to solve the issue.
Fields
Field Description
reason
This field always contains buffer-overflow.
msg
This field contains any one of the following:
• FortiGuard Log buffer is reset due to a buffer overflow (system overload).
Some log data may be lost.
• FortiGuard Analysis Service buffer is reset due to a buffer overflow (system
overload). Some log data may be lost.\”
22200
Message ID
22200
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The specified certificate will automatically update itself after a specified
number of days is up.
Fields
Field Description
user
This field always contains system.
action
This field always contains certificate-update.
status
This field always contains warning.
cert
The name of the certificate.
msg
CA certificate <certificate_name> will auto-update in <number_days> days.
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
151
Event-System
22201
Message ID
22201
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The specified certificate will automatically regenerate itself after a specified
number of days is up.
Fields
Field Description
user
This field always contains system.
action
This field always contains certificate-regenerate.
status
This field always contains warning.
cert
The name of the certificate.
msg
Local certificate <certificate_name> will auto-regenerate in <number_days>
days.
22202
Message ID
22202
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The certificate failed to automatically update.
Fields
Field Description
user
This field always contains system.
action
This field always contains certificate-update
status
This field always contains failure.
cert
The name of the certificate.
msg
The log message information. This usually contains a sentence and explains
the activity and/or action taken.
22203
152
Message ID
22203
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The specified certificate will automatically regenerate itself after a specified
number of days is up.
Fields
Field Description
user
This field always contains system.
action
This field always contains certificate-regenerate.
status
This field always contains failure.
cert
The name of the certificate.
msg
The log message information. This usually contains a sentence and explains
the activity and/or action taken.
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-System
22800
Message ID
22800
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
Scan services entered conserve mode.
Note: Not all of the fields may appear with every 22800 log message.
Fields
Field Description
service
The name of the service.
mode
The mode information.
conserve
This field always contains on.
total
The total information.
free
The free information.
entermargin
The entermargin information.
exitmargin
The exitmargin information.
msg
This field contains any one of the following:
• The system has entered conserve mode” conserve=on total=<value>
free=<value> entermargin=<value> exitmargin=<value>
• Scan services session fail mode.
• Scan services entered conserve mode.
22801
Message ID
22801
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what is in the msg field, the meaning can be any one of the
following:
• The system exited conserve mode.
• The scan services exited conserve mode.
Fields
Field Description
service
The type of service used.
conserve
This field contains either on or exit.
total
The total information.
free
The free information.
entermargin
The enter margin information.
exitmargin
The exit margin information.
msg
This field can be any one of the following:
• The system exited conserve mode.
• The system has entered conserve mode.
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
153
Event-System
22802
Message ID
22802
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
System services entered conserve mode.
Fields
Field Description
service
The type of service used.
sysconserve
This field always contains on.
total
The total information.
free
The free information.
entermargin
The enter margin information.
exitmargin
The exit margin information.
msg
The system has entered system conserve mode
22803
154
Message ID
22803
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
System services exited conserve mode.
Fields
Field Description
service
The type of service used.
sysconserve
This field always contains exit.
total
The total information.
free
The free information.
entermargin
The enter margin information.
exitmargin
The exit margin information.
msg
The system exited system conserve mode
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-System
22804
Message ID
22804
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The status of the license has changed.
Fields
Field Description
service
This field always contains license.
status
The status information of the license.
msg
License status changed to <status>
22805
Message ID
22805
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The status of the license could not be validated.
Fields
Field Description
service
This field always contains license.
status
This field always contains warning.
msg
License could not be validated for over 4 hours.
22806
Message ID
22806
Log Subtype
System
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
There is a duplicate of the license.
Fields
Field Description
service
This field always contains license.
status
This field always contains warning.
msg
Detected duplicate license in use.
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
155
Event-System
22901
Message ID
22901
Log Subtype
System
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGate unit is connected to the FortiAnalyzer unit.
Fields
Field Description
action
This field always contains connect.
status
This field always contains success.
reason
The reason for the trigger.
msg
Connected to FortiAnalyzer <ip_address>
22902
Message ID
22902
Log Subtype
System
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGate unit has been disconnected from the FortiAnalyzer unit.
Fields
Field Description
action
This field always contains disconnect.
status
This field always contains success.
reason
The reason for the trigger.
msg
Disconnected from FortiAnalyzer <ip_address>
22903
156
Message ID
22903
Log Subtype
System
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGate unit failed to connect to the FortiAnalyzer unit.
Fields
Field Description
action
This field always contains connect.
status
This field always contains failure.
reason
The reason for the trigger.
msg
Failed to connect to FortiAnalyzer <ip_address>
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-System
22911
Message ID
22911
Log Subtype
System
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGuard Analysis Service server is up.
Fields
Field Description
server
This field contains either Home or Alter.
action
This field always contains up.
msg
FortiGuard Analysis Service {Home | Alter} server is up
22912
Message ID
22912
Log Subtype
System
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGuard Analysis Service server is down.
Fields
Field Description
server
This field contains either Home or Alter.
action
This field always contains down.
msg
FortiGuard Analysis Service {Home | Alter} server is down
22913
Message ID
22913
Log Subtype
System
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGuard Analysis Service server has been disconnected.
Fields
Field Description
server
This field contains either Home or Alter.
action
This field always contains disconnect.
msg
FortiGuard Analysis Service {Home | Alter} server is disconnected
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
157
Event-System
22914
158
Message ID
22914
Log Subtype
System
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGuard Analysis Service server was changed to “disable” on the
FortiGuard Analysis and Management Service portal web site.
Fields
Field Description
server
This field contains either Home or Alter.
action
This field always contains change.
msg
FortiGuard Analysis Service server is changed to {Home | Alter}.
FortiGate 4.0 MR3 Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-DHCP service
Event-DHCP service log messages record DHCP service events.
26001
Message ID
26001
Log Subtype
DHCP service
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
A DHCP service occurred.
Fields
Field Description
dhcp_msg
Information about the DHCP server.
dir
The direction information.
mac
The MAC IP address with 2x.
ip
The IP address.
lease
The lease information.
hostname
The host name information.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
26002
Message ID
26002
Log Subtype
DHCP service
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what appears in the msg field, the meaning can be any one of
the following:
• No shared network found.
• The IP address range spans multiple subnets.
• The IP address range does not belong to the net.
Fields
Field Description
dhcp_msg
Information about the DHCP server.
dir
The direction information.
mac
The MAC IP address with 2x at the end.
ip
The IP address.
lease
The lease information.
hostname
The host name information.
msg
This field contains any one of the following:
• No shared network for network <interface_name> (ip_address)
• Address range <ip_address> to <ip_address>, netmask
<netmask_address> spans <string>!
• Address range <ip_address> to <ip_address> netmask
<netmask_address> not on net <string>!
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
159
Event-DHCP service
160
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Firewall authentication
Event-Firewall authentication log messages record authentication events that occur within the FortiGate
firewall.
38001
38002
38003
38004
38005
38010
38011
38012
38020
38021
38022
38026
38027
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
161
Event-Firewall authentication
38001
162
Message ID
38001
Log Subtype
Firewall Authentication
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The specified administrator succeeded in authentication.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
This field always contains authenticate.
status
This field always contains success.
msg
User <user_name> succeeded in authentication
Message ID
38001
Log Subtype
Firewall Authentication
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The specified AD group succeeded in authentication.
Fields
Field Description
ipproto
The IP protocol information.
src
The source IP address.
dst
The destination IP address.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
adgroup
The name of the AD group.
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
This field always contains FSAE-auth.
status
This field always contains success.
msg
AD group <adgroup_name> user <user_name> succeeded in
authentication.
Message ID
38001
Log Subtype
Firewall Authentication
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Firewall authentication
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The specified AD domain group failed in authentication.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
domain
The domain name.
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
This field always contains NTML-auth.
status
This field always contains failure
reason
The reason that the trigger occurred.
msg
AD domain <domain_name> user <user_name> failed in
authentication.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
163
Event-Firewall authentication
38002
164
Message ID
38002
Log Subtype
Firewall Authentication
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The specified user failed in concurrent check.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example, the
user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
This field is always authenticate.
status
This field always contains failure.
msg
User <user_name> failed in concurrent check.
Message ID
38002
Log Subtype
Firewall Authentication
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The specified user failed in authentication.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example, the
user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
This field is always authenticate.
status
This field always contains failure.
msg
User <user_name> failed in authentication
Message ID
38002
Log Subtype
Firewall Authentication
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The specified user failed in authentication.
Fields
Field Description
ipproto
The IP protocol information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Firewall authentication
src
The source IP address.
dst
The destination IP address.
policyid
The firewall policy identification number.
adgroup
The name of the AD group.
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example, the
user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
This field always contains FSAE-auth.
status
This field always contains failure.
reason
The reason that the trigger occurred.
msg
AD group <group_name> user <user_name> failed in authentication.
Message ID
38002
Log Subtype
Firewall Authentication
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The user failed to was blacked out for a specified amount of time because
of abnormal behavior.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example, the
user admin_123 access the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
dst
The destination IP address.
action
This field always contains authenticate
status
This field always contains blackout.
reason
This field always contains abnormal.
msg
User from <ip_address> was blacked out for <time_seconds> seconds
due to abnormal behavior.
Message ID
38002
Log Subtype
Firewall Authentication
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The user failed to authenticate within the allowed time frame.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
user
The name of the user creating the traffic.
service
The IP network service that applies to the session or packet. The services
displayed correspond to the services configured in the firewall policy.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
165
Event-Firewall authentication
action
166
This field always contains authenticate
status
This field always contains timeout.
reason
This field always contains timeout.
src
The source IP address.
srcname
The name of the source. This can be the source’s IP address; however, it
can also be N/A.
dst
The destination IP address.
dstname
The name of the destination. This can be the destination’s IP address;
however it can also be N/A.
msg
User failed to authenticate within the allowed period.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Firewall authentication
38003
Message ID
38003
Log Subtype
Firewall Authentication
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The specified administrator failed authentication and is locked out
because they tried too many times.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example, the
user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
This field always contains authenticate.
status
This field always contains lockout.
msg
User at <ip_address> failed authentication too many times.
38004
Message ID
38004
Log Subtype
Firewall Authentication
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A successful FSAE log in event.
Fields
Field Description
user
The name of the user creating the traffic.
src
The source IP address.
server
The name or IP address of the server.
action
This field always contains FSAE-logon.
status
This field always contains success.
msg
FSAE-logon event from <ip_address>: user <user_name> logged on
<ip_address>
Message ID
38004
Log Subtype
Firewall Authentication
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A successful FSAE log in event.
Fields
Field Description
user
The name of the user creating the traffic.
src
The source IP address.
server
The name or IP address of the server.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
167
Event-Firewall authentication
168
action
This field always contains FSAE-logoff.
status
This field always contains success.
msg
FSAE-logoff event from <ip_address>: user <user_name> logged off
<ip_address>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Firewall authentication
38005
Message ID
38005
Log Subtype
Firewall Authentication
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The policy authentication of the specified user has timed out.
Fields
Field Description
src
The source IP address.
user
The name of the user creating the traffic.
group
The name of the user group creating the traffic.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
action
This field always contains authenticate.
status
This field always contains timeout.
msg
Policy authentication of user <user_name> has timed out.
38010
Message ID
38010
Log Subtype
Firewall Authentication
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The specified user failed authentication when creating a FortiGuard Web
Filtering override.
Fields
Field Description
initiator
The initiator information.
status
This field always contains failure.
reason
This field always contains credentials.
src
The source IP address.
dst
The destination IP address.
msg
User <user_name> failed authentication when creating a FortiGuard Web
Filtering overrride from <ip_address>
Message ID
38010
Log Subtype
Firewall Authentication
Severity
Alert
Firmware version
FortiOS 4.0 MR3
Meaning
The encryption for EVP failed.
Fields
Field Description
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example, the
user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
169
Event-Firewall authentication
action
This field always contains encryption.
cipher
This field always contains aes-128-cbc.
status
This field always contains failed.
msg
EVP encryption failed.
38011
170
Message ID
38011
Log Subtype
Firewall Authentication
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGuard Web Filtering override table is full and cannot contain
anymore overrides.
Fields
Field Description
initiator
The initiator information.
status
This field always contains failure.
reason
This field always contains table_add_failed.
src
The source IP address.
dst
The destination IP address.
msg
FortiGuard Web Filtering override table is full.
Message ID
38011
Log Subtype
Firewall Authentication
Severity
Alert
Firmware version
FortiOS 4.0 MR3
Meaning
The decryption for EVP failed.
Fields
Field Description
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example, the
user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
This field always contains decryption.
cipher
This field always contains aes-128-cbc.
status
This field always contains failed.
msg
EVP decryption failed.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Firewall authentication
38012
Message ID
38012
Log Subtype
Firewall Authentication
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A FortiGuard Web Filtering override was successfully created.
Fields
Field Description
initiator
The initiator information.
status
This field always contains success.
reason
This field always contains none.
src
The source IP address.
dst
The destination IP address.
action
This field always contains authentication.
scope
The scope information.
scope_data
The scope data information
rule_type
The rule type information.
rule_data
The rule data information.
offsite
The offsite information.
expiry
The expiry information.
msg
User <user_name> added webfilter override entry <entry_name> from
<location>.
38020
Message ID
38020
Log Subtype
Firewall Authentication
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A FortiClient checking event occurred.
Fields
Field Description
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example, the
user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
dst
The destination IP address.
msg
Log message information.
Message ID
38020
Log Subtype
Firewall Authentication
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A FortiClient checking event occurred.
Fields
Field Description
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
171
Event-Firewall authentication
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example, the
user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
msg
Log message information.
38021
172
Message ID
38021
Log Subtype
Firewall Authentication
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The quota for per IP shaper was exceeded.
Fields
Field Description
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example, the
user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
This field always contains ip-traffic-shaper.
status
This field always contains blocked.
shaper
The name of the traffic shaper.
bps
The bps information.
giga
The Gigabyte number.
mega
The mega number.
bytes
The number of bytes.
msg
Traffic exceed per ip traffic shaper quota, ip: <ip_address>
Message ID
38021
Log Subtype
Firewall Authentication
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The quota for per IP shaper was exceeded.
Fields
Field Description
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example, the
user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
This field always contains policy-traffic-shaper.
status
This field always contains blocked.
shaper
The name of the traffic shaper.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
bps
The bps information.
giga
The Gigabyte number.
mega
The mega number.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Firewall authentication
bytes
The number of bytes.
msg
Traffic exceed shared traffic shaper quota, policy id:
<firewall_policy_id_number>.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
173
Event-Firewall authentication
38022
174
Message ID
38022
Log Subtype
Firewall Authentication
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The shared traffic shaper data was logged.
Fields
Field Description
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example, the
user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
This field always contains ip-traffic-shaper
status
This field always contains allowed.
shaper
The name of the traffic shaper.
bps
The bps information.
giga
The Gigabyte number.
mega
The mega number.
bytes
The number of bytes.
msg
Per ip traffic shaper statistic data is logged, ip: <ip_address>
Message ID
38022
Log Subtype
Firewall Authentication
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The shared traffic shaper data was logged.
Fields
Field Description
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example, the
user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
This field always contains policy-traffic-shaper
status
This field always contains allowed.
shaper
The name of the traffic shaper.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
bps
The bps information.
giga
The Gigabyte number.
mega
The mega number.
bytes
The number of bytes.
msg
Shared traffic shaper statistic data is logged, policy id:
<firewall_policy_id_number>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Firewall authentication
38026
Message ID
38026
Log Subtype
Firewall Authentication
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The Endpoint License Distribution has indicated that there are a specified
number of keys assigned with a specified IP address.
Fields
Field Description
msg
Endpoint License Distribution: active license keys left; key <key_number>
assigned to endpoint with ip=<ip_address>
38027
Message ID
38027
Log Subtype
Firewall Authentication
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An endpoint application was detected.
Fields
Field Description
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example, the
user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
dst
The destination IP address.
action
The action taken by the FortiGate unit.
msg
Log message information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
175
Event-Firewall authentication
176
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Wireless
Event-Wireless log messages record wireless events that occur with FortiGate units that have WiFi
capabilities.
43520
43521
43522
43524
43525
43526
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
177
Event-Wireless
43520
Log Subtype
Wireless
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A wireless system activity occurred.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domain
exists, this field always contains root.
action
The information about the action that was taken.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
43521
Log Subtype
Wireless
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A wireless rogue AP activity occurred.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domain
exists, this field always contains roots.
ssid
The service set identifier.
bssid
The basic service set identifier
rate
The data rate number.
radio-band
The radio band information.
channel
The channel number.
action
The information about the action that was taken.
manuf
The name of the manufacturer.
security-mode
The type of security mode.
rssi
The RSSI number.
noise
The noise number.
live
The live number.
age
The age number.
on-wire
This is either no or yes.
detection-method
The type of detection method being used. This can be any one of the following:
• N/A
• sta
• mac adjancency
178
sta-mac
The station MAC information.
ap-scan
The WTP that scanned the station.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Wireless
43522
Log Subtype
Wireless
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A physical AP activity occurred.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
sn
The phsyical AP unit’s serial number.
ap
The name of the physical AP.
ap_profile
The name of the AP profile.
ip
The IP address of the AP unit.
action
The information about the action that was taken.
reason
The reason for taking the specified action.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
43524
Log Subtype
Wireless
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A wireless client activity occurred.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
sn
The physical AP unit’s serial number.
ap
The physical AP name.
vap
The virtual AP name.
ssid
The service set identifier.
mac
The client wireless MAC address.
security
This field contains any one of the following:
• open
• wep64
• wep128
• wpa-psk
• wpa-radius
• wpa
• wpa2
• wpa2-auto
action
The information about the action that was taken.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
179
Event-Wireless
43525
Log Subtype
Wireless
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
A wireless rogue AP activity occurred.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domain
exists, this field always contains roots.
ssid
The service set identifier.
bssid
The basic service set identifier
rate
The data rate number.
radio-band
The radio band information.
channel
The channel number.
action
The information about the action that was taken.
manuf
The name of the manufacturer.
security-mode
The information about the security mode.
rssi
The RSSI number.
noise
The noise number.
live
The live number.
age
The age number.
on-wire
This is either no or yes.
detection-method
The type of detection method being used. This can be any one of the following:
• N/A
• sta
• mac adjancency
180
sta-mac
The station MAC information.
ap-scan
The WTP that scanned the station.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-Wireless
43526
Log Subtype
Wireless
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A physical AP radio activity.
Fields
Field Description
vd
The name of the virtual domain where the action occured in. If no virtual
domains exist, this field always contains root.
sn
The physical AP unit’s serial number.
ap
The name of the physical AP unit.
ip
The IP address of the AP unit.
radio-id
The radio identification number.
action
The information about the action that was taken.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
181
Event-Wireless
182
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-IPsec negotiation
Event-IPsec negotiation log messages record IPsec activities and events.
37120
37184
37121
37185
37122
37186
37123
37187
37124
37188
37125
37189
37126
37190
37127
37191
37129
37192
37130
37193
37131
37194
37132
37195
37133
37196
37134
37197
37135
37198
37136
37199
37137
37200
37138
37201
37139
37202
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
37203
183
Event-IPsec negotiation
37120
Log Subtype
IPsec
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Notification of an IPsec negotiation of Phase 1.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
negotiate IPsec phase 1
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
xauth_user
The name of the XAuth user.
xauth_group
The name of the Xauthentication group.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
xauth_result
184
This field contain either XAUTH authentication successful or XAUTH
authentication failed.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-IPsec negotiation
37121
Log Subtype
IPsec
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
Negotiation error of an IPsec Phase 1.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
negotiate IPsec phase 1
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
xauth_user
The name of the XAuth user.
xauth_group
The name of the Xauthentication group.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
xauth_result
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
This field contain either XAUTH authentication successful or XAUTH
authentication failed.
185
Event-IPsec negotiation
37122
Log Subtype
IPsec
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Notification of an IPsec negotiation of Phase 2.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
negotiate IPsec phase 1
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
xauth_user
The name of the XAuth user.
xauth_group
The name of the Xauthentication group.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
role
This field contains either responder or initiator.
esp_transform
This field contains any one of the following;
esp_auth
186
• ESP_NULL
• ESP_3DES
• ESP_DES
• ESP_AES
This field contains any one of the following;
• no authentication
• HMAC_MD5
• HMAC_SHA1
• HMAC_SHA256
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-IPsec negotiation
37123
Log Subtype
IPsec
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
Negotiation error of an IPsec Phase 2.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
negotiate IPsec phase 1
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
xauth_user
The name of the XAuth user.
xauth_group
The name of the Xauthentication group.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
role
This field contains either responder or initiator.
esp_transform
This field contains any one of the following;
esp_auth
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
• ESP_NULL
• ESP_3DES
• ESP_DES
• ESP_AES
This field contains any one of the following;
• no authentication
• HMAC_MD5
• HMAC_SHA1
• HMAC_SHA256
187
Event-IPsec negotiation
37124
Log Subtype
IPsec
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
IPsec Phase 1 error.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
msg
negotiate IPsec phase 1
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
xauth_user
The name of the XAuth user.
xauth_group
The name of the Xauthentication group.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
error_reason
peer_notif
188
This field contains any one of the following:
• invalid certificate
• peer notification
• invalid SA payload
• not enough key material for tunnel
• probable preshared key
• encapsulated mode mismatch
• mismatch
• no matching gateway for new request
• peer SA proposal not match
• aggressive vs main mode
• local policy
• mismatch for new request
This field, peer notification, can contain any one of the following:
• NOT-APPLICABLE
• INVALID-CERTIFICATE
• INVALID-PAYLOAD-TYPE
• BAD-CERT-REQUEST-SYNTAX
• DOI-NOT-SUPPORTED
• INVALID-CERT-AUTHORITY
• SITUATION-NOT-SUPPORTED
• INVALID-HASH-INFORMATION
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-IPsec negotiation
• INVALID-COOKIE
• AUTHENTICATION-FAILED
• INVALID-MAJOR-VERSION
• INVALID-SIGNATURE
• INVALID-MINOR-VERSION
• ADDRESS-NOTIFICATION
• INVALID-EXCHANGE-TYPE
• NOTIFY-SA-LIFETIME
• INVALID-FLAGS
• CERTIFICATE-UNAVAILABLE
• INVALID-MESSAGE-ID
• UNSUPPORTED-EXCHANGE-TYPE
• INVALID-PROTOCOL-ID
• UNEQUAL-PAYLOAD-LENGTHS
• INVALID-SPI
• CONNECTED
• INVALID-TRANSFORM-ID
• RESPONDER-LIFETIME
• ATTRIBUTES-NOT-SUPPORTED
• REPLAY-STATUS
• NO-PROPOSAL-CHOSEN
• INTIAL-CONTACT
• BAD-PROPOSAL-SYNTAX
• R-U-THERE
• PAYLOAD-MALFORMED
• R-U-THERE-ACK
• INVALID-KEY-INFORMATION
• HEARTBEAT
• INVALID-ID-INFORMATION
• RETRY-LIMIT-REACHED
• INVALID-CERT-ENCODING
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
189
Event-IPsec negotiation
37125
Log Subtype
IPsec
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
IPsec Phase 2 error.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
negotiate IPsec phase 1
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
xauth_user
The name of the XAuth user.
xauth_group
The name of the Xauthentication group.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
error_reason
190
This field contains any one of the following:
• invalid certificate
• peer notification
• invalid SA payload
• not enough key material for tunnel
• probable preshared key
• encapsulated mode mismatch
• mismatch
• no matching gateway for new request
• peer SA proposal not match
• aggressive vs main mode
• local policy
• mismatch for new request
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-IPsec negotiation
37126
Log Subtype
IPsec
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
IPsec not state error.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
msg
negotiate IPsec phase 1
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
xauth_user
The name of the XAuth user.
xauth_group
The name of the Xauthentication group.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
error_reason
This field contains any one of the following:
• invalid certificate
• not enough key material for tunnel
• invalid SA payload
• encapsulated mode mismatch
• probable preshared key mismatch • no matching gateway for new request
• peer SA proposal not match local • aggressive vs main mode mismatch for
policy
new request
• peer notification
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
191
Event-IPsec negotiation
37127
Log Subtype
IPsec
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Progress of an IPsec phase 1 notification.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
negotiate IPsec phase 1
action
This field contains any one of the following;
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
xauth_user
The name of the XAuth user.
xauth_group
The name of the Xauthentication group.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
init
This field can either be local or remote.
mode
This field contains any one of the following;
• aggressive
• xauth
• main
• xauth_client
• quick
192
dir
This field can be either outbound or inbound.
stage
The stage number.
role
This field contains either responder or initiator.
result
This field contains any one of the following:
• ERROR
• DONE
• OK
• PENDING
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-IPsec negotiation
37128
Log Subtype
IPsec
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
Progress of an IPsec Phase 1 error.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
negotiate IPsec phase 1
action
This field contains any one of the following;
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
xauth_user
The name of the XAuth user.
xauth_group
The name of the Xauthentication group.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following;
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
init
This field contains either local or remote.
mode
This field contains any one of the following:
• aggressive
• xauth
• main
• xauth_client
• quick
dir
The direction of the traffic. This field contains either outbound or inbound.
stage
The stage number.
role
This field contains either responder or initiator.
result
This field contains any one of the following:
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
• ERROR
• DONE
• OK
• PENDING
193
Event-IPsec negotiation
37129
Log Subtype
IPsec
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Progress of an IPsec Phase 2 notification.
Fields
Field Description
msg
negotiate IPsec phase 1
action
This field contains any one of the following;
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
xauth_user
The name of the XAuth user.
xauth_group
The name of the XAuthentication group.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
init
This field can either be local or remote.
mode
This field contains any one of the following;
• aggressive
• xauth
• main
• xauth_client
• quick
194
dir
The direction of the traffic. This field contains either outbound or inbound.
stage
The stage number.
role
This field contains either responder or initiator.
result
This field contains any one of the following:
• ERROR
• DONE
• OK
• PENDING
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-IPsec negotiation
37130
Log Subtype
IPsec
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
The progress status of an IPsec Phase 2 error.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
progress IPsec phase 2
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
xauth_user
The name of the XAuth user.
xauth_group
The name of the XAuthentication group.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following;
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
init
This field can either be local or remote.
mode
This field contains any one of the following:
• aggressive
• xauth
• main
• xauth_client
• quick
dir
The direction of the traffic. This field contain either outbound or inbound.
stage
The stage number.
role
This field contains either responder or initiator.
result
This field contains any one of the following:
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
• ERROR
• DONE
• OK
• PENDING
195
Event-IPsec negotiation
37131
Log Subtype
IPsec
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
A notification of IPsec ESP.
Fields
Field Description
msg
IPsec ESP.
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
xauth_user
The name of the XAuth user.
xauth_group
The name of the Xauthentication group.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
error_num
196
This field contains any one of the following:
• Invalid ESP packet detected
• Invalid ESP packet detected (invalid padding
length)
• Invalid ESP packet detected
(HMAC validation failed)
• Invalid ESP packet detected (replayed packet)
• Invalid ESP packet detected
(invalid padding)
• Received ESP packet with unknown SPI
spi
The spi information.
seq
The seq information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-IPsec negotiation
37132
Log Subtype
IPsec
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
A notification of IPsec ESP error.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domains exist,
this field always contains root.
msg
IPsec ESP.
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
xauth_user
The name of the XAuth user.
xauth_group
The name of the Xauthentication group.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
error_num
This field contains any one of the following:
• Invalid ESP packet detected
• Invalid ESP packet detected (invalid padding
length)
• Invalid ESP packet detected
(HMAC validation failed)
• Invalid ESP packet detected (replayed packet)
• Invalid ESP packet detected
(invalid padding)
• Received ESP packet with unknown SPI
spi
The spi information.
seq
The seq information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
197
Event-IPsec negotiation
37133
Log Subtype
IPsec
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An administrator installed IPsec SA.
Fields
Field Description
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
Install IPsec SA
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
198
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
xauth_user
The name of the XAuth user.
xauth_group
The name of the XAuthentication group.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
role
This field contains either responder or initiator.
in_spi
The in_spi information.
out_spi
The out_spi information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-IPsec negotiation
37134
Log Subtype
IPsec
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An administrator deleted an IPsec Phase 1 SA.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
delete IPsec phase 1 SA.
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
xauth_user
The name of the XAuth user.
xauth_group
The name of the XAuthentication group.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
199
Event-IPsec negotiation
37135
Log Subtype
IPsec
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An administrator deleted an IPsec Phase 1 SA.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
delete IPsec phase 2 SA.
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
200
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
xauth_user
The name of the XAuth user.
xauth_group
The name of the Xauthentication group.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
enc_spi
The enc_spi information.
dec_spi
The desc_spi information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-IPsec negotiation
37136
Log Subtype
IPsec
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An IPsec DPD failed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
msg
IPsec DPD failure
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
xauth_user
The name of the XAuth user.
xauth_group
The name of the XAuthentication group.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
201
Event-IPsec negotiation
37137
Log Subtype
IPsec
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An IPsec connection failed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
IPsec connection failure
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
xauth_user
The name of the XAuth user.
xauth_group
The name of the XAuthentication group.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
202
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-IPsec negotiation
37138
Log Subtype
IPsec
Severity
Notification
Firmware version FortiOS 4.0 MR3
Meaning
An IPsec connection status changed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
IPsec connection status change
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
xauth_user
The name of the XAuth user.
xauth_group
The name of the Xauthentication group.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
tunnel_ip
The tunnel’s IP address.
tunnel_id
The tunnel’s identification number.
tunnel_type
The type of tunnel. This field always contains IPsec.
duration
This represents the value in seconds.
sent
The total number of bytes sent.
rcvd
The total number of bytes received.
next_stat
The next_stat information.
tunnel
The tunnel information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
203
Event-IPsec negotiation
37139
Log Subtype
IPsec
Severity
Notification
Firmware version FortiOS 4.0 MR3
Meaning
An IPsec Phase 2 status changed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
IPsec phase 2 status change
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
204
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
xauth_user
The name of the XAuth user.
xauth_group
The name of the XAuthentication group.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
phase2_name
The name given to the phase 2 configuration.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-IPsec negotiation
37184
Log Subtype
IPsec
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An IPsec connection failed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
negotiate IPsec phase 1
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
peer_notif
This field, peer notification, can contain any one of the following:
• NOT-APPLICABLE
• INVALID-CERTIFICATE
• INVALID-PAYLOAD-TYPE
• BAD-CERT-REQUEST-SYNTAX
• DOI-NOT-SUPPORTED
• INVALID-CERT-AUTHORITY
• SITUATION-NOTSUPPORTED
• INVALID-HASH-INFORMATION
• INVALID-COOKIE
• AUTHENTICATION-FAILED
• INVALID-MAJOR-VERSION • INVALID-SIGNATURE
• INVALID-MINOR-VERSION
• ADDRESS-NOTIFICATION
• INVALID-EXCHANGE-TYPE • NOTIFY-SA-LIFETIME
• INVALID-FLAGS
• CERTIFICATE-UNAVAILABLE
• INVALID-MESSAGE-ID
• UNSUPPORTED-EXCHANGE-TYPE
• INVALID-PROTOCOL-ID
• UNEQUAL-PAYLOAD-LENGTHS
• INVALID-SPI
• CONNECTED
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
205
Event-IPsec negotiation
• INVALID-TRANSFORM-ID
• RESPONDER-LIFETIME
• ATTRIBUTES-NOTSUPPORTED
• REPLAY-STATUS
• NO-PROPOSAL-CHOSEN
• INTIAL-CONTACT
• BAD-PROPOSAL-SYNTAX
• R-U-THERE
• PAYLOAD-MALFORMED
• R-U-THERE-ACK
• INVALID-KEY
INFORMATION
• HEARTBEAT
• INVALID-ID-INFORMATION • RETRY-LIMIT-REACHED
• INVALID-CERT-ENCODING
206
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-IPsec negotiation
37185
Log Subtype
IPsec
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An IPsec connection failed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
negotiate IPsec phase 1
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
peer_notif
This field contains any one of the following:
• NOT APPLICABLE
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
• ATTRIBUTES-NOT-SUPPORTED
• INVALID-PAYLOAD-TYPE
• NO-PROPOSAL-CHOSEN
• DOI-NOT-SUPPORTED
• BAD-PROPOSAL-SYNTAX
• SITUATION-NOT SUPPORTED
• PAYLOAD-MALFORMED
• INVALID-COOKIE
• INVALID-KEY-INFORMATION
• INVALID-MAJOR-VERSION
• INVALID-ID-INFORMATION
• INVALID-MINOR-VERSION
• INVALID-CERT-ENCODING
• INVALID-MINOR-VERSION
• INVALID-CERTIIFCATE
• INVALID-EXCHANGE-TYPE
• BAD-CERT-REQUEST-SYNTAX
• INVALID-FLAGS
• INVALID-CERT-AUTHORITY
• INVALID-MESSAGE-ID
• INVALID-HASH-INFORMATION
• INVALID-PROTOCOL-ID
• AUTHENTICATION-FAILED
• INVALID-SPI
• INVALID-SIGNATURE
207
Event-IPsec negotiation
• INVALID-TRANSFORM-ID
• ADDRESS-NOTIFICATION
• NOTIFY-SA-LIFETIME
• RESPONDER-LIFETIME
• CERTIFICATE-UNAVAILABLE
• REPLAY-STATUS
• UNSUPPORTED-EXCHANGETYPE
• INITIAL-CONTACT
• UNEQUAL-PAYLOAD-LENGTHS • R-U-THERE
208
• CONNECTED
• R-U-THERE-ACK
• HEARTBEAT
• RETRY-LIMIT-REACHED
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-IPsec negotiation
37186
Log Subtype
IPsec
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An IPsec Phase 2 negotiation notification.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
vritual domains exist, this field always contains root.
msg
negotiate IPsec phase 2
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
role
This field contains either responder or initiator.
esp_transform
This field contains any one of the following:
esp_auth
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
• ESP_NULL
• ESP_3DES
• ESP_DES
• ESP_AES
This field contains any one of the following:
• no authentication
• HMAC_MD5
• HMAC_SHA1
• HMAC_SHA256
209
Event-IPsec negotiation
37187
Log Subtype
IPsec
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An IPsec Phase 2 negotiation notification.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
negotiate IPsec phase 2
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
role
This field contains either responder or initiator.
esp_transform
This field contains any one of the following:
esp_auth
210
• ESP_NULL
• ESP_3DES
• ESP_DES
• ESP_AES
This field contains any one of the following:
• no authentication
• HMAC_MD5
• HMAC_SHA1
• HMAC_SHA256
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-IPsec negotiation
37188
Log Subtype
IPsec
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An IPsec Phase 1 negotiation error.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. if no virtual
domains exist, this field always contains root.
msg
IPsec phase 1 error
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
error_reason
This field contains any one of the following:
• invalid certificate
• peer notification
• invalid SA payload
• not enough key material for tunnel
• probable preshared key
mismatch
• encapsulation mode mismatch
• peer SA proposal not match
local policy
• no matching gateway for new request
• aggressive vs main mode
mismatch for new request
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
211
Event-IPsec negotiation
37189
Log Subtype
IPsec
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An IPsec Phase 1 negotiation error.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no vritual domains
exist, this field always contains root.
msg
IPsec phase 2 error
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
error_reason
This field contains any one of the following:
• invalid certificate
• peer notification
• invalid SA payload
• not enough key material for tunnel
• probable preshared key
mismatch
• encapsulation mode mismatch
• peer SA proposal not match
local policy
• no matching gateway for new request
• aggressive vs main mode
mismatch for new request
212
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-IPsec negotiation
37190
Log Subtype
IPsec
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An IPsec no state error.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
IPsec no state error
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
error_reason
This field contains any one of the following:
• invalid certificate
• peer notification
• invalid SA payload
• not enough key material for tunnel
• probable preshared key
mismatch
• encapsulation mode mismatch
• peer SA proposal not match
local policy
• no matching gateway for new request
• aggressive vs main mode
mismatch for new request
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
213
Event-IPsec negotiation
37191
Log Subtype
IPsec
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An IPsec Phase 1 progress notification.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
progress IPsec phase 1
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
init
This field contains either local or remote.
exch
This field contains any one of the following:
• SA_INIT
• CREATE_CHILD
• AUTH
dir
This field contains either outbound or inbound.
role
This field contains either responder or initiator.
result
version
214
This field contains one of the following:
• ERROR
• DONE
• OK
• PENDING
The version of the IPsec, which is IKEv2.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-IPsec negotiation
37192
Log Subtype
IPsec
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An IPsec Phase 1 progress error.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If
no virtual domains exist, this field always contains root.
msg
progress IPsec phase 1
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vpn_tunnel
The name of the VPN tunnel that was used. For example,
ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
init
This field contains either local or remote.
exch
This field contains any one of the following:
• SA_INIT
• CREATE_CHILD
• AUTH
dir
The direction of the traffic. This field contains either outbound or
inbound.
role
This field contains either responder or initiator.
result
This field contains one of the following:
version
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
• ERROR
• DONE
• OK
• PENDING
The version of the IPsec, which is IKEv2.
215
Event-IPsec negotiation
37193
Log Subtype
IPsec
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An IPsec Phase 2 progress notification.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
progress IPsec phase 2
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
init
This field contains either local or remote.
exch
This field contains any one of the following:
• SA_INIT
• CREATE_CHILD
• AUTH
dir
The direction of the traffic. This field contains either outbound or inbound.
role
This field contains either responder or initiator.
result
This field contains one of the following:
version
216
• ERROR
• DONE
• OK
• PENDING
The version of the IPsec, which is IKEv2.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-IPsec negotiation
37194
Log Subtype
IPsec
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An IPsec Phase 2 progress error.
Fields
Field Description
msg
progress IPsec phase 2
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
init
This field contains either local or remote.
exch
This field contains any one of the following:
• SA_INIT
• CREATE_CHILD
• AUTH
dir
The direction of the traffic. This field contains either outbound or inbound.
role
This field contains either responder or initiator.
result
This field contains one of the following:
version
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
• ERROR
• DONE
• OK
• PENDING
The version of the IPsec, which is IKEv2.
217
Event-IPsec negotiation
37195
Log Subtype
IPsec
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An IPsec ESP notification.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
IPsec ESP
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
error_num
218
This field contains any one of the following:
• Invalid ESP packet detected
• Invalid ESP packet detected. (invalid
padding length)
• Invalid ESP packet detected
(HMAC validation failed)
• Invalid ESP packet detected (replayed
packet)
• Invalid ESP packet detected
(invalid padding)
• Received ESP packet with unknown SPI
spi
The spi information.
seq
The seq information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-IPsec negotiation
37196
Log Subtype
IPsec
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
An IPsec ESP error.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
IPsec ESP
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
error_num
This field contains any one of the following:
• Invalid ESP packet detected • Invalid ESP packet detected. (invalid
padding length)
• Invalid ESP packet detected • Invalid ESP packet detected (replayed
(HMAC validation failed)
packet)
• Invalid ESP packet detected • Received ESP packet with unknown SPI
(invalid padding)
spi
The spi information.
seq
The seq information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
219
Event-IPsec negotiation
37197
Log Subtype
IPsec
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Installation of IPsec SA occurred.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
install IPsec SA
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
220
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
role
This field contains either responder or initiator.
in_spi
The in_spi information.
out_spi
The out_spi information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-IPsec negotiation
37198
Log Subtype
IPsec
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Removed an IPsec Phase 1 SA.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If
no virtual domains exist, this field always contains root.
msg
delete IPsec phase 1SA
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vpn_tunnel
The name of the VPN tunnel that was used. For example,
ssl_vpn1.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
221
Event-IPsec negotiation
37199
Log Subtype
IPsec
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Removed an IPsec Phase 2 SA.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in.
If no virtual domains exist, this field always contains root.
msg
delete IPsec phase 2 SA
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
222
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vpn_tunnel
The name of the VPN tunnel that was used. For example,
ssl_vpn1.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-IPsec negotiation
37200
Log Subtype
IPsec
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An IPsec DPD failure occurred.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If
no virtual domains exist, this field always contains root.
msg
IPsec DPD failure
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vpn_tunnel
The name of the VPN tunnel that was used. For example,
ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
223
Event-IPsec negotiation
37201
Log Subtype
IPsec
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An IPsec connection failure occurred.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
IPsec connection failure
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down}
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vpn_tunnel
The name of the VPN tunnel that was used. For example,
ssl_vpn1.
status
This field contains any one of the following:
• success
• esp_error
• failure
• dpd_failure
• negotiate_error
224
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-IPsec negotiation
37202
Log Subtype
IPsec
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An IPsec connection status changed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
IPsec connection status change
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vpn_tunnel
The name of the VPN tunnel that was used. For example, ssl_vpn1.
tunnel_ip
The VPN tunnel’s IP address.
tunnel_id
The VPN tunnel’s identification number.
tunnel_type
The type of VPN tunnel. This field contains IPsec.
duration
This represents the value in seconds.
sent
The total number of bytes sent.
rcvd
The total number of bytes received.
next_stat
The next_stat information.
tunnel
The tunnel information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
225
Event-IPsec negotiation
37203
Log Subtype
IPsec
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An IPsec phase 2 status change.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
IPsec phase 2 status change
action
This field contains any one of the following:
• negotiate
• tunnel-up
• error
• tunnel-down
• install_sa
• tunnel-stats
• delete_phase1_sa
• phase2-up
• delete_IPsec_sa
• phase2-down
• dpd
226
rem_ip
The remote IP address.
loc_ip
The local IP address.
rem_port
The remote port number.
loc_port
The local port number.
out_intf
The interface that is outbound.
cookies
The cookies for that IPsec session.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vpn_tunnel
The name of the VPN tunnel that was used. For example,
ssl_vpn1.
phase2_name
The name of the Phase 2 configuration.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-L2TP/PPP/PPPoE
Event-L2TP/PPP/PPPoE log messages record events and activities that occur with the Internet and
modem protocols, L2TP, PPP, and PPPoE.
29001
31006
29002
31007
29003
31008
29004
31009
29009
29015
29016
29022
29024
30004
30005
30006
30007
30008
30009
31004
31005
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
227
Event-L2TP/PPP/PPPoE
29001
Message ID
29001
Log Subtype
L2TP/PPTP/PPPoE
Severity
Variable
Firmware version
FortiOS 4.0 MR3
Meaning
PPPd log message.
Fields
Field Description
user
The name of the user creating the traffic.
local
The local IP address.
remote
The remote IP address.
assigned
The assigned IP address.
stat
The stat information.
msg
The log message information. This is usually a sentence and
explains the activity and/or action taken.
29002
228
Message ID
29002
Log Subtype
L2TP/PPTP/PPPoE
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
PPPd authentication message.
Fields
Field Description
user
The name of the user creating the traffic.
local
The local IP address.
remote
The remote IP address.
assigned
The assigned IP address.
action
This field always contains auth_success.
msg
User <user_name> using <auth> with authentication protocol
<protocol_information>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-L2TP/PPP/PPPoE
29003
Message ID
29003
Log Subtype
L2TP/PPTP/PPPoE
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The user failed authentication when trying to connect.
Fields
Field Description
local
The local IP address.
remote
The remote IP address.
assigned
The assigned IP address.
action
This field always contains auth_failed.
msg
<user_name> is trying to connect using <auth> with
authentication protocol <protocol_information>, failed.
29004
Message ID
29004
Log Subtype
L2TP/PPTP/PPPoE
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The maximum number of PPTP connections has been
reached.
Fields
Field Description
status
This field always contains failure.
action
This field always contains connect.
msg
PPTP: the maximum number of connections has been
reached. No more clients can connect.
29009
Message ID
29009
Log Subtype
L2TP/PPTP/PPPoE
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A PPPoE status report.
Fields
Field Description
gateway_ip
The gateway IP address.
assigned_IP
The assigned IP address.
mtu
The MTU information.
msg
PPPoE status report.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
229
Event-L2TP/PPP/PPPoE
29015
Message ID
29015
Log Subtype
L2TP/PPTP/PPPoE
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
PPP has received bad options.
Fields
Field Description
msg
Peer IP is the same as an interface IP <interface>.
IP(<interface_ip_address>).
29016
Message ID
29016
Log Subtype
L2TP/PPTP/PPPoE
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
PPP has received bad options.
Fields
Field Description
msg
Local IP is the same as an interface IP <interface>.
IP(<interface_ip_address>)
29022
Message ID
29022
Log Subtype
L2TP/PPTP/PPPoE
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
No IP address is currently available.
Fields
Field Description
status
This field always contains failure.
action
This field always contains connect.
msg
PPTP: No IP addresses left to assign in virtual domain:
<virtual_domain_name>
29024
230
Message ID
29024
Log Subtype
L2TP/PPTP/PPPoE
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
Not enough memory available.
Fields
Field Description
status
This field always contains failure.
action
This field always contains start.
msg
failed to expand pptp config list due to not enough memory.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-L2TP/PPP/PPPoE
30004
Message ID
30004
Log Subtype
L2TP/PPTP/PPPoE
Severity
Variable
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on the msg field, the meaning can be any one of
the following:
• The PPTPD successfully started.
• An PPPTP log message.
Fields
Field Description
action
This field always contains start.
status
This field always contains success.
msg
This field contains any one of the following:
• PPTPD: started successfully
• The log message information, which is usually a sentence
explaining the activity and/or action taken.
30005
Message ID
30005
Log Subtype
L2TP/PPTP/PPPoE
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
The PPTPD failed to start.
Fields
Field Description
action
This field always contains start.
status
This field always contains failure.
reason
failed to create socket
msg
PPTPD failed to start because failed to create socket.
30006
Message ID
30006
Log Subtype
L2TP/PPTP/PPPoE
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The PPTPD successfully exited.
Fields
Field Description
action
This field always contains exit.
status
This field always contains success.
msg
PPTPD exited successfully.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
231
Event-L2TP/PPP/PPPoE
30007
Message ID
30007
Log Subtype
L2TP/PPTP/PPPoE
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
All PPTPD connections were closed because the PPTP
setting changed.
Fields
Field Description
action
This field always contains disconnect.
status
This field always contains success.
reason
PPTP setting is changed.
msg
PPTPD closed all client connections in vdom <vdom_name>
because PPTP setting was changed.
Message ID
30007
Log Subtype
L2TP/PPTP/PPPoE
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
The PPTPD disconnected.
Fields
Field Description
action
This field always contains disconnect.
status
This field always contains success.
reason
failed to find the interface by device index
msg
PPTPD closed all client connections in vdom <vdom_name>
because failed to find the interface by device index.
30008
232
Message ID
30008
Log Subtype
L2TP/PPTP/PPPoE
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
PPTPD client connection.
Fields
Field Description
action
This field always contains connect
status
This field always contains success.
msg
Client <ip_address> control connection started.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-L2TP/PPP/PPPoE
30009
Message ID
30009
Log Subtype
L2TP/PPTP/PPPoE
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
PPTPD client disconnected.
Fields
Field Description
action
This field always contains disconnect.
status
This field always contains success.
msg
Client <client_name> control connection finished.
31004
Message ID
31004
Log Subtype
L2TP/PPTP/PPPoE
Severity
Variable
Firmware version
FortiOS 4.0 MR3
Meaning
An L2TP log message.
Fields
Field Description
msg
The log message information. This is usually a sentence and
explains the activity and/or action taken.
31005
Message ID
31005
Log Subtype
L2TP/PPTP/PPPoE
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
L2TP exited successfully.
Fields
Field Description
action
This field always contains exit.
status
This field always contains success.
msg
L2TPD exited successfully.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
233
Event-L2TP/PPP/PPPoE
31006
Message ID
31006
Log Subtype
L2TP/PPTP/PPPoE
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
L2TP closed all client connections in a specified VDOM
because L2TP setting was changed.
Fields
Field Description
action
This field always contains disconnect.
status
This field always contains success.
reason
L2TP setting changed.
msg
L2TPD closed all client connections in vdom <vdom_name>
because L2TP setting was changed.
Message ID
31006
Log Subtype
L2TP/PPTP/PPPoE
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
L2TP closed all client connections in a specified VDOM
because failed to find interface by device index.
Fields
Field Description
action
This field always contains disconnect.
status
This field always contains success.
reason
interface not found
msg
L2TPD closed all client connections in vdom <vdom_name>
because failed to find interface by device index.
31007
234
Message ID
31007
Log Subtype
L2TP/PPTP/PPPoE
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
An L2TP client connection. There are no more available IP
addresses to assign in the specified VDOM.
Fields
Field Description
action
This field always contains connect.
status
This field always contains failure
reason
no ip available
msg
No IP addresses left to assign in virtual domain:
<vdom_name>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-L2TP/PPP/PPPoE
31008
Message ID
31008
Log Subtype
L2TP/PPTP/PPPoE
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An L2TP connection started.
Fields
Field Description
action
This field always contains connect.
status
This field always contains success.
msg
Client <client_name> control connection started
(id<ip_address>), assigned ip <ip_address>.
31009
Message ID
31009
Log Subtype
L2TP/PPTP/PPPoE
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An L2TP connection has finished.
Fields
Field Description
action
This field always contains disconnect.
status
This field always contains success.
msg
Client <client_name> control connection(id<ip_address>)
finished.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
235
Event-L2TP/PPP/PPPoE
236
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-SSL VPN
Event SSL-VPN log messages record SSL-VPN user, administration and session events.
39424
39944
39425
39945
39426
39946
41984
39947
41985
39948
41986
39949
41987
39950
41988
39951
39936
39937
39939
39940
39941
39942
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
237
Event-SSL VPN
39424
238
Message ID
39424
Log Sub-type
sslvpn-user
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL-VPN web access user has log into the system successfully.
Fields
Field Description
action
The status of the SSL VPN tunnel. This field contains tunnel-up, which indicates
that the SSL VPN tunnel is currently up and running.
tunnel_type
The type of SSL VPN tunnel. The field contains ssl-web, which indicates that it is
an SSL VPN web access tunnel.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
tunnel_id
The tunnel identification number.
remote_ip
The remote IP address.
tunnel_ip
The tunnel IP address.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
dst_host
The destination host information.
reason
The reason that the trigger occurred.
msg
SSL tunnel established.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-SSL VPN
39425
Message ID
39425
Log Sub-type
sslvpn-user
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL-VPN tunnel was shut down.
Fields
Field Description
action
The status of the SSL VPN tunnel. This field contains tunnel-down, which
indicates that the SSL VPN tunnel is currently down, or not running.
tunnel_type
The type of SSL VPN tunnel that was accessed. The field contains ssl-web,
which indicates that it is an SSL VPN web access tunnel.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
tunnel_id
The tunnel identification number.
remote_ip
The remote IP address.
tunnel_ip
The tunnel IP address.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
dst_host
The destination host information.
reason
The reason that the trigger occurred.
duration
This represents the value in seconds.
sent
The total number of bytes sent.
rcvd
The total number of bytes received.
msg
SSL tunnel shutdown.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
239
Event-SSL VPN
39426
Message ID
39426
Log Type
sslvpn-user
Severity
Alert
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL VPN user has failed to log in.
Fields
Field Description
action
The action of an SSL VPN user. This field contains ssl-login-fail, which
indicates that a user tried to log in using the SSL VPN tunnel but failed.
tunnel_type
The type of SSL VPN tunnel that was accessed. This field contains ssl-web,
which indicates that it is an SSL VPN web access tunnel.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
tunnel_id
The tunnel identification number.
remote_ip
The remote IP address.
tunnel_ip
The tunnel IP address.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
dst_host
The destination host information.
reason
The reason that the trigger occurred.
msg
SSL user failed to logged in.
41984
Message ID
41984
Log Type
sslvpn-admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL-VPN admin user successfully uploaded a certificate.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
action
This field contains info.
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accesses the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
msg
A certificate is loaded.
cert-type
This field contains any one of the following:
• CA
• CRL
240
• Local
• Remote
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-SSL VPN
41985
Message ID
41985
Log Type
sslvpn-admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL-VPN admin removed a certificate.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
action
This field contains info.
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example, the
user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
msg
A certificate is removed.
cert-type
This field contains any one of the following:
• CA
• CRL
• Local
• Remote
41986
Message ID
41986
Log Type
sslvpn-admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL-VPN admin regenerated a certificate.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
action
This field contains info.
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example, the
user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
msg
A certificate is regenerated.
cert-type
This field contains any one of the following:
• CA
• CRL
status
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
• Local
• Remote
This field contains success.
241
Event-SSL VPN
41987
Message ID
41987
Log Type
sslvpn-admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL-VPN admin updated a certificate.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
action
This field contains info.
cert-type
This field contains any one of the following:
• CA
• CRL
• Local
• Remote
status
This field contains success.
name
The name of the certificate.
method
The method information.
msg
A certificate is updated.
41988
242
Message ID
41988
Log Type
sslvpn-admin
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL-VPN admin changed a setting.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
action
This field contains info.
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so
that they could change, add, or remove a setting. For example, the user
admin_123 accessed the web-based manager to change their password on
the FortiGate-51B (IP address is 10.10.20.5). This field shows their point-ofentry in this field, GUI(10.10.20.5).
msg
User changed SSL setting.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-SSL VPN
39936
Message ID
39936
Log Type
sslvpn-session
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
SSL VPN web tunnel statistics.
Fields
Field Description
action
The status of the SSL VPN tunnel. This field contains tunnel-stats.
tunnel_type
The type of SSL VPN tunnel. This field contains ssl-web, which indicates that it is
an SSL VPN web access tunnel.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
tunnel_id
The tunnel identification number.
remote_ip
The remote IP address.
tunnel_ip
The tunnel IP address.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
dst_host
The destination host information.
next_stats
The information of the next statistics.
duration
This represents the value in seconds.
sent
The number of bytes sent.
rcvd
The number of bytes received.
reason
The reason that the trigger occurred.
msg
SSL web tunnel statistics.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
243
Event-SSL VPN
39937
Message ID
39937
Log Type
sslvpn-session
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL VPN web application was blocked.
Fields
Field Description
action
This field contains ssl-web-deny.
tunnel_type
The type of SSL VPN tunnel. This field contains ssl-web-deny. This indicates that
the SSL VPN was blocked and users were denied access.
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
tunnel_id
The tunnel identification number.
remote_ip
The remote IP address.
tunnel_ip
The tunnel IP address.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
dst_host
The destination host information.
app-type
The type of application that triggered the action within the control list.
msg
SSL web application blocked.
39938
244
Message ID
39938
Log Type
sslvpn-session
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL VPN web application was activated.
Fields
Field Description
action
The status of the SSL VPN tunnel. This field contains ssl-web-pass.
tunnel_type
The type of SSL VPN tunnel. This field contains ssl-web, which indicates that it
is for web access.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
tunnel_id
The tunnel identification number.
remote_ip
The remote IP address.
tunnel_ip
The tunnel IP address.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
dst_host
The destination host information.
app-type
The type of application that triggered the action within the control list.
msg
SSL web application timeout.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-SSL VPN
39939
Message ID
39939
Log Type
sslvpn-session
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL VPN web application timed out.
Fields
Field Description
action
The status of the SSL VPN tunnel. This field contains ssl-web-timeout, which
indicates that the web application timed out.
tunnel_type
The type of tunnel. This field contains ssl-web, which indicates that it is an SSL
VPN web tunnel.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
tunnel_id
The tunnel identification number.
remote_ip
The remote IP address.
tunnel_ip
The tunnel IP address.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
dst_host
The destination host information.
app-type
The type of application that triggered the action within the control list.
msg
SSL web application timeout.
39940
Message ID
39940
Log Type
sslvpn-session
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL VPN web application was closed.
Fields
Field Description
action
The status of the SSL VPN web application. This field contains ssl-web-close,
which indicates that the application closed.
tunnel_type
The type of tunnel. This field contains ssl-web, which indicates that it is an SSL
VPN web tunnel.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
tunnel_id
The tunnel identification number.
remote_ip
The remote IP address.
tunnel_ip
The tunnel IP address.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
dst_host
The destination host information.
app-type
The type of application that triggered the action within the control list.
msg
SSL web application closed.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
245
Event-SSL VPN
39941
Message ID
39941
Log Type
sslvpn-session
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The SSL VPN system is busy.
Fields
Field Description
action
The status of the SSL VPN tunnel. This field contains ssl-sys-busy.
tunnel_type
The type of SSL VPN tunnel. This field contains ssl-web which indicates it is an
SSL VPN tunnel with web access.
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
tunnel_id
The tunnel identification number.
remote_ip
The remote IP address.
tunnel_ip
The tunnel IP address.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
dst_host
The destination host information.
reason
The reason that the trigger occurred.
msg
SSL system busy.
39942
246
Message ID
39942
Log Type
sslvpn-session
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A new SSL VPN certification was successfully verified.
Fields
Field Description
action
The status of the SSL VPN tunnel. This field contains ssl-cert.
tunnel_type
The type of SSL VPN tunnel. This field contains ssl, which indicates that it is an SSL
VPN tunnel.
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
tunnel_id
The tunnel identification number.
remote_ip
The remote IP address.
tunnel_ip
The tunnel IP address.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
dst_host
The destination host information.
reason
The reason that the trigger occurred.
msg
SSL new SSL certificate verification success.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-SSL VPN
39943
Message ID
39943
Log Type
sslvpn-session
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A new connection was made.
Fields
Field Description
action
The status of the SSL VPN tunnel. This field contains ssl-new-con, which indicates
a new SSL VPN tunnel connection was created.
tunnel_type
The type of SSL VPN tunnel. This field contains ssl, which indicates that it is an SSL
VPN tunnel.
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
tunnel_id
The tunnel identification number.
remote_ip
The remote IP address.
tunnel_ip
The tunnel IP address.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
dst_host
The destination host information.
reason
The reason that the trigger occurred.
msg
SSL new connection.
39944
Message ID
39944
Log Type
sslvpn-session
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
SSL alerts
Fields
Field Description
action
The status of the SSL VPN tunnel. This field contains ssl-alert.
tunnel_type
The type of SSL VPN tunnel. This field contains ssl, which indicates that this is an
SSL VPN tunnel.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
tunnel_id
The tunnel identification number.
remote_ip
The remote IP address.
tunnel_ip
The tunnel IP address.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
dst_host
The destination host information.
alert
The alert information.
desc
The description information.
msg
SSL alerts
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
247
Event-SSL VPN
39945
Message ID
39945
Log Type
Session
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL VPN exit failed.
Fields
Field Description
action
The status of the SSL VPN tunnel. This field contains ssl-exit-fail.
tunnel_type
The type of SSL VPN tunnel. This field contains ssl, which indicates that it is an
SSL VPN tunnel.
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
tunnel_id
The tunnel identification number.
remote_ip
The remote IP address.
tunnel_ip
The tunnel IP address.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
dst_host
The destination host information.
reason
The reason that the trigger occurred.
msg
SSL exit fail.
39946
248
Message ID
39946
Log Type
sslvpn-session
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL VPN exit error.
Fields
Field Description
action
The status of the SSL VPN tunnel. This field contains ssl-exit-error.
tunnel_type
The type of SSL VPN tunnel. This field contains ssl, which indicates that it is an
SSL VPN tunnel.
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
tunnel_id
The tunnel identification number.
remote_ip
The remote IP address.
tunnel_ip
The tunnel IP address.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
dst_host
The destination host information.
reason
The reason that the trigger occurred.
msg
SSL exit error
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-SSL VPN
39947
Message ID
39947
Log Type
sslvpn-session
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL VPN tunnel was established.
Fields
Field Description
action
The status of the SSL VPN tunnel. This field contains tunnel-up, which indicates
that the current SSL VPN tunnel is up and running .
tunnel_type
The type of SSL VPN tunnel. This field contains ssl-tunnel, which indicates that it
is an SSL VPN tunnel.
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
tunnel_id
The tunnel identification number.
remote_ip
The remote IP address.
tunnel_ip
The tunnel IP address.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
dst_host
The destination host information.
reason
The reason that the trigger occurred.
msg
SSL tunnel established.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
249
Event-SSL VPN
39948
250
Message ID
39948
Log Type
sslvpn-session
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The SSL VPN tunnel was shut down.
Fields
Field Description
action
The status of the SSL VPN tunnel. This field contains tunnel-down, which
indicates that the SSL VPN is no longer connected or running.
tunnel_type
The type of SSL VPN tunnel. This field contains ssl-tunnel.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
tunnel_id
The tunnel identification number.
remote_ip
The remote IP address.
tunnel_ip
The tunnel IP address.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
dst_host
Destination host.
duration
This represents the value in seconds.
sent
The total number of bytes that were sent.
rcvd
The total number of bytes that were received.
reason
The reason that the trigger occurred.
msg
SSL tunnel shutdown.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-SSL VPN
39949
Message ID
39949
Log Type
sslvpn-session
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
SSL tunnel statistics.
Fields
Field Description
action
The status of the SSL VPN tunnel. This field contains tunnel-stats.
tunnel_type
The type of SSL VPN tunnel. This field contains ssl-tunnel, which indicates that
it is an SSL VPN tunnel.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
tunnel_id
The tunnel identification number.
remote_ip
The remote IP address.
tunnel_ip
The tunnel IP address.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
dst_host
The destination host information.
next_stats
The next statistical number.
duration
This represents the value in seconds.
sent
The total number of bytes that were sent.
rcvd
The total number of bytes that were received.
reason
The reason that the trigger occurred.
msg
SSL tunnel statistics
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
251
Event-SSL VPN
39950
Message ID
39950
Log Type
sslvpn-session
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
SSL VPN tunnel unknown tag.
Fields
Field Description
action
The status of the SSL VPN tunnel. This field contains ssl-tunnel-unknown-tag.
tunnel_type
The type of SSL VPN tunnel. This field contains ssl-tunnel, which indicates that
it is an SSL VPN tunnel.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
tunnel_id
The tunnel identification number.
remote_ip
The remote IP address.
tunnel_ip
The tunnel IP address.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
dst_host
The destination host information.
reason
The reason that the trigger occurred.
msg
SSL tunnel unknown tag
39951
252
Message ID
39951
Log Type
sslvpn-session
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL tunnel error.
Fields
Field Description
action
The status of the SSL VPN tunnel. This field contains ssl-tunnel-error.
tunnel_type
The type of SSL VPN tunnel. This field contains ssl-tunnel, which indicates
that it is an SSL VPN tunnel.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
tunnel_id
The tunnel identification number.
remote_ip
The remote IP address.
tunnel_ip
The tunnel IP address.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
dst_host
The destination host information.
reason
The reason that the trigger occurred.
msg
SSL tunnel error.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-VIP SSL
Event-VIP SSL log messages record VIP activities.
45001
45003
45005
45007
45009
45011
45012
45013
45015
45017
45019
45023
45027
45029
45031
45032
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
253
Event-VIP SSL
45001
Message ID
45001
Log Subtype
VIP SSL
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
The SSL received an incorrect handshake message.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate unit will have an
index number of zero.
vip
The virtual IP address.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains received.
expected
This field contains any one of the following:
• HelloRequest
• ClientHello
• ServerHello
• NewsSessionTicket
• Certificate
• ServerKeyExchange
• CertificateRequest
• ServerHelloDone
• CertificateVerify
• ClientKeyExchange
• Finished
received
This field contains any one of the following, especially if the record is
corrupted:
• HelloRequest
• ClientHello
• ServerHello
• NewsSessionTicket
• Certificate
• ServerKeyExchange
• CertificateRequest
• ServerHelloDone
• CertificateVerify
• ClientKeyExchange
• Finished
msg
254
Incorrect SSL handshake message.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-VIP SSL
45003
Message ID
45003
Log Subtype
VIP SSL
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL handshake message has a bad length.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate unit will have an
index number of zero.
vip
The virtual IP address.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains close.
handshake
The handshake information.
msg
Bad length in SSL handshake.
45005
Message ID
45005
Log Subtype
VIP SSL
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An RSA verification of Diffie-Hellman parameters failed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate unit will have an
index number of zero.
vip
The virtual IP address.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains close.
msg
RSA verification of Diffie-Hellman parameters failed.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
255
Event-VIP SSL
45007
256
Message ID
45007
Log Subtype
VIP SSL
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
A Hash in the SSL Finished does not match the calculated hash.
Each hash value in the local and remote log fields are hex encoded.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate unit will have an
index number of zero.
vip
The virtual IP address.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
local
The local information.
remote
The remote information.
action
This field always contains close.
msg
Hash in SSL Finished does not match calculated hash
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-VIP SSL
45009
Message ID
45007
Log Subtype
VIP SSL
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
The SSL decryption failed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet. Any
policy that is automatically added by the FortiGate unit will have an index number
of zero.
vip
The virtual IP address.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains close.
reason
This field contains any one of the following:
• status_bad_pad_len=1 – indicates that the received SSL Record did not
comply with RFC 4336 section 6.2.3.2 on padding_length
• status_bad_pad_value=2 – indicates that the received SSL Record did not
comply with RFC 4346 section 6.2.3.2 on padding
• status_bad_mac=3 – indicates that the MAC in the received SSL Record did
not match the MAC calculated by the FortiGate unit for that SSL Record.
• status_internal_error=4 – indicates that there was an internal error
msg
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
SSL decryption failure
257
Event-VIP SSL
45011
Message ID
45011
Log Subtype
VIP SSL
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL minor version is below the configured minimum value.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet. Any
policy that is automatically added by the FortiGate unit will have an index number
of zero.
vip
The virtual IP address.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains close.
min-minor
The min-minor information.
recv-minor
The recv-minor information.
msg
SSL minor below minimum configured value.
45012
258
Message ID
45012
Log Subtype
VIP SSL
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The SSL maximum connection limit was reached.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet. Any
policy that is automatically added by the FortiGate unit will have an index number
of zero.
vip
The virtual IP address.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains close.
msg
SSL maximum connections reached.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-VIP SSL
45013
Message ID
45013
Log Subtype
VIP SSL
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
None of the offered SSL CipherSuites are supported.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet. Any
policy that is automatically added by the FortiGate unit will have an index number
of zero.
vip
The virtual IP address.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains close.
msg
None of the offered CipherSuites are supported
45015
Message ID
45015
Log Subtype
VIP SSL
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
The SSL handshake has an invalid length.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet. Any
policy that is automatically added by the FortiGate unit will have an index number
of zero.
vip
The virtual IP address.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains receive.
len
The length information.
msg
Incorrect SSL handshake length
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
259
Event-VIP SSL
45017
260
Message ID
45017
Log Subtype
VIP SSL
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
The SSL handshake was too long.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet. Any
policy that is automatically added by the FortiGate unit will have an index number
of zero.
vip
The virtual IP address.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains receive.
handshake
The handshake information.
len
The length information.
max
The maximum length information.
msg
SSL Handshake too long
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-VIP SSL
45019
Message ID
45019
Log Subtype
VIP SSL
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL alert message was sent.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet. Any
policy that is automatically added by the FortiGate unit will have an index number
of zero.
vip
The virtual IP address.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains send.
level
The level information.
desc
This field contains any one of the following:
• fts_alert_desc_close_notify=0 – notifies the recipient that the sender
will not send any more messages on this connection
• fts_alert_desc_unexpected_message=10 – an inappropriate message
was received; this is usually fatal and should be observed closely
• fts_alert_desc_bad_record_mac=20 – is returned if a record is received
with an incorrect MAC
• fts_alert_desc_decryption_failed=21 – may be returned if a
TLSCiphertext decrypted in an invalid way; either it was not an even multiple of
the block length or its padding values, when checked, were not correct (always
fatal)
• fts_alert_desc_record_overflow=22 – a TLSCiphertext record was
received that had a length more than 2^14+2048 bytes, or a record decypted to a
TLSCompressed record with more than 2^14+1024 bytes (always fatal)
• fts_alert_desc_handshake_failure=40 – indicates the sender was
unable to negotiate an acceptable set of security parameters given the options
available (fatal error)
• fts_alert_desc_no_certificate=41 – indicates there is no available
certificate
• fts_alert_desc_illegal_parameter=47 – a field in the handshake was
out of range or inconsistent with other fields (always fatal)
• fts_alert_desc_decord_error=50 – a message could not be decoded
because some field was out of the specified range or the length of the message
was incorrect (always fatal)
• fts_alert_desc_decrypt_error=51 – a handshake cryptographic
operation failed, including being unable to correctly verify a signature, decrypt a
key exchange, or validate a finished message
• fts_alert_desc_protocol_version=70 – the protocol version the client
has attempted to negotiate is recognized but not supported (always fatal)
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
261
Event-VIP SSL
• fts_alert_desc_internal_error=80 – an internal error unrelated to the
peer or correctness of the protocol (always fatal)
msg
262
SSL Alert sent
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-VIP SSL
45023
Message ID
45023
Log Subtype
VIP SSL
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL alert was received.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet. Any
policy that is automatically added by the FortiGate unit will have an index number
of zero.
vip
The virtual IP address.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains receive.
level
The level information.
desc
The description information.
msg
SSL Alert received
45027
Message ID
45027
Log Subtype
VIP SSL
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An invalid SSL ContentType occurred.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet. Any
policy that is automatically added by the FortiGate unit will have an index number
of zero.
vip
The virtual IP address.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains receive.
type
The type information.
msg
Invalid SSL ContentType
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
263
Event-VIP SSL
45029
264
Message ID
45029
Log Subtype
VIP SSL
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL ChangeCipherSpec has a bad length.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet. Any
policy that is automatically added by the FortiGate unit will have an index number
of zero.
vip
The virtual IP address.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains close.
msg
Bad length in SSL ChangeCipherSpec
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-VIP SSL
45031
Message ID
45031
Log Subtype
VIP SSL
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL ChangeCipherSpec has a bad length.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet. Any
policy that is automatically added by the FortiGate unit will have an index number
of zero.
vip
The virtual IP address.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
humin
This field always contains close.
max
The maximum information.
received
The received information.
action
This field always contains close.
msg
The log message information. This is usually a sentence and explains the activity
and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
265
Event-VIP SSL
45032
266
Message ID
45032
Log Subtype
VIP SSL
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
A certificate’s public key is too big for SSL off-loading.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet. Any
policy that is automatically added by the FortiGate unit will have an index number
of zero.
vip
The virtual IP address.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
hulen
This field is always close.
max
The maximum information.
action
This field always contains close.
msg
The log message information. This is usually a sentence and explains the activity
and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-DNS
Event-DNS log messages record DNS response activity.
44288
Message ID
44288
Log Subtype
Event-DNS
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A DNS response log message.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
policy_id
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate unit will
have an index number of zero.
src
The source IP address.
dst
The destination IP address.
src_int
The name of the source interface.
dst_int
The name of the destination interface.
user
The name of the user creating the traffic.
group
The name of the gorup creating the traffic.
dns_name
The name of the DNS sesrver.
dns_ip
The IP address of the DNS server.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
267
Event-DNS
268
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-config
Event-config log messages record configuration changes that an administrator or user makes to the
FortiOS configuration.
44544
44545
44546
44547
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
269
Event-config
44544
Message ID
44544
Log Sub-type
Event-config
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A configuration path log message.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
user
The name of the user changing the configuration setting.
ui
The user interface.
action
This can be any one of the following:
• add
• edit
• delete
• clear
• move
• rename
• clone
• abort
cfg_tid
The configuration transaction identification number.
cfg_path
The configuration path.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
44545
270
Message ID
44545
Log Sub-type
Event-config
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A configuration object log message.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
user
The name of the user changing the configuration setting.
ui
The user interface.
action
This can be any one of the following:
• add
• edit
• delete
• clear
• move
• rename
• clone
• abort
cfg_tid
The configuration transaction identification number.
cfg_path
The configuration path.
cfg_obj
The configuration object.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-config
44546
Message ID
44546
Log Sub-type
Event-config
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A configuration attributes log message.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
user
The name of the user changing the configuration setting.
ui
The user interface.
action
This can be any one of the following:
• add
• edit
• delete
• clear
• move
• rename
• clone
• abort
cfg_tid
The configuration transaction identification number.
cfg_path
The configuration path.
cfg_attr
The configuration attributes.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
271
Event-config
44547
272
Message ID
44547
Log Sub-type
Event-config
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A configuration object attributes log message.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
user
The name of the user changing the configuration setting.
ui
The user interface.
action
This can be any one of the following:
• add
• edit
• delete
• clear
• move
• rename
• clone
• abort
cfg_tid
The configuration transaction identification number.
cfg_path
The configuration path.
conf_obj
The configuration object.
cfg_attr
The configuration attributes.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-auth
Event-auth log messages record authentication activity, including FSAE activity and NTLM authentication.
43008
43023
43009
43024
43010
43025
43011
43025
43012
43026
43013
43027
43014
43028
43015
43029
43016
43030
43017
43018
43019
43020
43021
43022
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
273
Event-auth
43008
Message ID
43008
Log Subtype
auth
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The authentication was successful.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
src
The source IP address.
dst
The destination IP address.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate unit will have an
index number of zero.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
ui
The user interface.
action
The action that was taken. This can be any one of the following:
• authentication
• FSAE-auth
• FSAE-logon
• FSAE-logoff
• NTLM-auth
status
274
The status of the authentication session. This can be any one of the
following:
• success
• failure
• timed_out
• locked_out
reason
The reason for recording the activity.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-auth
43009
Message ID
43009
Log Subtype
auth
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The authentication session failed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
src
The source IP address.
dst
The destination IP address.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate unit will have an
index number of zero.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
ui
The user interface.
action
The action that was taken. This can be any one of the following:
• authentication
• FSAE-auth
• FSAE-logon
• FSAE-logoff
• NTLM-auth
status
The status of the authentication session. This can be any one of the
following:
• success
• failure
• timed_out
• locked_out
reason
The reason for recording the activity.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
275
Event-auth
43010
Message ID
43010
Log Subtype
auth
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The authentication locked out.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
src
The source IP address.
dst
The destination IP address.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate unit will have an
index number of zero.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
ui
The user interface.
action
The action that was taken. This can be any one of the following:
• authentication
• FSAE-auth
• FSAE-logon
• FSAE-logoff
• NTLM-auth
status
276
The status of the authentication session. This can be any one of the
following:
• success
• failure
• timed_out
• locked_out
reason
The reason for recording the activity.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-auth
43011
Message ID
43011
Log Subtype
auth
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The authentication timed out.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
src
The source IP address.
dst
The destination IP address.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate unit will have an
index number of zero.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
ui
The user interface.
action
The action that was taken. This can be any one of the following:
• authentication
• FSAE-auth
• FSAE-logon
• FSAE-logoff
• NTLM-auth
status
The status of the authentication session. This can be any one of the
following:
• success
• failure
• timed_out
• locked_out
reason
The reason for recording the activity.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
277
Event-auth
43012
Message ID
43012
Log Subtype
auth
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
FSAE authentication was successful.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
src
The source IP address.
dst
The destination IP address.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate unit will have an
index number of zero.
user
The name of the user creating the traffic.
adgroup
The name of the active directory group.
group
The name of the group creating the traffic.
ui
The user interface.
action
The action that was taken. This can be any one of the following:
• authentication
• FSAE-auth
• FSAE-logon
• FSAE-logoff
• NTLM-auth
status
278
The status of the authentication session. This can be any one of the
following:
• success
• failure
• timed_out
• locked_out
reason
The reason for recording the activity.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-auth
43013
Message ID
43013
Log Subtype
auth
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The FSAE authentication failed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
src
The source IP address.
dst
The destination IP address.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate unit will have an
index number of zero.
user
The name of the user creating the traffic.
adgroup
The name of the active directory group.
group
The name of the group creating the traffic.
ui
The user interface.
action
The action that was taken. This can be any one of the following:
• authentication
• FSAE-auth
• FSAE-logon
• FSAE-logoff
• NTLM-auth
status
The status of the authentication session. This can be any one of the
following:
• success
• failure
• timed_out
• locked_out
reason
The reason for recording the activity.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
279
Event-auth
43014
Message ID
43014
Log Subtype
auth
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The FSAE user logged on.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
src
The source IP address.
user
The name of the FSAE user who is logggin on.
server
The IP address of the FSAE server.
action
The action that was taken. This can be any one of the following:
• authentication
• FSAE-auth
• FSAE-logon
• FSAE-logoff
• NTLM-auth
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
43015
Message ID
43015
Log Subtype
auth
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The FSAE user logged off.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
src
The source IP address.
user
The name of the FSAE user who is logggin on.
server
The IP address of the FSAE server.
action
The action that was taken. This can be any one of the following:
• authentication
• FSAE-auth
• FSAE-logon
• FSAE-logoff
• NTLM-auth
msg
280
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-auth
43016
Message ID
43016
Log Subtype
auth
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The NTLM authentication was successful.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
src
The source IP address.
dst
The destination IP address.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate unit will have an
index number of zero.
user
The name of the user creating the traffic.
adgroup
The name of the active directory group.
group
The name of the group creating the traffic.
ui
The user interface.
action
The action that was taken. This can be any one of the following:
• authentication
• FSAE-auth
• FSAE-logon
• FSAE-logoff
• NTLM-auth
status
The status of the authentication session. This can be any one of the
following:
• success
• failure
• timed_out
• locked_out
reason
The reason for recording the activity.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
281
Event-auth
43017
Message ID
43017
Log Subtype
auth
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The NTLM authentication failed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
src
The source IP address.
dst
The destination IP address.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate unit will have an
index number of zero.
user
The name of the user creating the traffic.
adgroup
The name of the active directory group.
group
The name of the group creating the traffic.
ui
The user interface.
action
The action that was taken. This can be any one of the following:
• authentication
• FSAE-auth
• FSAE-logon
• FSAE-logoff
• NTLM-auth
status
282
The status of the authentication session. This can be any one of the
following:
• success
• failure
• timed_out
• locked_out
reason
The reason for recording the activity.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-auth
43018
Message ID
43018
Log Subtype
auth
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGuard override failed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
src
The source IP address.
dst
The destination IP address.
initiator
The initiator information.
status
The status of the authentication session. This can be any one of the
following:
• success
• failure
• timed_out
• locked_out
reason
The reason for recording the activity.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
43019
Message ID
43019
Log Subtype
auth
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGuard override failed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
src
The source IP address.
dst
The destination IP address.
initiator
The initiator information.
status
The status of the authentication session. This can be any one of the
following:
• success
• failure
• timed_out
• locked_out
reason
The reason for recording the activity.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
283
Event-auth
43020
Message ID
43020
Log Subtype
auth
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGuard override was successful.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
src
The source IP address.
dst
The destination IP address.
initator
The initiator information.
status
This can be any one of the following:
• success
• failure
• timed_out
• locked_out
reason
The reason that the activity or action occurred.
scope
This can be any one of
the following:
• user
• user_group
• ip
• profile
unhandled
284
scope_data
The scope data information.
rule_type
This can be any one of the following:
• directory
• domain
• rating
• unhandled
rule_data
The rule data information.
offsite
This can be either yes, meaning the offsite was allowed, or no, meaning
the offsite was not allowed.
expiry
The expiry information.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-auth
43021
Message ID
43021
Log Subtype
auth
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Endpoint checking event.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
dst
The destination IP address.
ui
The user interface.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
43022
Message ID
43022
Log Subtype
auth
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Endpoint license distribution.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
dst
The destination IP address.
ui
The user interface.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
43023
Message ID
43023
Log Subtype
auth
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Endpoint detection.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
dst
The destination IP address.
ui
The user interface.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
285
Event-auth
43024
Message ID
43024
Log Subtype
auth
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Endpoint detection.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
dst
The destination IP address.
ui
The user interface.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
43025
Message ID
43025
Log Subtype
auth
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The authentication was successful.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
src
The source IP address.
dst
The destination IP address.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate unit will have an
index number of zero.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
ui
The user interface.
action
The action that was taken. This can be any one of the following:
• authentication
• FSAE-auth
• FSAE-logon
• FSAE-logoff
• NTLM-auth
status
286
The status of the authentication session. This can be any one of the
following:
• success
• failure
• timed_out
• locked_out
reason
The reason for recording the activity.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-auth
43026
Message ID
43026
Log Subtype
auth
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The authentication failed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
src
The source IP address.
dst
The destination IP address.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate unit will have an
index number of zero.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
ui
The user interface.
action
The action that was taken. This can be any one of the following:
• authentication
• FSAE-auth
• FSAE-logon
• FSAE-logoff
• NTLM-auth
status
The status of the authentication session. This can be any one of the
following:
• success
• failure
• timed_out
• locked_out
reason
The reason for recording the activity.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
287
Event-auth
43027
Message ID
43027
Log Subtype
auth
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The authentication session timed out.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
src
The source IP address.
dst
The destination IP address.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate unit will have an
index number of zero.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
ui
The user interface.
action
The action that was taken. This can be any one of the following:
• authentication
• FSAE-auth
• FSAE-logon
• FSAE-logoff
• NTLM-auth
status
288
The status of the authentication session. This can be any one of the
following:
• success
• failure
• timed_out
• locked_out
reason
The reason for recording the activity.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-auth
43028
Message ID
43028
Log Subtype
auth
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The authentication session failed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
src
The source IP address.
dst
The destination IP address.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate unit will have an
index number of zero.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
ui
The user interface.
action
The action that was taken. This can be any one of the following:
• authentication
• FSAE-auth
• FSAE-logon
• FSAE-logoff
• NTLM-auth
status
The status of the authentication session. This can be any one of the
following:
• success
• failure
• timed_out
• locked_out
reason
The reason for recording the activity.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
289
Event-auth
43029
Message ID
43029
Log Subtype
auth
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGuard override was successful.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
src
The source IP address.
dst
The destination IP address.
initator
The initiator information.
status
This can be any one of the following:
• success
• failure
• timed_out
• locked_out
reason
The reason the activity or action occurred.
scope
This can be any one of
the following:
• user
• user_group
• ip
• profile
unhandled
290
scope_data
The scope data information.
rule_type
This can be any one of the following:
• directory
• domain
• rating
• unhandled
rule_data
The rule data information.
offsite
This can be either yes, meaning the offsite was allowed, or no, meaning
the offsite was not allowed.
expiry
The expiry information.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-auth
43030
Message ID
43030
Log Subtype
auth
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGuard override failed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
src
The source IP address.
dst
The destination IP address.
initiator
The initiator information.
status
The status of the authentication session. This can be any one of the
following:
• success
• failure
• timed_out
• locked_out
reason
The reason for recording the activity.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
291
Event-auth
292
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-wad
Event-wad log messages record WAN optimization events, such as a user adding an WAN optimization
rule as well as web proxy events.
40960
48102
48001
48123
48003
48124
48005
48124
48007
48127
48009
48129
48011
48131
48012
48132
48013
48200
48015
48201
48017
48205
48019
48300
48023
48301
48027
48029
48031
48032
48100
48101
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
293
Event-wad
40960
Message ID
40960
Log Subtype
wad
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A web proxy forward server error.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
fwserver_name
The name of the web proxy server.
addr_type
The type of address used, for example FQDN. This field contains either IP
or FQDN.
ip
The IP address.
fqdn
The FQDN address.
port
The port number.
msg
The log message is any one of the following:
• Failed to connection to forward server.
• Successfully connected to forward server.
294
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-wad
48001
Message ID
48001
Log Subtype
wad
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
The SSL received an incorrect handshake message.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains receive.
expected
The expected information.
received
The received information.
msg
Incorrect SSL handshake message.
48003
Message ID
48003
Log Subtype
wad
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
The SSL handshake message contains a bad length.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains close.
handshake
The handshake information.
msg
Bad length in SSL handshake.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
295
Event-wad
48005
Message ID
48005
Log Subtype
wad
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
The RSA verification of Diffie-Hellman parameters failed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains close.
msg
RSA verification of Diffie-Hellman parameters failed.
48007
296
Message ID
48007
Log Subtype
wad
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
The hash in SSL FInished does not match the calculated hash.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
local
The local information.
remote
The remote information.
action
This field always contains close.
msg
Hash in SSL Finished does not match calculated hash.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-wad
48009
Message ID
48009
Log Subtype
wad
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL decryption failure occurred.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains close.
reason
The reason that the trigger occurred.
msg
SSL decryption failure.
48011
Message ID
48011
Log Subtype
wad
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL minor version is less than the configured minimum value.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will have
an index number of zero.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains close.
min-minor
The min-minor information.
recv-minor
The recv-minor information.
msg
SSL minor below minimum configured value.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
297
Event-wad
48012
Message ID
48012
Log Subtype
wad
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The maximum limit of SSL connections were reached.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains close.
msg
SSL maximum connections reached.
48013
298
Message ID
48013
Log Subtype
wad
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
There is no support for the offered CipherSuites.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains close.
msg
None of the offered CipherSuites are supported.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-wad
48015
Message ID
48015
Log Subtype
wad
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
The SSL handshake does not have a valid length.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an
index number of zero.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains receive.
len
The length information.
msg
Incorrect SSL handshake length.
48017
Message ID
48017
Log Subtype
wad
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
The SSL handshake is too long.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains receive.
handshake
The handshake information.
len
The length information.
max
The maximum length information.
msg
SSL Handshake too long
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
299
Event-wad
48019
Message ID
48019
Log Subtype
wad
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL alert message was sent.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains send.
level
The level information.
desc
The description information.
msg
SSL Alert sent
48023
300
Message ID
48023
Log Subtype
wad
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL alert message was received.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains receive.
level
The level information.
desc
The description information.
msg
SSL Alert received.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-wad
48027
Message ID
48027
Log Subtype
wad
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An invalid SSL content type was received.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will have
an index number of zero.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains receive.
type
The type information.
msg
Invalid SSL ContentType.
48029
Message ID
48029
Log Subtype
wad
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL ChangeCipherSpec has bad length.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
action
This field always contains close.
msg
Bad length in SSL ChangeCipherSpec.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
301
Event-wad
48031
302
Message ID
48031
Log Subtype
wad
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
An SSL ChangeCipherSpec has bad length.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
min
The minimum information.
max
The maximum information.
received
The received information.
action
This field always contains close.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-wad
48032
Message ID
48032
Log Subtype
wad
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
The certificate’s public key is too big for SSL offloading to handle.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
len
The length information.
max
The maximum length information.
action
This field always contains close.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
303
Event-wad
48100
Message ID
48100
Log Subtype
wad
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
Cert authentication has failed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
msg
authentication failed: cert authentication failed.
48101
304
Message ID
48101
Log Subtype
wad
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
Authentication failed because of an incorrect private shared key.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
authgrp
The authentication group information.
host
The host information.
msg
authentication failed: incorrect psk.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-wad
48102
Message ID
48102
Log Subtype
wad
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
Authentication failed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
authgrp
The authentication group information.
peer
The peer information.
msg
authentication failed: <reason>
48123
Message ID
48123
Log Subtype
wad
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A WAN optimization rule was changed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
msg
A wan-opt rule has changed.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
305
Event-wad
48124
306
Message ID
48124
Log Subtype
wad
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A WAN optimization rule was added.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
msg
A wan-opt rule is added.
Message ID
48124
Log Subtype
wad
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A WAN optimization rule was removed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
id
The identification information.
msg
User <user_name> deleted a wad rule <rule_name> from <ui>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-wad
48127
Message ID
48127
Log Subtype
wad
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A web cache name was entered or a host name was entered.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
msg
This field contains one of the following:
• user <user_name> set web proxy name.
• user<user_name> set wan acceleration host-id
48129
Message ID
48129
Log Subtype
wad
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what appears in the msg field, the meaning can be any
one of the following:
• The specified user set the WAN-opt storage.
• The specified user deleted the WAN-opt storage entry.
• The specified user set the byte cache storage.
• The specified user set the web cache storage.
• The specified user deleted the disk storage entry.
• The ISCSI target is set.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
action
The action information. This field does not appear for all 48129 log
messages.
name
The name information.
msg
This field contains one of the following:
• user <user_name> set wanopt storage <storage> size=<size_amount>
• Administrator <user_name> disk storage <disk_storage> from <ui>
• user <user_name> delete disk storage entry
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
307
Event-wad
48131
Message ID
48131
Log Subtype
wad
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A user added a WAN accelerator SSL server.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
name
The name information.
msg
User <user_name> added a wan accelerator ssl server setting
<ssl_server_setting> from <ui>.
48132
308
Message ID
48132
Log Subtype
wad
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A user removed a WAN accelerator SSL server.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
name
The name information.
msg
User <user_name> deleted a wan accelerator ssl server setting
<ssl_server_setting> from <ui>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-wad
48200
Message ID
48200
Log Subtype
wad
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A user added a network peer.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
name
The name information.
msg
User <user_name> added network accelerator peer <peer_name> from
<ui>
48201
Message ID
48201
Log Subtype
wad
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A user deleted a peer.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
name
The name information.
msg
User <user_name> deleted a network accelerator peer entry
<peer_name> from <ui>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
309
Event-wad
48205
Message ID
48205
Log Subtype
wad
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A user deleted an authentication group entry.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example,
the user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
auth-group
The authentication group information.
msg
User <user_name> deleted a network accelerator auth-group entry
<auth_group_name> from <ui>
48300
310
Message ID
48300
Log Subtype
wad
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The server side, FortiGate, is not properly configured.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
rule-id
The identification number of the rule.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
msg
auto detection failed: server side ftg is not properly configured.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-wad
48301
Message ID
48301
Log Subtype
wad
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
An unexpected application type was detected.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
serial
The serial number of the firewall session on which the event happened.
policy
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
rule-id
The identification number of the rule.
app-type
The type of application that triggered the action within the control list.
src
The source IP address.
src-port
The source port number.
dst
The destination IP address.
dst-port
The destination port number.
msg
unexpected application type. Please report.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
311
Event-wad
312
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-LDB-monitor
Event-LDB-monitor log messages record VIP activities.
46000
46001
46002
46003
46004
46005
46100
46101
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
313
Event-LDB-monitor
46000
Message ID
46000
Log Subtype
ldb-monitor
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The VIP real server was enabled.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
vip
The name of the virtual IP list used.
server
The IP address of the server.
port
The port number.
status
The status information.
action
This field always contains enable.
msg
ldb server enabled.
46001
314
Message ID
46001
Log Subtype
ldb-monitor
Severity
Alert
Firmware version
FortiOS 4.0 MR3
Meaning
The VIP real server was disabled.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
vip
The name of the virtual IP list used.
server
The IP address of the server.
port
The port number.
status
The status information.
action
This field always contains disable.
msg
ldb server disabled.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-LDB-monitor
46002
Message ID
46002
Log Subtype
ldb-monitor
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The VIP real server is now up.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
vip
The name of the virtual IP list used.
server
The IP address of the server.
port
The port number.
status
The status information.
action
This field always contains up.
msg
ldb server up.
46003
Message ID
46003
Log Subtype
ldb-monitor
Severity
Alert
Firmware version
FortiOS 4.0 MR3
Meaning
The VIP real server is down.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
vip
The name of the virtual IP list used.
server
The IP address of the server.
port
The port number.
status
The status information.
action
This field always contains down.
msg
ldb server down
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
315
Event-LDB-monitor
46004
Message ID
46004
Log Subtype
ldb-monitor
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The VIP real server has started a hold down period.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
vip
The name of the virtual IP list used.
server
The IP address of the server.
port
The port number.
status
The status information.
action
This field always contains holddown.
msg
ldb server entered holddown period
interval
The hold-down interval period in seconds.
46005
316
Message ID
46000
Log Subtype
ldb-monitor
Severity
Alert
Firmware version
FortiOS 4.0 MR3
Meaning
The VIP realserver failed during the hold down period.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
vip
The name of the virtual IP list used.
server
The IP address of the server.
port
The port number.
status
The status information.
action
This field always contains holddown
msg
ldb server health checking failed during holddown period.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-LDB-monitor
46100
Message ID
46100
Log Subtype
ldb-monitor
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A load balance server monitor was added.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example, the
user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
name
The name information.
msg
User <user_name> added load balance monitor
<load_balance_monitor_name> from <ui>
46101
Message ID
46100
Log Subtype
ldb-monitor
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A load balance server monitor was added.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate
unit so that they could change, add, or remove a setting. For example, the
user admin_123 accesses the web-based manager to change their
password on the FortiGate-51B (IP address is 10.10.20.5). This field
shows their point-of-entry in this field, GUI(10.10.20.5).
name
The name information.
msg
User <user_name> deleted a load balance server monitor
<load_balance_monitor_name> from <ui>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
317
Event-LDB-monitor
318
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-nac-quarantine
Event-nac-quarantine log messages record quarantine events, such as when banned users are
quarantined.
43776
Log Sub-type
nac-quarantine
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A NAC quarantine event was recorded.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
src
The banned IP address.
dst
The destination IP address.
src_int
The banned interface.
dst_int
The destination interface.
src_port
The source port number.
dst_port
The destination port number.
proto
The protocol number that applies to the session or packet. The protocol
number in the packet header that identifies the next level protocol. Protocol
numbers are assigned by the Internet Assigned Number Authority (IANA).
service
The IP network service that applies to the session or packet. The services
displayed correspond to the services configured in the firewall policy.
action
This field contains any one of the following:
• ban-ip
• ban-src-dst-ip (banned all traffic from source IP to
destination IP by NAC quarantine)
• ban-interface
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
policid
The ID number of the firewall policy that applies the session or packet. Any
policy that is automatically added by the FortiGate will have an index
number of zero.
banned_src
The banned source. This field contains any one of the following:
• ips
• dlp-compound
• dos
• av
• dlp-rule
banned_rule
The banned rule or reason that was detected.
sensor
The name of the DLP sensor that was used to detect and take action.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
319
Event-nac-quarantine
320
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-his-performance
Event-his-performance log messages record the FortiGate unit’s performance statistics.
40704
Message ID
40704
Log Sub-type
his-performance
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
Performance statistics for the FortiGate unit.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
action
This field contains perf-stats.
cpu
The CPU usage in percent.
mem
The memory usage in percent.
total_session
The total number of sessions.
msg
Performance statistics.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
321
Event-his-performance
322
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-HA
Event-HA log messages are recorded when FortiGate units are in high availability mode.
These log messages describe changes in cluster unit status. These changes in status occur if a cluster unit
fails/starts up, or if a link fails/restored. Each of these messages includes the serial number of the cluster
unit reporting the message. You can use the serial number to determine which cluster unit’s status has
changed.
37888
37889
37890
37891
37892
37893
37894
37895
37896
37897
37898
37899
37900
37901
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
323
Event-HA
37888
Message ID
37888
Log Subtype
HA
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A specified HA group was deleted.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
HA group is deleted.
ha_group
The number of the HA group.
37889
Message ID
37889
Log Subtype
HA
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A specified virtual cluster was deleted.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
Virtual cluster is deleted.
vcluster
The number of the virtual cluster.
37890
324
Message ID
37890
Log Subtype
HA
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A specific VDOM in a virtual cluster was moved.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
Virtual cluster’s vdom is moved.
from_vcluster
The number of the virtual cluster that the VDOM is being moved from.
to_vcluster
The number of the virtual cluster that the VDOM is being moved to.
vdname
The name of the virtual domain where the VDOM has been moved to.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-HA
37891
Message ID
37891
Log Subtype
HA
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A VDOM was added to the specified virtual cluster.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
Virtual cluster’s vdom is added.
to_vcluster
The number of the virtual cluster that the VDOM was added to.
vdname
The name of the virtual domain where the new VDOM was added in.
37892
Message ID
37892
Log Subtype
HA
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A virtual cluster moved a member’s status.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
Virtual cluster’s member state moved
ha_role
The role of the unit within the cluster, for example, subordinate. This
field contains either slave or master.
Note: A FortiGate unit in a cluster has either a “slave” role (which is
often referred to as subordinate), or “master” role (which is often
referred to as primary). There are no other roles for the unit in a cluster.
vcluster
The number of the virtual cluster that the VDOM was added to.
vcluster_state
The state the virtual cluster is in. This field contains any one of the
following:
• init
• work
• helo
• standby
vcluster_member
The number of the member of the virtual cluster.
hostname
The host name.
sn
The serial number of the log message.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
325
Event-HA
37893
Message ID
37893
Log Subtype
HA
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A virtual cluster’s member was detected and its status was that it was not
functioning.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
Virtual cluster detected memeber dead.
vcluster
The number of the virtual cluster.
ha_group
The number of the HA group.
37894
Message ID
37894
Log Subtype
HA
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A virtual cluster’s member was detected and its status was that it joined
the virtual cluster.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
Virtual cluster detected member join
vcluster
The number of the virtual cluster.
ha_group
The number of the HA group.
37895
326
Message ID
37895
Log Subtype
HA
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A FortiGate unit in HA mode was added to the virtual cluster. The unit’s
name is not given, only its internal interface name.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
Virtual cluster add HA device
vcluster
The number of the virtual cluster.
devintfname
The name of the unit’s interface.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-HA
37896
Message ID
37896
Log Subtype
HA
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A FortiGate unit in HA mode was deleted from the virtual cluster. The
unit’s name is not given, only its internal interface name.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
Virtual cluster delete HA device(interface)
vcluster
The number of the virtual cluster.
devintfname
The name of the unit’s interface.
37897
Message ID
37897
Log Subtype
HA
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A FortiGate unit in HA mode is ready. The unit’s name is not given, only its
internal interface name.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
HA device(interface) ready
ha_role
The type of role the device has in the HA cluster. This field contains either
master or slave.
Note: A FortiGate unit in a cluster has either a “slave” role (which is often
referred to as subordinate), or “master” role (which is often referred to as
primary). There are no other roles for the unit in a cluster.
devintfname
The name of the unit’s interface.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
327
Event-HA
37898
Message ID
37898
Log Subtype
HA
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
A FortiGate unit in HA mode failed. The unit’s name is not given, only its
internal interface name.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
HA device(interface) fail
ha_role
The type of role the device has in the HA cluster. This field contains either
master or slave.
Note: A FortiGate unit in a cluster has either a “slave” role (which is often
referred to as subordinate), or “master” role (which is often referred to as
primary). There are no other roles for the unit in a cluster.
devintfname
The name of the interface of the device.
37899
328
Message ID
37899
Log Subtype
HA
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A FortiGate unit in HA mode with peer information. The unit’s name is not
given, only its internal interface name.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
HA device(interface) peerinfo
ha_role
The type of role the unit has in the HA cluster. This field contains either
master or slave.
Note: A FortiGate unit in a cluster has either a “slave” role (which is often
referred to as subordinate), or “master” role (which is often referred to as
primary). There are no other roles for the unit in a cluster.
devintfname
The name of the unit’s interface.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-HA
37900
Message ID
37900
Log Subtype
HA
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The HA heartbeat was deleted.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
Heartbeat device(interface) delete
devintfname
The name of the interface on the FortiGate unit.
37901
Message ID
37901
Log Subtype
HA
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGate unit in HA mode is not functioning properly. The unit’s name
is not given, only its internal interface name.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
Heartbeat device(interface) down
ha_role
The type of role the FortiGate unit has in the HA cluster. This field contains
either master or slave.
Note: A FortiGate unit in a cluster has either a “slave” role (which is often
referred to as subordinate), or “master” role (which is often referred to as
primary). There are no other roles for the unit in a cluster.
hbdn_reason
The reason why the heartbeat is currently down. This field contains either
linkfail or neighbor-info-lost.
devintfname
The name of the interface on the FortiGate unit.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
329
Event-HA
37902
Message ID
37902
Log Subtype
HA
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The HA heartbeat is up.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
Heartbeat device(interface) up
ha_role
The type of role the FortiGate unit has in the HA cluster. This field contains
either master or slave.
Note: A FortiGate unit in a cluster has either a “slave” role (which is often
referred to as subordinate), or “master” role (which is often referred to as
primary). There are no other roles for the unit in a cluster.
devintfname
The name of the interface on the FortiGate unit.
37903
330
Message ID
37903
Log Subtype
HA
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The primary unit’s synchronization status.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
The sync status with the master
sync_type
The type of synchronization being performed. This field contains either
configurations or external-files.
synt_status
The status of the synchronization. This field contains either out-of-sync or
in-sync.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-HA
37904
Message ID
37904
Log Subtype
HA
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The HA activity report
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
HA activity report
vd
The name of the virtual domain where the information for the report was
gathered from.
ip
The IP address of the unit.
ha-prio
The priority number of the unit.
activity
The HA activity message.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
331
Event-HA
332
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-pattern
Event-pattern logs are recorded whenever an administrator updates virus, IPS, and antispam databases
from the FortiGuard network.
41000
41001
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
333
Event-pattern
41000
334
Message ID
41000
Log Subtype
pattern
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what appears in the msg field, the meaning can be any one of the
following:
• The specified administrator updated the IPS database from the web-based
manager.
• The specified administrator failed to updated the virus database from the
web-based manager.
• The specified administrator successfully updated the AntiSpam database from
the web-based manager.
• The specified administrator successfully updated the IPS database from the
web-based manager.
Fields
Field Description
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so that
they could change, add, or remove a setting. For example, the user admin_123
accesses the web-based manager to change their password on the FortiGate-51B
(IP address is 10.10.20.5). This field shows their point-of-entry, GUI(10.10.20.5).
action
This field is always update.
status
This field contains either success or failure.
msg
This field contains any one of the following:
• VCM plugin has been updated successfully by user <user_name> via
GUI(<ip_address>)
• Virus database has been updated successfully by user <user_name> via
GUI(<ip_address>)
• Antispam database has been updated successfully by user <user_name> via
GUI (<ip_address>)
• IPS database has been updated successfully by user <user_name> via GUI
(<ip_address>)
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-pattern
41001
Message ID
41001
Log Subtype
pattern
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
Depending on what appears in the msg field, the meaning can be any one of the
following:
• The specified administrator failed to update the IPS database from the web-based
manager.
• The specified administrator failed to update the virus database from the
web-based manager.
• The specified administrator failed to update the AntiSpam database from the
web-based manager.
• The specified administrator failed to update the IPS database from the web-based
manager.
Fields
Field Description
user
The name of the user creating the traffic.
ui
The location of the point-of-entry the user used to access the FortiGate unit so that
they could change, add, or remove a setting. For example, the user admin_123
accesses the web-based manager to change their password on the FortiGate-51B
(IP address is 10.10.20.5). This field shows their point-of-entry, GUI(10.10.20.5).
action
This field is always update.
status
This field contains either success or failure.
msg
This field contains any one of the following:
• Update VCM plugin failed by user <user_name> via GUI (<ip_address>)
• Update virus database failed by user <user_name> via GUI(<ip_address>)
• Update AntiSpam database failed by user <user_name> via GUI(<ip_address>)
• Update IPS database failed by user <user_name> via GUI(<ip_address>)
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
335
Event-pattern
336
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-RADIUS
Event RADIUS log messages record RADIUS server events.
38656
38657
38658
38659
38660
38661
38662
38663
38664
38665
38666
38667
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
337
Event-RADIUS
38656
Message ID
38656
Log Sub-type
RADIUS
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A RADIUS protocol error report.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
count
The number of times the same event was detected within a short period of time.
duration
This represents the value in seconds.
msg
The log message information. This is usually a sentence and explains the activity
and/or action taken.
38657
Message ID
38657
Log Sub-type
RADIUS
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A RADIUS profile error report.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
count
The number of times the same event was detected within a short period of time.
duration
This represents the value in seconds.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
38658
338
Message ID
38658
Log Sub-type
RADIUS
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A RADIUS context error report.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
count
The number of times the same event was detected within a short period of time.
duration
This represents the value in seconds.
msg
The log message information. This is usually a sentence and explains the activity
and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-RADIUS
38659
Message ID
38659
Log Sub-type
RADIUS
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A RADIUS missing stop packet report.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
count
The number of times the same event was detected within a short period of time.
duration
This represents the value in seconds.
msg
The log message information. This is usually a sentence and explains the activity
and/or action taken.
38660
Message ID
38660
Log Sub-type
RADIUS
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A RADIUS accounting event report.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
count
The number of times the same event was detected within a short period of time.
duration
This represents the value in seconds.
msg
The log message information. This is usually a sentence and explains the activity
and/or action taken.
38661
Message ID
38661
Log Sub-type
RADIUS
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A RADIUS other dynamic profile report.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
count
The number of times the same event was detected within a short period of time.
duration
This represents the value in seconds.
msg
The log message information. This is usually a sentence and explains the activity
and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
339
Event-RADIUS
38662
Message ID
38662
Log Sub-type
RADIUS
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
RADIUS protocol errors occurred.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always display
N/A in FortiOS.
ip
The IP address.
profile
The name of the profile that was used to detect and take action.
msg
The log message information. This is usually a sentence and explains the activity
and/or action taken.
acc_stat
The accounting state. This field contains any one of the following:
• Start
• Stop
• Interim-Update
• Accounting-On
• Accounting-Off
reason
The reason that the trigger occurred.
38663
Message ID
38663
Log Sub-type
RADIUS
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A RADIUS start or interim-update packet received with missing or invalid profile
specified.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always display
N/A in FortiOS.
ip
The IP address.
profile
The name of the profile that was used to detect and take action.
msg
The log message information. This is usually a sentence and explains the activity
and/or action taken.
acct_stat
This field contains any one of the following:
• Start
• Stop
• Interim-Update
• Accounting-On
• Accounting-Off
reason
340
The reason that the trigger occurred.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-RADIUS
38664
Message ID
38664
Log Sub-type
RADIUS
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
RADIUS context not found for user.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always display
N/A in FortiOS.
ip
The IP address.
profile
The name of the profile that was used to detect and take action.
msg
The log message information. This is usually a sentence and explains the activity
and/or action taken.
38665
Message ID
38665
Log Sub-type
RADIUS
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A RADIUS stop packet was missed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always display
N/A in FortiOS.
ip
The IP address.
profile
The name of the profile that was used to detect and take action.
msg
The log message information. This is usually a sentence and explains the activity
and/or action taken.
acct_stat
The accounting state. This field contains any one of the following:
• Start
• Stop
• Interim-Update
• Accounting-On
• Accounting-Off
reason
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
The reason that the trigger occurred.
341
Event-RADIUS
38666
Message ID
38666
Log Sub-type
RADIUS
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A RADIUS account event.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always display
N/A in FortiOS.
ip
The IP address.
profile
The name of the profile that was used to detect and take action.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
acct_stat
This field contains any one of the following:
• Start
• Stop
• Interim-Update
• Accounting-On
• Accounting-Off
reason
The reason that the trigger occurred.
38667
Message ID
38667
Log Sub-type
RADIUS
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A RADIUS other dynamic profile event.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always display
N/A in FortiOS.
ip
The IP address.
profile
The name of the profile that was used to detect and take action.
msg
The log message information. This is usually a sentence and explains the activity
and/or action taken.
acct_stat
This field contains any one of the following:
• Start
• Stop
• Interim-Update
• Accounting-On
• Accounting-Off
reason
342
The reason that the trigger occurred.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-notification
Event-notification logs messages record sent email notification alerts.
38400
38401
38402
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
343
Event-notification
38400
344
Message ID
38400
Log Subtype
Notification
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The system successfully sent an email notification message.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
user
The name of the user creating the traffic.
from
The sender’s email address.
to
The recipient’s email address.
service
The IP network service that applies to the session or packet. The
services displayed correspond to the services configured in the
firewall policy.
proto
The MMS protocol used when running FortiOS Carrier. When
running FortiOS, this field contains N/A. This field contains any one
of the following:
• mm1
• mm4
• mm3
• mm7
dst
The destination IP address.
dport
The destination port number.
nf_type
The type of notification that was sent. For example, if a file was
blocked. This field contains any one of the following:
• bword
• file_block
• carrier_ep_bwl
• flood
• dupe
• alert
• mms_checksum
• virus
virus
The name of the virus that was found.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile used.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured.
count
The number of times the same event was detected within a short
period of time.
duration
This represents the value in seconds.
msg
Successfully sent a notification message.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-notification
38401
Message ID
38401
Log Subtype
Notification
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The system failed to send an email notification message.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
user
The name of the user creating the traffic.
from
The sender’s email address.
to
The recipient’s email address.
service
The IP network service that applies to the session or packet. The
services displayed correspond to the services configured in the
firewall policy.
proto
The MMS protocol used when running FortiOS Carrier. When running
FortiOS, this field contains N/A. This field contains any one of the
following:
• mm1
• mm4
• mm3
• mm7
dst
The destination IP address.
dport
The destination port number.
nf_type
The type of notification that was sent. For example, if a file was
blocked. This field contains any one of the following:
virus
• bword
• file_block
• carrier_ep_bwl
• flood
• dupe
• alert
• mms_checksum
• virus
The name of the virus that was found.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile used.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured.
count
The number of times the same event was detected within a short
period of time.
duration
This represents the value in seconds.
msg
Unable to send notification message.
sess_duration
The session duration number.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
345
Event-notification
38402
346
Message ID
38402
Log Subtype
Notification
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The system was unable to resolve an MMSC hostname.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
service
The IP network service that applies to the session or packet. The
services displayed correspond to the services configured in the
firewall policy.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile used.
profile_vd
The virtual domain that the profile is from.
msg
Unable to resolve hostname.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-amc-intf-bypass
Event-amc-intf-bypass log messages record the AMC disks’ bypass mode activity.
47201
Message ID
47201
Log Sub-type
amc-intf-bypass
Severity
Emergency
Firmware version
FortiOS 4.0 MR3
Meaning
AMC card entered bypass mode.
Fields
Field Description
msg
The AMC card in slot <slot_number> has entered bypass mode due to <reason>.
47202
Message ID
47202
Log Sub-type
amc-intf-bypass
Severity
Emergency
Firmware version
FortiOS 4.0 MR3
Meaning
AMC card exited bypass mode.
Fields
Field Description
msg
The AMC card in slot <slot_number> has exited bypass mode due to <reason>.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
347
Event-amc-intf-bypass
348
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-GTP
Event-GTP log messages record GTP activity. These messages are recorded only when running FortiOS
Carrier firmware.
41216
41217
41218
41219
41220
41221
41222
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
349
Event-GTP
41216
Message ID
41216
Log Subtype
GTP
Severity
Information
Firmware version
FortiOS Carrier 4.0 MR3
Meaning
GTP forward
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
profile
The name of the VoIP profile that was used to detect and take action.
status
This field can contain any one of the following:
• forwarded
• prohibited
• rate-limited
• state-invalid
• tunnel-limited
• traffic-count
• user-data
version
The version number.
msg-type
The number of the message type.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
from
The source IP address.
to
The destination IP address.
imsi
The IMSI information.
msisdn
The MSISDN information.
apn
The APN information.
selection
This field contains any one of the following:
• apns-vrf
• ms-apn-no-vrf
• net-apn-no-vrf
c-gsn
The GSN IP address for signaling.
u-gsn
The GSN IP address for user traffic.
nsapi
The NSAPI number.
linked-nsapi
The linked-NSAPI number.
imei-sv
The IMEI-SV information.
rat-type
This field contains any one of the following
• utran
• gan
• geran
• hspa
• wlan
350
rai
The RAI information.
uli
The ULI information.
end-user-address
The end-user’s IP address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-GTP
41217
Message ID
41217
Log Subtype
GTP
Severity
Information
Firmware version
FortiOS Carrier 4.0 MR3
Meaning
GTP deny
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If
no virtual domains exist, this field always contains root.
profile
The name of the VoIP profile that was used to detect and take
action.
status
This field can contain any one of the following:
• forwarded
• prohibited
• rate-limited
• state-invalid
• tunnel-limited
• traffic-count
• user-data
version
The version number.
msg-type
The number of the message type.
carrier_ep
The FortiOS Carrier end-point identification. For example, it
would display MSISDN of the phone that sent the MMS
message. This field will always display N/A in FortiOS.
from
The source IP address.
to
The destination IP address.
deny-cause
Explains why the message is prohibited. This field contains any
one of the following:
• packet-sanity
• invalid-reserved-field
• reserved-msg
• out-state-msg
• reserved-ie
• out-state-ie
• invalid-msg-length
• invalid-ie-length
• miss-mandatory-ie
• ip-policy
• non-ip-policy
• sgsn-not-authorized
• sgsn-no-handover
• ggsn-not-authorized
• invalid-seq-num
• msg-filter
• apn-filter
• imsi-filter
• adv-policy-filter
imsi
The IMSI information.
msisdn
The MSISDN information.
apn
The APN information.
selection
This field contains any one of the following:
• apns-vrf
• ms-apn-no-vrf
• net-apn-no-vrf
c-gsn
The IP address.
u-gsn
The IP address.
nsapi
The number of NSAPI.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
351
Event-GTP
linked-nsapi
The number of linked-NSAPI.
imei-sv
The IMEI-SV information.
rat-type
This field contains any one of the following
• utran
• gan
• geran
• hspa
• wlan
352
rai
The RAI information.
uli
The ULI information.
end-user-address
The end-user’s IP address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-GTP
41218
Message ID
41218
Log Subtype
GTP
Severity
Information
Firmware version
FortiOS Carrier 4.0 MR3
Meaning
GTP rate limit.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
profile
The name of the VoIP profile that was used to detect and take
action.
status
This field can contain any one of the following:
• forwarded
• prohibited
• rate-limited
• state-invalid
• tunnel-limited
• traffic-count
• user-data
version
The version number.
msg-type
The number of the message type.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This
field will always display N/A in FortiOS.
from
The source IP address.
to
The destination IP address.
imsi
The identification number of the IMSI.
msisdn
The identification number of the MSISDN.
apn
The identification number for APN.
selection
This field contains any one of the following:
• apns-vrf
• ms-apn-no-vrf
• net-apn-no-vrf
c-gsn
The IP address.
u-gsn
The IP address.
nsapi
The NSAPI number.
linked-nsapi
The linked-NSAPI number.
imei-sv
The IMEI-SV information.
rat-type
This field contains any one of the following
• utran
• gan
• geran
• hspa
• wlan
rai
The RAI information.
uli
The ULI information.
end-user-address
The end-user’s IP address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
353
Event-GTP
41219
Message ID
41219
Log Subtype
GTP
Severity
Information
Firmware version
FortiOS Carrier 4.0 MR3
Meaning
GTP state invalid
Fields
Field Description
vd
The name of the virtual domain where the action occurred in.
If no virtual domains exist, this field always contains root.
profile
The name of the VoIP profile that was used to detect and take
action.
status
This field always contains state-invalid. This means the
message is blocked because the FortiGate unit found no valid
state. For example, a response message comes in and the
FortiGate unit detects no corresponding request message.
version
The version number.
msg-type
The number of the message type.
carrier_ep
The FortiOS Carrier end-point identification. For example, it
would display MSISDN of the phone that sent the MMS
message. This field will always display N/A in FortiOS.
from
The source IP address.
to
The destination IP address.
imsi
The IMSI information.
msisdn
The MSISDN information.
apn
The APN information.
selection
This field contains any one of the following:
• apns-vrf
• ms-apn-no-vrf
• net-apn-no-vrf
c-gsn
The IP address.
u-gsn
The IP address.
nsapi
The number of NSAPI.
linked-nsapi
The number of linked-NSAPI.
imei-sv
The IMEI-SV information.
rat-type
This field contains any one of the following
• utran
• gan
• geran
• hspa
• wlan
354
rai
The RAI information.
uli
The ULI information.
end-user-address
The end-user’s IP address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-GTP
41220
Message ID
41220
Log Subtype
GTP
Severity
Information
Firmware version
FortiOS Carrier 4.0 MR3
Meaning
Tunnel limit GTP message. These messages occur only when the
maximum number of GTP tunnels is reached. No new tunnels are
created when the maximum number is reached.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
profile
The name of the VoIP profile that was used to detect and take
action.
status
This field contains any one of the following:
• forwarded
• prohibited
• rate-limited
• state-invalid
• tunnel-limited
• traffic-count
• user-data
version
The version number.
msg-type
The number of the message type.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This
field will always display N/A in FortiOS.
from
The source IP address.
to
The destination IP address.
imsi
The IMSI information.
msisdn
The MSISDN information.
apn
The APN information.
selection
This field contains any one of the following:
• apns-vrf
• ms-apn-no-vrf
• net-apn-no-vrf
c-gsn
The IP address.
u-gsn
The IP address.
nsapi
The number of NSAPI.
linked-nsapi
The number of linked-NSAPI.
imei-sv
The IMEI-SV information.
rat-type
This field contains any one of the following
• utran
• gan
• geran
• hspa
• wlan
rai
The RAI information.
uli
The ULI information.
end-user-address
The end-user’s IP address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
355
Event-GTP
41221
Message ID
41221
Log Subtype
GTP
Severity
Information
Firmware version
FortiOS Carrier 4.0 MR3
Meaning
Statistic summary information when the GTP tunnel is being torn
down.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
profile
The name of the VoIP profile that was used to detect and take
action.
status
This field contains any one of the following:
• forwarded
• prohibited
• rate-limited
• state-invalid
• tunnel-limited
• traffic-count
• user-data
version
The version number.
c-sgsn
The SGSN IP address for signaling.
c-ggsn
The GGSN IP address for signaling.
u-sgsn
The SGSN IP address for user traffic.
u-ggsn
The GGSN IP address for user traffic.
c-sgsn-teid
The identification number.
c-ggsn-teid
The identification number.
u-sgsn-teid
The identification number.
u-ggsn-teid
The identification number.
tunnel-idx
The tunnel’s identity index number.
duration
The duration of the GTP tunnel’s existence. The duration is in
seconds.
c-pkts
The number of GTP-c packets.
c-bytes
The number of bytes for GTP-c signaling traffic.
u-pkts
The number of GTP-u packets.
u-bytes
The number of bytes for GTP-u user traffic.
imsi
The IMSI information.
msisdn
The MSISDN information.
apn
The APN information.
selection
This field contains any one of the following:
• apns-vrf
• ms-apn-no-vrf
• net-apn-no-vrf
356
nsapi
The NSAPI information.
linked-nsapi
The linked-NSAPI information.
imei-sv
The IMEI-SV information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-GTP
rat-type
This field contains any one of the following:
• utran
• gan
• geran
• hspa
• wlan
rai
The RAI information.
uli
The ULI information.
end-user-address
The end-user’s IP address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
357
Event-GTP
41222
Message ID
41222
Log Subtype
GTP
Severity
Information
Firmware version
FortiOS Carrier 4.0 MR3
Meaning
GTP user data
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If
no virtual domains exist, this field always contains root.
profile
The name of the VoIP profile that was used to detect and take
action.
status
This field contains any one of the following:
• forwarded
• prohibited
• rate-limited
• state-invalid
• tunnel-limited
• traffic-count
• user-data
358
version
The version number.
tunnel-idx
The tunnel’s identity index number.
from
The source IP address.
to
The destination IP address.
end-user-address
The end-user’s IP address.
imsi
The IMSI information.
msisdn
The MSISDN information.
apn
The APN information.
user_data
The actual user traffic content, represented in hexidecimal form.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-MMS-Stats
Event-MMS log messages record MMS activity. These log messages are recorded only when running
FortiOS Carrier firmware.
43264
Message ID
43264
Log Sub-type
MMS
Severity
Information
Firmware version
FortiOS Carrier 4.0 MR3
Meaning
MMS statistics.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
proto
The MMS protocol that was used. This field can be any one of the following:
• mm1
• mm3
• mm4
• mm7
infected
The number of infected messages.
suspicious
The number of suspicous messages.
scanned
The number of scanned messages.
intercepted
The number of intercepted messages.
blocked
The number of blocked messages.
checksum
The number of content checksum blocked messages.
duration
The duration of the interval this counts over.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
359
Event-MMS-Stats
360
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-VoIP
Event-VoIP log messages record VoIP activites that include the SIP and SCCP protocols.
44032
44033
44034
44035
44036
44037
44038
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
361
Event-VoIP
44032
Message ID
44032
Log Subtype
VoIP
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A SIP log.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
session_id
The session identification number.
epoch
The user session identification number.
event_id
The event’s serial identification number.
src
The source IP address.
src_port
The source port number.
dst
The destination IP address.
dst_port
The destination port number
proto
The transport protocol number.
src_int
The source interface.
dst_int
The destination interface.
policy_id
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate unit will
have an index number of zero.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
endpoint
The endpoint information.
profile
The name of the VoIP profile that was used to detect the SIP activity.
profile_group
The group that the profile is part of. This field contains N/A if there is no
profile group configured.
profile_type
The type of profile used.
voip_proto
The VoIP application protocol that was detected. This field contains
either sip or sccp.
kind
This field contains any one of the following:
• register
• call-info
• unregister
• call-block
• call
action
362
This field contains any one of the following:
• permit
• cm-reject
• block
• exempt
• monitor
• ban
• kickout
• ban-user
• encrypt-kickout
• log-only
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-VoIP
status
This field contains any one of the following:
• start
• succeeded
• end
• failed
• timeout
• authentication-required
• blocked
duration
This represents the value in seconds.
dir
The direction of the traffic. This field contains either inbound or
outbound.
from
The source name.
to
The destination name.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
363
Event-VoIP
44033
Message ID
44033
Log Subtype
VoIP
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
SIP was blocked.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
session_id
The session identification number.
epoch
The user session identification number.
event_id
The event’s serial identification number.
src
The source IP address.
src_port
The source port number.
dst
The destination IP address.
dst_port
The destination port number
proto
The transport protocol number.
src_int
The source interface.
dst_int
The destination interface.
policy_id
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate unit will have an
index number of zero.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
endpoint
The endpoint information.
profile
The name of the VoIP profile that was used to detect the SIP activity.
profile_group
The name of the profile group. This is for FortiOS Carrier only.
profile_type
The type of profile that was used.
voip_proto
The VoIP application protocol that was detected. This field contains either
sip or sccp.
kind
This field contains any one of the following:
• register
• call-info
• unregister
• call-block
• call
action
364
This field contains any one of the following:
• permit
• cm-reject
• block
• exempt
• monitor
• ban
• kickout
• ban-user
• encrypt-kickout
• log-only
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-VoIP
status
This field contains any one of the following:
• start
• succeeded
• end
• failed
• timeout
• authentication-required
• blocked
reason
This field contains any one of the following:
• rate-limit
• dialog-limit
• long-header
• unrecognized-form
• unknown
• block-request
• phone
• session-close
• new-register
• invalid-ip
• exceed-rate
duration
This represents the value in seconds.
dir
The direction of the traffic. This field contains either inbound or outbound.
message_type
The type of message. This field contains either request or response.
request_name
The name of the request.
count
The number of times the same event was detected within a short period of
time.
from
The source name.
to
The destination name.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
365
Event-VoIP
44034
Message ID
44034
Log Subtype
VoIP
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
SIP fuzzing occurred.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
session_id
The session identification number.
epoch
The user session identification number.
event_id
The event’s identification serial number
src
The source IP address.
src_port
The source port number.
dst
The destination IP address.
dst_port
The destination port number
proto
The transport protocol number.
src_int
The source interface.
dst_int
The destination interface.
policy_id
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate unit will have an
index number of zero.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
endpoint
The endpoint information.
profile
The name of the VoIP profile that was used to detect the SIP activity.
profile_group
The group that the profile is part of. This field contains N/A if there is no
profile group configured. profile groups are only available in FortiOS Carrier.
profile_type
The type of profile used.
voip_proto
The VoIP application protocol that was detected. This field contains either
sip or sccp.
kind
This field contains any one of the following:
• register
• call-info
• unregister
• call-block
• call
action
366
This field contains any one of the following:
• permit
• cm-reject
• block
• exempt
• monitor
• ban
• kickout
• ban-user
• encrypt-kickout
• log-only
duration
This represents the value in seconds.
dir
The direction of the traffic. This field contains either inbound or outbound.
message_type
The type of message. This field contains either request or response.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-VoIP
request_name
The request name.
malform_desc
The description of the syntax error. This field contains any one of the
following:
• unexpected-character
• invalid-quoting-character
• trailing-bytes
• header-line-oversize
• msg-body-oversize
• domain-name-oversize
• domain-name-oversize
• domain-label-oversize
• syntax-malformed
• duplicated-sip-header
• space-violation
• invalid-ip4-address
• invalid-ipv6-address
• invalid-port
• invalid-fqdn
• no-matching-double-quote
• empty-quoted-string
• invalid<userinfo>
• invalid-escape-encodingin<userinfor>
• invalid-escape-encoding-in-uriparamter
• invalid-escape-encoding-in-uriheader
• invalid-escape-encoding-in<reasonphrase>
• port-expected
• port-not-allowed
• domain-name-invalid
• <gen-value>-expected
• invalid-<gen-value>
• invalid-<quoted-string>-in-<gen-value>
• ipv4-address-expected
• ipv6-address-expected
• uri-expected
• invalid-transport-uri-parameter
• invalid-user-uri-parameter
• invalid-method-uri-parameter
• invalid-ttl-uri-parameter
• invalid-uri-parameter-pname
• invalid-uri-parameter-value
• uri-parameter-repeat
• invalid-uri-header-name
• invalid-uri-header-value
• invalid-uri-header-name-valuepair
• invalid-quoted-string-in-display-name
• left-angle-bracket-is-mandatory • right-angle-bracket-not-found
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
• invalid-status-code
• no-METHOD-on-request-line
• uri-parameters-not-allowed-byRFC
• unknown-scheme
• whitespace-expected
• LWS-expected
• invalid-<SIP-Version>-onrequest-line
• invalid-<protocol-name>
• invalid-<protocol-version>
• invalid-<transport>
• no-SLASH-after-<protocolname>
• no-SLASH-after-<protocol-version>
• header-parameter-expected
• invalid-ttl-parameter
• invalid-madddr-parameter
• invalid-received-parameter
• invalid-branch-parameter
• invalid-rport-parameter
• via-parameter-repeat
• <seq>-number-expected
• <method>-expected
• <method>-does-not-match-therequest-line
• <response-num>-expected
• <CSeq-num>-expected
• <Method>-expected-after<CSeq-num>
• expires-header-repeated
367
Event-VoIP
• <delta-seconds>expected
• invalid-max-forwards
• token-expected
• invalid-expires-parameter
• invalid-q-parameter
• <generic-param>-with-invalid<genvalue>
• <m-type>-expected
• SLASH-expected-after-<m-type>
• <m-subtype>expected
• <m-attribute>-expected-after-SEMI
• boundary-parameter-appearsmore-than-once
• EQUAL-expected-after-<m-attribute>
• invalid-<quoted-string>-in-<mvalue>
• invalid-<m-value>
• multipart-Content-Type-has-no- • digits-expected
boundary
• IN-expected
368
• IP-expected
• IP4-or-IP6-expected
• IPv4-or-IPv6-address-expected
• line-order-error
• z-line-not-allowed-on-media-level
• <time>-expected
• <typed-time>-expected
• r-line-not-allowed-on-medialevel
• <repeat-interval>-expected
• <bwtype>-expected
• colon-expected
• <bandwidth>-expected
• t-liine-not-allowed-on-media-level
• invalid-<start-time>
• invalid<stop-time>
• too-many-i-lines
• <text>-expected
• too-many-c-lines
• too-many-v-line
• v-line-not-allowed-on-medialevel
• too-many-o-lines
• o-line-not-allowed-on-medialevel
• <username>-expected
• <sess-id>-expected
• <sess-version>-expected
• too-many-s-lines
• s-line-not-allowed-on-media-level
• too-many-m-lines
• <media>-expected
• <integer>-expected
• <proto>-expected
• <token>-expected-in-<proto>after-slash
• <fmt>-expected
• <att-field>-expected
• <att-value>-expected
• <payload-type>-expected-inrtpmap
• <encoding-name>-expected-in-rtpmap
• slash-expected-after<encoding-name>-in-rtpmap
• invalid-<clock-rate>-in-rtpmap
• invalid-<encodingparameters>-in-rtpmap
• invalid-candidate-line
• sdp-candidate-line-before-mline
• sip-Yahoo-candidate-invalid-protocol
• invalid-port-after-ip-address-incandidate-line
• too-many-candidate-lines
• sdp-invalid-alt-line
• sdp-alt-line-before-m-line
• invalid-port-after-ip-address-inalt-line
• sdp-rtcp-line-before-m-line
• invalid-port-in-rtcp-lines
• too-many-rtcp-lines
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-VoIP
• <callid>-expected
• <word>-expected
• invalid-tag-parameter
• no-tag-parameter
• sdp-v-o-s-t-lines-are-mandatory • unknown-header
• end-of-line-error
• sip-udp-message-truncated
• missing-mandatory-field
madlform_data
The number of the malform data.
line
The line information.
column
The column number.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
369
Event-VoIP
44035
Message ID
44035
Log Subtype
VoIP
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
SCCP registration
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
session_id
The session identification number.
epoch
The user session identification number.
event_id
The event’s serial identification number
src
The source IP address.
proto
The transport protocol number.
src_int
The source interface.
policy_id
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate unit will have an
index number of zero.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
endpoint
The endpoint information.
profile
The name of the VoIP profile that was used to detect the SIP activity.
profile_group
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
profile_type
The type of profile used.
voip_proto
The VoIP protocol that was detected. This field contains either sip or sccp.
kind
This field contains any one of the following:
• register
• call-info
• unregister
• call-block
• call
action
status
This field contains any one of the following:
• permit
• cm-reject
• block
• exempt
• monitor
• ban
• kickout
• ban-user
• encrypt-kickout
• log-only
This field contains any one of the following:
• start
• succeeded
• end
• failed
• timeout
• authentication-required
• blocked
phone
370
The phone information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-VoIP
44036
Message ID
44036
Log Subtype
VoIP
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
SCCP unregister
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
session_id
The session identification number.
epoch
The user session identification number.
event_id
The event’s serial identification number
src
The source IP address.
proto
The transport protocol number.
src_int
The source interface.
policy_id
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate unit will have an
index number of zero.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
endpoint
The endpoint information.
profile
The name of the VoIP profile that was used to detect the VoIP activity.
profile_group
The group that the profile is part of. This field contains N/A if there is no
profile group configured.
profile_type
The type of profile used.
voip_proto
The VoIP protocol that was detected. This field contains either sip or sccp.
kind
This field contains any one of the following:
• register
• call-info
• unregister
• call-block
• call
action
status
This field contains any one of the following:
• permit
• cm-reject
• block
• exempt
• monitor
• ban
• kickout
• ban-user
• encrypt-kickout
• log-only
This field contains any one of the following:
• start
• succeeded
• end
• failed
• timeout
• authentication-required
• blocked
reason
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
This field contains any one of the following:
• rate-limit
• block-request
• dialog-limit
• phone
371
Event-VoIP
• long-header
• session-close
• unrecognized-form
• new-register
• unknown
• invalid-ip
• exceed-rate
phone
372
The phone information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-VoIP
44037
Message ID
44037
Log Subtype
VoIP
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
SCCP call block
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
session_id
The session identification number.
epoch
The user session identification number.
event_id
The event’s serial identification number.
src
The source IP address.
proto
The transport protocol number.
src_int
The source interface.
policy_id
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate unit will have an
index number of zero.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
endpoint
The endpoint information.
profile
The name of the VoIP profile that was used to detect the VoIP activity.
profile_group
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
profile_type
The type of profile used.
voip_proto
The VoIP protocol that was detected. This field contains either sip or sccp.
kind
This field contains any one of the following:
• register
• call-info
• unregister
• call-block
• call
action
status
This field contains any one of the following:
• permit
• cm-reject
• block
• exempt
• monitor
• ban
• kickout
• ban-user
• encrypt-kickout
• log-only
This field contains any one of the following:
• start
• succeeded
• end
• failed
• timeout
• authentication-required
• blocked
reason
This field contains any one of the following:
• rate-limit
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
• block-request
373
Event-VoIP
• dialog-limit
• phone
• long-header
• session-close
• unrecognized-form
• new-register
• unknown
• invalid-ip
• exceed-rate
phone
374
The phone information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Event-VoIP
44038
Message ID
44038
Log Subtype
VoIP
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
SCCP call info
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
session_id
The session identification number.
epoch
The user session identification number.
event_id
The event’s serial identification number
src
The source IP address.
src_port
The source port number.
dst
The destination IP address.
dst_port
The destination port number.
proto
The transport protocol number.
src_int
The source interface.
dst_int
The destination interface.
policy_id
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate unit will have an
index number of zero.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
endpoint
The endpoint information.
profile
The name of the VoIP profile that was used to detect the VoIP activity.
profile_group
The group that the profile is part of. This field contains N/A if there is no
profile group configured.
profile_type
The type of profile used.
voip_proto
The VoIP protocol that was detected. This field contains either sip or sccp.
kind
This field contains any one of the following:
• register
• call-info
• unregister
• call-block
• call
action
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
This field contains any one of the following:
• permit
• cm-reject
• block
• exempt
• monitor
• ban
• kickout
• ban-user
• encrypt-kickout
• log-only
375
Event-VoIP
status
This field contains any one of the following:
• start
• succeeded
• end
• failed
• timeout
• authentication-required
• blocked
376
duration
This represents the value in seconds.
phone
The phone information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Data Leak Prevention
Data Leak Protection (DLP) log messages are log messages that record data leaks. These logs provide
additional information to help administrators better analyze and detect data leaks.
In FortiOS 4.0 MR3 and higher, DLP log messages are located in UTM log file. These log messages are
also viewed in the web-based manager from Log&Report > Log & Archive Access > UTM.
24576
24577
24578
24579
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
377
Data Leak Prevention
24576
Message ID
24576
Log Subtype
DLP
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
A data leak was detected by a specified DLP sensor rule.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet. Any
policy that is automatically added by the FortiGate will have an index number
of zero.
custom
The log field that a user has created. This is referred to as a custom log field
because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if the
firewall policy does not use an identity-based policy; otherwise, it displays the
number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall
policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains one of the following:
status
filefilter
• http
• mm4
• https
• mm7
• smtp
• nntp
• pop3
• im
• imap
• smtps
• ftp
• pop3s
• mm1
• imaps
• mm3
• ftp (ftp-over-http)
The action the FortiGate unit took. This field contains any of the following:
•
detected
• blocked
•
success
• error
The type of file filter. This field contains any one of the following:
• none
• file pattern
• file type
378
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Data Leak Prevention
filetype
The type of file, for example, a zip file. This field contains any one of the
following:
• arj
• cab
• tzh
• rar
• tar
• zip
• bzip
• gzip
• bzip2
• bat
• msc
• uue
• mime
• base64
• binhex
• com
• elf
• exe
• hta
• html
• jad
• class
• cod
• javascript
• msoffice
• fsg
• upx
• petite
• aspack
• prc
• sis
• hlp
• activemime
• jpeg
• gif
• tiff
• png
• bmp
• ignored
• unknown
• N/A
sent
The total number of bytes sent.
rcvd
The total number of bytes received.
hostname
The home page of the web site. For example, www.example.com
url
The URL address of the web page that the user was viewing.
from
The sender’s email address.
to
The receiver’s email address.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
rulename
The name of the DLP rule within the DLP sensor.
compoundname
The name of the compound rule used.
filtername
The name of the filter.
file
The file information.
action
The action that was specified within the rule. In some rules within sensors,
you can specify content archiving. If no log type is specified, this field
displays log-only.
This field contains any one of the following:
• log-only
• ban sender
• block
• quarantine ip
• exempt
• quarantine interface
• ban
severity
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
The level of severity for that specific rule.
379
Data Leak Prevention
24577
Message ID
24577
Log Subtype
DLP
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A data leak was detected by a specified DLP sensor rule.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log field
because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique within
a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains one of the following:
status
filefilter
• http
• mm4
• https
• mm7
• smtp
• nntp
• pop3
• im
• imap
• smtps
• ftp
• pop3s
• mm1
• imaps
• mm3
• ftp (ftp-over-http)
The action the FortiGate unit took. This field contains any one of the
following:
• detected
• blocked
• success
• error
The type of file filter. This field contains any one of the following:
• none
• file pattern
• file type
380
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Data Leak Prevention
filetype
The type of file, for example, a zip file. This field contains any one of the
following:
• arj
• cab
• tzh
• rar
• tar
• zip
• bzip
• gzip
• bzip2
• bat
• msc
• uue
• mime
• base64
• binhex
• com
• elf
• exe
• hta
• html
• jad
• class
• cod
• javascript
• msoffice
• fsg
• upx
• petite
• aspack
• prc
• sis
• hlp
• activemime
• jpeg
• gif
• tiff
• png
• bmp
• ignored
• unknown
• N/A
sent
The total number of bytes sent.
rcvd
The total number of bytes received.
hostname
The home page of the web site. For example, www.example.com.
url
The URL address of the web page that the user was viewing.
from
This field contains N/A.
to
This field contains N/A.
msg
data leak detected(Data Leak Prevention Rule matched)
rulename
The name of the DLP rule that was used.
compoundname
The name of the compound rule used.
filtername
The name of the filter.
file
The file information.
action
The action that was specified within the rule. In some rules within sensors,
you can specify content archiving. If no log type is specified, this field
displays log-only.
This field contains one of the following:
• log-only
• ban sender
• block
• quarantine ip
• exempt
• quarantine interface
• ban
severity
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
The level of severity for that specific rule.
381
Data Leak Prevention
24578
Message ID
24578
Log Subtype
DLP
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A DLP fingerprint document source notice.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
status
The action the FortiGate unit took. This field contains any one of the
following:
• detected
•
blocked
• success
•
error
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
sensitivity
The document source.
docsource
The document source.
errorstr
The erorr information, if there was an error in scanning the document
source.
24579
Message ID
24579
Log Subtype
DLP
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A DLP fingerprint document source error.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
status
The action the FortiGate unit took. This field contains any one of the
following:
msg
382
• detected
•
blocked
• success
•
error
The log message information. This is usually a sentence and explains the
activity and/or action taken.
sensitivity
The document source.
docsource
The document source.
errorstr
The erorr information, if there was an error in scanning the document
source.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Data Leak Prevention
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
383
Data Leak Prevention
384
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Application Control
Application Control log messages are log messages that record application control protocols and events.
In FortiOS 4.0 MR3 and higher, application control log messages are located in UTM log file. These log
messages are also viewed in the web-based manager from Log&Report > Log & Archive Access > UTM.
28672
28673
28674
28675
28676
28677
28678
28688
28689
28690
28704
28705
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
385
Application Control
28672
Message ID
28672
Log Subtype
app-crtl-all
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An application control IM-basic log message.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
kind
This field can be any one of the following:
• login
• chat
• file
• photo
• audio
• call
• regist
• unregister
• call-block
• request
• response
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
dir
This field can be any one of the following:
• incoming
• outgoing
• N/A
386
src
The source IP address.
src_port
The source port number.
src_int
The source interface name. For example, internal.
dst
The destination IP address.
dst_port
The destination port number.
dst_int
The destination interface name. For example, wan1.
src_name
The source name. This can be a name or an IP address.
dst_name
The destination name. This can be a name or an IP address.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level
protocol. Protocol numbers are assigned by the Internet Assigned
Number Authority (IANA).
service
The service where the event or activity occurred.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Application Control
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happened.
app_list
The name of the application control list that was used to detect and
take action. For example, the default application control list, monitor-all.
app_type
The type of application that triggered the action within the control list.
app
The name of the application that triggered the action within the control
list. For example, SSL.
action
The action that was taken by the application control engine. This field
can be any one of the following:
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
• pass
• block
• monitor
• kickout
• encrypt-kickout
• reject
387
Application Control
28673
Message ID
28673
Log Subtype
app-crtl-all
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An application control IM log message.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
kind
This field can be any one of the following:
• login
• chat
• file
• photo
• audio
• call
• regist
• unregister
• call-block
• request
• response
• video
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
dir
This field can be any one of the following:
• incoming
• outgoing
• N/A
388
src
The source IP address.
src_port
The source port number.
src_int
The source interface name. For example, internal.
dst
The destination IP address.
dst_port
The destination port number.
dst_int
The destination interface name. For example, wan1.
src_name
The source name. This can be a name or an IP address.
dst_name
The destination name. This can be a name or an IP address.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level
protocol. Protocol numbers are assigned by the Internet Assigned
Number Authority (IANA).
service
The service where the event or activity occurred.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Application Control
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happened.
app_list
The name of the application control list that was used to detect and take
action. For example, the default application control list, monitor-all.
app_type
The type of application that triggered the action within the control list.
app
The name of the application that triggered the action within the control
list. For example, SSL.
action
The action that was taken by the application control engine. This field can
be any one of the following:
status
• pass
• block
• monitor
• kickout
• encrypt-kickout
• reject
This field can be any one of the following:
• request
• cancel
• accept
• fail
• download
• stop
• start
• end
• timeout
• blocked
• succeeded
• failed
• authentication-required
• pass
• block
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
389
Application Control
28674
Message ID
28674
Log Subtype
app-crtl-all
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An application control IM (chat message count) log message.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
kind
This field can be any one of the following:
• login
• chat
• file
• photo
• audio
• call
• regist
• unregister
• call-block
• request
• response
• video
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
dir
This field can be any one of the following:
• incoming
• outgoing
• N/A
390
src
The source IP address.
src_port
The source port number.
src_int
The source interface name. For example, internal.
dst
The destination IP address.
dst_port
The destination port number.
dst_int
The destination interface name. For example, wan1.
src_name
The source name. This can be a name or an IP address.
dst_name
The destination name. This can be a name or an IP address.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level
protocol. Protocol numbers are assigned by the Internet Assigned
Number Authority (IANA).
service
The service where the event or activity occurred.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Application Control
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happened.
app_list
The name of the application control list that was used to detect and take
action. For example, the default application control list, monitor-all.
app_type
The type of application that triggered the action within the control list.
app
The name of the application that triggered the action within the control
list. For example, SSL.
action
The action that was taken by the application control engine. This field can
be any one of the following:
count
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
• pass
• block
• monitor
• kickout
• encrypt-kickout
• reject
The number of times the same event was detected within a short period
of time.
391
Application Control
28675
Message ID
28675
Log Subtype
app-crtl-all
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An application control IM (file) log message.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
kind
This field can be any one of the following:
• login
• chat
• file
• photo
• audio
• call
• regist
• unregister
• call-block
• request
• response
• video
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
dir
This field can be any one of the following:
• incoming
• outgoing
• N/A
392
src
The source IP address.
src_port
The source port number.
src_int
The source interface name. For example, internal.
dst
The destination IP address.
dst_port
The destination port number.
dst_int
The destination interface name. For example, wan1.
src_name
The source name. This can be a name or an IP address.
dst_name
The destination name. This can be a name or an IP address.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level
protocol. Protocol numbers are assigned by the Internet Assigned
Number Authority (IANA).
service
The service where the event or activity occurred.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Application Control
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happened.
app_list
The name of the application control list that was used to detect and take
action. For example, the default application control list, monitor-all.
app_type
The type of application that triggered the action within the control list.
app
The name of the application that triggered the action within the control
list. For example, SSL.
action
The action that was taken by the application control engine. This field can
be any one of the following:
status
• pass
• block
• monitor
• kickout
• encrypt-kickout
• reject
This field can be any one of the following:
• request
• cancel
• accept
• fail
• download
• stop
• start
• end
• timeout
• blocked
• succeeded
• failed
• authentication-required
• pass
• block
filename
The name of the file.
filesize
The size of the file.
message
The log information. This is usually a sentence and explains the activity
and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
393
Application Control
28676
Message ID
28676
Log Subtype
app-crtl-all
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An application control IM (chat) log message.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
kind
This field can be any one of the following:
• login
• chat
• file
• photo
• audio
• call
• regist
• unregister
• call-block
• request
• response
• video
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
dir
This field can be any one of the following:
• incoming
• outgoing
• N/A
394
src
The source IP address.
src_port
The source port number.
src_int
The source interface name. For example, internal.
dst
The destination IP address.
dst_port
The destination port number.
dst_int
The destination interface name. For example, wan1.
src_name
The source name. This can be a name or an IP address.
dst_name
The destination name. This can be a name or an IP address.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level
protocol. Protocol numbers are assigned by the Internet Assigned
Number Authority (IANA).
service
The service where the event or activity occurred.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Application Control
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happened.
app_list
The name of the application control list that was used to detect and take
action. For example, the default application control list, monitor-all.
app_type
The name of the application control list that was used to detect and take
action. For example, the default application control list, monitor-all.
app
The type of application that triggered the action within the control list.
action
The action that was taken by the application control engine. This field can
be any one of the following:
• pass
• block
• monitor
• kickout
• encrypt-kickout
• reject
count
The number of times the same event was detected within a short period
of time.
content
The content information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
395
Application Control
28677
Message ID
28677
Log Subtype
app-crtl-all
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An application control IM (chat blocked) log message.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
kind
This field can be any one of the following:
• login
• chat
• file
• photo
• audio
• call
• regist
• unregister
• call-block
• request
• response
• video
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
dir
This field can be any one of the following:
• incoming
• outgoing
• N/A
396
src
The source IP address.
src_port
The source port number.
src_int
The source interface name. For example, internal.
dst
The destination IP address.
dst_port
The destination port number.
dst_int
The destination interface name. For example, wan1.
src_name
The source name. This can be a name or an IP address.
dst_name
The destination name. This can be a name or an IP address.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level
protocol. Protocol numbers are assigned by the Internet Assigned
Number Authority (IANA).
service
The service where the event or activity occurred.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Application Control
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
app_list
The name of the application control list that was used to detect and take
action. For example, the default application control list, monitor-all.
app_type
The type of application that triggered the action within the control list.
app
The name of the application that triggered the action within the control
list. For example, SSL.
action
The action that was taken by the application control engine. This field can
be any one of the following:
• pass
• block
• monitor
• kickout
• encrypt-kickout
• reject
count
The number of times the same event was detected within a short period
of time.
reason
This field contains any one of the following:
req
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
• meter-overload-drop
• meter-overload-refuse
• rate-limit
• dialog-limit
• long-header
• unrecognized-form
• unknown
• block-request
• invalid-ip
• exceed-rate
The request information.
397
Application Control
28678
Message ID
28678
Log Subtype
app-crtl-all
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An application control IM (blocked) log message.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
kind
This field can be any one of the following:
• login
• chat
• file
• photo
• audio
• call
• regist
• unregister
• call-block
• request
• response
• video
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
dir
This field can be any one of the following:
• incoming
• outgoing
• N/A
398
src
The source IP address.
src_port
The source port number.
src_int
The source interface name. For example, internal.
dst
The destination IP address.
dst_port
The destination port number.
dst_int
The destination interface name. For example, wan1.
src_name
The source name. This can be a name or an IP address.
dst_name
The destination name. This can be a name or an IP address.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level
protocol. Protocol numbers are assigned by the Internet Assigned
Number Authority (IANA).
service
The service where the event or activity occurred.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Application Control
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
app_list
The name of the application control list that was used to detect and take
action. For example, the default application control list, monitor-all.
app_type
The type of application that triggered the action within the control list.
app
The name of the application that triggered the action within the control
list. For example, SSL.
action
The action that was taken by the application control engine. This field can
be any one of the following:
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
• pass
• block
• monitor
• kickout
• encrypt-kickout
• reject
399
Application Control
28688
Message ID
28688
Log Subtype
app-crtl-all
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An application control IM (VoIP basic) log message.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
kind
This field can be any one of the following:
• login
• chat
• file
• photo
• audio
• call
• regist
• unregister
• call-block
• request
• response
• video
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
dir
This field can be any one of the following:
• incoming
• outgoing
• N/A
400
src
The source IP address.
src_port
The source port number.
src_int
The source interface name. For example, internal.
dst
The destination IP address.
dst_port
The destination port number.
dst_int
The destination interface name. For example, wan1.
src_name
The source name. This can be a name or an IP address.
dst_name
The destination name. This can be a name or an IP address.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level
protocol. Protocol numbers are assigned by the Internet Assigned
Number Authority (IANA).
service
The service where the event or activity occurred.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Application Control
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
app_list
The name of the application control list that was used to detect and take
action. For example, the default application control list, monitor-all.
app_type
The type of application that triggered the action within the control list.
app
The name of the application that triggered the action within the control
list. For example, SSL.
action
The action that was taken by the application control engine. This field can
be any one of the following:
status
• pass
• block
• monitor
• kickout
• encrypt-kickout
• reject
This field can be any one of the following:
• request
• cancel
• accept
• fail
• download
• stop
• start
• end
• timeout
• blocked
• succeeded
• failed
• authentication-required
• pass
• block
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
401
Application Control
28689
Message ID
28689
Log Subtype
app-crtl-all
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An application control IM (SCCP call blocked) log message.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
kind
This field can be any one of the following:
• login
• chat
• file
• photo
• audio
• call
• regist
• unregister
• call-block
• request
• response
• video
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
dir
This field can be any one of the following:
• incoming
• outgoing
• N/A
402
src
The source IP address.
src_port
The source port number.
src_int
The source interface name. For example, internal.
dst
The destination IP address.
dst_port
The destination port number.
dst_int
The destination interface name. For example, wan1.
src_name
The source name. This can be a name or an IP address.
dst_name
The destination name. This can be a name or an IP address.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level
protocol. Protocol numbers are assigned by the Internet Assigned
Number Authority (IANA).
service
The service where the event or activity occurred.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Application Control
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
app_list
The name of the application control list that was used to detect and take
action. For example, the default application control list, monitor-all.
app_type
The type of application that triggered the action within the control list.
app
The name of the application that triggered the action within the control
list. For example, SSL.
action
The action that was taken by the application control engine. This field can
be any one of the following:
status
• pass
• block
• monitor
• kickout
• encrypt-kickout
• reject
This field can be any one of the following:
• request
• cancel
• accept
• fail
• download
• stop
• start
• end
• timeout
• blocked
• succeeded
• failed
• authentication-required
• pass
• block
phone
The phone information.
reason
This field contains any one of the following:
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
• meter-overload-drop
• meter-overload-refuse
• rate-limit
• dialog-limit
• long-header
• unrecognized-form
• unknown
• block-request
• invalid-ip
• exceed-rate
403
Application Control
28690
Message ID
28690
Log Subtype
app-crtl-all
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An application control IM (SIP block) log message.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
kind
This field can be any one of the following:
• login
• chat
• file
• photo
• audio
• call
• regist
• unregister
• call-block
• request
• response
• video
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
dir
This field can be any one of the following:
• incoming
• outgoing
• N/A
404
src
The source IP address.
src_port
The source port number.
src_int
The source interface name. For example, internal.
dst
The destination IP address.
dst_port
The destination port number.
dst_int
The destination interface name. For example, wan1.
src_name
The source name. This can be a name or an IP address.
dst_name
The destination name. This can be a name or an IP address.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level
protocol. Protocol numbers are assigned by the Internet Assigned
Number Authority (IANA).
service
The service where the event or activity occurred.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Application Control
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
app_list
The name of the application control list that was used to detect and take
action. For example, the default application control list, monitor-all.
app_type
The type of application that triggered the action within the control list.
app
The name of the application that triggered the action within the control
list. For example, SSL.
action
The action that was taken by the application control engine. This field can
be any one of the following:
• pass
• block
• monitor
• kickout
• encrypt-kickout
• reject
count
The number of times the same event was detected within a short period
of time.
reason
This field contains any one of the following:
req
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
• meter-overload-drop
• meter-overload-refuse
• rate-limit
• dialog-limit
• long-header
• unrecognized-form
• unknown
• block-request
• invalid-ip
• exceed-rate
The request information.
405
Application Control
28704
406
Message ID
28704
Log Subtype
app-crtl-all
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An application control IM (IPS) log message (pass).
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
attack_id
The identification number of the IM (IPS) log message.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
src_port
The source port number.
src_int
The source interface name. For example, internal.
dst
The destination IP address.
dst_port
The destination port number.
dst_int
The destination interface name. For example, wan1.
src_name
The source name. This can be a name or an IP address.
dst_name
The destination name. This can be a name or an IP address.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level
protocol. Protocol numbers are assigned by the Internet Assigned
Number Authority (IANA).
service
The service where the event or activity occurred.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
serial
The serial number of the firewall session on which the event happend.
app_list
The name of the application control list that was used to detect and take
action. For example, the default application control list, monitor-all.
app_type
The type of application that triggered the action within the control list.
app
The name of the application that triggered the action within the control
list. For example, SSL.
action
The action that was taken by the application control engine. This field can
be any one of the following:
• pass
• block
• monitor
• kickout
• encrypt-kickout
• reject
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Application Control
count
The number of times the same event was detected within a short period
of time.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
407
Application Control
28705
408
Message ID
28705
Log Subtype
app-crtl-all
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An application control IM (IPS) log message (pass).
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
attack_id
The identification number of the IM (IPS) log message.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
src_port
The source port number.
src_int
The source interface name. For example, internal.
dst
The destination IP address.
dst_port
The destination port number.
dst_int
The destination interface name. For example, wan1.
src_name
The source name. This can be a name or an IP address.
dst_name
The destination name. This can be a name or an IP address.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level
protocol. Protocol numbers are assigned by the Internet Assigned
Number Authority (IANA).
service
The service where the event or activity occurred.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
serial
The serial number of the firewall session on which the event happend.
app_list
The name of the application control list that was used to detect and take
action. For example, the default application control list, monitor-all.
app_type
The type of application that triggered the action within the control list.
app
The name of the application that triggered the action within the control
list. For example, SSL.
action
The action that was taken by the application control engine. This field can
be any one of the following:
• pass
• block
• monitor
• kickout
• encrypt-kickout
• reject
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Application Control
count
The number of times the same event was detected within a short period
of time.
msg
The log message information. This is usually a sentence and explains the
activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
409
Application Control
410
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
Antivirus log messages record actual viruses that are contained in an email as well as anything that
appears to be similar to a virus or suspicious, such as in a file or in an email.
In FortiOS 4.0 MR3 and higher, antivirus log messages are located in UTM log file. These log messages
are also viewed in the web-based manager from Log&Report > Log & Archive Access > UTM.
8192
8704
8972
8193
8704
8973
8194
8705
8195
8706
8196
8707
8197
8960
8198
8961
8199
8962
8448
8963
8449
8964
8450
8965
8451
8966
8452
8967
8453
8968
8454
8969
8455
8970
8456
8971
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
411
Antivirus
8192
Message ID
8192
Log Subtype
Infected
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
An infected file was detected by the FortiGate unit and blocked.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
File is infected
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic. This
field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
dir
This field contains any one of the following:
• N/A
• tx
• rx
412
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
file
The name of the file.
checksum
The checksum of the file that was scanned by the FortiGate unit. If two
files have different names but the same checksum, the FortiGate unit
assumes that they have the same content.
quarskip
This field contains any one of the following:
• No skip
• No quarantine for HTTP
• GET file pattern block
• No quarantine for oversized files.
• File was not quarantined.
virus
The name of the virus that was detected.
dtype
The dtype information.
ref
The URL reference that give more information about the virus. If you
enter the URL in the address bar of the web browser, you are directed
to that specific page that contains information about the virus.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in FortiOS
Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
413
Antivirus
8193
Message ID
8193
Log Subtype
Infected
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An infected file was detected by the FortiGate unit and it passed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
File is infected
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic. This
field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
dir
This field contains any one of the following:
• N/A
• tx
• rx
414
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
file
The name of the file.
checksum
The checksum of the file that was scanned by the FortiGate unit. If two
files have different names but the same checksum, the FortiGate unit
assumes that they have the same content.
quarskip
This field contains any one of the following:
• No skip
• No quarantine for HTTP
• GET file pattern block
• No quarantine for oversized files.
• File was not quarantined.
virus
The name of the virus that was detected.
dtype
The dtype information.
ref
The URL reference that give more information about the virus. If you
enter the URL in the address bar of the web browser, you are directed
to that specific page that contains information about the virus.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in FortiOS
Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
415
Antivirus
8194
Message ID
8194
Log Subtype
Infected
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
A MIME header was detected to have a virus and was blocked.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
File is infected
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
416
The type of protocol that was used to send and receive the traffic. This
field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
file
The name of the file.
checksum
The checksum of the file that was scanned by the FortiGate unit. If two
files have different names but the same checksum, the FortiGate unit
assumes that they have the same content.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
quarskip
This field contains any one of the following:
• No skip
• No quarantine for HTTP
• GET file pattern block
• No quarantine for oversized files.
• File was not quarantined.
virus
The name of the virus that was detected.
dtype
The dtype information.
ref
The URL reference that give more information about the virus. If you
enter the URL in the address bar of the web browser, you are directed
to that specific page that contains information about the virus.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profiletype
The name of the profile that was used to detect and take action.
profilegroup
The type of profile that was used, for example, Antivirus_Profile.
profile
The group that the profile is a part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in FortiOS
Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
from
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
to
The sender’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
417
Antivirus
8195
Message ID
8195
Log Subtype
Infected
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A MIME header is infected and passed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
File is infected
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
blocked
passthrough
monitored
service
418
The type of protocol that was used to send and receive the traffic. This
field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
file
The name of the file.
checksum
The checksum of the file that was scanned by the FortiGate unit. If two
files have different names but the same checksum, the FortiGate unit
assumes that they have the same content.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
quarskip
This field contains any one of the following:
• No skip
• No quarantine for HTTP
• GET file pattern block
• No quarantine for oversized files.
• File was not quarantined.
virus
The name of the virus that was detected.
dtype
The dtype information.
ref
The URL reference that give more information about the virus. If you
enter the URL in the address bar of the web browser, you are directed
to that specific page that contains information about the virus.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profiletype
The name of the profile that was used to detect and take action.
profilegroup
The type of profile that was used, for example, Antivirus_Profile.
profile
The group that the profile is a part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in FortiOS
Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
from
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
to
The sender’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
419
Antivirus
8196
Message ID
8196
Log Subtype
Infected
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGate unit detected a computer worm and blocked it.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
Worm detected.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
420
The type of protocol that was used to send and receive the traffic. This
field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
virus
The name of the virus that was detected.
dtype
The dtype information.
url
The URL address of where the file was acquired.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profiletype
The name of the profile that was used to detect and take action.
profilegroup
The type of profile that was used, for example, Antivirus_Profile.
profile
The group that the profile is a part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in FortiOS
Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
421
Antivirus
8197
Message ID
8197
Log Subtype
Infected
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGate unit detected a computer worm and monitored it.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
Worm deteceted.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
422
The type of protocol that was used to send and receive the traffic. This
field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
virus
The name of the virus that was detected.
dtype
The dtype information.
url
The URL address of where the file was acquired.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profiletype
The name of the profile that was used to detect and take action.
profilegroup
The type of profile that was used, for example, Antivirus_Profile.
profile
The group that the profile is a part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in FortiOS
Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
423
Antivirus
8198
Message ID
8198
Log Subtype
Infected
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGate unit detected a computer worm (MIME) and blocked it.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
Worm detected.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
424
The type of protocol that was used to send and receive the traffic. This
field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
virus
The name of the virus that was detected.
dtype
The dtype information.
url
The URL address of where the file was acquired.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profiletype
The name of the profile that was used to detect and take action.
profilegroup
The type of profile that was used, for example, Antivirus_Profile.
profile
The group that the profile is a part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in FortiOS
Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
425
Antivirus
8199
Message ID
8199
Log Subtype
Infected
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGate unit detected a computer worm (MIME) and monitored it.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
Worm detected.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
426
The type of protocol that was used to send and receive the traffic. This
field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
virus
The name of the virus that was detected.
dtype
The dtype information.
url
The URL address of where the file was acquired.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profiletype
The name of the profile that was used to detect and take action.
profilegroup
The type of profile that was used, for example, Antivirus_Profile.
profile
The group that the profile is a part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in FortiOS
Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
427
Antivirus
8457
Message ID
8457
Log Subtype
Infected
Severity
Warning
Firmware version
FortiOS Carrier 4.0 MR3
Meaning
An MMS content checksum blocked an infected file.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
Blocked by MMS content checksum
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic. This
field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
dir
This fieldl contains any one of the following:
• N/A
• tx
• rx
428
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
checksum
The checksum of the file that was scanned by the FortiGate unit. If two
files have different names but the same checksum, the FortiGate unit
assumes that they have the same content.
file
The name of the file.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profiletype
The name of the profile that was used to detect and take action.
profilegroup
The type of profile that was used, for example, Antivirus_Profile.
profile
The group that the profile is a part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in FortiOS
Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
429
Antivirus
8458
Message ID
8458
Log Subtype
Infected
Severity
Notification
Firmware version
FortiOS Carrier 4.0 MR3
Meaning
An MMS content checksum was matched.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
Matched by MMS content checksum.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic. This
field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
dir
This fieldl contains any one of the following:
• N/A
• tx
• rx
430
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
checksum
The checksum of the file that was scanned by the FortiGate unit. If two
files have different names but the same checksum, the FortiGate unit
assumes that they have the same content.
file
The name of the file.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profiletype
The name of the profile that was used to detect and take action.
profilegroup
The type of profile that was used, for example, Antivirus_Profile.
profile
The group that the profile is a part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in FortiOS
Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
431
Antivirus
8448
Message ID
8448
Log Subtype
Filename
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGate unit blocked a file because it contains a virus.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
File is blocked
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic. This field
contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log field
because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if the
firewall policy does not use an identity-based policy; otherwise, it displays
the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall
policy.
serial
The serial number of the firewall session on which the event happend.
dir
This field contains any one of the following:
• N/A
• tx
• rx
432
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
filefilter
This field contains any one of the following:
• none
• file pattern
• file type
filetype
This field contains any one of the following:
• arj
• cab
• lzh
• rar
• tar
• zip
• bzip
• gzip
• bzip2
• bat
• msc
• uue
• mime
• base64
• binhex
• com
• elf
• exe
• hta
• html
• jad
• class
• cod
• javascript
• msoffice
• fsg
• upx
• petite
• aspack
• prc
• sis
• hlp
• activemime
• jpeg
• gif
• tiff
• png
• bmp
• ignored
• unknown
• N/A
file
The name of the file.
checksum
The checksum of the file that was scanned by the FortiGate unit. If two files
have different names but the same checksum, the FortiGate unit assumes
that they have the same content.
quarskip
This field contains any one of the following:
• No skip
• No quarantine for HTTP GET file pattern
block.
• No quarantine for
oversized files
• File was not quarantined.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profiletype
The name of the profile that was used to detect and take action.
profilegroup
The type of profile that was used, for example, Antivirus_Profile.
profile
The group that the profile is a part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS Carrier,
this field always contains N/A.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
433
Antivirus
434
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
8449
Message ID
8449
Log Subtype
Filename
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGate unit blocked a file because it contains a virus.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
File is blocked
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic.This field
contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log field
because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if the
firewall policy does not use an identity-based policy; otherwise, it displays
the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall
policy.
serial
The serial number of the firewall session on which the event happend.
dir
This field contains any one of the following:
• N/A
• tx
• rx
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
435
Antivirus
filefilter
This field contains any one of the following:
• none
• file pattern
• file type
filetype
This field contains any one of the following:
• arj
• cab
• lzh
• rar
• tar
• zip
• bzip
• gzip
• bzip2
• bat
• msc
• uue
• mime
• base64
• binhex
• com
• elf
• exe
• hta
• html
• jad
• class
• cod
• javascript
• msoffice
• fsg
• upx
• petite
• aspack
• prc
• sis
• hlp
• activemime
• jpeg
• gif
• tiff
• png
• bmp
• ignored
• unknown
• N/A
file
The name of the file.
checksum
The checksum of the file that was scanned by the FortiGate unit. If two files
have different names but the same checksum, the FortiGate unit assumes
that they have the same content.
quarskip
This field contains any one of the following:
• No skip
• No quarantine for HTTP GET file pattern
block.
• No quarantine for oversized • File was not quarantined.
files
436
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profiletype
The name of the profile that was used to detect and take action.
profilegroup
The type of profile that was used, for example, Antivirus_Profile.
profile
The group that the profile is a part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS Carrier,
this field always contains N/A.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
437
Antivirus
8450
Message ID
8450
Log Subtype
Filename
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGate unit blocked a file because it contains a virus (MIME).
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
File is blocked.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic.
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The serial number of the firewall session on which the event
happend.
filefilter
This field contains any one of the following:
• none
• file pattern
• file type
438
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
filetype
This field contains any one of the following:
• arj
• cab
• lzh
• rar
• tar
• zip
• bzip
• gzip
• bzip2
• bat
• msc
• uue
• mime
• base64
• binhex
• com
• elf
• exe
• hta
• html
• jad
• class
• cod
• javascript
• msoffice
• fsg
• upx
• petite
• aspack
• prc
• sis
• hlp
• activemime
• jpeg
• gif
• tiff
• png
• bmp
• ignored
• unknown
• N/A
file
The name of the file.
checksum
The checksum of the file that was scanned by the FortiGate unit. If
two files have different names but the same checksum, the FortiGate
unit assumes that they have the same content.
quarskip
This field contains any one of the following:
• No skip
• No quarantine for HTTP GET file pattern
block.
• No quarantine for
oversized files
• File was not quarantined.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profiletype
The name of the profile that was used to detect and take action.
profilegroup
The type of profile that was used, for example, Antivirus_Profile.
profile
The group that the profile is a part of. This field contains N/A if there
is no profile group configured. Profile groups are only available in
FortiOS Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
439
Antivirus
8451
Message ID
8451
Log Subtype
Filename
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGate unit blocked a file because it contains a virus (MIME).
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
File is blocked.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic.
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The serial number of the firewall session on which the event
happend.
filefilter
This field contains any one of the following:
• none
• file pattern
• file type
440
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
filetype
This field contains any one of the following:
• arj
• cab
• lzh
• rar
• tar
• zip
• bzip
• gzip
• bzip2
• bat
• msc
• uue
• mime
• base64
• binhex
• com
• elf
• exe
• hta
• html
• jad
• class
• cod
• javascript
• msoffice
• fsg
• upx
• petite
• aspack
• prc
• sis
• hlp
• activemime
• jpeg
• gif
• tiff
• png
• bmp
• ignored
• unknown
• N/A
file
The name of the file.
checksum
The checksum of the file that was scanned by the FortiGate unit. If
two files have different names but the same checksum, the FortiGate
unit assumes that they have the same content.
quarskip
This field contains any one of the following:
• No skip
• No quarantine for HTTP GET file pattern
block.
• No quarantine for
oversized files
• File was not quarantined.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profiletype
The name of the profile that was used to detect and take action.
profilegroup
The type of profile that was used, for example, Antivirus_Profile.
profile
The group that the profile is a part of. This field contains N/A if there
is no profile group configured. Profile groups are only available in
FortiOS Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
441
Antivirus
8452
Message ID
8452
Log Subtype
Filename
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGate unit blocked a virus command.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
Command blocked.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
442
The type of protocol that was used to send and receive the traffic.
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The serial number of the firewall session on which the event
happend.
url
The URL address of where the file was acquired.
user
The name of the user creating the traffic.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
group
The name of the group creating the traffic.
command
The command information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
443
Antivirus
8453
Message ID
8453
Log Subtype
Filename
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGate unit intercepted a file containing a virus.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
The file is intercepted.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
blocked
passthrough
monitored
service
The type of protocol that was used to send and receive the traffic.
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The serial number of the firewall session on which the event
happend.
dir
This field contains any one of the following:
• N/A
• tx
• rx
444
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
filefilter
This field contains any one of the following:
• none
• file pattern
• file type
filetype
This field contains any one of the following:
• arj
• cab
• lzh
• rar
• tar
• zip
• bzip
• gzip
• bzip2
• bat
• msc
• uue
• mime
• base64
• binhex
• com
• elf
• exe
• hta
• html
• jad
• class
• cod
• javascript
• msoffice
• fsg
• upx
• petite
• aspack
• prc
• sis
• hlp
• activemime
• jpeg
• gif
• tiff
• png
• bmp
• ignored
• unknown
• N/A
file
The name of the file.
checksum
The checksum of the file that was scanned by the FortiGate unit. If
two files have different names but the same checksum, the FortiGate
unit assumes that they have the same content.
quarskip
This field contains any one of the following:
• No skip
• No quarantine for HTTP GET file pattern
block.
• No quarantine for
oversized files
• File was not quarantined.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profiletype
The name of the profile that was used to detect and take action.
profilegroup
The type of profile that was used, for example, Antivirus_Profile.
profile
The group that the profile is a part of. This field contains N/A if there
is no profile group configured. Profile groups are only available in
FortiOS Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
445
Antivirus
446
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
8454
Message ID
8454
Log Subtype
Filename
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGate unit intercepted a file (MIME).
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
The file is intercepted.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic.
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The serial number of the firewall session on which the event
happend.
filefilter
This field contains any one of the following:
• none
• file pattern
• file type
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
447
Antivirus
filetype
This field contains any one of the following:
• arj
• cab
• lzh
• rar
• tar
• zip
• bzip
• gzip
• bzip2
• bat
• msc
• uue
• mime
• base64
• binhex
• com
• elf
• exe
• hta
• html
• jad
• class
• cod
• javascript
• msoffice
• fsg
• upx
• petite
• aspack
• prc
• sis
• hlp
• activemime
• jpeg
• gif
• tiff
• png
• bmp
• ignored
• unknown
• N/A
448
file
The name of the file.
checksum
The checksum of the file that was scanned by the FortiGate unit. If
two files have different names but the same checksum, the FortiGate
unit assumes that they have the same content.
quarskip
This field contains any one of the following:
• No skip
• No quarantine for HTTP GET file pattern
block.
• No quarantine for
oversized files
• File was not quarantined.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profiletype
The name of the profile that was used to detect and take action.
profilegroup
The type of profile that was used, for example, Antivirus_Profile.
profile
The group that the profile is a part of. This field contains N/A if there
is no profile group configured. Profile groups are only available in
FortiOS Carrier.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
8455
Message ID
8455
Log Subtype
Filename
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A file was exempted.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
File has been exempted.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic.
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The serial number of the firewall session on which the event
happend.
dir
This field contains any one of the following:
• N/A
• tx
• rx
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
449
Antivirus
filefilter
This field contains any one of the following:
• none
• file pattern
• file type
filetype
This field contains any one of the following:
• arj
• cab
• lzh
• rar
• tar
• zip
• bzip
• gzip
• bzip2
• bat
• msc
• uue
• mime
• base64
• binhex
• com
• elf
• exe
• hta
• html
• jad
• class
• cod
• javascript
• msoffice
• fsg
• upx
• petite
• aspack
• prc
• sis
• hlp
• activemime
• jpeg
• gif
• tiff
• png
• bmp
• ignored
• unknown
• N/A
450
file
The name of the file.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profiletype
The name of the profile that was used to detect and take action.
profilegroup
The type of profile that was used, for example, Antivirus_Profile.
profile
The group that the profile is a part of. This field contains N/A if there
is no profile group configured. Profile groups are only available in
FortiOS Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
8456
Message ID
8456
Log Subtype
Filename
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A file was exempted.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
File has been exempted.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic.
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The serial number of the firewall session on which the event
happend.
filefilter
This field contains any one of the following:
• none
• file pattern
• file type
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
451
Antivirus
filetype
This field contains any one of the following:
• arj
• cab
• lzh
• rar
• tar
• zip
• bzip
• gzip
• bzip2
• bat
• msc
• uue
• mime
• base64
• binhex
• com
• elf
• exe
• hta
• html
• jad
• class
• cod
• javascript
• msoffice
• fsg
• upx
• petite
• aspack
• prc
• sis
• hlp
• activemime
• jpeg
• gif
• tiff
• png
• bmp
• ignored
• unknown
• N/A
452
file
The name of the file.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profiletype
The name of the profile that was used to detect and take action.
profilegroup
The type of profile that was used, for example, Antivirus_Profile.
profile
The group that the profile is a part of. This field contains N/A if there
is no profile group configured. Profile groups are only available in
FortiOS Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
8704
Message ID
8704
Log Subtype
Oversize
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The defined file size limit was exceeded
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
Size limit is exceeded.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic.
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The serial number of the firewall session on which the event
happend.
file
The name of the file.
url
The URL address of where the file was acquired.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
453
Antivirus
454
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profiletype
The name of the profile that was used to detect and take action.
profilegroup
The type of profile that was used, for example, Antivirus_Profile.
profile
The group that the profile is a part of. This field contains N/A if there
is no profile group configured. Profile groups are only available in
FortiOS Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
from
The sender’s email address.
to
The recipient’s email address.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
8705
Message ID
8705
Log Subtype
Oversize
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The file size limit was exceeded.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
Size limit is exceeded.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic.
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The serial number of the firewall session on which the event
happend.
file
The name of the file.
url
The URL address of where the file was acquired.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
455
Antivirus
456
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profiletype
The name of the profile that was used to detect and take action.
profilegroup
The type of profile that was used, for example, Antivirus_Profile.
profile
The group that the profile is a part of. This field contains N/A if there
is no profile group configured. Profile groups are only available in
FortiOS Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
from
The sender’s email address.
to
The recipient’s email address.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
8706
Message ID
8706
Log Subtype
Oversize
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The file (MIME) size exceed the defined size limit.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
Size limit is exceeded.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic.
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The serial number of the firewall session on which the event
happend.
file
The name of the file.
url
The URL address of where the file was acquired.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
457
Antivirus
458
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profiletype
The name of the profile that was used to detect and take action.
profilegroup
The type of profile that was used, for example, Antivirus_Profile.
profile
The group that the profile is a part of. This field contains N/A if there
is no profile group configured. Profile groups are only available in
FortiOS Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
8707
Message ID
8707
Log Subtype
Oversize
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The file (MIME) size exceed the defined size limit.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
Size limit is exceeded.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic.
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The serial number of the firewall session on which the event
happend.
file
The name of the file.
url
The URL address of where the file was acquired.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
459
Antivirus
460
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profiletype
The name of the profile that was used to detect and take action.
profilegroup
The type of profile that was used, for example, Antivirus_Profile.
profile
The group that the profile is a part of. This field contains N/A if there
is no profile group configured. Profile groups are only available in
FortiOS Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
8960
Message ID
8960
Log Subtype
Scanerror
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The file reached the uncompressed nested limit.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
File reached uncompressed nested limit.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic. This field
contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique within
a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
dir
This field contains any one of the following:
• N/A
• tx
• rx
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
461
Antivirus
462
file
The name of the file.
checksum
The checksum of the file that was scanned by the FortiGate unit. If two files
have different names but the same checksum, the FortiGate unit assumes
that they have the same content.
quarskip
This field contains any one of the following:
• No skip
• No quaratine for HTTP GET file pattern
block
• No quarantine for
oversized files
• File was not quarantined.
virus
The name of the virus that was detected.
dtype
The dtype information.
ref
The URL reference that give more information about the virus. If you enter
the URL in the address bar of the web browser, you are directed to that
specific page that contains information about the virus.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
8961
Message ID
8961
Log Subtype
Scanerror
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The file reached the uncompressed size limit.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
File reached uncompressed size limit.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic.
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• https
• pop3s
• imaps
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The serial number of the firewall session on which the event
happend.
dir
This field contains any one of the following:
• N/A
• tx
• rx
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
463
Antivirus
464
file
The name of the file.
checksum
The checksum of the file that was scanned by the FortiGate unit. If
two files have different names but the same checksum, the FortiGate
unit assumes that they have the same content.
quarskip
This field contains any one of the following:
• No skip
• No quaratine for HTTP GET file pattern
block
• No quarantine for
oversized files
• File was not quarantined.
virus
The name of the virus that was detected.
dtype
The dtype information.
ref
The URL reference that give more information about the virus. If you
enter the URL in the address bar of the web browser, you are
directed to that specific page that contains information about the
virus.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there
is no profile group configured. Profile groups are only available in
FortiOS Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
8962
Message ID
8962
Log Subtype
Scanerror
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The archived file is encrypted.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
Encrypted archive.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic.
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The serial number of the firewall session on which the event
happend.
dir
This field contains any one of the following:
• N/A
• tx
• rx
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
465
Antivirus
466
file
The name of the file.
checksum
The checksum of the file that was scanned by the FortiGate unit. If
two files have different names but the same checksum, the FortiGate
unit assumes that they have the same content.
quarskip
This field contains any one of the following:
• No skip
• No quaratine for HTTP GET file pattern
block
• No quarantine for
oversized files
• File was not quarantined.
virus
The name of the virus that was detected.
dtype
The dtype information.
ref
The URL reference that give more information about the virus. If you
enter the URL in the address bar of the web browser, you are
directed to that specific page that contains information about the
virus.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there
is no profile group configured. Profile groups are only available in
FortiOS Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
8963
Message ID
8963
Log Subtype
Scanerror
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The archived file is encrypted.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
Encrypted archive.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic.
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The serial number of the firewall session on which the event
happend.
dir
This field contains any one of the following:
• N/A
• tx
• rx
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
467
Antivirus
468
file
The name of the file.
checksum
The checksum of the file that was scanned by the FortiGate unit. If
two files have different names but the same checksum, the FortiGate
unit assumes that they have the same content.
quarskip
This field contains any one of the following:
• No skip
• No quaratine for HTTP GET file pattern
block
• No quarantine for
oversized files
• File was not quarantined.
virus
The name of the virus that was detected.
dtype
The dtype information.
ref
The URL reference that give more information about the virus. If you
enter the URL in the address bar of the web browser, you are
directed to that specific page that contains information about the
virus.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there
is no profile group configured. Profile groups are only available in
FortiOS Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
8964
Message ID
8964
Log Subtype
Scanerror
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The archived file is corrupted.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
Corrupted archive
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic.
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The serial number of the firewall session on which the event
happend.
dir
This field contains any one of the following:
• N/A
• tx
• rx
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
469
Antivirus
470
file
The name of the file.
checksum
The checksum of the file that was scanned by the FortiGate unit. If
two files have different names but the same checksum, the FortiGate
unit assumes that they have the same content.
quarskip
This field contains any one of the following:
• No skip
• No quaratine for HTTP GET file pattern
block
• No quarantine for
oversized files
• File was not quarantined.
virus
The name of the virus that was detected.
dtype
The dtype information.
ref
The URL reference that give more information about the virus. If you
enter the URL in the address bar of the web browser, you are
directed to that specific page that contains information about the
virus.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there
is no profile group configured. Profile groups are only available in
FortiOS Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
8965
Message ID
8962
Log Subtype
Scanerror
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The archived file is corrupted.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
Corrupted archive.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic.
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The serial number of the firewall session on which the event
happend.
dir
This field contains any one of the following:
• N/A
• tx
• rx
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
471
Antivirus
472
file
The name of the file.
checksum
The checksum of the file that was scanned by the FortiGate unit. If
two files have different names but the same checksum, the FortiGate
unit assumes that they have the same content.
quarskip
This field contains any one of the following:
• No skip
• No quaratine for HTTP GET file pattern
block
• No quarantine for
oversized files
• File was not quarantined.
virus
The name of the virus that was detected.
dtype
The dtype information.
ref
The URL reference that give more information about the virus. If you
enter the URL in the address bar of the web browser, you are
directed to that specific page that contains information about the
virus.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there
is no profile group configured. Profile groups are only available in
FortiOS Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
8966
Message ID
8966
Log Subtype
Scanerror
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The file is a multipart archive or contains multiple files within the
archive.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
Multipart archive.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic.
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The serial number of the firewall session on which the event
happend.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
473
Antivirus
dir
This field contains any one of the following:
• N/A
• tx
• rx
474
file
The name of the file.
checksum
The checksum of the file that was scanned by the FortiGate unit. If
two files have different names but the same checksum, the FortiGate
unit assumes that they have the same content.
quarskip
This field contains any one of the following:
• No skip
• No quaratine for HTTP GET file pattern
block
• No quarantine for
oversized files
• File was not quarantined.
virus
The name of the virus that was detected.
dtype
The dtype information.
ref
The URL reference that give more information about the virus. If you
enter the URL in the address bar of the web browser, you are
directed to that specific page that contains information about the
virus.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there
is no profile group configured. Profile groups are only available in
FortiOS Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
8967
Message ID
8967
Log Subtype
Scanerror
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The file is a multipart archive or contains multiple files within the
archive.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
Encrypted archive.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic.
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The serial number of the firewall session on which the event
happend.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
475
Antivirus
dir
This field contains any one of the following:
• N/A
• tx
• rx
476
file
The name of the file.
checksum
The checksum of the file that was scanned by the FortiGate unit. If
two files have different names but the same checksum, the FortiGate
unit assumes that they have the same content.
quarskip
This field contains any one of the following:
• No skip
• No quaratine for HTTP GET file pattern
block
• No quarantine for
oversized files
• File was not quarantined.
virus
The name of the virus that was detected.
dtype
The dtype information.
ref
The URL reference that give more information about the virus. If you
enter the URL in the address bar of the web browser, you are
directed to that specific page that contains information about the
virus.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there
is no profile group configured. Profile groups are only available in
FortiOS Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
8968
Message ID
8968
Log Subtype
Scanerror
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The file is a nested archived file.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
Nested archive.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic.
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The serial number of the firewall session on which the event
happend.
dir
This field contains any one of the following:
• N/A
• tx
• rx
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
477
Antivirus
478
file
The name of the file.
checksum
The checksum of the file that was scanned by the FortiGate unit. If
two files have different names but the same checksum, the FortiGate
unit assumes that they have the same content.
quarskip
This field contains any one of the following:
• No skip
• No quaratine for HTTP GET file pattern
block
• No quarantine for
oversized files
• File was not quarantined.
virus
The name of the virus that was detected.
dtype
The dtype information.
ref
The URL reference that give more information about the virus. If you
enter the URL in the address bar of the web browser, you are
directed to that specific page that contains information about the
virus.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there
is no profile group configured. Profile groups are only available in
FortiOS Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
8969
Message ID
8969
Log Subtype
Scanerror
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The file is a nested archived file.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
Nested archive.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic.
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The serial number of the firewall session on which the event
happend.
dir
This field contains any one of the following:
• N/A
• tx
• rx
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
479
Antivirus
480
file
The name of the file.
checksum
The checksum of the file that was scanned by the FortiGate unit. If
two files have different names but the same checksum, the FortiGate
unit assumes that they have the same content.
quarskip
This field contains any one of the following:
• No skip
• No quaratine for HTTP GET file pattern
block
• No quarantine for
oversized files
• File was not quarantined.
virus
The name of the virus that was detected.
dtype
The dtype information.
ref
The URL reference that give more information about the virus. If you
enter the URL in the address bar of the web browser, you are
directed to that specific page that contains information about the
virus.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there
is no profile group configured. Profile groups are only available in
FortiOS Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
8970
Message ID
8970
Log Subtype
Scanerror
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The archived file is oversized.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
Oversize archive.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic.
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The serial number of the firewall session on which the event
happend.
dir
This field contains any one of the following:
• N/A
• tx
• rx
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
481
Antivirus
482
file
The name of the file.
checksum
The checksum of the file that was scanned by the FortiGate unit. If
two files have different names but the same checksum, the FortiGate
unit assumes that they have the same content.
quarskip
This field contains any one of the following:
• No skip
• No quaratine for HTTP GET file pattern
block
• No quarantine for
oversized files
• File was not quarantined.
virus
The name of the virus that was detected.
dtype
The dtype information.
ref
The URL reference that give more information about the virus. If you
enter the URL in the address bar of the web browser, you are
directed to that specific page that contains information about the
virus.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there
is no profile group configured. Profile groups are only available in
FortiOS Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
8971
Message ID
8971
Log Subtype
Scanerror
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The archived file is oversized.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
Nested archive.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic.
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The serial number of the firewall session on which the event
happend.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
483
Antivirus
dir
This field contains any one of the following:
• N/A
• tx
• rx
484
file
The name of the file.
checksum
The checksum of the file that was scanned by the FortiGate unit. If
two files have different names but the same checksum, the FortiGate
unit assumes that they have the same content.
quarskip
This field contains any one of the following:
• No skip
• No quaratine for HTTP GET file pattern
block
• No quarantine for
oversized files
• File was not quarantined.
virus
The name of the virus that was detected.
dtype
The dtype information.
ref
The URL reference that give more information about the virus. If you
enter the URL in the address bar of the web browser, you are
directed to that specific page that contains information about the
virus.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there
is no profile group configured. Profile groups are only available in
FortiOS Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
8972
Message ID
8969
Log Subtype
Scanerror
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
A type of unhandled archived file.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
Unhandled archive.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic.
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The serial number of the firewall session on which the event
happend.
dir
This field contains any one of the following:
• N/A
• tx
• rx
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
485
Antivirus
486
file
The name of the file.
checksum
The checksum of the file that was scanned by the FortiGate unit. If
two files have different names but the same checksum, the FortiGate
unit assumes that they have the same content.
quarskip
This field contains any one of the following:
• No skip
• No quaratine for HTTP GET file pattern
block
• No quarantine for
oversized files
• File was not quarantined.
virus
The name of the virus that was detected.
dtype
The dtype information.
ref
The URL reference that give more information about the virus. If you
enter the URL in the address bar of the web browser, you are
directed to that specific page that contains information about the
virus.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there
is no profile group configured. Profile groups are only available in
FortiOS Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Antivirus
8973
Message ID
8973
Log Subtype
Scanerror
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A type of unhandled archived file.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
msg
Unhandled archive.
status
The decision of the antivirus engine on how to treat the file. This field
contains any one of the following:
• blocked
• passthrough
• monitored
service
The type of protocol that was used to send and receive the traffic.
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
• http (ftp-over-http)
src
The source IP address.
dst
The destination IP address.
sport
The source port number.
src_port
The source port number.
dport
The destination port number.
dst_port
The destination port number.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The serial number of the firewall session on which the event
happend.
dir
This field contains any one of the following:
• N/A
• tx
• rx
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
487
Antivirus
488
file
The name of the file.
checksum
The checksum of the file that was scanned by the FortiGate unit. If
two files have different names but the same checksum, the FortiGate
unit assumes that they have the same content.
quarskip
This field contains any one of the following:
• No skip
• No quaratine for HTTP GET file pattern
block
• No quarantine for
oversized files
• File was not quarantined.
virus
The name of the virus that was detected.
dtype
The dtype information.
ref
The URL reference that give more information about the virus. If you
enter the URL in the address bar of the web browser, you are
directed to that specific page that contains information about the
virus.
url
The URL address of where the file was acquired.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there
is no profile group configured. Profile groups are only available in
FortiOS Carrier.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Attack
Attack log message are recorded when attacks are made against your network. These log messages
provide details about the attack, such as the severity level of the attack and a reference URL link to find
more information about the specified attack in the Fortinet Attack Encyclopedia.
In FortiOS 4.0 MR3 and higher, attack log messages are located in UTM log file. These log messages are
also viewed in the web-based manager from Log&Report > Log & Archive Access > UTM.
16384
16385
16386
18432
18433
18434
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
489
Attack
16384
Message ID
16384
Log Subtype
Signature
Severity
Alert
Firmware version
FortiOS 4.0 MR3
Meaning
An attack signature using UCP/TCP.
Fields
Field Description
severity
The specified severity level of the attack. This field contains any one of
the following:
• info
• low
• medium
• high
• critical
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profilegroup
The group that the profile is a part of. This field contains N/A if there is
no profile group configure. Profile groups are only available in FortiOS
Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
src
The source IP address.
dst
The destination IP address.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
serial
The serial number of the firewall session on which the event happend.
status
The type of action the FortiGate unit took, for example, detecting the
attack.
This field contains any one of the following:
• detected
• dropped
• reset
490
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level
protocol. Protocol numbers are assigned by the Internet Assigned
Number Authority (IANA).
service
The service of where the event or activity occurred. For example,
139/tcp.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
count
The number of times that the attack was detected within a short period
of time. This is useful when the attacks are DoS attacks.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Attack
attack_name
The name of the attack.
src_port
The source port number. This number is either a TCP or UDP port
number.
dst_port
The destination port number. This number is either a TCP or UDP port
number.
attack_id
The identification number of the attack log message.
sensor
The name of the DLP sensor that was used to detect and take action.
ref
The reference URL where you can find out more information about the
attack. This URL takes you directly to Fortinet’s FortiGuard Center
Encyclopedia.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
incident_serialno
The unique ID for this attack. This number is used for cross-referencing
IPS packet logs.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
491
Attack
16385
Message ID
16385
Log Subtype
Signature
Severity
Alert
Firmware version
FortiOS 4.0 MR3
Meaning
An attack signature using ICMP.
Fields
Field Description
severity
The specified severity level of the attack. This field contains any one of
the following:
• info
• low
• medium
• high
• critical
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profilegroup
The group that the profile is a part of. This field contains N/A if there is
no profile group configure. Profile groups are only available in FortiOS
Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
src
The source IP address.
dst
The destination IP address.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
serial
The serial number of the firewall session on which the event happend.
status
The type of action the FortiGate unit took, for example detecting the
attack.
This field contains any one of the following:
• detected
• dropped
• reset
492
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level
protocol. Protocol numbers are assigned by the Internet Assigned
Number Authority (IANA).
service
The service of where the event or activity occurred. For example,
139/tcp.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
count
The number of times that the attack was detected within a short period
of time. This is useful when the attacks are DoS attacks.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Attack
attack_name
The name of the attack.
icmp_id
The ICMP source port number.
icmp_type
The ICMP destination port number.
icmp_code
The ICMP destination port number.
attack_id
The identification number of the attack log message.
sensor
The name of the DLP sensor that was used to detect and take action.
ref
The reference URL where you can find out more information about the
attack. This URL takes you directly to Fortinet’s FortiGuard Center
Encyclopedia.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
incident_serialno
The unique ID for this attack. This number is used for cross-referencing
IPS packet logs.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
493
Attack
16386
Message ID
16386
Log Subtype
Signature
Severity
Alert
Firmware version
FortiOS 4.0 MR3
Meaning
An attack signature using others.
Fields
Field Description
severity
The specified severity level of the attack. This field contains any one of
the following:
• info
• low
• medium
• high
• critical
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profilegroup
The group that the profile is a part of. This field contains N/A if there is
no profile group configure. Profile groups are only available in FortiOS
Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
src
The source IP address.
dst
The destination IP address.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
serial
The serial number of the firewall session on which the event happend.
status
The type of action the FortiGate unit took, for example detecting the
attack.
This field contains any one of the following:
• detected
• dropped
• reset
494
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level
protocol. Protocol numbers are assigned by the Internet Assigned
Number Authority (IANA).
service
The service of where the event or activity occurred. For example,
139/tcp.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
count
The number of times that the attack was detected within a short period
of time. This is useful when the attacks are DoS attacks.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Attack
attack_name
The name of the attack.
attack_id
The identification number of the attack log message.
sensor
The name of the DLP sensor that was used to detect and take action.
ref
The reference URL where you can find out more information about the
attack. This URL takes you directly to Fortinet’s FortiGuard Center
Encyclopedia.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
incident_serialno
The unique ID for this attack. This number is used for cross-referencing
IPS packet logs.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
495
Attack
18432
Message ID
18432
Log Subtype
Anomaly
Severity
Alert
Firmware version
FortiOS 4.0 MR3
Meaning
An attack anomaly using UDP/TCP
Fields
Field Description
severity
The specified severity level of the attack. This field contains any one of
the following:
• info
• low
• medium
• high
• critical
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profilegroup
The group that the profile is a part of. This field contains N/A if there is
no profile group configure. Profile groups are only available in FortiOS
Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
src
The source IP address.
dst
The destination IP address.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
serial
The serial number of the firewall session on which the event happend.
status
The type of action the FortiGate unit took, for example detecting the
attack.
This field contains any one of the following:
• detected
• dropped
• reset
496
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level
protocol. Protocol numbers are assigned by the Internet Assigned
Number Authority (IANA).
service
The service of where the event or activity occurred. For example,
139/tcp.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
count
The number of times that the attack was detected within a short period
of time. This is useful when the attacks are DoS attacks.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Attack
attack_name
The name of the attack.
src_port
The source port number. This number is either a TCP or UDP port
number.
dst_port
The destination port number. This number is either a TCP or UDP port
number.
attack_id
The identification number of the attack log message.
sensor
The name of the DLP sensor that was used to detect and take action.
ref
The reference URL where you can find out more information about the
attack. This URL takes you directly to Fortinet’s FortiGuard Center
Encyclopedia.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
497
Attack
18433
Message ID
18433
Log Subtype
Anomaly
Severity
Alert
Firmware version
FortiOS 4.0 MR3
Meaning
An attack anomaly using ICMP.
Fields
Field Description
severity
The specified severity level of the attack. This field contains any one of
the following:
• info
• low
• medium
• high
• critical
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profilegroup
The group that the profile is a part of. This field contains N/A if there is
no profile group configure. Profile groups are only available in FortiOS
Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
src
The source IP address.
dst
The destination IP address.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
serial
The serial number of the firewall session on which the event happend.
status
The type of action the FortiGate unit took, for example detecting the
attack.
This field contains any one of the following:
• detected
• dropped
• reset
498
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level
protocol. Protocol numbers are assigned by the Internet Assigned
Number Authority (IANA).
service
The service of where the event or activity occurred. For example,
139/tcp.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
count
The number of times that the attack was detected within a short period
of time. This is useful when the attacks are DoS attacks.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Attack
attack_name
The name of the attack.
icmp_id
The ICMP source port number.
icmp_type
The ICMP destination port number.
icmp_code
The ICMP destination port number.
attack_id
The identification number of the attack log message.
sensor
The name of the DLP sensor that was used to detect and take action.
ref
The reference URL where you can find out more information about the
attack. This URL takes you directly to Fortinet’s FortiGuard Center
Encyclopedia.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
incident_serialno
The unique ID for this attack. This number is used for cross-referencing
IPS packet logs.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
499
Attack
18434
Message ID
18434
Log Subtype
Anomaly
Severity
Alert
Firmware version
FortiOS 4.0 MR3
Meaning
An attack anomaly using others.
Fields
Field Description
severity
The specified severity level of the attack. This field contains any one of
the following:
• info
• low
• medium
• high
• critical
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profilegroup
The group that the profile is a part of. This field contains N/A if there is
no profile group configure. Profile groups are only available in FortiOS
Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
src
The source IP address.
dst
The destination IP address.
src_int
The source interface. For example, internal.
dst_int
The destination interface. For example, wan1.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
serial
The serial number of the firewall session on which the event happend.
status
The type of action the FortiGate unit took, for example detecting the
attack.
This field contains any one of the following:
• detected
• dropped
• reset
500
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level
protocol. Protocol numbers are assigned by the Internet Assigned
Number Authority (IANA).
service
The service of where the event or activity occurred. For example,
139/tcp.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
count
The number of times that the attack was detected within a short period
of time. This is useful when the attacks are DoS attacks.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Attack
attack_name
The name of the attack.
attack_id
The identification number of the attack log message.
sensor
The name of the DLP sensor that was used to detect and take action.
ref
The reference URL where you can find out more information about the
attack. This URL takes you directly to Fortinet’s FortiGuard Center
Encyclopedia.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
incident_serialno
The unique ID for this attack. This number is used for cross-referencing
IPS packet logs.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
501
Attack
502
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
Email filter log messages record email protocols SMTP, POP3 and IMAP.
In FortiOS 4.0 MR3 and higher, email filtering log messages are located in UTM log file. These log
messages are also viewed in the web-based manager from Log&Report > Log & Archive Access > UTM.
20480
20496
20481
20497
20482
20498
20483
20499
20484
20500
20491
20501
20485
20503
20486
20504
20487
20505
20488
20489
20490
20492
20493
20494
20495
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
503
Email filter
20480
Message ID
20480
Log Subtype
SMTP
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An SMTP warning.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
504
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
505
Email filter
20481
Message ID
20481
Log Subtype
SMTP
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An SMTP warning.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
506
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
banword
The banned word that was detected.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
507
Email filter
20482
Message ID
20482
Log Subtype
POP3
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A POP3 warning.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
508
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
509
Email filter
20483
Message ID
20483
Log Subtype
POP3
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A POP3 notice.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
510
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
banword
The banned word that was detected.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
511
Email filter
20484
Message ID
20484
Log Subtype
IMAP
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An IMAP notice.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
512
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
513
Email filter
20491
Message ID
20491
Log Subtype
IMAP
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An IMAP banned word notice.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
514
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
banword
The banned word that was detected.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
515
Email filter
20485
Message ID
20485
Log Subtype
Carrier Endpoint Filter
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
An endpoint filter warning.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
516
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
517
Email filter
20486
Message ID
20486
Log Subtype
Carrier Endpoint Filter
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An endpoint filter notice.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
518
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
519
Email filter
20487
Message ID
20487
Log Subtype
Carrier Endpoint Filter
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
An MM7 warning.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
520
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
521
Email filter
20488
Message ID
20488
Log Subtype
Carrier Endpoint Filter
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An MM7 notice.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
522
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
523
Email filter
20489
Message ID
20489
Log Subtype
Carrier Endpoint Filter
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
An MM1 warning.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
524
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
dir
This field contains either tx or rx.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
525
Email filter
20490
Message ID
20490
Log Subtype
Carrier Endpoint Filter
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An MM1 notice.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
526
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
dir
This field contains either tx or rx.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
527
Email filter
20492
Message ID
20492
Log Subtype
Mass-MMS
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
An MM1 flood detection warning.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
528
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
dir
This field contains either tx or rx.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
529
Email filter
20493
Message ID
20493
Log Subtype
Mass-MMS
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An MM1 flood detection notice.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
530
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
dir
This field contains either tx or rx.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
531
Email filter
20494
Message ID
20494
Log Subtype
Mass-MMS
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
An MM4 flood detection warning.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
532
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
533
Email filter
20495
Message ID
20495
Log Subtype
Mass-MMS
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An MM4 flood detection notice.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
534
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
535
Email filter
20496
Message ID
20496
Log Subtype
Mass-MMS
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
An MM1 duplicate detection warning.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
536
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
dir
This field contains either tx or rx.
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
537
Email filter
20497
Message ID
20497
Log Subtype
Mass-MMS
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An MM1 duplicate detection notice.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
538
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
dir
This field contains either tx or rx.
agent
This is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
539
Email filter
20498
Message ID
20498
Log Subtype
Mass-MMS
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
An MM4 duplicate detection warning.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
540
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
541
Email filter
20499
Message ID
20499
Log Subtype
Mass-MMS
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
An MM4 duplicate detection notice.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
542
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
543
Email filter
20500
Message ID
20500
Log Subtype
msn-hotmail
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An MSN Hotmail email message.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
544
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
subject
The subject line of the email message.
size
The email message’s size.
attachment
Indicates whether the email message includes an attachment or not.
This log field contains either yes, that an attachment is included, or no,
that an attachment is not included.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
545
Email filter
20501
Message ID
20501
Log Subtype
yahoo-hotmail
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A Yahoo! email message.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
546
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
subject
The subject line of the email message.
size
The email message’s size.
attachment
Indicates whether the email message includes an attachment or not.
This log field contains either yes, that an attachment is included, or no,
that an attachment is not included.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
547
Email filter
20503
Message ID
20503
Log Subtype
smtp
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An SMTP warning.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
548
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
subject
The subject line of the email message.
size
The email message’s size.
attachment
Indicates whether the email message includes an attachment or not.
This log field contains either yes, that an attachment is included, or no,
that an attachment is not included.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
549
Email filter
20504
Message ID
20504
Log Subtype
POP3
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A POP3 warning.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
550
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
subject
The subject line of the email message.
size
The email message’s size.
attachment
Indicates whether the email message includes an attachment or not.
This log field contains either yes, that an attachment is included, or no,
that an attachment is not included.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
551
Email filter
20505
Message ID
20505
Log Subtype
IMAP
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An IMAP notice.
Fields
Field Description
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The serial number of the firewall session on which the event happend.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• im
• nntp
• https
• smtps
• imaps
• pop3s
552
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Email filter
status
The type of action the FortiGate unit took, for example blocking the
email message from getting through.
This field contains any one of the following:
• exempted
• blocked
• detected
from
The sender’s email address.
to
The recipient’s email address.
tracker
The identification information that is associated wiith the rule or rules
that were used to identify the email message as spam. This field
appears only when the email message was blocked by the email filter
rules, and not by other filter methods. For example, if an email
message was blocked by URL filter, IP address filter and E-mail
checksum filter (these filters are checked off in the FortiGuard Email
Filter section of the Profile page for email filtering) this field displays.
msg
The log message information. This is usually a sentence and explains
the activity and/or action taken.
subject
The subject line of the email message.
size
The email message’s size.
attachment
Indicates whether the email message includes an attachment or not.
This log field contains either yes, that an attachment is included, or no,
that an attachment is not included.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
553
Email filter
554
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
Web filter log messages record URL activity as well as filters, such as a blocked URL because it was found
in the URL black list.
In FortiOS 4.0 MR3 and higher, web filtering log messages are located in UTM log file. These log
messages are also viewed in the web-based manager from Log&Report > Log & Archive Access > UTM.
12288
12558
12289
13056
12290
13056
12291
13312
12544
13313
12545
13314
12546
12800
12547
12801
12548
13568
12549
13601
12550
13602
12551
13573
12552
13584
12553
13315
12554
13316
12555
12802
12556
12557
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
555
Webfilter
12288
Message ID
12288
Log Subtype
Content
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
A web content banned word was found.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
556
hostname
The name of the website that was accessed.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
profile
The name of the profile that was used to detect and take action.
req_type
The type of request, which can be one of the following:
• referral – if the HTTP transaction is requested from a parent web
site, such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the
URL address manually.
url
The URL address.
status
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
agent
This field is for FortiOS carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
from
The sender’s information.
to
The recipient’s information.
banword
The banned word that was detected.
msg
URL was blocked because it contained banned word(s).
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
557
Webfilter
12289
Message ID
12289
Log Subtype
Content
Severity
Warning
Firmware version
FortiOS Carrier 4.0 MR2
Meaning
A web content MMS banned word was found.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will have
an index number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero
if the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
558
hostname
The name of the website that was accessed.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
profile
The name of the profile that was used to detect and take action.
req_type
The type of request, which can be one of the following:
• referral – if the HTTP transaction is requested from a parent web site,
such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the URL
address manually.
url
The URL address.
status
This field contains any one of the following:
dir
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
This field contains any one of the following:
• n/a
• TX
• RX
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Caririer, this field always contains N/A.
from
The sender’s information.
to
The recipient’s information.
banword
The banned word that was detected.
msg
Message was blocked because it contained a banned word.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
559
Webfilter
12290
Message ID
12290
Log Subtype
Content
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A web content exempt word was found.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
560
hostname
The name of the website that was accessed.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
profile
The name of the profile that was used to detect and take action.
req_type
The type of request, which can be one of the following:
• referral – if the HTTP transaction is requested from a parent web
site, such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the
URL address manually.
url
The URL address.
status
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
from
The sender’s information.
to
The recipient’s information.
banword
The banned word that was detected.
msg
URL was exempted because it contained exempt word(s).
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
561
Webfilter
12291
Message ID
12291
Log Subtype
Content
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A web content MMS exempt word was found.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
562
hostname
The name of the website that was accessed.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile groups are only available in
FortiOS Carrier.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
profile
The name of the profile that was used to detect and take action.
req_type
The type of request, which can be one of the following:
• referral – if the HTTP transaction is requested from a parent web
site, such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the
URL address manually.
url
The URL address.
status
This field contains any one of the following:
dir
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
This field contains any one of the following:
• n/a
• TX
• RX
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
from
The sender’s information.
to
The recipient’s information.
banword
The banned word that was detected.
msg
Message was exempted because it contained an exempt word.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
563
Webfilter
12305
Message ID
12305
Log Subtype
Content
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A web content MMS banned word.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no
virtual domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or
packet. Any policy that is automatically added by the FortiGate will
have an index number of zero.
custom
The log field that a user has created. This is referred to as a custom
log field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays
zero if the firewall policy does not use an identity-based policy;
otherwise, it displays the number of the identity-based policy entry
that the traffic matched. This number is not globally unique, it is only
locally unique within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
564
hostname
The name of the website that was accessed.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field
will always display N/A in FortiOS.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is
no profile group configured. Profile gorups are only available in
FortiOS Carrier.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
profile
The name of the profile that was used to detect and take action.
req_type
The type of request, which can be one of the following:
• referral – if the HTTP transaction is requested from a parent web
site, such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the
URL address manually.
url
The URL address.
status
This field contains any one of the following:
dir
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
This field contains any one of the following:
• n/a
• TX
• RX
agent
This field is for FortiOS Carrier only. If the unit is not running FortiOS
Carrier, this field always contains N/A.
from
The sender’s information.
to
The recipient’s information.
banword
The banned word that was detected.
msg
Message was logged because it contained a banned word.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
565
Webfilter
12544
Message ID
12544
Log Subtype
URL Filter
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
The URL address was blocked because it was found in the URL filter list.
Fields
Field Description
urlfilter_idx
The index number that identifies the URL filter in the URL filter list.
urlfilter_list
The name of the URL filter list.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet. Any
policy that is automatically added by the FortiGate will have an index number
of zero.
custom
The log field that a user has created. This is referred to as a custom log field
because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if the
firewall policy does not use an identity-based policy; otherwise, it displays
the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall
policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
566
hostname
The name of the website that was accessed.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile gorups are only available in FortiOS Carrier.
profile
The name of the profile that was used to detect and take action.
status
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
req_type
The type of request, which can be one of the following:
• referral – if the HTTP transaction is requested from a parent web site, such
as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the URL
address manually.
url
The URL address.
msg
URL was blocked becaue it is in the URL filter list.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
567
Webfilter
12545
Message ID
12545
Log Subtype
URL Filter
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The URL address was exempted because it was found in the URL filter
list.
Fields
Field Description
urlfilter_idx
The index number that identifies the URL filter in the URL filter list.
urlfilter_list
The name of the URL filter list.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
568
hostname
The name of the website that was accessed.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile gorups are only available in FortiOS
Carrier.
profile
The name of the profile that was used to detect and take action.
status
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
req_type
The type of request, which can be one of the following:
• referral – if the HTTP transaction is requested from a parent web site,
such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the URL
address manually.
url
The URL address.
msg
URL was exempted because it is in the URL filter list.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
569
Webfilter
12546
Message ID
12546
Log Subtype
URL Filter
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The URL address was allowed because it was found in the URL filter list.
Fields
Field Description
urlfilter_idx
The index number that identifies the URL filter in the URL filter list.
urlfilter_list
The name of the URL filter list.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
570
hostname
The name of the website that was accessed.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile gorups are only available in FortiOS
Carrier.
profile
The name of the profile that was used to detect and take action.
status
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
req_type
The type of request, which can be one of the following:
• referral – if the HTTP transaction is requested from a parent web site,
such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the URL
address manually.
url
The URL address.
msg
URL was allowed because it is in the URL filter list.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
571
Webfilter
12547
Message ID
12547
Log Subtype
URL Filter
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The request contained an invalid domain name.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
572
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
profile
The name of the profile that was used to detect and take action.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
status
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
req_type
The type of request, which can be one of the following:
• referral – if the HTTP transaction is requested from a parent web site,
such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the URL
address manually.
msg
The HTTP request contained an invalid domain name.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
573
Webfilter
12548
Message ID
12548
Log Subtype
URL Filter
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A HTTP certificate request contained an invalid domain name.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
574
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
profile
The name of the profile that was used to detect and take action.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
status
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
req_type
The type of request, which can be one of the following:
• referral – if the HTTP transaction is requested from a parent web site,
such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the URL
address manually.
msg
The certificate for the HTTPS session contained an invalid domain name.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
575
Webfilter
12549
Message ID
12549
Log Subtype
URL Filter
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A HTTP request contained an invalid name so the session has been
filtered by IP only.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
576
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
profile
The name of the profile that was used to detect and take action.
status
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
req_type
The type of request, which can be one of the following:
• referral – if the HTTP transaction is requested from a parent web site,
such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the URL
address manually.
msg
The HTTP request contained an invalid domain name. The session has
been filtered by IP only.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
577
Webfilter
12550
Message ID
12550
Log Subtype
URL Filter
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A HTTPS request contained an invalid name so the session has been
filtered by IP only.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
578
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
profile
The name of the profile that was used to detect and take action.
status
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
req_type
The type of request, which can be one of the following:
• referral – if the HTTP transaction is requested from a parent web site,
such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the URL
address manually.
msg
The certificate for the HTTP Ssession contained an invalid domain name.
The session has been filtered by IP only.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
579
Webfilter
12551
Message ID
12551
Log Subtype
URL Filter
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
There are insufficient resources.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
error
The webfilter error information.
msg
Insufficient resources.
12552
580
Message ID
12552
Log Subtype
URL Filter
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
Getting the host name failed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
hostname
The name of the website that was accessed.
error
The webfilter error information.
msg
gethostbyname() failed.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
12553
Message ID
12553
Log Subtype
URL Filter
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A server certificate validation failed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
msg
The server certificate valiadation failed.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile gorups are only available in FortiOS
Carrier.
profile
The name of the profile that was used to detect and take action.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
581
Webfilter
12554
Message ID
12554
Log Subtype
URL Filter
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The SSL session was blocked because its identification number was not
known.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
status
msg
582
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
The SSL session was blocked because the session ID was unknown.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
12555
Message ID
12555
Log Subtype
URL Filter
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The SSL session was blocked, either because the server certificate was
missing or because the server certificate was invalid.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
status
msg
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
The SSL session was blocked because the server certificate was
missing or invalid.
583
Webfilter
12556
Message ID
12556
Log Subtype
URL Filter
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The SSL session was ignored, either because the server certificate was
missing, or the server certificate was invalid.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
status
msg
584
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
The SSL session was blocked because the server certificate was
missing or invalid.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
12557
Message ID
12557
Log Subtype
URL Filter
Severity
Critical
Firmware version
FortiOS 4.0 MR3
Meaning
The FortiGuard Analysis and Management Service is not active. You
must enable this service, after subscribing to the service, in System >
Maintenance > FortiGuard.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
msg
FortiGate is enabled in the protection profile but the FortiGuard service is
not enabled.
12558
Message ID
12558
Log Subtype
URL Filter
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A rating error occurred.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
user
The name of the user creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
url_type
This field contains any one of the following:
• http
• https
• ftp
• telnet
• mail
hostname
The name of the website that was accessed.
status
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
error
The webfilter error information.
url
The URL address.
msg
Policy allows URLs when a rating error occurs.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
585
Webfilter
12559
Message ID
12559
Log Subtype
URL Filter
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A URL was passed because it was in the URL filter list.
Fields
Field Description
urlfilter_idx
The index number that identifies the URL filter in the URL filter list.
urlfilter_list
The name of the URL filter list.
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
586
hostname
The name of the website that was accessed.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
profiletype
The type of profile that was used, for example Antivirus_Profile.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
profile
The name of the profile that was used to detect and take action.
status
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
req_type
The type of request, which can be one of the following:
• referral – if the HTTP transaction is requested from a parent web site,
such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the URL
address manually.
url
The URL address.
msg
URL was passed becaused it is in the URL filter list.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
587
Webfilter
13056
Message ID
13056
Log Subtype
ftgd_blk
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The URL belongs to an blocked category within the firewall policy.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
588
hostname
The name of the website that was accessed.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
profile
The name of the profile that was used to detect and take action.
status
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
req_type
The type of request, which can be one of the following:
• referral – if the HTTP transaction is requested from a parent web site,
such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the URL
address manually.
url
The URL address.
msg
URL belongs to a denied category in policy.
method
This field contains either ip or domain
class
The class the URL belongs to.
class_desc
The class description that the URL belongs to.
cat
The category that the URL belongs to.
cat_desc
The category description that the URL belongs to.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
589
Webfilter
13312
Message ID
13312
Log Subtype
ftgd_allow
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The URL belongs to an allowed category within the firewall policy.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
590
hostname
The name of the website that was accessed.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
profile
The name of the profile that was used to detect and take action.
status
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
req_type
The type of request, which can be one of the following:
• referral – if the HTTP transaction is requested from a parent web site,
such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the URL
address manually.
url
The URL address.
msg
URL belongs to an allowed category in policy.
method
This field contains either ip or domain
class
The class the URL belongs to.
class_desc
The class description that the URL belongs to.
cat
The category that the URL belongs to.
cat_desc
The category description that the URL belongs to.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
591
Webfilter
13313
Message ID
13313
Log Subtype
ftgd_allow
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The URL belongs to an override rule.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
592
hostname
The name of the website that was accessed.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
profile
The name of the profile that was used to detect and take action.
status
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
req_type
The type of request, which can be one of the following:
• referral – if the HTTP transaction is requested from a parent web site,
such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the URL
address manually.
url
The URL address.
msg
URL belongs to an override rule.
method
This field contains either ip or domain.
class
The class the URL belongs to.
class_desc
The class description that the URL belongs to.
cat
The category that the URL belongs to.
cat_desc
The category description that the URL belongs to.
mode
This field contains rule.
rule_type
This field contains any one of the following:
• directory
• domain
• rating
rule_data
The rule data information.
ovrd_tbl
The override table information .
ovrd_id
The override identification number.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
593
Webfilter
13314
Message Id
13314
Log Subtype
ftgd_allow
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The URL belongs to an override rule.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
594
hostname
The name of the website that was accessed.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
profile
The name of the profile that was used to detect and take action.
status
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
req_type
The type of request, which can be one of the following:
• referral –if the HTTP transaction is requested from a parent web site,
such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the URL
address manually.
url
The URL address.
msg
URL belongs to an override rule.
method
This field contains either ip or domain
class
The class the URL belongs to.
class_desc
The class description that the URL belongs to.
cat
The category that the URL belongs to.
cat_desc
The category description that the URL belongs to.
mode
This field contains offsite.
rule_type
This field contains any one of the following:
• directory
• domain
• rating
rule_data
The rule data information.
ovrd_tbl
The override table information .
ovrd_id
The override identification number.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
595
Webfilter
12800
596
Message Id
12800
Log Subtype
ftgd_err
Severity
Error
Firmware version
FortiOS 4.0 MR3
Meaning
A FortiGuard Web Filter error.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
• ftp (ftp-over-http)
hostname
The name of the website that was accessed.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
profile
The name of the profile that was used to detect and take action.
status
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
req_type
The type of request, which can be one of the following:
• referral –if the HTTP transaction is requested from a parent web site,
such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the URL
address manually.
url
The URL address.
sent
The total number of bytes sent.
rcvd
The total number of bytes received.
msg
A rating error occurs.
error
The web filter error information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
597
Webfilter
12801
598
Message Id
12801
Log Subtype
ftgd_err
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
A FortiGuard Web Filter error.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
• ftp (ftp-over-http)
hostname
The name of the website that was accessed.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
profile
The name of the profile that was used to detect and take action.
status
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
req_type
The type of request, which can be one of the following:
• referral –if the HTTP transaction is requested from a parent web site,
such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the URL
address manually.
url
The URL address.
sent
The total number of bytes sent.
rcvd
The total number of bytes received.
msg
A rating error occurs.
error
The web filter error information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
599
Webfilter
13601
600
Message Id
13601
Log Subtype
cookiefilter
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A FortiGuard web filter cookie log message.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
• ftp (ftp-over-http)
hostname
The name of the website that was accessed.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
profile
The name of the profile that was used to detect and take action.
status
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
req_type
The type of request, which can be one of the following:
• referral –if the HTTP transaction is requested from a parent web site,
such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the URL
address manually.
url
The URL address.
sent
The total number of bytes sent.
rcvd
The total number of bytes received.
msg
The cookie was removed entirely.
count
The number of times the same event was detected within a short period
of time.
filter_type
The script filter type. This field contains any one of the following:
• n/a
• jscript
• javascript
• vbscript
• unknown
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
601
Webfilter
13602
602
Message Id
13602
Log Subtype
cookiefilter
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A web reference filter log message.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
• ftp (ftp-over-http)
hostname
The name of the website that was accessed.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
profile
The name of the profile that was used to detect and take action.
status
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
req_type
The type of request, which can be one of the following:
• referral –if the HTTP transaction is requested from a parent web site,
such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the URL
address manually.
url
The URL address.
sent
The total number of bytes sent.
rcvd
The total number of bytes received.
msg
Reference was removed from request.
count
The number of times the same event was detected within a short period
of time.
filter_type
The script filter type. This field contains any one of the following:
• n/a
• jscript
• javascript
• vbscript
• unknown
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
603
Webfilter
13568
604
Message ID
13568
Log Subtype
activexfilter
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An ActiveX script was removed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
• ftp (ftp-over-http)
hostname
The name of the website that was accessed.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
profile
The name of the profile that was used to detect and take action.
status
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
req_type
The type of request, which can be one of the following:
• referral – if the HTTP transaction is requested from a parent web site,
such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the URL
address manually.
url
The URL address.
msg
activex script was removed
count
The number of times the same event was detected within a short period
of time.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
605
Webfilter
13573
606
Message ID
13573
Log Subtype
cookiefilter
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A cookie was removed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
• ftp (ftp-over-http)
hostname
The name of the website that was accessed.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
profile
The name of the profile that was used to detect and take action.
status
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
req_type
The type of request, which can be one of the following:
• referral – if the HTTP transaction is requested from a parent web site,
such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the URL
address manually.
url
The URL address.
msg
cookie was removed
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
607
Webfilter
13584
608
Message ID
13584
Log Subtype
appletfilter
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A Java applet was removed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
• ftp (ftp-over-http)
hostname
The name of the website that was accessed.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
profile
The name of the profile that was used to detect and take action.
status
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
req_type
The type of request, which can be one of the following:
• referral – if the HTTP transaction is requested from a parent web site,
such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the URL
address manually.
url
The URL address.
msg
java applet was removed
count
The number of times the same event was detected within a short period
of time.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
609
Webfilter
13315
610
Message ID
13315
Log Subtype
ftgd_quota_counting
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A FortiGuard web filter category quota counting log message.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
• fp (ftp-over-http)
hostname
The name of the website that was accessed.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
profile
The name of the profile that was used to detect and take action.
status
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
req_type
The type of request, which can be one of the following:
• referral – if the HTTP transaction is requested from a parent web site,
such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the URL
address manually.
url
The URL address.
msg
Webfilter wuota has begun counting
method
This field contains either ip or domain
class
The class the URL belongs to.
class_desc
The class description that the URL belongs to.
cat
The category that the URL belongs to.
cat_desc
The category description that the URL belongs to.
quota_used
The number of times the quota was used by the user, in seconds.
qutoa_max
The maximum number of times quota time wa allowed, in seconds.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
611
Webfilter
13316
612
Message ID
13316
Log Subtype
ftgd_quota_expired
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
A FortiGuard web filter category quota expired log message.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
custom
The log field that a user has created. This is referred to as a custom log
field because the name can be anything, for example, hq.
identidx
The identity-based policy identification number. This field displays zero if
the firewall policy does not use an identity-based policy; otherwise, it
displays the number of the identity-based policy entry that the traffic
matched. This number is not globally unique, it is only locally unique
within a given firewall policy.
serial
The session number identification.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
src
The source IP address.
sport
The source port number.
src_port
The source port number.
src_int
The source interface. For example, internal.
dst
The destination IP address.
dport
The destination port number.
dst_port
The destination port number.
dst_int
The destination interface. For example, wan1.
service
This field contains any one of the following:
• http
• https
• smtp
• pop3
• imap
• ftp
• mm1
• mm3
• mm4
• mm7
• nntp
• im
• smtps
• pop3s
• imaps
• ftp (ftps-over-http)
hostname
The name of the website that was accessed.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would
display MSISDN of the phone that sent the MMS message. This field will
always display N/A in FortiOS.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrier.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Webfilter
profile
The name of the profile that was used to detect and take action.
status
This field contains any one of the following:
• blocked
• exempted
• allowed
• passthrough
• filtered
• DLP
req_type
The type of request, which can be one of the following:
• referral – if the HTTP transaction is requested from a parent web site,
such as selecting a link on a web page
• direct – a direct connection to a web page, such as typing in the URL
address manually.
url
The URL address.
msg
Webfilter quota for category has expired
method
This field contains either ip or domain
class
The class the URL belongs to.
class_desc
The class description that the URL belongs to.
cat
The category that the URL belongs to.
cat_desc
The category description that the URL belongs to.
quota_used
The number of times the quota was used by the user, in seconds.
qutoa_max
The maximum number of times quota time wa allowed, in seconds.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
613
Webfilter
12802
614
Message ID
12802
Log Subtype
ftgd_quota
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The daily FortiGuard quota status.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
quota
Indicates whether the quota was exceeded or not. This field contains
either no or yes.
quota_used
The quota time used, in seconds.
quota_max
The maximum quota time that is allowed, in seconds.
cat_desc
The category description.
user
The name of the user.
profile
The name of the profile that was used to detect and take action.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Netscan logs
Netscan logs record network scanning activities that were preformed by the FortiGate unit.
4096
4097
4098
4099
4100
4101
4102
4103
4104
4105
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
615
Netscan logs
4096
Message ID
4096
Log Subtype
Vulnerability
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A network scan was performed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field contains root.
action
This field contains any one of the following:
•
scan
•
host-detection
•
vuln-detection
•
service-detection
•
os-scan
•
port-detection
•
vuln-count
start
The GMT start time, indicating when the scan began.
end
The GMT end time, indicating when the scan stopped.
status
The status of the scan. This field contains any one of the following:
•
start
•
stop
•
pause
•
resume
•
complete
engine
The version number of the netscan engine
plugin
The version number of the netscan plugin.
4097
616
Message ID
4097
Log Subtype
Discovery
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A network scan was performed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field contains root.
action
This field contains any one of the following:
•
scan
•
host-detection
•
vuln-detection
•
service-detection
•
os-scan
•
port-detection
•
vuln-count
start
The GMT start time, indicating when the scan began.
end
The GMT end time, indicating when the scan stopped.
engine
The version number of the netscan engine
plugin
The version number of the netscan plugin.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Netscan logs
4098
Message ID
4098
Log Subtype
Vulnerability
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A network scan vulnerabilty was detected.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field contains root.
action
This field contains any one of the following:
•
scan
•
host-detection
•
vuln-detection
•
service-detection
•
os-scan
•
port-detection
•
vuln-count
ip
The host IP address.
vuln
The name of the detected vulnerabilty.
vuln_cat
The category of the detected vulnerability.
vuln_id
The identification number of the detected vulnerability.
vuln_ref
The link that redirects you to the vulnerability listed in FortiGuard.
severity
The severity level of the detected vulnerabiltiy. This field contains any one of
the following:
•
cirticial
•
high
•
medium
•
low
•
info
proto
The protocol that was used, which is either TCP or UDP.
port
The port number.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
617
Netscan logs
4099
618
Message ID
4099
Log Subtype
Discovery
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A network scan was performed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field contains root.
action
This field contains any one of the following:
•
scan
•
host-detection
•
vuln-detection
•
service-detection
•
os-scan
•
port-detection
•
vuln-count
ip
The host’s IP address.
os
The name of the operating system.
os_family
The name of the operating system’s family.
os_gen
The operating system’s generation.
os_vender
The name of the vendor for that operating system. For example, Microsoft.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Netscan logs
4100
Message ID
4100
Log Subtype
Discovery
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A network scan was performed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field contains root.
action
This field contains any one of the following:
•
scan
•
host-detection
•
vuln-detection
•
service-detection
•
os-scan
•
port-detection
•
vuln-count
ip
The host’s IP address.
service
The name of the detected service.
proto
This field can be either tcp or udp, depending on the protocol that was used.
port
The port number.
4101
Message ID
4101
Log Subtype
Vulnerability
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A network scan notification.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field contains root.
action
This field contains any one of the following:
msg
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
•
scan
•
host-detection
•
vuln-detection
•
service-detection
•
os-scan
•
port-detection
•
vuln-count
The log message information. This is usually a sentence and explains the
activity and/or action taken.
619
Netscan logs
4102
Message ID
4102
Log Subtype
Discovery
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A network scan was performed.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field contains root.
action
This field contains any one of the following:
message
•
scan
•
host-detection
•
vuln-detection
•
service-detection
•
os-scan
•
port-detection
•
vuln-count
The log message information. This is usually a sentence and explains the
activity and/or action taken.
4103
620
Message ID
4103
Log Subtype
Vulnerability
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
The number of vulnerabilities that netscan detected.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field contains root.
action
This field contains any one of the following:
•
scan
•
host-detection
•
vuln-detection
•
service-detection
•
os-scan
•
port-detection
•
vuln-count
•
ip
The host’s IP address.
vuln_count
The total number of vulnerabilities.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
Netscan logs
4104
Message ID
4104
Log Subtype
Discovery
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A netscan host was detected.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field contains root.
action
This field contains any one of the following:
•
scan
•
host-detection
•
vuln-detection
•
service-detection
•
os-scan
•
port-detection
•
vuln-count
•
ip
The host’s IP address.
method
The discovery method that was used. This field contains any one of the
following:
•
ARP
•
ICMP
•
TCP
•
UDP
asset_id
The asset definition fro this host.
asset_name
The asset definition name for this host.
vuln_count
The total number of vulnerabilities.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
621
Netscan logs
4105
622
Message ID
4105
Log Subtype
Discovery
Severity
Notification
Firmware version
FortiOS 4.0 MR3
Meaning
A netscan port was detected.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field contains root.
action
This field contains any one of the following:
•
scan
•
host-detection
•
vuln-detection
•
service-detection
•
os-scan
•
port-detection
•
vuln-count
•
ip
The host’s IP address.
proto
This field can be either tcp or udp, depending on the protocol that was used.
port
The port number.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
DLP archive log messages are log messages that are sent to the FortiAnalyzer unit, FortiGate hard disk, or
FortiGuard Analysis server. These log messages include email, FTP activities, IM events, VoIP events, and
web filter events. You can configure your FortiGate unit to send archives to a FortiGuard Analysis server if
you have subscribe to the FortiGuard Analysis and Management Service.
32768
32777
32776
32794
32770
32795
32772
32796
32774
32797
32769
32798
32782
32800
32783
32778
32784
32779
32785
32780
32786
32781
32787
32771
32788
32773
32789
32775
32790
32791
32792
32793
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
623
DLP archives
32768
Message ID
32768
Log Subtype
HTTP
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The HTTP log archive.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
infection
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request
• im_voice
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
This field contains any one of the following:
• block
• fileexempt
• file intercept
• mms block
• carrier end point filter
• mms flood
• mms duplicate
• virus
• virusrm
• heuristic
• html script
• script filter
• banned word
• exempt word
• oversize
• virus
• heuristic
• worm
• mime block
• fragmented
• exempt
• ip blacklist
• dnsbl
• FortiGuard - Antispam ip blacklist
• helo
• emailblacklist
• mimeheader
• dns
• FortiGuard - AntiSpam ase • banned word
block
624
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
• ipwhitelist
• emailwhitelist
• fewhitelist
• headerwhitelist
• dlp
• dlpban
• pass
• mms content checksum
virus
The name of the virus that was detected.
SN
The session number of the log message.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
client
The internal IP address of the FortiGate unit.
server
The IP address of the server.
rcvd
The total number of bytes transferred on server side.
sent
The total number of bytes transferred on client side.
dlp_sensor
The name of the DLP sensor that was used to detect and take action. For
example, the default sensor Content_Archive.
method
The HTTP/HTTPS command.
hostname
The HTTP/HTTPS host name.
url
The HTTP/HTTPS URL address.
cat
The HTTP/HTTPS category.
cat_desc
The HTTP/HTTPS description of the category.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
625
DLP archives
32776
Message ID
32776
Log Subtype
FTP
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The FTP log archive
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request • im_voice
infection
626
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
This field contains any one of the following:
• block
• fileexempt
• file intercept
• mms block
• carrier end point filter
• mms flood
• mms duplicate
• virus
• virusrm
• heuristic
• html script
• script filter
• banned word
• exempt word
• oversize
• virus
• heuristic
• worm
• mime block
• fragmented
• exempt
• ip blacklist
• dnsbl
• FortiGuard - Antispam ip blacklist
• helo
• emailblacklist
• mimeheader
• dns
• FortiGuard - AntiSpam
ase block
• banned word
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
• ipwhitelist
• emailwhitelist
• fewhitelist
• headerwhitelist
• dlp
• dlpban
• pass
• mms content checksum
virus
The name of the virus detected.
SN
The session number of the log message.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS
Carrer.
client
The internal IP address of the FortiGate unit.
server
The IP address of the server.
rcvd
The total number of bytes transferred on server side.
sent
The total number of bytes transferred on client side.
dlp_sensor
The name of the DLP sensor that was used to detect and take action. For
example, the default sensor Content_Archive.
ftpcmd
This field contains any one of the following:
• NONE
• USER
• PASS
• ACCT
• STOR
• RETR
• QUIT
file
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
The name of the file that was uploaded to the server.
627
DLP archives
32770
Message ID
32770
Log Subtype
SMTP
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The SMTP log archive
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
infection
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request
• im_voice
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
This field contains any one of the following:
• block
• fileexempt
• file intercept
• mms block
• carrier end point filter
• mms flood
• mms duplicate
• virus
• virusrm
• heuristic
• html script
• script filter
• banned word
• exempt word
• oversize
• virus
• heuristic
• worm
• mime block
• fragmented
• exempt
• ip blacklist
• dnsbl
• FortiGuard - Antispam ip blacklist
• helo
• emailblacklist
• mimeheader
• dns
• FortiGuard - AntiSpam ase • banned word
block
628
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
• ipwhitelist
• emailwhitelist
• fewhitelist
• headerwhitelist
• dlp
• dlpban
• pass
• mms content checksum
virus
The name of the virus detected.
SN
The session number of the log message.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
client
The internal IP address of the FortiGate unit.
server
The IP address of the server.
rcvd
The total number of bytes transferred on server side.
sent
The total number of bytes transferred on client side.
dlp_sensor
The name of the DLP sensor that was used to detect and take action. For
example, the default sensor Content_Archive.
to
The recipient’s email address.
from
The sender’s email address.
subject
The subject line of the email message.
attachment
The number of attachments that are present within the email. If there are no
attachments, zero displays.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
629
DLP archives
32772
Message ID
32772
Log Subtype
POP3
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The POP3 log archive.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
infection
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request
• im_voice
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
This field contains any one of the following:
• block
• fileexempt
• file intercept
• mms block
• carrier end point filter
• mms flood
• mms duplicate
• virus
• virusrm
• heuristic
• html script
• script filter
• banned word
• exempt word
• oversize
• virus
• heuristic
• worm
• mime block
• fragmented
• exempt
• ip blacklist
• dnsbl
• FortiGuard - Antispam ip blacklist
• helo
• emailblacklist
• mimeheader
• dns
• FortiGuard - AntiSpam ase • banned word
block
630
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
• ipwhitelist
• emailwhitelist
• fewhitelist
• headerwhitelist
• dlp
• dlpban
• pass
• mms content checksum
virus
The name of the virus detected.
SN
The session number of the log message.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
client
The internal IP address of the FortiGate unit.
server
The IP address of the server.
rcvd
The total number of bytes transferred on server side.
sent
The total number of bytes transferred on client side.
dlp_sensor
The name of the DLP sensor that was used to detect and take action. For
example, the default sensor Content_Archive.
to
The recipient’s email address.
from
The sender’s email address.
subject
The subject line of the email message.
attachment
The number of attachments that are present within the email. If there are no
attachments, zero displays.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
631
DLP archives
32774
Message ID
32774
Log Subtype
IMAP
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The IMAP content archive
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
infection
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request
• im_voice
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
This field contains any one of the following:
• block
• fileexempt
• file intercept
• mms block
• carrier end point filter
• mms flood
• mms duplicate
• virus
• virusrm
• heuristic
• html script
• script filter
• banned word
• exempt word
• oversize
• virus
• heuristic
• worm
• mime block
• fragmented
• exempt
• ip blacklist
• dnsbl
• FortiGuard - Antispam ip blacklist
• helo
• emailblacklist
• mimeheader
• dns
• FortiGuard - AntiSpam ase • banned word
block
632
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
• ipwhitelist
• emailwhitelist
• fewhitelist
• headerwhitelist
• dlp
• dlpban
• pass
• mms content checksum
virus
The name of the virus detected.
SN
The session number of the log message.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
client
The internal IP address of the FortiGate unit.
server
The IP address of the server.
rcvd
The total number of bytes transferred on server side.
sent
The total number of bytes transferred on client side.
dlp_sensor
The name of the DLP sensor that was used to detect and take action. For
example, the default sensor Content_Archive.
to
The recipient’s email address.
from
The sender’s email address.
subject
The subject line of the email.
attachment
The number of attachments that are present within the email. If there are no
attachments, zero displays.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
633
DLP archives
32769
Message ID
32769
Log Subtype
HTTPS
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The HTTPS log archive.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
infection
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request
• im_voice
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
This field contains any one of the following:
• block
• fileexempt
• file intercept
• mms block
• carrier end point filter
• mms flood
• mms duplicate
• virus
• virusrm
• heuristic
• html script
• script filter
• banned word
• exempt word
• oversize
• virus
• heuristic
• worm
• mime block
• fragmented
• exempt
• ip blacklist
• dnsbl
• FortiGuard - Antispam ip blacklist
• helo
• emailblacklist
• mimeheader
• dns
• FortiGuard - AntiSpam ase • banned word
block
634
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
• ipwhitelist
• emailwhitelist
• fewhitelist
• headerwhitelist
• dlp
• dlpban
• pass
• mms content checksum
virus
The name of the virus detected.
SN
The session number of the log message.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
client
The internal IP address of the FortiGate unit.
server
The IP address of the server.
rcvd
The total number of bytes transferred on server side.
sent
The total number of bytes transferred on client side.
dlp_sensor
The name of the DLP sensor that was used to detect and take action. For
example, the default sensor Content_Archive.
method
The HTTP/HTTPS command.
hostname
The HTTP/HTTPS host name.
url
The HTTP/HTTPS URL address.
cat
The HTTP/HTTPS category.
cat_desc
The HTTP/HTTPS description of the category.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
635
DLP archives
32782
Message ID
32782
Log Subtype
im-all
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The IM chat summary log archive.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
infection
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request
• im_voice
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
This field contains any one of the following:
• block
• fileexempt
• file intercept
• mms block
• carrier end point filter
• mms flood
• mms duplicate
• virus
• virusrm
• heuristic
• html script
• script filter
• banned word
• exempt word
• oversize
• virus
• heuristic
• worm
• mime block
• fragmented
• exempt
• ip blacklist
• dnsbl
• FortiGuard - Antispam ip blacklist
• helo
• emailblacklist
• mimeheader
• dns
• FortiGuard - AntiSpam ase • banned word
block
636
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
• ipwhitelist
• emailwhitelist
• fewhitelist
• headerwhitelist
• dlp
• dlpban
• pass
• mms content checksum
SN
The session number of the log message.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrier.
profile
The name of the profile that was used to detect and take action.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
identidx
The identity-based policy identification number. This field displays zero is the
firewall policy does not use an identity-based policy; otherwise, it displays
the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall
policy.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level protocol.
Protocol numbers are assigned by the Internet Assigned Number Authority
(IANA).
kind
This field contains any one of the following:
• summary
• chat
• file
• photo
• photo-xref
• audio
• oversize
• fileblock
• fileexempt
• virus
• dlp
• call-block
• call-info
• call
• register
• unregister
laddr
The local IP address.
raddr
The remote IP address.
local
The local user.
remote
The remote user.
messages
The number of chat messages.
start-date
The local start date.
end-date
The local end date.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
637
DLP archives
32783
Message Id
32783
Log Subtype
im-all
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
The IM chat message log archive.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
infection
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request
• im_voice
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
This field contains any one of the following:
• block
• fileexempt
• file intercept
• mms block
• carrier end point filter
• mms flood
• mms duplicate
• virus
• virusrm
• heuristic
• html script
• script filter
• banned word
• exempt word
• oversize
• virus
• heuristic
• worm
• mime block
• fragmented
• exempt
• ip blacklist
• dnsbl
• FortiGuard - Antispam ip blacklist
• helo
• emailblacklist
• mimeheader
• dns
• FortiGuard - AntiSpam ase • banned word
block
638
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
• ipwhitelist
• emailwhitelist
• fewhitelist
• headerwhitelist
• dlp
• dlpban
• pass
• mms content checksum
SN
The session number of the log message.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there is no
profile group configured. Profile groups are available only in FortiOS Carrier.
profile
The name of the profile that was used to detect and take action.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is a part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
identidx
The identity-based policy identification number. This field displays zero is the
firewall policy does not use an identity-based policy; otherwise, it displays
the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall
policy.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level protocol.
Protocol numbers are assigned by the Internet Assigned Number Authority
(IANA).
kind
This field contains any one of the following:
• summary
• chat
• file
• photo
• photo-xref
• audio
• oversize
• fileblock
• fileexempt
• virus
• dlp
• call-block
• call-info
• call
• register
• unregister
• video
laddr
The local IP address.
raddr
The remote IP address.
local
The local user.
remote
The remote user.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
639
DLP archives
action
640
This field contains any one of the following:
• permit
• block
• monitor
• kickout
• encrypt-kickout
• cm-reject
• exempt
• ban
• ban-im-user
• log-only
dir
The direction of the traffic. This field contains either outbound or inbound.
messages
The number of chat messages.
content
The content of the IM chat message.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
32784
Message Id
32784
Log Subtype
im-all
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An IM file transfer log archive.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
infection
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request
• im_voice
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
This field contains any one of the following:
• block
• fileexempt
• file intercept
• mms block
• carrier end point filter
• mms flood
• mms duplicate
• virus
• virusrm
• heuristic
• html script
• script filter
• banned word
• exempt word
• oversize
• virus
• heuristic
• worm
• mime block
• fragmented
• exempt
• ip blacklist
• dnsbl
• FortiGuard - Antispam ip blacklist
• helo
• emailblacklist
• mimeheader
• dns
• FortiGuard - AntiSpam ase • banned word
block
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
641
DLP archives
• ipwhitelist
• emailwhitelist
• fewhitelist
• headerwhitelist
• dlp
• dlpban
• pass
• mms content checksum
SN
The session number of the log message.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrier.
profile
The name of the profile that was used to detect and take action.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
profiletype
The type of profile that was used, for example Antivirus_Profile.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
identidx
The identity-based policy identification number. This field displays zero is the
firewall policy does not use an identity-based policy; otherwise, it displays
the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall
policy.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level protocol.
Protocol numbers are assigned by the Internet Assigned Number Authority
(IANA).
kind
This field contains any one of the following:
• summary
• chat
• file
• photo
• photo-xref
• audio
• oversize
• fileblock
• fileexempt
• virus
• dlp
• call-block
• call-info
• call
• register
• unregister
• video
642
laddr
The local IP address.
raddr
The remote IP address.
local
The local user.
remote
The remote user.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
action
This field contains any one of the following:
• permit
• block
• monitor
• kickout
• encrypt-kickout
• cm-reject
• exempt
• ban
• ban-im-user
• log-only
dir
The direction of the traffic. This field contains either outbound or inbound.
status
The IM status.
filename
The name of the file that was transferred.
filesize
The size of the file that was transferred.
message
The number of chat messages.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
643
DLP archives
32785
Message ID
32785
Log Subtype
im-all
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An IM photo sharing log archive.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
infection
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request
• im_voice
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
This field contains any one of the following:
• block
• fileexempt
• file intercept
• mms block
• carrier end point filter
• mms flood
• mms duplicate
• virus
• virusrm
• heuristic
• html script
• script filter
• banned word
• exempt word
• oversize
• virus
• heuristic
• worm
• mime block
• fragmented
• exempt
• ip blacklist
• dnsbl
• FortiGuard - Antispam ip blacklist
• helo
• emailblacklist
• mimeheader
• dns
• FortiGuard - AntiSpam ase • banned word
block
644
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
• ipwhitelist
• emailwhitelist
• fewhitelist
• headerwhitelist
• dlp
• dlpban
• pass
• mms content checksum
SN
The session number of the log message.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
profile
The name of the profile that was used to detect and take action.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured.
profiletype
The type of profile that was used, for example Antivirus_Profile.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
identidx
The identity-based policy identification number. This field displays zero is the
firewall policy does not use an identity-based policy; otherwise, it displays
the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall
policy.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level protocol.
Protocol numbers are assigned by the Internet Assigned Number Authority
(IANA).
kind
This field contains any one of the following:
• summary
• chat
• file
• photo
• photo-xref
• audio
• oversize
• fileblock
• fileexempt
• virus
• dlp
• call-block
• call-info
• call
• register
• unregister
• video
laddr
The local IP address.
raddr
The remote IP address.
local
The local user.
remote
The remote user.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
645
DLP archives
action
646
This field contains any one of the following:
• permit
• block
• monitor
• kickout
• encrypt-kickout
• cm-reject
• exempt
• ban
• ban-im-user
• log-only
dir
The direction of the traffic. This field contains either outbound or inbound.
status
The IM status.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
32786
Message ID
32786
Log Subtype
im-all
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An IM photo transfer log archive.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
infection
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request
• im_voice
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
This field contains any one of the following:
• block
• fileexempt
• file intercept
• mms block
• carrier end point filter
• mms flood
• mms duplicate
• virus
• virusrm
• heuristic
• html script
• script filter
• banned word
• exempt word
• oversize
• virus
• heuristic
• worm
• mime block
• fragmented
• exempt
• ip blacklist
• dnsbl
• FortiGuard - Antispam ip blacklist
• helo
• emailblacklist
• mimeheader
• dns
• FortiGuard - AntiSpam ase • banned word
block
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
647
DLP archives
• ipwhitelist
• emailwhitelist
• fewhitelist
• headerwhitelist
• dlp
• dlpban
• pass
• mms content checksum
SN
The session number of the log message.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
profile
The name of the profile that was used to detect and take action.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured.
profiletype
The type of profile that was used, for example Antivirus_Profile.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
identidx
The identity-based policy identification number. This field displays zero is the
firewall policy does not use an identity-based policy; otherwise, it displays
the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall
policy.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level protocol.
Protocol numbers are assigned by the Internet Assigned Number Authority
(IANA).
kind
This field contains any one of the following:
• summary
• chat
• file
• photo
• photo-xref
• audio
• oversize
• fileblock
• fileexempt
• virus
• dlp
• call-block
• call-info
• call
• register
• unregister
• video
648
laddr
The local IP address.
raddr
The remote IP address.
local
The local user.
remote
The remote user.
dir
The direction of the traffic. This field contains either outbound or inbound.
conn-mode
The mode information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
32787
Message ID
32787
Log Subtype
im-all
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An IM voice chat log archive.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
infection
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request
• im_voice
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
This field contains any one of the following:
• block
• fileexempt
• file intercept
• mms block
• carrier end point filter
• mms flood
• mms duplicate
• virus
• virusrm
• heuristic
• html script
• script filter
• banned word
• exempt word
• oversize
• virus
• heuristic
• worm
• mime block
• fragmented
• exempt
• ip blacklist
• dnsbl
• FortiGuard - Antispam ip blacklist
• helo
• emailblacklist
• mimeheader
• dns
• FortiGuard - AntiSpam ase • banned word
block
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
649
DLP archives
• ipwhitelist
• emailwhitelist
• fewhitelist
• headerwhitelist
• dlp
• dlpban
• pass
• mms content checksum
SN
The session number of the log message.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
profile
The name of the profile that was used to detect and take action.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
profiletype
The type of profile that was used, for example Antivirus_Profile.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
identidx
The identity-based policy identification number. This field displays zero is the
firewall policy does not use an identity-based policy; otherwise, it displays
the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall
policy.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level protocol.
Protocol numbers are assigned by the Internet Assigned Number Authority
(IANA).
kind
This field contains any one of the following:
• summary
• chat
• file
• photo
• photo-xref
• audio
• oversize
• fileblock
• fileexempt
• virus
• dlp
• call-block
• call-info
• call
• register
• unregister
• video
650
laddr
The local IP address.
raddr
The remote IP address.
local
The local user.
remote
The remote user.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
action
This field contains any one of the following:
• permit
• block
• monitor
• kickout
• encrypt-kickout
• cm-reject
• exempt
• ban
• ban-im-user
• log-only
dir
The direction of the traffic. This field contains either outbound or inbound.
status
The IM status.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
651
DLP archives
32788
Message ID
32788
Log Subtype
im-all
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An IM virus log archive.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
infection
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request
• im_voice
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
This field contains any one of the following:
• block
• fileexempt
• file intercept
• mms block
• carrier end point filter
• mms flood
• mms duplicate
• virus
• virusrm
• heuristic
• html script
• script filter
• banned word
• exempt word
• oversize
• virus
• heuristic
• worm
• mime block
• fragmented
• exempt
• ip blacklist
• dnsbl
• FortiGuard - Antispam ip blacklist
• helo
• emailblacklist
• mimeheader
• dns
• FortiGuard - AntiSpam ase • banned word
block
652
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
• ipwhitelist
• emailwhitelist
• fewhitelist
• headerwhitelist
• dlp
• dlpban
• pass
• mms content checksum
SN
The session number of the log message.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
profile
The name of the profile that was used to detect and take action.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
profiletype
The type of profile that was used, for example Antivirus_Profile.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
identidx
The identity-based policy identification number. This field displays zero is the
firewall policy does not use an identity-based policy; otherwise, it displays
the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall
policy.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level protocol.
Protocol numbers are assigned by the Internet Assigned Number Authority
(IANA).
kind
This field contains any one of the following:
• summary
• chat
• file
• photo
• photo-xref
• audio
• oversize
• fileblock
• fileexempt
• virus
• dlp
• call-block
• call-info
• call
• register
• unregister
• video
laddr
The local IP address.
raddr
The remote IP address.
local
The local user.
remote
The remote user.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
653
DLP archives
action
654
This field contains any one of the following:
• permit
• block
• monitor
• kickout
• encrypt-kickout
• cm-reject
• exempt
• ban
• ban-im-user
• log-only
dir
The direction of the traffic. This field contains either outbound or inbound.
filename
The name of the file that was transferred.
virus
The name of the virus detected.
heuristic
The information regarding heuristics.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
32789
Message ID
32789
Log Subtype
im-all
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An IM file oversize log archive.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
infection
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request
• im_voice
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
This field contains any one of the following:
• block
• fileexempt
• file intercept
• mms block
• carrier end point filter
• mms flood
• mms duplicate
• virus
• virusrm
• heuristic
• html script
• script filter
• banned word
• exempt word
• oversize
• virus
• heuristic
• worm
• mime block
• fragmented
• exempt
• ip blacklist
• dnsbl
• FortiGuard - Antispam ip blacklist
• helo
• emailblacklist
• mimeheader
• dns
• FortiGuard - AntiSpam ase • banned word
block
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
655
DLP archives
• ipwhitelist
• emailwhitelist
• fewhitelist
• headerwhitelist
• dlp
• dlpban
• pass
• mms content checksum
SN
The session number of the log message.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
profile
The name of the profile that was used to detect and take action.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
profiletype
The type of profile that was used, for example Antivirus_Profile.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
identidx
The identity-based policy identification number. This field displays zero is the
firewall policy does not use an identity-based policy; otherwise, it displays
the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall
policy.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level protocol.
Protocol numbers are assigned by the Internet Assigned Number Authority
(IANA).
kind
This field contains any one of the following:
• summary
• chat
• file
• photo
• photo-xref
• audio
• oversize
• fileblock
• fileexempt
• virus
• dlp
• call-block
• call-info
• call
• register
• unregister
• video
656
laddr
The local IP address.
raddr
The remote IP address.
local
The local user.
remote
The remote user.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
action
This field contains any one of the following:
• permit
• block
• monitor
• kickout
• encrypt-kickout
• cm-reject
• exempt
• ban
• ban-im-user
• log-only
dir
The direction of the traffic. This field contains either outbound or inbound.
filename
The name of the file that was transferred.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
657
DLP archives
32790
Message ID
32790
Log Subtype
im-all
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An IM file block log archive.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
infection
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request
• im_voice
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
This field contains any one of the following:
• block
• fileexempt
• file intercept
• mms block
• carrier end point filter
• mms flood
• mms duplicate
• virus
• virusrm
• heuristic
• html script
• script filter
• banned word
• exempt word
• oversize
• virus
• heuristic
• worm
• mime block
• fragmented
• exempt
• ip blacklist
• dnsbl
• FortiGuard - Antispam ip blacklist
• helo
• emailblacklist
• mimeheader
• dns
• FortiGuard - AntiSpam ase • banned word
block
658
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
• ipwhitelist
• emailwhitelist
• fewhitelist
• headerwhitelist
• dlp
• dlpban
• pass
• mms content checksum
SN
The session number of the log message.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
profile
The name of the profile that was used to detect and take action.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
profiletype
The type of profile that was used, for example Antivirus_Profile.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
identidx
The identity-based policy identification number. This field displays zero is the
firewall policy does not use an identity-based policy; otherwise, it displays
the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall
policy.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level protocol.
Protocol numbers are assigned by the Internet Assigned Number Authority
(IANA).
kind
This field contains any one of the following:
• summary
• chat
• file
• photo
• photo-xref
• audio
• oversize
• fileblock
• fileexempt
• virus
• dlp
• call-block
• call-info
• call
• register
• unregister
• video
laddr
The local IP address.
raddr
The remote IP address.
local
The local user.
remote
The remote user.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
659
DLP archives
action
660
This field contains any one of the following:
• permit
• block
• monitor
• kickout
• encrypt-kickout
• cm-reject
• exempt
• ban
• ban-im-user
• log-only
dir
The direction of the traffic. This field contains either outbound or inbound.
filename
The name of the file that was transferred.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
32791
Message ID
32791
Log Subtype
im-all
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An IM file exempt log archive.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request
• im_voice
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
SN
The session number of the log message.
profiletype
The type of profile that was used, for example, Antivirus_Profiile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
profile
The name of the profile that was used to detect and take action.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured.
profiletype
The type of profile that was used, for example, Antivirus _Profile.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
661
DLP archives
identidx
The identity-based policy identification number. This field displays zero is the
firewall policy does not use an identity-based policy; otherwise, it displays
the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall
policy.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level protocol.
Protocol numbers are assigned by the Internet Assigned Number Authority
(IANA).
kind
This field contains any one of the following:
• summary
• chat
• file
• photo
• photo-xref
• audio
• oversize
• fileblock
• fileexempt
• virus
• dlp
• call-block
• call-info
• call
• register
• unregister
• video
662
laddr
The local IP address.
raddr
The remote IP address.
local
The local user.
remote
The remote user.
action
This field contains any one of the following:
• permit
• block
• monitor
• kickout
• encrypt-kickout
• cm-reject
• exempt
• ban
• ban-im-user
• log-only
dir
The direction of the traffic. This field contains either outbound or inbound.
filename
The name of the file that was transferred.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
32792
Message ID
32792
Log Subtype
im-all
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An IM DLP information log archive.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request
• im_voice
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
SN
The session number of the log message.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
profile
The name of the profile that was used to detect and take action.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
663
DLP archives
identidx
The identity-based policy identification number. This field displays zero is the
firewall policy does not use an identity-based policy; otherwise, it displays
the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall
policy.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level protocol.
Protocol numbers are assigned by the Internet Assigned Number Authority
(IANA).
kind
This field contains any one of the following:
• summary
• chat
• file
• photo
• photo-xref
• audio
• oversize
• fileblock
• fileexempt
• virus
• dlp
• call-block
• call-info
• call
• register
• unregister
• video
664
laddr
The local IP address.
raddr
The remote IP address.
local
The local user.
remote
The remote user.
action
This field contains any one of the following:
• permit
• block
• monitor
• kickout
• encrypt-kickout
• cm-reject
• exempt
• ban
• ban-im-user
• log-only
dir
The direction of the traffic. This field contains either outbound or inbound.
filename
The name of the file that was transferred.
filesize
The size of the file that was transferred.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
32793
Message ID
32793
Log Subtype
im-all
Severity
Warning
Firmware version
FortiOS 4.0 MR3
Meaning
An IM DLP warning log archive.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request
• im_voice
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
SN
The session number of the log message.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
profile
The name of the profile that was used to detect and take action.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
profiletype
The type of profile that was used, for example Antivirus_Profile.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
665
DLP archives
identidx
The identity-based policy identification number. This field displays zero is the
firewall policy does not use an identity-based policy; otherwise, it displays
the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall
policy.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level protocol.
Protocol numbers are assigned by the Internet Assigned Number Authority
(IANA).
kind
This field contains any one of the following:
• summary
• chat
• file
• photo
• photo-xref
• audio
• oversize
• fileblock
• fileexempt
• virus
• dlp
• call-block
• call-info
• call
• register
• unregister
• video
666
laddr
The local IP address.
raddr
The remote IP address.
local
The local user.
remote
The remote user.
action
This field contains any one of the following:
• permit
• block
• monitor
• kickout
• encrypt-kickout
• cm-reject
• exempt
• ban
• ban-im-user
• log-only
dir
The direction of the traffic. This field contains either outbound or inbound.
filename
The name of the file that was transferred.
filesize
The size of the file that was transferred.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
32777
Message ID
32777
Log Subtype
NNTP
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
An NNTP log archive.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
infection
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request
• im_voice
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
The type of infection. This field contains any one of the following:
• block
• fileexempt
• file intercept
• mms block
• carrier end point filter
• mms flood
• mms duplicate
• virus
• virusrm
• heuristic
• html script
• script filter
• banned word
• exempt word
• oversize
• virus
• heuristic
• worm
• mime block
• fragmented
• exempt
• ip blacklist
• dnsbl
• FortiGuard - Antispam ip blacklist
• helo
• emailblacklist
• mimeheader
• dns
• FortiGuard - AntiSpam ase • banned word
block
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
667
DLP archives
668
• ipwhitelist
• emailwhitelist
• fewhitelist
• headerwhitelist
• dlp
• dlpban
• pass
• mms content checksum
virus
The name of the virus that was detected.
SN
The session number of the log message.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profile
The name of the profile that was used to detect and take action.
profilegroup
The group that the profile is a part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
client
The internal IP address of the FortiGate unit.
server
The IP address of the server.
rcvd
The total number of bytes transferred on server side.
sent
The total number of bytes transferred on client side.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
32794
Message ID
32794
Log Subtype
VOIP
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A VoIP SIP log archive.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request
• im_voice
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
SN
The session number of the log message.
profile
The name of the profile applied to the firewall policy and used during the
detection process.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The carrier endpoint identification number. This field contains N/A unless
FortiOS Carrier is running on the unit.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
identidx
The identity-based policy identification number. This field displays zero if the
firewall policy does not use an identity-based policy; otherwise, it displays
the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall
policy.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
669
DLP archives
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level protocol.
Protocol numbers are assigned by the Intenet Assigned Number Authority
(IANA).
kind
This field contains any one of the following:
• summary
• chat
• file
• photo
• photo-xref
• audio
• oversize
• fileblock
• fileexempt
• virus
• dlp
• call-block
• call-info
• call
• register
• unregister
• video
action
670
This field contains any one of the following:
• permit
• block
• monitor
• kickout
• encrypt-kickout
• cm-reject
• exempt
• ban
• ban-im-user
• log-only
status
The IM status.
src
The source IP address.
dst
The destination IP address.
src_port
The source port number.
dst_port
The destination port number.
dir
The direction of the traffic. This field contains either outbound or inbound.
duration
This represents the value in seconds.
from
The sender’s email address.
to
The recipient’s email address.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
32795
Message ID
32795
Log Subtype
VOIP
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A VOIP SCCP register log archive.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request
• im_voice
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
SN
The session number of the log message.
profile
The name of the profile applied to the firewall policy and used during the
detection process.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
671
DLP archives
identidx
The identity-based policy identification number. This field displays zero is the
firewall policy does not use an identity-based policy; otherwise, it displays
the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall
policy.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level protocol.
Protocol numbers are assigned by the Internet Assigned Number Authority
(IANA).
kind
This field contains any one of the following:
• summary
• chat
• file
• photo
• photo-xref
• audio
• oversize
• fileblock
• fileexempt
• virus
• dlp
• call-block
• call-info
• call
• register
• unregister
• video
action
672
This field contains any one of the following:
• permit
• block
• monitor
• kickout
• encrypt-kickout
• cm-reject
• exempt
• ban
• ban-im-user
• log-only
status
The IM status.
phone
The phone number.
src
The source IP address.
from
The sender’s information.
to
The receiver’s information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
32796
Message ID
32796
Log Subtype
VOIP
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A VOIP SCCP unregister log archive.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request
• im_voice
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
SN
The session number of the log message.
profile
The name of the profile applied to the firewall policy and used during the
detection process.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example, Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
673
DLP archives
identidx
The identity-based policy identification number. This field displays zero is the
firewall policy does not use an identity-based policy; otherwise, it displays
the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall
policy.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level protocol.
Protocol numbers are assigned by the Internet Assigned Number Authority
(IANA).
kind
This field contains any one of the following:
• summary
• chat
• file
• photo
• photo-xref
• audio
• oversize
• fileblock
• fileexempt
• virus
• dlp
• call-block
• call-info
• call
• register
• unregister
• video
action
674
This field contains any one of the following:
• permit
• block
• monitor
• kickout
• encrypt-kickout
• cm-reject
• exempt
• ban
• ban-im-user
• log-only
status
The IM status.
phone
The phone information.
src
The source IP address.
reason
The information about why the trigger occurred.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
32797
Message ID
32797
Log Subtype
VOIP
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A VOIP SCCP call block log archive.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
SN
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request
• im_voice
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
The session number of the log message.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The grou pthat the profile is a part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there is no
profile group configured. Profile groups are only available in FortiOS Carrer.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
675
DLP archives
identidx
The identity-based policy identification number. This field displays zero is the
firewall policy does not use an identity-based policy; otherwise, it displays
the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall
policy.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level protocol.
Protocol numbers are assigned by the Internet Assigned Number Authority
(IANA).
kind
This field contains any one of the following:
• summary
• chat
• file
• photo
• photo-xref
• audio
• oversize
• fileblock
• fileexempt
• virus
• dlp
• call-block
• call-info
• call
• register
• unregister
• video
action
676
This field contains any one of the following:
• permit
• block
• monitor
• kickout
• encrypt-kickout
• cm-reject
• exempt
• ban
• ban-im-user
• log-only
status
The IM status.
phone
The phone information.
src
The source IP address.
reason
The reason as to why the trigger occurred.
from
The sender’s information.
to
The receiver’s information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
32798
Message ID
32798
Log Subtype
VOIP
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A VOIP SCCP call information log archive.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual
domains exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
SN
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request
• im_voice
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
The session number of the log message.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there is no
profile group configured.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display
MSISDN of the phone that sent the MMS message. This field will always
display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The grou pthat the profile is a part of. This field contains N/A if there is no
profile group configured.
policyid
The ID number of the firewall policy that applies to the session or packet.
Any policy that is automatically added by the FortiGate will have an index
number of zero.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
677
DLP archives
identidx
The identity-based policy identification number. This field displays zero is the
firewall policy does not use an identity-based policy; otherwise, it displays
the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall
policy.
proto
The protocol number that applies to the session or packet. This is the
protocol number in the packet header that identifies the next level protocol.
Protocol numbers are assigned by the Internet Assigned Number Authority
(IANA).
kind
This field contains any one of the following:
• summary
• chat
• file
• photo
• photo-xref
• audio
• oversize
• fileblock
• fileexempt
• virus
• dlp
• call-block
• call-info
• call
• register
• unregister
• video
action
678
This field contains any one of the following:
• permit
• block
• monitor
• kickout
• encrypt-kickout
• cm-reject
• exempt
• ban
• ban-im-user
• log-only
status
The IM status.
phone
The phone information.
src
The source IP address.
dst
The destination IP address.
src_port
The source port number.
dst_port
The destination port number.
duration
This represents the value in seconds.
from
The sender’s information.
to
The receipient’s information.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
32800
Message ID
32800
Log Subtype
VOIP
Severity
Information
Firmware version
FortiOS 4.0 MR3
Meaning
A VOIP SIP fuzzing log archive.
Fields
Field Description
vd
The name of the virtual domain where the action occurred in. If no virtual domains
exist, this field always contains root.
clogver
The content log version number.
epoch
The time period in seconds.
eventid
The event identification number or serial number.
cstatus
The status of the content log. This field contains any one of the following:
SN
• clean
• infected
• heuristic
• banned_word
• blocked
• exempt
• oversize
• carrier_endpoint_filter
• mass_mms
• dlp
• fragmented
• spam
• im_summary
• im_message
• im_file_request
• im_file_accept
• im_file_cancel
• im_video
• im_photo_share_request
• im_voice
• im_photo_share_cancel
• im_photo_share_accept
• im_photo_xref
• im_photo_share_stop
• error
• voip
The session number of the log message.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The group that the profile is a part of. This field contains N/A if there is no profile
group configured. Profile groups are only available in FortiOS Carrer.
user
The name of the user creating the traffic.
group
The name of the group creating the traffic.
carrier_ep
The FortiOS Carrier end-point identification. For example, it would display MSISDN of
the phone that sent the MMS message. This field will always display N/A in FortiOS.
profile
The name of the profile that was used to detect and take action.
profiletype
The type of profile that was used, for example Antivirus_Profile.
profilegroup
The grou pthat the profile is a part of. This field contains N/A if there is no profile
group configured. Profile groups are only available in FortiOS Carrer.
policyid
The ID number of the firewall policy that applies to the session or packet. Any policy
that is automatically added by the FortiGate will have an index number of zero.
identidx
The identity-based policy identification number. This field displays zero is the firewall
policy does not use an identity-based policy; otherwise, it displays the number of the
identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
679
DLP archives
proto
The protocol number that applies to the session or packet. This is the protocol
number in the packet header that identifies the next level protocol. Protocol numbers
are assigned by the Internet Assigned Number Authority (IANA).
kind
This field contains any one of the following:
• summary
• chat
• file
• photo
• photo-xref
• audio
• oversize
• fileblock
• fileexempt
• virus
• dlp
• call-block
• call-info
• call
• register
• unregister
• video
action
680
This field contains any one of the following:
• permit
• block
• monitor
• kickout
• encrypt-kickout
• cm-reject
• exempt
• ban
• ban-im-user
• log-only
status
The IM status.
src
The source IP address.
dst
The destination IP address.
src_port
The source port number.
dst_port
The destination port number.
dir
The direction of the traffic. This field contains either outbound or inbound.
duration
This represents the value in seconds.
message_type
This field contains either request or response.
request_name
The request name.
malform_desc
The description of the malformed header. This field contains any one of the following;
• unexpected-character
• invalid-quoting-character
• trailing-bytes
• header-line-oversize
• msg-body-oversize
• domain-name-oversize
• domain-label-oversize
• syntax-malformed
• duplicated-sip-header
• space-violation
• invalid-ipv4-address
• invalid-ipv6-address
• invalid-port
• invalid-fqdn
• no-matching-double-quote
• empty-quoted-string
• invalid-<user_info>
• invalid-escape-encoding-in-<userinfo>
• invalid-escape-encoding-in-uriparameter
• invalid-escape-encoding-in-uri-header
• invalid-escape-encoding-in<reason-phrase>
• port-expected
• port-not-allowed
• domain-name-invalid
• <gen-value>-expected
• invalid-<gen-value>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
DLP archives
• invalid-<quoted-string>-in-<genvalue>
• ip4-address-expected
• ipv6-address-expected
• uri-expected
• invalid-transport-uri-parameter
• invalid-user-uri-parameter
• invalid-method-uri-parameter
• invalid-ttl-uri-parameter
• invalid-uri-parameter-pname
• invalid-uri-parameter-value
• uri-parameter-repeat
• invalid-uri-header-name
• invalid-uri-header-value
• invalid-uri-header-name-value-pair
• invalid-quoted-string-in-displayname
• left-angle-braket-is-mandatory
• right-angle-bracket-not-found
• invalid-status-code
• no-METHOD-on-request-time
• uri-parameters-not-allowed-by-RFC
• unknown-scheme
• whitespace-expected
• LWS-expected
• invalid-<SIP-Version>-on-request-line
• invalid-<protocol-name>
• invalid-<protocol-version>
• invalid-<transport>
• no-SLASH-after-<protocol_name>
• no-SLASH-after-<protocol-version> • header-parameter-expected
• invalid-ttl-parameter
• invalid-maddr-parameter
• invalid-received-parameter
• invalid-branch-parameter
• invalid-rport-parameter
• via-parameter-repeat
• <seq>-number-expected
• <method>-expected
• <method>-does-not-match-therequest-line
• <response-num>-expected
• <CSeq-num>-expected
• <Method>-expected-after-<CSeq-num>
• expires-header-repeated
• <delta-seconds>-expected
• invalid-max-forwards
• token-expected
• invalid-expires-parameter
• invalid-q-parameter
• <generic-param>-with-invalid-<gen- • <m-type>-expected
value>
FortiGate Log Message Reference
01-430-112804-20111121
http://docs.fortinet.com/ • Feedback
• SLASH-expected-after-<m-type>
• <m-subtype>-expected
• <m-attribute>-expected-after-SEMI
• boundary-parameter-appears-more-thanonce
• EQUAL-expected-after-<mattribute>
• invalid-<quoted-string>-in-<m-value>
• invalid-<m-value>
• multipart-Content-Type-has-no-boundary
• digits-expected
• IN-expected
• IP-expected
• IP4-or-IP6-expected
• IPv4-or-IPv6-address-expected
• line-order-error
• z-line-not-allowed-on-media-level
• <time>-expected
• <typed-time>-expected
• r-line-not-allowed-on-media-level
• <repeat-interval>-expected
• <bwtype>-expected
• colon-expected
• <bandwidth>-expected
• t-line-not-allowed-on-media-level
• invalid-<start-time>
• invalid-<stop-time>
• too-many-i-lines
• <text>-expected
• too-many-c-lines
681
DLP archives
682
• too-many-v-line
• v-line-not-allowed-on-media-level
• too