FortiOS 6.4.7 Log Reference
FortiOS 6.4.7 Log Reference
Version 6.4.7
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
NSE INSTITUTE
https://training.fortinet.com
FORTIGUARD CENTER
https://www.fortiguard.com
FEEDBACK
Email: techdoc@fortinet.com
Change Log 29
Introduction 30
Before you begin 30
What's new 31
FortiOS 6.4.7 31
FortiOS 6.4.6 31
FortiOS 6.4.5 31
FortiOS 6.4.4 32
FortiOS 6.4.3 32
FortiOS 6.4.2 34
FortiOS 6.4.1 36
FortiOS 6.4.0 37
Log Types and Subtypes 44
Type 44
Subtype 44
List of log types and subtypes 44
UTM log subtypes 45
FortiOS priority levels 46
Log field format 47
Log Schema Structure 48
Log message fields 48
Log ID numbers 51
Log ID definitions 52
FortiGuard Web Filter Categories 55
CEF Support 58
FortiOS to CEF log field mapping guidelines 58
CEF priority levels 58
Examples of CEF support 59
Traffic log support for CEF 59
Event log support for CEF 61
Antivirus log support for CEF 62
Webfilter log support for CEF 63
IPS log support for CEF 64
Email Spamfilter log support for CEF 64
Anomaly log support for CEF 65
VoIP log support for CEF 65
DLP log support for CEF 66
Application log support for CEF 67
WAF log support for CEF 67
DNS log support for CEF 67
SSH log support for CEF 68
UTM Extended Logging 69
Enabling extended logging 69
This document provides information about all the log messages applicable to the FortiGate devices running FortiOS
version 6.4.7 or higher. The logs are intended for administrators to use as reference for more information about a specific
log entry and message generated by FortiOS.
This document also provides information about log fields when FortiOS sends log messages to remote syslog servers in
Common Event Format (CEF). See CEF Support on page 58. It also describes how to enable extended logging. See
UTM Extended Logging on page 69.
Performance statistics are not logged to disk. Performance statistics can be received by a
syslog server or by FortiAnalyzer.
Before you begin using this reference, read the following notes:
l Information in this document applies to all FortiGate units that are currently running FortiOS 6.4.7 or higher.
l Ensure that you have enabled logging for the FortiOS unit.
l Each log message is displayed in the Log & Report pane of the GUI. You can also download the RAW format from
the Log & Report pane.
l Each log message is documented similar to how it appears in the RAW format.
This reference contains detailed information for each log type and subtype; however, this
reference contains only information gathered at publication and, as a result, not every log
message field contains detailed information.
What's new
This section identifies major changes in the Log Reference from version 6.4.0 and later. For more information about new
features, please see the FortiOS 6.4 New Features Guide.
FortiOS 6.4.7
Log ID changes
FortiOS 6.4.6
Log ID changes
FortiOS 6.4.5
Log ID changes
FortiOS 6.4.4
There are no major log changes between FortiOS 6.4.3 and 6.4.4.
FortiOS 6.4.3
Field Change
cc Field Added
DLP logs:
Field Change
cc Field Added
Event logs:
Field Change
FILE-FILTER logs:
Field Change
cc Field Added
Traffic logs:
Field Change
Log ID changes
FortiOS 6.4.2
Field Change
Email logs:
Field Change
GTP logs:
Field Change
DNS logs:
Field Change
Traffic logs:
Field Change
Log ID changes
Event logs:
Email logs:
FortiOS 6.4.1
Field Change
Event logs:
Field Change
Traffic logs:
Field Change
Log ID changes
SSL logs:
FortiOS 6.4.0
l Internet Content Adaptation Protocol (ICAP) is added as a new log type with a log category ID of 20.
l SD-WAN is added as a new Event log subtype.
Field Change
Field Change
to Field Removed
ICAP logs:
Field Change
Field Change
tz Field Added
vd Field Added
SSL logs:
Field Change
Traffic logs:
Field Change
Web logs:
Field Change
Log ID changes
CIFS logs:
Email logs:
Event logs:
ICAP logs:
SSL logs:
Web logs:
This section describes the log types, subtypes, and priority levels. It also describes the log field format.
Type
Each log entry contains a Type (type) or category field that indicates its log type and which log file stores the log entry.
Subtype
Each log entry contains a Sub Type (subtype) or subcategory field within a log type, based on the feature associated with
the cause of the log entry.
For example:
l In event logs, some of the subtypes are compliance check, system, and user.
l In traffic logs, the subtypes are forward, local, multicast, and sniffer.
FortiGate devices can record the following types and subtypes of log entry information:
UTM log subtypes
Each log entry contains a Level (level) field that indicates the estimated severity of the event that caused the log entry,
such as level=warning, and therefore how high a priority it is likely to be. Level (level) associations with the
descriptions below are not always uniform. They also may not correspond with your own definitions of how severe each
event is. If you require notification when a specific event occurs, either configure SNMP traps or alert email by
administrator-defined Severity Level (severity_level) or ID (logid), not by Level (level).
For each location where the FortiGate device can store log files (disk, memory, Syslog or FortiAnalyzer), you can define
a severity threshold. FortiOS stores all log messages equal to or exceeding the log severity level selected. For example,
if you select Error, FortiOS will store log messages whose log severity level is Error, Critical, Alert, and Emergency.
The following table describes the standard format in which each log type is described in this document. For
documentation purposes, all log types and subtypes follow this generic table format to present the log entry information.
Each log message consists of several sections of fields. In the FortiOS GUI, you can view the logs in the Log & Report
pane, which displays the formatted view. If you want to view logs in raw format, you must download the log and view it in
a text editor.
Following is an example of a traffic log message in raw format:
date=2017-11-15 time=11:44:16 logid="0000000013" type="traffic" subtype="forward"
level="notice" vd="vdom1" eventtime=1510775056 srcip=10.1.100.155 srcname="pc1"
srcport=40772 srcintf="port12" srcintfrole="undefined" dstip=35.197.51.42
dstname="fortiguard.com" dstport=443 dstintf="port11" dstintfrole="undefined"
poluuid="707a0d88-c972-51e7-bbc7-4d421660557b" sessionid=8058 proto=6 action="close"
policyid=1 policytype="policy" policymode="learn" service="HTTPS" dstcountry="United
States" srccountry="Reserved" trandisp="snat" transip=172.16.200.2 transport=40772
appid=40568 app="HTTPS.BROWSER" appcat="Web.Client" apprisk="medium" duration=2
sentbyte=1850 rcvdbyte=39898 sentpkt=25 rcvdpkt=37 utmaction="allow" countapp=1
devtype="Linux PC" osname="Linux" mastersrcmac="a2:e9:00:ec:40:01"
srcmac="a2:e9:00:ec:40:01" srcserver=0 utmref=0-220586
The following table provides an example of the log field information in the FortiOS GUI in the detailed view of the Log &
Report pane and in the downloaded, raw log file.
General
Source
Master Source MAC The master MAC address for a host mastersrcmac="a2:e9:00:ec:40:01"
(mastersrcmac) that has multiple network interfaces.
Destination
Application
Data
Action
Security
Other
Log ID numbers
The ID (logid) is a 10-digit field. It is a unique identifier for that specific log and includes the following information about
the log entry.
Log Type Represented by the first two digits of l Traffic log IDs begin with "00".
the log ID. l Event log IDs begin with "01".
Sub Type or Event Type Represented by the second two digits l VPN log subtype is represented with
of the log ID. "01" which belongs to the Event log type
that is represented with "01".
Therefore, all VPN related Event log IDs
will begin with the 0101 log ID series.
Message ID The last six digits of the log ID l An administrator account always has the
represent the message ID. log ID 0000003401.
The logid field is a number assigned to all permutations of the same message. It classifies a log entry by the nature of the
cause of the log message, such as administrator authentication failures or traffic. Other log messages that share the
same cause will share the same logid.
Log ID definitions
Following are the definitions for the log type IDs and subtype IDs applicable to FortiOS version 5.2.1 and later.
traffic: 0 l forward: 0
l local: 1
l multicast: 2
l sniffer: 4
event: 1 l system: 0
l vpn: 1
l user: 2
l router: 3
l wireless: 4
l wad: 5
l endpoint: 7
l ha: 8
l security-rating: 10
l fortiextender: 11
l connector: 12
l sdwan: 13
virus: 2 l analytics: 1
l botnet: 2
l filetype-executable: 3
l outbreak-prevention: 4
l content-disarm: 5
webfilter: 3 l unknown: 0
l content: 14
l urlfilter: 15
l ftgd_blk: 16
l ftgd_allow: 17
l ftgd_err: 18
l activexfilter: 35
l cookiefilter: 36
l appletfilter: 37
l ftgd_quota_counting: 38
l ftgd_quota: 40
l scriptfilter: 41
l webfilter_command_block: 43
l http_header_change: 44
l ssl-exempt: 45
l antiphishing: 46
ips: 4 l signature: 19
l malicious_url: 21
l botnet
email: 5 l msn-hotmail: 5
l yahoo-mail: 6
l gmail: 7
l smtp: 8
l pop3: 9
l imap: 10
l mapi: 11
l carrier-endpoint-filter: 47
l mass-mms: 52
l ftgd_err: 53
anomaly: 7 l anomaly: 20
voip: 8 l voip: 14
dlp: 9 l dlp: 54
app_ctrl: 10 l signature: 59
WAF: 12 l waf-signature: 0
l waf-custom-signature: 1
l waf-http-method: 2
l waf-http-constraint: 3
l waf-address-list: 4
l waf-url-access: 5
GTP: 14 l gtp-all: 0
DNS: 15 l dns-query: 0
l dns-response: 1
SSH: 16 l ssh-command: 0
l ssh-channel: 1
SSL: 17 l ssl-anomalies: 0
l ssl-exempt: 1
l ssl-negotiation: 2
CIFS: 18 l cifs-filefilter: 0
l cifs-auth-fail: 1
ICAP: 20 l icap: 0
The below details the mapping between FortiGuard Web Filter category names and numbers.
Number Category
0 Unrated
1 Drug abuse
2 Alternative beliefs
3 Hacking
4 Illegal or unethical
5 Discrimination
6 Explicit violence
7 Abortion
9 Advocacy organizations
11 Gambling
12 Extremist groups
14 Pornography
15 Dating
16 Weapons (sales)
17 Advertising
20 Games
23 Web-based email
26 Malicious websites
28 Entertainment
30 Education
Number Category
34 Job search
35 Medicine
37 Social networking
38 Political organizations
39 Reference
40 Global religion
42 Shopping
43 General organizations
46 Sports
47 Travel
48 Personal vehicles
49 Business
52 Information technology
53 Armed forces
54 Dynamic content
55 Meaningless content
56 Web hosting
57 Marijuana
58 Folklore
59 Proxy avoidance
61 Phishing
62 Plagiarism
63 Sex education
Number Category
64 Alcohol
65 Tobacco
68 Web chat
69 Instant messaging
71 Digital postcards
76 Internet telephony
77 Child education
78 Real estate
81 Secure websites
82 Content servers
83 Child abuse
84 Web-based applications
85 Domain parking
86 Spam URLs
87 Personal privacy
88 Dynamic DNS
89 Auction
92 Charitable organizations
93 Remote access
94 Web analytics
95 Online meeting
You can configure FortiOS 6.4.7 to send logs to remote syslog servers in Common Event Format (CEF) by using the
config log syslogd setting command.
When CEF is enabled, FortiOS sends logs to syslog servers in CEF. This section describes how FortiOS logs support
CEF.
You can view logs in CEF on remote syslog servers or FortiAnalyzer, but not in the FortiOS
GUI.
The SignatureId field in FortiOS logs maps to the logid field in CEF and should be last 5 digits of logid.
The Name field in CEF uses the following formula:
type:subtype + [eventtype] + [action] + [status]
Following is an example of the header and one key-value pair for extension from the Event VPN log in CEF:
#Feb 12 10:31:04 syslog-800c CEF:0|Fortinet|Fortigate|v5.6.0|37127|event:vpn negotiate
success|3|FTNTFGTlogid=0101037127
The type:subtype field in FortiOS logs maps to the cat field in CEF.
Any fields in FortiOS logs that are unmatched to fields in CEF include the FTNTFGT prefix.
Quotes ("") are removed from FortiOS logs to support CEF.
Forward slashes (//) in string values as well as the equal sign (=) and backward slashes (\) are escaped in FortiOS logs
to support CEF.
CEF priority levels
Following are the CEF priority levels. They are opposite of FortiOS priority levels. See also FortiOS priority levels on
page 46.
Examples of CEF support
This section includes examples of how the different types of log message support CEF.
The following is an example of a traffic log sent in CEF format to a syslog server:
Dec 27 11:07:55 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|00013|traffic:forward
close|3|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0000000013
cat=traffic:forward FTNTFGTsubtype=forward FTNTFGTlevel=notice FTNTFGTvd=vdom1
FTNTFGTeventtime=1545937675 src=10.1.100.11 spt=54190 deviceInboundInterface=port12
FTNTFGTsrcintfrole=undefined dst=52.53.140.235 dpt=443
deviceOutboundInterface=port11 FTNTFGTdstintfrole=undefined FTNTFGTpoluuid=c2d460aa-
fe6f-51e8-9505-41b5117dfdd4 externalId=402 proto=6 act=close FTNTFGTpolicyid=1
FTNTFGTpolicytype=policy app=HTTPS FTNTFGTdstcountry=United States
FTNTFGTsrccountry=Reserved FTNTFGTtrandisp=snat sourceTranslatedAddress=172.16.200.1
sourceTranslatedPort=54190 FTNTFGTappid=40568 FTNTFGTapp=HTTPS.BROWSER
FTNTFGTappcat=Web.Client FTNTFGTapprisk=medium FTNTFGTapplist=g-default
FTNTFGTduration=2 out=3652 in=146668 FTNTFGTsentpkt=58 FTNTFGTrcvdpkt=105
FTNTFGTutmaction=allow FTNTFGTcountapp=2
The following table maps FortiOS log field names to CEF field names.
srcip src
srcport spt
srcintf deviceInboundInterface
dstip dst
dstport dpt
dstintf deviceOutboundInterface
sessionid externalID
proto proto
action act
transip sourceTranslatedAddress
transport sourceTranslatedPort
service app
sentbyte out
rcvdbyte in
Custom fields
To configure the traffic log with custom fields, enter the following CLI commands:
config log custom-field
edit 1
set name "custom_name1"
set value "HN123456"
next
edit 2
set name "custom_name2"
set value "accounting_dpt"
next
end
config firewall policy
edit 1
set name "A-v4-out"
set srcintf "port12"
set dstintf "port11"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set utm-status enable
set logtraffic all
set custom-log-fields "1" "2"
The following is an example of a traffic log with custom fields on the FortiGate disk:
date=2018-12-27 time=11:12:30 logid="0000000013" type="traffic" subtype="forward"
level="notice" vd="vdom1" eventtime=1545937950 srcip=10.1.100.11 srcport=58843
srcintf="port12" srcintfrole="undefined" dstip=172.16.200.55 dstport=53
dstintf="port11" dstintfrole="undefined" poluuid="c2d460aa-fe6f-51e8-9505-
41b5117dfdd4" sessionid=440 proto=17 action="accept" policyid=1 policytype="policy"
service="DNS" dstcountry="Reserved" srccountry="Reserved" trandisp="snat"
transip=172.16.200.1 transport=58843 appid=16195 app="DNS" appcat="Network.Service"
apprisk="elevated" applist="g-default" duration=180 sentbyte=70 rcvdbyte=528
sentpkt=1 rcvdpkt=1 custom_name1="HN123456" custom_name2="accounting_dpt"
The following is an example of a traffic log with custom fields sent in CEF format to a syslog server:
Dec 27 11:12:30 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|00013|traffic:forward
accept|3|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0000000013
cat=traffic:forward FTNTFGTsubtype=forward FTNTFGTlevel=notice FTNTFGTvd=vdom1
FTNTFGTeventtime=1545937950 src=10.1.100.11 spt=58843 deviceInboundInterface=port12
FTNTFGTsrcintfrole=undefined dst=172.16.200.55 dpt=53 deviceOutboundInterface=port11
FTNTFGTdstintfrole=undefined FTNTFGTpoluuid=c2d460aa-fe6f-51e8-9505-41b5117dfdd4
externalId=440 proto=17 act=accept FTNTFGTpolicyid=1 FTNTFGTpolicytype=policy
app=DNS FTNTFGTdstcountry=Reserved FTNTFGTsrccountry=Reserved FTNTFGTtrandisp=snat
sourceTranslatedAddress=172.16.200.1 sourceTranslatedPort=58843 FTNTFGTappid=16195
FTNTFGTapp=DNS FTNTFGTappcat=Network.Service FTNTFGTapprisk=elevated
FTNTFGTapplist=g-default FTNTFGTduration=180 out=70 in=528 FTNTFGTsentpkt=1
FTNTFGTrcvdpkt=1 FTNTFGTcustom_name1=HN123456 FTNTFGTcustom_name2=accounting_dpt
The following table maps FortiOS custom log field names to CEF field names.
custom_name1 FTNTFGTcustom_name1
custom_name2 FTNTFGTcustom_name2
The following table maps FortiOS log field names to CEF field names.
msg msg
cookies requestCookies
user duser
status outcome
role sourceServiceName
ui sproc
reason reason
action act
system subtype
The following is an example of a system subtype event log on the FortiGate disk:
date=2018-12-27 time=11:15:40 logid="0100032002" type="event" subtype="system"
level="alert" vd="vdom1" eventtime=1545938140 logdesc="Admin login failed" sn="0"
user="admin1" ui="https(172.16.200.254)" method="https" srcip=172.16.200.254
dstip=172.16.200.1 action="login" status="failed" reason="name_invalid"
msg="Administrator admin1 login failed from https(172.16.200.254) because of invalid
user name"
The following is an example of a system subtype event log sent in CEF format to a syslog server:
Dec 27 11:15:40 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|32002|event:system login
failed|7|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0100032002 cat=event:system
FTNTFGTsubtype=system FTNTFGTlevel=alert FTNTFGTvd=vdom1 FTNTFGTeventtime=1545938140
FTNTFGTlogdesc=Admin login failed FTNTFGTsn=0 duser=admin1 sproc=https
(172.16.200.254) FTNTFGTmethod=https src=172.16.200.254 dst=172.16.200.1 act=login
outcome=failed reason=name_invalid msg=Administrator admin1 login failed from https
(172.16.200.254) because of invalid user name
user subtype
The following is an example of a user subtype log sent in CEF format to a syslog server:
Dec 27 11:17:35 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|43008|event:user
authentication success|3|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0102043008
cat=event:user FTNTFGTsubtype=user FTNTFGTlevel=notice FTNTFGTvd=vdom1
FTNTFGTeventtime=1545938255 FTNTFGTlogdesc=Authentication success src=10.1.100.11
dst=172.16.200.55 FTNTFGTpolicyid=1 deviceInboundInterface=port12 duser=bob
FTNTFGTgroup=N/A FTNTFGTauthproto=TELNET(10.1.100.11) act=authentication
outcome=success reason=N/A msg=User bob succeeded in authentication
The following is an example of an antivirus log sent in CEF format to a syslog server:
Dec 27 11:20:48 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|08192|utm:virus infected
blocked|4|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0211008192 cat=utm:virus
FTNTFGTsubtype=virus FTNTFGTeventtype=infected FTNTFGTlevel=warning FTNTFGTvd=vdom1
FTNTFGTeventtime=1545938448 msg=File is infected. act=blocked app=HTTP
externalId=695 src=10.1.100.11 dst=172.16.200.55 spt=44356 dpt=80
deviceInboundInterface=port12 FTNTFGTsrcintfrole=undefined
deviceOutboundInterface=port11 FTNTFGTdstintfrole=undefined FTNTFGTpolicyid=1
proto=6 deviceDirection=0 fname=eicar.com FTNTFGTquarskip=File-was-not-quarantined.
FTNTFGTvirus=EICAR_TEST_FILE FTNTFGTdtype=Virus
FTNTFGTref=http://www.fortinet.com/ve?vn\=EICAR_TEST_FILE FTNTFGTvirusid=2172
request=http://172.16.200.55/virus/eicar.com FTNTFGTprofile=g-default duser=bob
requestClientApplication=curl/7.47.0
FTNTFGTanalyticscksum=275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd
0f FTNTFGTanalyticssubmit=false FTNTFGTcrscore=50 FTNTFGTcrlevel=critical
The following table maps FortiOS log field names to CEF field names.
filename fname
url request
agent requestClientApplication
The following is an example of a webfilter log sent in CEF format to a syslog server:
Dec 27 11:23:49 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|13056|utm:webfilter ftgd_blk
blocked|4|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0316013056
cat=utm:webfilter FTNTFGTsubtype=webfilter FTNTFGTeventtype=ftgd_blk
FTNTFGTlevel=warning FTNTFGTvd=vdom1 FTNTFGTeventtime=1545938629 FTNTFGTpolicyid=1
externalId=764 duser=bob src=10.1.100.11 spt=59194 deviceInboundInterface=port12
FTNTFGTsrcintfrole=undefined dst=185.230.61.185 dpt=80
deviceOutboundInterface=port11 FTNTFGTdstintfrole=undefined proto=6 app=HTTP
dhost=ambrishsriv.wixsite.com FTNTFGTprofile=g-default act=blocked
FTNTFGTreqtype=direct request=/bizsquads out=96 in=0 deviceDirection=1 msg=URL
The following table maps FortiOS log field names to CEF field names.
hostname dhost
catdesc requestContext
The following is an example of an email spamfilter log sent in CEF format to a syslog server:
Dec 27 11:36:58 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|20503|utm:emailfilter smtp
log-only|2|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0508020503
cat=utm:emailfilter FTNTFGTsubtype=emailfilter FTNTFGTeventtype=smtp
FTNTFGTlevel=information FTNTFGTvd=vdom1 FTNTFGTeventtime=1545939418
The following table maps FortiOS log field names to CEF field names.
from suser
to duser
The following is an example of an anomaly log sent in CEF format to a syslog server:
Dec 27 11:40:04 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|18433|utm:anomaly anomaly
clear_session|7|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0720018433
cat=utm:anomaly FTNTFGTsubtype=anomaly FTNTFGTeventtype=anomaly FTNTFGTlevel=alert
FTNTFGTvd=vdom1 FTNTFGTeventtime=1545939604 FTNTFGTseverity=critical src=10.1.100.11
FTNTFGTsrccountry=Reserved dst=172.16.200.55 deviceInboundInterface=port12
FTNTFGTsrcintfrole=undefined externalId=0 act=clear_session proto=1 app=PING cnt=1
FTNTFGTattack=icmp_flood FTNTFGTicmpid=0x3053 FTNTFGTicmptype=0x08
FTNTFGTicmpcode=0x00 FTNTFGTattackid=16777316 FTNTFGTpolicyid=1
FTNTFGTpolicytype=DoS-policy FTNTFGTref=http://www.fortinet.com/ids/VID16777316
msg=anomaly: icmp_flood, 51 > threshold 50 FTNTFGTcrscore=50 FTNTFGTcrlevel=critical
The following table maps FortiOS log field names to CEF field names.
count cnt
The following table maps FortiOS log field names to CEF field names.
status outcome
from suser
to duser
The following table maps FortiOS log field names to CEF field names.
filename fname
FortiOS 6.0.0 and later supports extended logging for UTM log types to reliable Syslog servers over TCP. Extended
logging adds HTTP header information to the rawdata field in UTM log types. You must enable extended logging before
you can use the feature.
When extended logging is enabled, the following HTTP header information can be added to the rawdata field in
UTM logs:
l Method
l X-Forwarded-For
l Request-Content-Type | Response-Content-Type
l Referer
l User-Agent
The full rawdata field of 20KB is only sent to reliable Syslog servers. Other logging devices, such as disk, FortiAnalyzer,
and UDP Syslog servers, receive the information, but only keep a maximum of 2KB total log length, including the
rawdata field, and discard the rest of the extended log information.
The extended-log option has been added to all UTM profiles, for example:
# webfilter profile
config webfilter profile
edit "test-webfilter"
set extended-log enable
set web-extended-all-action-log enable
next
end
# av profile
config antivirus profile
edit "av-proxy-test"
set extended-log enable
next
end
# waf profile
config waf profile
edit "test-waf"
set extended-log enable
next
end
The Syslog server mode changed to udp, reliable, and legacy-reliable. You must set the mode to reliable to
support extended logging, for example:
config log syslogd setting
set status enable
set server "<ip address>"
set mode reliable
set facility local6
end
Following is an example extended log for a utm log type with a webfilter subtype for a reliable Syslog server. The
rawdata field contains the extended log data.
Dec 18 15:40:15 10.6.30.254 date=2017-12-18 time=15:40:14 devname="600D-9"
devid="FGT6HD3915800120" logid="0316013056" type="utm"subtype="webfilter"
eventtype="ftgd_blk" level="warning" vd="vdom1" eventtime=1513640414 policyid=2
sessionid=440522 srcip=10.1.100.128 srcport=60995 srcintf="port2" srcintfrole="lan"
dstip=209.121.139.177 dstport=80 dstintf="port1" dstintfrole="wan" proto=6
service="HTTP" hostname="detectportal.firefox.com" profile="test-webfilter"
action="blocked" reqtype="direct" url="/success.txt" sentbyte=285 rcvdbyte=0
direction="outgoing" msg="URL belongs to a denied category in policy"
method="domain" cat=52 catdesc="Information Technology" crscore=30 crlevel="high"
rawdata="Method=GET|User-Agent=Mozilla/5.0 (Windows NT 6.1; rv:57.0) Gecko/20100101
Firefox/57.0"
The following sections list the FortiOS 6.4.7 log messages by log ID number.
Anomaly
18432 - LOGID_ATTCK_ANOMALY_TCP_UDP
dstip Destination IP ip 39
srcip Source IP ip 39
18433 - LOGID_ATTCK_ANOMALY_ICMP
Type: Anomaly
Category: ANOMALY
Severity: Alert
dstip Destination IP ip 39
srcip Source IP ip 39
18434 - LOGID_ATTCK_ANOMALY_OTHERS
dstip Destination IP ip 39
srcip Source IP ip 39
App
28672 - LOGID_APP_CTRL_IM_BASIC
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
dstip Destination IP ip 39
profile string 36
srcip Source IP ip 39
tz string 5
28673 - LOGID_APP_CTRL_IM_BASIC_WITH_STATUS
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
dstip Destination IP ip 39
profile string 36
srcip Source IP ip 39
tz string 5
28674 - LOGID_APP_CTRL_IM_BASIC_WITH_COUNT
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
dstip Destination IP ip 39
profile string 36
srcip Source IP ip 39
tz string 5
28675 - LOGID_APP_CTRL_IM_FILE
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
dstip Destination IP ip 39
profile string 36
srcip Source IP ip 39
tz string 5
28676 - LOGID_APP_CTRL_IM_CHAT
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
dstip Destination IP ip 39
profile string 36
srcip Source IP ip 39
tz string 5
28677 - LOGID_APP_CTRL_IM_CHAT_BLOCK
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
dstip Destination IP ip 39
profile string 36
srcip Source IP ip 39
tz string 5
28678 - LOGID_APP_CTRL_IM_BLOCK
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
dstip Destination IP ip 39
profile string 36
srcip Source IP ip 39
tz string 5
28704 - LOGID_APP_CTRL_IPS_PASS
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
ccertissuer string 64
clouduser User login ID detected by the Deep Application Control feature string 256
dstip Destination IP ip 39
profile string 36
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
rawdataid string 10
srcip Source IP ip 39
trueclntip True-Client-IP ip 39
tz string 5
28705 - LOGID_APP_CTRL_IPS_BLOCK
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
ccertissuer string 64
clouduser User login ID detected by the Deep Application Control feature string 256
dstip Destination IP ip 39
profile string 36
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
rawdataid string 10
srcip Source IP ip 39
trueclntip True-Client-IP ip 39
tz string 5
28706 - LOGID_APP_CTRL_IPS_RESET
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
ccertissuer string 64
clouduser User login ID detected by the Deep Application Control feature string 256
dstip Destination IP ip 39
profile string 36
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
rawdataid string 10
srcip Source IP ip 39
trueclntip True-Client-IP ip 39
tz string 5
28720 - LOGID_APP_CTRL_SSH_PASS
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
dstip Destination IP ip 39
profile string 36
srcip Source IP ip 39
tz string 5
28721 - LOGID_APP_CTRL_SSH_BLOCK
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
dstip Destination IP ip 39
profile string 36
srcip Source IP ip 39
tz string 5
28736 - LOGID_APP_CTRL_PORT_ENF
Severity: Warning
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
ccertissuer string 64
clouduser User login ID detected by the Deep Application Control feature string 256
dstip Destination IP ip 39
profile string 36
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
rawdataid string 10
srcip Source IP ip 39
trueclntip True-Client-IP ip 39
tz string 5
28737 - LOGID_APP_CTRL_PROTO_ENF
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
ccertissuer string 64
clouduser User login ID detected by the Deep Application Control feature string 256
dstip Destination IP ip 39
profile string 36
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
rawdataid string 10
srcip Source IP ip 39
trueclntip True-Client-IP ip 39
tz string 5
AV
8192 - MESGID_INFECT_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8193 - MESGID_INFECT_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8194 - MESGID_INFECT_MIME_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8195 - MESGID_INFECT_MIME_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8200 - MESGID_MIME_FILETYPE_EXE_WARNING
Category: FILETYPE-EXECUTABLE
Severity: Warning
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8201 - MESGID_MIME_FILETYPE_EXE_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8202 - MESGID_AVQUERY_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8203 - MESGID_AVQUERY_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8204 - MESGID_MIME_AVQUERY_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8205 - MESGID_MIME_AVQUERY_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8212 - MESGID_MALWARE_LIST_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8213 - MESGID_MALWARE_LIST_NOTIF
Category: MALWARE-LIST
Severity: Notice
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8214 - MESGID_MIME_MALWARE_LIST_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8215 - MESGID_MIME_MALWARE_LIST_NOTIF
Type: AV
Category: MALWARE-LIST
Severity: Notice
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8448 - MESGID_BLOCK_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
subservice string 16
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8450 - MESGID_BLOCK_MIME_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
subservice string 16
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8451 - MESGID_BLOCK_MIME_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
subservice string 16
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8452 - MESGID_BLOCK_COMMAND
Category: COMMAND-BLOCKED
Severity: Warning
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
command string 16
devid string 16
profile The name of the profile that was used to detect and take action string 64
subservice string 16
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8704 - MESGID_OVERSIZE_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8705 - MESGID_OVERSIZE_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8706 - MESGID_OVERSIZE_MIME_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8707 - MESGID_OVERSIZE_MIME_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8708 - MESGID_OVERSIZE_STREAM_UNCOMP_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8709 - MESGID_OVERSIZE_STREAM_UNCOMP_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8720 - MESGID_SWITCH_PROTO_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
subservice string 16
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8721 - MESGID_SWITCH_PROTO_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
subservice string 16
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8960 - MESGID_SCAN_UNCOMPSIZELIMIT_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8961 - MESGID_SCAN_UNCOMPSIZELIMIT_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8962 - MESGID_SCAN_ARCHIVE_ENCRYPTED_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8963 - MESGID_SCAN_ARCHIVE_ENCRYPTED_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8964 - MESGID_SCAN_ARCHIVE_CORRUPTED_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8965 - MESGID_SCAN_ARCHIVE_CORRUPTED_NOTIF
Category: SCANERROR
Severity: Notice
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8966 - MESGID_SCAN_ARCHIVE_MULTIPART_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8967 - MESGID_SCAN_ARCHIVE_MULTIPART_NOTIF
Type: AV
Category: SCANERROR
Severity: Notice
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8968 - MESGID_SCAN_ARCHIVE_NESTED_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8969 - MESGID_SCAN_ARCHIVE_NESTED_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8970 - MESGID_SCAN_ARCHIVE_OVERSIZE_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8971 - MESGID_SCAN_ARCHIVE_OVERSIZE_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8972 - MESGID_SCAN_ARCHIVE_UNHANDLED_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8973 - MESGID_SCAN_ARCHIVE_UNHANDLED_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8974 - MESGID_SCAN_AV_ENGINE_LOAD_FAILED_ERROR
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8975 - MESGID_SCAN_ARCHIVE_PARTIALLYCORRUPTED_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8976 - MESGID_SCAN_ARCHIVE_PARTIALLYCORRUPTED_NOTIF
Category: SCANERROR
Severity: Notice
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8977 - MESGID_SCAN_ARCHIVE_FILESLIMIT_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8978 - MESGID_SCAN_ARCHIVE_FILESLIMIT_NOTIF
Type: AV
Category: SCANERROR
Severity: Notice
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8979 - MESGID_SCAN_ARCHIVE_TIMEOUT_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8980 - MESGID_SCAN_ARCHIVE_TIMEOUT_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8981 - MESGID_SCAN_AV_CDR_INTERNAL_ERROR
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
9233 - MESGID_ANALYTICS_SUBMITTED
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
9234 - MESGID_ANALYTICS_INFECT_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
9235 - MESGID_ANALYTICS_INFECT_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
9236 - MESGID_ANALYTICS_INFECT_MIME_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
9237 - MESGID_ANALYTICS_INFECT_MIME_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
ref The URL of the FortiGuard IPS database entry for the attack string 512
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
9238 - MESGID_ANALYTICS_FSA_RESULT
Category: ANALYTICS
Severity: Notice
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
devid string 16
unauthuser string 66
unauthusersource string 66
9239 - MESGID_CONTENT_DISARM_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
9240 - MESGID_CONTENT_DISARM_WARNING
action The status of the session: blocked - Blocked infected file by AV string 17
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
profile The name of the profile that was used to detect and take action string 64
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
CIFS
63000 - LOG_ID_CIFS_FILE_BLOCK
date string 10
devid string 16
domainctrlauthstate uint32 5
domainctrlauthtype uint32 5
domainctrldomain string 80
domainctrlip ip 39
domainctrlname string 64
domainctrlprotocoltype uint32 5
domainctrlusername string 65
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
errorcode string 20
eventtime uint64 20
eventtype string 32
fctuid string 32
level string 11
logid string 10
policyid uint32 10
profile string 64
service string 5
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
63001 - LOG_ID_CIFS_FILE_PASS
date string 10
devid string 16
domainctrlauthstate uint32 5
domainctrlauthtype uint32 5
domainctrldomain string 80
domainctrlip ip 39
domainctrlname string 64
domainctrlprotocoltype uint32 5
domainctrlusername string 65
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
errorcode string 20
eventtime uint64 20
eventtype string 32
fctuid string 32
level string 11
logid string 10
policyid uint32 10
profile string 64
service string 5
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
63002 - LOG_ID_CIFS_CONN_FAIL
date string 10
devid string 16
domainctrlauthstate uint32 5
domainctrlauthtype uint32 5
domainctrldomain string 80
domainctrlip ip 39
domainctrlname string 64
domainctrlprotocoltype uint32 5
domainctrlusername string 65
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
errorcode string 20
eventtime uint64 20
eventtype string 32
fctuid string 32
level string 11
logid string 10
policyid uint32 10
profile string 64
service string 5
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
63003 - LOG_ID_CIFS_AUTH_FAIL
date string 10
devid string 16
domainctrlauthstate uint32 5
domainctrlauthtype uint32 5
domainctrldomain string 80
domainctrlip ip 39
domainctrlname string 64
domainctrlprotocoltype uint32 5
domainctrlusername string 65
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
errorcode string 20
eventtime uint64 20
eventtype string 32
fctuid string 32
level string 11
logid string 10
policyid uint32 10
profile string 64
service string 5
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
63004 - LOG_ID_CIFS_AUTH_INTERNAL_ERROR
date string 10
devid string 16
domainctrlauthstate uint32 5
domainctrlauthtype uint32 5
domainctrldomain string 80
domainctrlip ip 39
domainctrlname string 64
domainctrlprotocoltype uint32 5
domainctrlusername string 65
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
errorcode string 20
eventtime uint64 20
eventtype string 32
fctuid string 32
level string 11
logid string 10
policyid uint32 10
profile string 64
service string 5
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
63005 - LOG_ID_CIFS_AUTH_KRB_ERROR
date string 10
devid string 16
domainctrlauthstate uint32 5
domainctrlauthtype uint32 5
domainctrldomain string 80
domainctrlip ip 39
domainctrlname string 64
domainctrlprotocoltype uint32 5
domainctrlusername string 65
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
errorcode string 20
eventtime uint64 20
eventtype string 32
fctuid string 32
level string 11
logid string 10
policyid uint32 10
profile string 64
service string 5
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
DLP
24576 - LOG_ID_DLP_WARN
action The status of the session: log-only - DLP event is detected , string 20
but NOT blocked (similar to monitor action) block - Blocked
exempt - Allowed ban - blocked (Not in used since FortiOS
5.0, replaced by blocked) ban-sender - blocks all data being
sent by an ip or user (Not in used since FortiOS 5.0, replaced
by quarantine) quarantine-ip - Blocked and band the source ip
(Not in used since FortiOS 5.0) quarantine-interface - Blocked
and band the source interface (Not in used since FortiOS 5.0)
attachment string 3
cc string 512
dstip Destination IP ip 39
eventid The serial number of the dlparchive file in the same epoch uint32 10
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
srcip Source IP ip 39
subservice string 16
tz string 5
24577 - LOG_ID_DLP_NOTIF
action The status of the session: log-only - DLP event is detected , string 20
but NOT blocked (similar to monitor action) block - Blocked
exempt - Allowed ban - blocked (Not in used since FortiOS
5.0, replaced by blocked) ban-sender - blocks all data being
sent by an ip or user (Not in used since FortiOS 5.0, replaced
by quarantine) quarantine-ip - Blocked and band the source ip
(Not in used since FortiOS 5.0) quarantine-interface - Blocked
and band the source interface (Not in used since FortiOS 5.0)
attachment string 3
cc string 512
dstip Destination IP ip 39
eventid The serial number of the dlparchive file in the same epoch uint32 10
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
srcip Source IP ip 39
subservice string 16
tz string 5
24578 - LOG_ID_DLP_DOC_SOURCE
tz string 5
24579 - LOG_ID_DLP_DOC_SOURCE_ERROR
tz string 5
DNS
54000 - LOG_ID_DNS_QUERY
dstip Destination IP ip 39
srcip Source IP ip 39
54200 - LOG_ID_DNS_RESOLV_ERROR
dstip Destination IP ip 39
exchange Mail Exchanges from DNS response answer section string 256
rcode uint8 3
srcip Source IP ip 39
translationid uint32 10
54400 - LOG_ID_DNS_URL_FILTER_BLOCK
dstip Destination IP ip 39
exchange Mail Exchanges from DNS response answer section string 256
rcode uint8 3
srcip Source IP ip 39
translationid uint32 10
54401 - LOG_ID_DNS_URL_FILTER_ALLOW
dstip Destination IP ip 39
exchange Mail Exchanges from DNS response answer section string 256
rcode uint8 3
srcip Source IP ip 39
translationid uint32 10
54600 - LOG_ID_DNS_BOTNET_IP
Type: DNS
Category: DNS-RESPONSE
Severity: Warning
dstip Destination IP ip 39
exchange Mail Exchanges from DNS response answer section string 256
rcode uint8 3
srcip Source IP ip 39
translationid uint32 10
54601 - LOG_ID_DNS_BOTNET_DOMAIN
dstip Destination IP ip 39
exchange Mail Exchanges from DNS response answer section string 256
rcode uint8 3
srcip Source IP ip 39
translationid uint32 10
54800 - LOG_ID_DNS_FTGD_WARNING
dstip Destination IP ip 39
exchange Mail Exchanges from DNS response answer section string 256
rcode uint8 3
srcip Source IP ip 39
translationid uint32 10
54801 - LOG_ID_DNS_FTGD_ERROR
dstip Destination IP ip 39
exchange Mail Exchanges from DNS response answer section string 256
rcode uint8 3
srcip Source IP ip 39
translationid uint32 10
54802 - LOG_ID_DNS_FTGD_CAT_ALLOW
dstip Destination IP ip 39
exchange Mail Exchanges from DNS response answer section string 256
rcode uint8 3
srcip Source IP ip 39
translationid uint32 10
54803 - LOG_ID_DNS_FTGD_CAT_BLOCK
dstip Destination IP ip 39
exchange Mail Exchanges from DNS response answer section string 256
rcode uint8 3
srcip Source IP ip 39
translationid uint32 10
54804 - LOG_ID_DNS_SAFE_SEARCH
dstip Destination IP ip 39
exchange Mail Exchanges from DNS response answer section string 256
rcode uint8 3
srcip Source IP ip 39
translationid uint32 10
20480 - LOGID_ANTISPAM_EMAIL_NOTIF
action Security action of the email filter. Eg. blocked, tagged, allow string 8
agent string 64
authserver string 64
dstip Destination IP ip 39
srcip Source IP ip 39
tz string 5
unauthuser string 66
unauthusersource string 66
webmailprovider string 32
20481 - LOGID_EMAIL_GENERAL_NOTIF
action Security action of the email filter. Eg. blocked, tagged, allow string 8
agent string 64
authserver string 64
dstip Destination IP ip 39
srcip Source IP ip 39
tz string 5
unauthuser string 66
unauthusersource string 66
webmailprovider string 32
20482 - LOGID_ANTISPAM_EMAIL_BWORD_NOTIF
action Security action of the email filter. Eg. blocked, tagged, allow string 8
agent string 64
authserver string 64
dstip Destination IP ip 39
srcip Source IP ip 39
tz string 5
unauthuser string 66
unauthusersource string 66
webmailprovider string 32
20509 - LOGID_ANTISPAM_FTGD_ERR
action Security action of the email filter. Eg. blocked, tagged, allow string 8
agent string 64
authserver string 64
dstip Destination IP ip 39
srcip Source IP ip 39
tz string 5
unauthuser string 66
unauthusersource string 66
webmailprovider string 32
20510 - LOGID_ANTISPAM_EMAIL_WEBMAIL_NOTIF
action Security action of the email filter. Eg. blocked, tagged, allow string 8
agent string 64
authserver string 64
dstip Destination IP ip 39
srcip Source IP ip 39
tz string 5
unauthuser string 66
unauthusersource string 66
webmailprovider string 32
Event
20002 - LOG_ID_DOMAIN_UNRESOLVABLE
20003 - LOG_ID_MAIL_SENT_FAIL
20004 - LOG_ID_POLICY_TOO_BIG
20005 - LOG_ID_PPP_LINK_UP
20006 - LOG_ID_PPP_LINK_DOWN
20007 - LOG_ID_SOCKET_EXHAUSTED
dstip Destination IP ip 39
srcip Source IP ip 39
vrf uint8 3
20008 - LOG_ID_POLICY6_TOO_BIG
20010 - LOG_ID_KERNEL_ERROR
20016 - LOG_ID_MODEM_EXCEED_REDIAL_COUNT
20017 - LOG_ID_MODEM_FAIL_TO_OPEN
20020 - LOG_ID_MODEM_USB_DETECTED
20021 - LOG_ID_MAIL_RESENT
20022 - LOG_ID_MODEM_USB_REMOVED
20023 - LOG_ID_MODEM_USBLTE_DETECTED
Severity: Information
20024 - LOG_ID_MODEM_USBLTE_REMOVED
20025 - LOG_ID_REPORTD_REPORT_SUCCESS
20026 - LOG_ID_REPORTD_REPORT_FAILURE
20027 - LOG_ID_REPORT_DEL_OLD_REC
20028 - LOG_ID_REPORT_RECREATE_DB
20031 - LOG_ID_RAD_OUT_OF_MEM
20032 - LOG_ID_RAD_NOT_FOUND
20033 - LOG_ID_RAD_MOBILE_IPV6
20034 - LOG_ID_RAD_IPV6_OUT_OF_RANGE
20035 - LOG_ID_RAD_MIN_OUT_OF_RANGE
20036 - LOG_ID_RAD_MAX_OUT_OF_RANGE
20037 - LOG_ID_RAD_MAX_ADV_OUT_OF_RANGE
20039 - LOG_ID_RAD_MTU_TOO_SMALL
20040 - LOG_ID_RAD_TIME_TOO_SMALL
20041 - LOG_ID_RAD_HOP_OUT_OF_RANGE
20042 - LOG_ID_RAD_DFT_HOP_OUT_OF_RANGE
20043 - LOG_ID_RAD_AGENT_OUT_OF_RANGE
20044 - LOG_ID_RAD_AGENT_FLAG_NOT_SET
20045 - LOG_ID_RAD_PREFIX_TOO_LONG
20046 - LOG_ID_RAD_PREF_TIME_TOO_SMALL
20047 - LOG_ID_RAD_FAIL_IPV6_SOCKET
20048 - LOG_ID_RAD_FAIL_OPT_IPV6_PKTINFO
20049 - LOG_ID_RAD_FAIL_OPT_IPV6_CHECKSUM
20050 - LOG_ID_RAD_FAIL_OPT_IPV6_UNICAST_HOPS
20051 - LOG_ID_RAD_FAIL_OPT_IPV6_MULTICAST_HOPS
20052 - LOG_ID_RAD_FAIL_OPT_IPV6_HOPLIMIT
20053 - LOG_ID_RAD_FAIL_OPT_IPPROTO_ICMPV6
20054 - LOG_ID_RAD_EXIT_BY_SIGNAL
20055 - LOG_ID_RAD_FAIL_CMDB_QUERY
20056 - LOG_ID_RAD_FAIL_CMDB_FOR_EACH
20057 - LOG_ID_RAD_FAIL_FIND_VIRT_INTF
20058 - LOG_ID_RAD_UNLOAD_INTF
20061 - LOG_ID_RAD_INV_ICMPV6_TYPE
20062 - LOG_ID_RAD_INV_ICMPV6_RA_LEN
20063 - LOG_ID_RAD_ICMPV6_NO_SRC_ADDR
20064 - LOG_ID_RAD_INV_ICMPV6_RS_LEN
20065 - LOG_ID_RAD_INV_ICMPV6_CODE
20066 - LOG_ID_RAD_INV_ICMPV6_HOP
20067 - LOG_ID_RAD_MISMATCH_HOP
20068 - LOG_ID_RAD_MISMATCH_MGR_FLAG
20069 - LOG_ID_RAD_MISMATCH_OTH_FLAG
20070 - LOG_ID_RAD_MISMATCH_TIME
20071 - LOG_ID_RAD_MISMATCH_TIMER
20072 - LOG_ID_RAD_EXTRA_DATA
20073 - LOG_ID_RAD_NO_OPT_DATA
20074 - LOG_ID_RAD_INV_OPT_LEN
20075 - LOG_ID_RAD_MISMATCH_MTU
20077 - LOG_ID_RAD_MISMATCH_PREF_TIME
20078 - LOG_ID_RAD_INV_OPT
20080 - LOG_ID_RAD_FAIL_TO_RCV
20081 - LOG_ID_RAD_INV_HOP
20082 - LOG_ID_RAD_INV_PKTINFO
20083 - LOG_ID_RAD_FAIL_TO_CHECK
20084 - LOG_ID_RAD_FAIL_TO_SEND
20085 - LOG_ID_SESSION_CLASH
trace_id string 32
20090 - LOG_ID_INTF_LINK_STA_CHG
20099 - LOG_ID_INTF_STA_CHG
20100 - LOG_ID_WEB_CAT_UPDATED
20101 - LOG_ID_WEB_LIC_EXPIRE
20102 - LOG_ID_SPAM_LIC_EXPIRE
20103 - LOG_ID_AV_LIC_EXPIRE
20104 - LOG_ID_IPS_LIC_EXPIRE
20107 - LOG_ID_LOG_UPLOAD_ERR
20108 - LOG_ID_LOG_UPLOAD_DONE
20109 - LOG_ID_WEB_LIC_EXPIRED
20113 - LOG_ID_IPSA_DOWNLOAD_FAIL
20114 - LOG_ID_IPSA_SELFTEST_FAIL
20115 - LOG_ID_IPSA_STATUSUPD_FAIL
20116 - LOG_ID_SPAM_LIC_EXPIRED
Severity: Critical
20117 - LOG_ID_AV_LIC_EXPIRED
20118 - LOG_ID_WEBF_STATUS_REACH
20119 - LOG_ID_WEBF_STATUS_UNREACH
Category: SYSTEM
Severity: Warning
20200 - LOG_ID_FIPS_SELF_TEST
20201 - LOG_ID_FIPS_SELF_ALL_TEST
20202 - LOG_ID_DISK_FORMAT_ERROR
20203 - LOG_ID_DAEMON_SHUTDOWN
20204 - LOG_ID_DAEMON_START
20205 - LOG_ID_DISK_FORMAT_REQ
20206 - LOG_ID_DISK_SCAN_REQ
20207 - LOG_ID_RAD_MISMATCH_VALID_TIME
20208 - LOG_ID_ZOMBIE_DAEMON_CLEANUP
20209 - LOG_ID_DISK_UNAVAIL
20210 - LOG_ID_DISK_TRIM_START
20211 - LOG_ID_DISK_TRIM_END
20212 - LOG_ID_DISK_SCAN_NEEDED
20213 - LOG_ID_DISK_LOG_CORRUPTED
20220 - LOGID_EVENT_SHAPER_OUTBOUND_MAXED_OUT
Category: SYSTEM
Severity: Information
20221 - LOGID_EVENT_SHAPER_INBOUND_MAXED_OUT
20300 - LOG_ID_BGP_NB_STAT_CHG
20301 - LOG_ID_VZ_LOG
20302 - LOG_ID_OSPF_NB_STAT_CHG
20303 - LOG_ID_OSPF6_NB_STAT_CHG
20401 - LOG_ID_ROUTER_CLEAR
22000 - LOG_ID_INV_PKT_LEN
22001 - LOG_ID_UNSUPPORTED_PROT_VER
22002 - LOG_ID_INV_REQ_TYPE
22003 - LOG_ID_FAIL_SET_SIG_HANDLER
Severity: Warning
22004 - LOG_ID_FAIL_CREATE_SOCKET
22005 - LOG_ID_FAIL_CREATE_SOCKET_RETRY
22006 - LOG_ID_FAIL_REG_CMDB_EVENT
22009 - LOG_ID_FAIL_FIND_AV_PROFILE
22010 - LOG_ID_SENDTO_FAIL
22011 - LOG_ID_ENTER_MEM_CONSERVE_MODE
red string 32
22012 - LOG_ID_LEAVE_MEM_CONSERVE_MODE
red string 32
22013 - LOG_ID_IPPOOLPBA_BLOCK_EXHAUSTED
22014 - LOG_ID_IPPOOLPBA_NATIP_EXHAUSTED
22015 - LOG_ID_IPPOOLPBA_CREATE
22016 - LOG_ID_IPPOOLPBA_DEALLOCATE
22017 - LOG_ID_EXCEED_GLOB_RES_LIMIT
22018 - LOG_ID_EXCEED_VD_RES_LIMIT
22019 - LOG_ID_LOGRATE_OVER_LIMIT
22020 - LOG_ID_FAIL_CREATE_HA_SOCKET
22021 - LOG_ID_FAIL_CREATE_HA_SOCKET_RETRY
Severity: Warning
22031 - LOG_ID_SUCCESS_CSF_LOG_SYNC_CONFIG_CHANGED
22032 - LOG_ID_CSF_LOOP_FOUND
22035 - LOG_ID_CSF_UPSTREAM_SN_CHANGED
ip ip 39
22036 - LOG_ID_CSF_FGT_CONNECTED
Type: Event
Category: SYSTEM
Severity: Information
direction string 16
ip ip 39
22037 - LOG_ID_CSF_FGT_DISCONNECTED
direction string 16
ip ip 39
22038 - LOG_ID_CSF_GLOBAL_SYNC_FAILED
22039 - LOG_ID_CSF_GLOBAL_SYNC_REPORT
cmdbpathname string 96
cmdbtablename string 64
conflictcount int32 10
errorcount int32 10
successcount int32 10
22050 - LOG_ID_IPAMD_ADDRESS_ALLOCATED
ip ip 39
22051 - LOG_ID_IPAMD_ADDRESS_SET_FAILED
ip ip 39
22052 - LOG_ID_IPAMD_ADDRESS_INVALIDATED
22053 - LOG_ID_IPAMD_VALIDATION_COMPLETE
22100 - LOG_ID_QUAR_DROP_TRAN_JOB
22101 - LOG_ID_QUAR_DROP_TLL_JOB
22102 - LOG_ID_LOG_DISK_FAILURE
22103 - LOG_ID_QUAR_LIMIT_REACHED
22104 - LOG_ID_POWER_RESTORE
22105 - LOG_ID_POWER_FAILURE
22106 - LOG_ID_POWER_OPTIONAL_NOT_DETECTED
22107 - LOG_ID_VOLT_ANOM
22108 - LOG_ID_FAN_ANOM
22109 - LOG_ID_TEMP_TOO_HIGH
22110 - LOG_ID_SPARE_BLOCK_LOW
22113 - LOG_ID_FNBAM_FAILURE
22150 - LOG_ID_VOLT_NOM
22151 - LOG_ID_FAN_NOM
22152 - LOG_ID_TEMP_TOO_LOW
22153 - LOG_ID_TEMP_NORM
22200 - LOG_ID_AUTO_UPT_CERT
22201 - LOG_ID_AUTO_GEN_CERT
22203 - LOG_ID_AUTO_GEN_CERT_FAIL
22204 - LOG_ID_AUTO_GEN_CERT_PENDING
22205 - LOG_ID_AUTO_GEN_CERT_SUCC
22206 - LOG_ID_CRL_EXPIRED
22220 - LOG_ID_EXT_RESOURCE
22221 - LOG_ID_EXT_RESOURCE_FAIL
22222 - LOG_ID_EXT_RESOURCE_LOAD
created string 64
22223 - LOG_ID_EXT_RESOURCE_DEBUG
22700 - LOG_ID_IPS_FAIL_OPEN
22701 - LOG_ID_IPS_FAIL_OPEN_END
22800 - LOG_ID_SCAN_SERV_FAIL
22802 - LOG_ID_ENTER_FD_CONSERVE_MODE
Category: SYSTEM
Severity: Critical
red string 32
22803 - LOG_ID_LEAVE_FD_CONSERVE_MODE
red string 32
22804 - LOG_ID_LIC_STATUS_CHG
22805 - LOG_ID_FAIL_TO_VALIDATE_LIC
22806 - LOG_ID_DUP_LIC
22808 - LOG_ID_LIC_EXPIRE
Category: SYSTEM
Severity: Critical
22809 - LOG_ID_LIC_WILL_EXPIRE
22810 - LOG_ID_SCANUNIT_ERROR_BLOCK
dstip Destination IP ip 39
srcip Source IP ip 39
22811 - LOG_ID_SCANUNIT_ERROR_PASS
dstip Destination IP ip 39
srcip Source IP ip 39
22812 - LOG_ID_SCANUNIT_AVENG_RELOAD
22813 - LOG_ID_SCANUNIT_AVDB_RELOAD
22814 - LOG_ID_SCANUNIT_AVDB_RELOAD_ERROR
Type: Event
Category: SYSTEM
Severity: Error
22815 - LOG_ID_SCANUNIT_AVDB_LOAD
22816 - LOG_ID_SCANUNIT_AVDB_LOAD_ERROR
22850 - LOG_ID_USER_QUARANTINE_MAC_ADD
action string 65
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
22851 - LOG_ID_USER_QUARANTINE_MAC_DELETE
action string 65
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
22852 - LOG_ID_USER_QUARANTINE_MAC_BOUNCE_PORT_HIT
action string 65
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
22853 - LOG_ID_USER_QUARANTINE_MAC_BOUNCE_PORT_MISS
action string 65
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
22890 - LOG_ID_FORTILINKD
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
22891 - LOG_ID_FLCFGD_SYNC_ERROR
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
22892 - LOG_ID_FLCFGD_SYNC_COMPLETE
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
22893 - LOG_ID_FLCFGD_SYNC_STATE
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
22894 - LOG_ID_FLCFGD_UPGRADE_ERROR
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
22895 - LOG_ID_FLCFGD_UPGRADE_STATUS
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
22896 - LOG_ID_FORTILINKD_CRITICAL
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
22897 - LOG_ID_FLCFGD_NAC_ADD
action string 65
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
22898 - LOG_ID_FLCFGD_NAC_DELETE
Severity: Information
action string 65
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
22899 - LOG_ID_FLCFGD_NAC_MODIFY
action string 65
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
22900 - LOG_ID_CAPUTP_SESSION
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
subtype string 20
time string 8
type string 16
tz string 5
vd string 32
22901 - LOG_ID_FAZ_CON
22902 - LOG_ID_FAZ_DISCON
22903 - LOG_ID_FAZ_CON_ERR
22904 - LOG_ID_CAPUTP_SESSION_NOTIF
action string 65
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
srcip ip 39
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
22912 - LOG_ID_FDS_SRV_ERRCON
22913 - LOG_ID_FDS_SRV_DISCON
22914 - LOG_ID_FDS_SRV_CHG
22915 - LOG_ID_FDS_SRV_CON
22916 - LOG_ID_FDS_STATUS
22917 - LOG_ID_FDS_SMS_QUOTA
22918 - LOG_ID_FDS_CTRL_STATUS
22919 - LOG_ID_SVR_LOG_STATUS_CHANGED
22921 - LOG_ID_EVENT_ROUTE_INFO_CHANGED
22922 - LOG_ID_EVENT_LINK_MONITOR_STATUS
22923 - LOG_ID_EVENT_VWL_LQTY_STATUS
eventtype string 32
healthcheck string 64
newvalue string 32
numpassmember uint32 10
oldvalue string 32
serviceid uint32 10
slatargetid uint32 10
22924 - LOG_ID_EVENT_VWL_VOLUME_STATUS
Category: SDWAN
Severity: Notice
eventtype string 32
22925 - LOG_ID_EVENT_VWL_SLA_INFO
bibandwidth string 24
bibandwidthused string 24
eventtype string 32
healthcheck string 64
inbandwidth string 24
inbandwidthused string 24
jitter string 24
latency string 24
newvalue string 32
oldvalue string 32
outbandwidth string 24
outbandwidthused string 24
packetloss string 24
slamap string 24
slatargetid uint32 10
22926 - LOG_ID_EVENT_VWL_NEIGHBOR_STATUS
Severity: Notice
eventtype string 32
neighbor string 46
22927 - LOG_ID_EVENT_VWL_NEIGHBOR_STANDALONE
eventtype string 32
newvalue string 32
oldvalue string 32
22928 - LOG_ID_EVENT_VWL_NEIGHBOR_PRIMARY
eventtype string 32
newvalue string 32
oldvalue string 32
22929 - LOG_ID_EVENT_VWL_NEIGHBOR_SECONDARY
eventtype string 32
newvalue string 32
oldvalue string 32
22949 - LOG_ID_FDS_JOIN
22950 - LOG_ID_FDS_LOGIN_SUCC
22951 - LOG_ID_FDS_LOGOUT
22952 - LOG_ID_FDS_LOGIN_FAIL
22953 - LOG_ID_IOC_DETECTED
22954 - LOG_ID_INET_SVC_OBSOLETE
22955 - LOG_ID_INET_SVC_NAME_FAILURE
22956 - LOG_ID_INET_SVC_NAME_UPDATE
23101 - LOG_ID_IPSEC_TUNNEL_UP
23102 - LOG_ID_IPSEC_TUNNEL_DOWN
23103 - LOG_ID_IPSEC_TUNNEL_STAT
26001 - LOG_ID_DHCP_ACK
ip ip 39
26002 - LOG_ID_DHCP_RELEASE
ip ip 39
26003 - LOG_ID_DHCP_STAT
26004 - LOG_ID_DHCP_CLIENT_LEASE
26005 - LOG_ID_DHCP_LEASE_USAGE_HIGH
26006 - LOG_ID_DHCP_LEASE_USAGE_FULL
26007 - LOG_ID_DHCP_BLOCKED_MAC
26008 - LOG_ID_DHCP_DDNS_ADD
ip ip 39
26009 - LOG_ID_DHCP_DDNS_DELETE
ip ip 39
26010 - LOG_ID_DHCP_DDNS_COMPLETED
ip ip 39
26011 - LOG_ID_DHCPV6_REPLY
ip ip 39
26012 - LOG_ID_DHCPV6_RELEASE
ip ip 39
27001 - LOG_ID_VRRP_STATE_CHG
29001 - LOG_ID_PPPD_MSG
29002 - LOG_ID_PPPD_AUTH_SUC
29003 - LOG_ID_PPPD_AUTH_FAIL
29010 - LOG_ID_PPPOE_STATUS_REPORT_NOTIF
29011 - LOG_ID_PPPD_FAIL_TO_EXEC
29012 - LOG_ID_PPP_OPT_ERR
29013 - LOG_ID_PPPD_START
29014 - LOG_ID_PPPD_EXIT
29015 - LOG_ID_PPP_RCV_BAD_PEER_IP
29016 - LOG_ID_PPP_RCV_BAD_LOCAL_IP
29017 - LOG_ID_PPP_OPT_NOTIF
29021 - LOG_ID_EVENT_AUTH_SNMP_QUERY_FAILED
dstip Destination IP ip 39
srcip Source IP ip 39
29022 - LOG_ID_DDNS_UPDATE_FAIL
32001 - LOG_ID_ADMIN_LOGIN_SUCC
dstip Destination IP ip 39
srcip Source IP ip 39
32002 - LOG_ID_ADMIN_LOGIN_FAIL
dstip Destination IP ip 39
srcip Source IP ip 39
32003 - LOG_ID_ADMIN_LOGOUT
dstip Destination IP ip 39
srcip Source IP ip 39
32005 - LOG_ID_ADMIN_OVERIDE_VDOM
32006 - LOG_ID_ADMIN_ENTER_VDOM
32007 - LOG_ID_ADMIN_LEFT_VDOM
32008 - LOG_ID_VIEW_DISK_LOG_FAIL
32009 - LOG_ID_SYSTEM_START
32010 - LOG_ID_DISK_LOG_FULL
32011 - LOG_ID_LOG_ROLL
32014 - LOG_ID_CS_LIC_EXPIRE
32015 - LOG_ID_DISK_LOG_USAGE
32017 - LOG_ID_FDS_DAILY_QUOTA_FULL
32018 - LOG_ID_FIPS_ENTER_ERR_MOD
Severity: Emergency
32019 - LOG_ID_CC_ENTER_ERR_MOD
32020 - LOG_ID_SSH_CORRPUT_MAC
32021 - LOG_ID_ADMIN_LOGIN_DISABLE
32022 - LOG_ID_VDOM_ENABLED
Severity: Notice
32023 - LOG_ID_MEM_LOG_FIRST_FULL
32024 - LOG_ID_ADMIN_PASSWD_EXPIRE
32025 - LOG_ID_SSH_REKEY
32026 - LOG_ID_SSH_BAD_PACKET_LENGTH
32027 - LOG_ID_VIEW_DISK_LOG_SUCC
32028 - LOG_ID_LOG_DEL_DIR
32029 - LOG_ID_LOG_DEL_FILE
Type: Event
Category: SYSTEM
Severity: Warning
32030 - LOG_ID_SEND_FDS_STAT
32031 - LOG_ID_VIEW_MEM_LOG_FAIL
32032 - LOG_ID_DISK_DLP_ARCH_FULL
32033 - LOG_ID_DISK_QUAR_FULL
Category: SYSTEM
Severity: Emergency
32034 - LOG_ID_DISK_REPORT_FULL
32035 - LOG_ID_VDOM_DISABLED
32036 - LOG_ID_DISK_IPS_ARCH_FULL
32037 - LOG_ID_DISK_LOG_FIRST_FULL
32038 - LOG_ID_LOG_ROLL_FORTICRON
32039 - LOG_ID_VIEW_MEM_LOG_SUCC
32040 - LOG_ID_REPORT_DELETED
32041 - LOG_ID_REPORT_DELETED_GUI
32042 - LOG_ID_MEM_LOG_SECOND_FULL
32043 - LOG_ID_MEM_LOG_FINAL_FULL
Type: Event
Category: SYSTEM
Severity: Warning
32044 - LOG_ID_LOG_DELETE
32045 - LOG_ID_MGR_LIC_EXPIRE
32048 - LOG_ID_SCHEDULE_EXPIRE
32049 - LOG_ID_FC_EXPIRE
32050 - LOG_ID_POL_PKT_CAPTURE_FULL
32051 - LOG_ID_LOG_UPLOAD
32052 - LOG_ID_UPLOAD_RUN_SCRIPT
32053 - LOG_ID_ADMIN_MTNER_LOGIN_SUCC
dstip Destination IP ip 39
srcip Source IP ip 39
32054 - LOG_ID_ADMIN_MTNER_LOGOUT
dstip Destination IP ip 39
srcip Source IP ip 39
32057 - LOG_ID_VIEW_FAZ_LOG_FAIL
32058 - LOG_ID_VIEW_FAZ_LOG_SUCC
32095 - LOG_ID_GUI_CHG_SUB_MODULE
32096 - LOG_ID_GUI_DOWNLOAD_LOG
32097 - LOG_ID_DELETE_CAPTURE_PKT
32100 - LOG_ID_FORTI_TOKEN_SYNC
32102 - LOG_ID_CHG_CONFIG
32103 - LOG_ID_NEW_FIRMWARE
32104 - LOG_ID_CHG_CONFIG_GUI
Type: Event
Category: SYSTEM
Severity: Information
32105 - LOG_ID_NTP_SVR_STAUS_CHG_REACHABLE
32106 - LOG_ID_NTP_SVR_STAUS_CHG_RESOLVABLE
32107 - LOG_ID_NTP_SVR_STAUS_CHG_UNRESOLVABLE
32108 - LOG_ID_NTP_SVR_STAUS_CHG_UNREACHABLE
32109 - LOG_ID_UPD_SIGN_AV_DB
32110 - LOG_ID_UPD_SIGN_IPS_DB
32111 - LOG_ID_UPD_SIGN_AVIPS_DB
32113 - LOG_ID_UPD_SIGN_SRCVIS_DB
32114 - LOG_ID_UPD_SIGN_GEOIP_DB
32116 - LOG_ID_UPD_SIGN_AVPKG_FAILURE
32117 - LOG_ID_UPD_SIGN_AVPKG_SUCCESS
32118 - LOG_ID_UPD_ADMIN_AV_DB
32119 - LOG_ID_UPD_SCANUNIT_AV_DB
32120 - LOG_ID_RPT_ADD_DATASET
32122 - LOG_ID_RPT_DEL_DATASET
32125 - LOG_ID_RPT_ADD_CHART
32126 - LOG_ID_RPT_DEL_CHART
32129 - LOG_ID_ADD_GUEST
32130 - LOG_ID_CHG_USER
32131 - LOG_ID_DEL_GUEST
32132 - LOG_ID_ADD_USER
32138 - LOG_ID_REBOOT
32139 - LOG_ID_WAKE_ON_LAN
32140 - LOG_ID_TIME_USER_SETTING_CHG
srcip Source IP ip 39
32141 - LOG_ID_TIME_NTP_SETTING_CHG
32142 - LOG_ID_BACKUP_CONF
32143 - LOG_ID_BACKUP_CONF_BY_SCP
32144 - LOG_ID_BACKUP_CONF_ERROR
32145 - LOG_ID_BACKUP_CONF_ALERT
32146 - LOG_ID_TIME_PTP_SETTING_CHG
32148 - LOG_ID_GET_CRL
32149 - LOG_ID_COMMAND_FAIL
32151 - LOG_ID_ADD_IP6_LOCAL_POL
32152 - LOG_ID_CHG_IP6_LOCAL_POL
32153 - LOG_ID_DEL_IP6_LOCAL_POL
32155 - LOG_ID_ACT_FTOKEN_REQ
32156 - LOG_ID_ACT_FTOKEN_SUCC
32157 - LOG_ID_SYNC_FTOKEN_SUCC
32158 - LOG_ID_SYNC_FTOKEN_FAIL
32159 - LOG_ID_ACT_FTOKEN_FAIL
32160 - LOG_ID_FTM_PUSH_SUCC
32161 - LOG_ID_FTM_PUSH_FAIL
32168 - LOG_ID_REACH_VDOM_LIMIT
32169 - LOG_ID_ALARM_DLP_DB
32170 - LOG_ID_ALARM_MSG
32171 - LOG_ID_ALARM_ACK
32172 - LOG_ID_ADD_IP4_LOCAL_POL
32173 - LOG_ID_CHG_IP4_LOCAL_POL
32174 - LOG_ID_DEL_IP4_LOCAL_POL
32190 - LOG_ID_UPT_INVALID_IMG
32191 - LOG_ID_UPT_INVALID_IMG_CC
32192 - LOG_ID_UPT_INVALID_IMG_RSA
32193 - LOG_ID_UPT_IMG_RSA
32194 - LOG_ID_UPT_IMG_FAIL
32199 - LOG_ID_RESTORE_IMG_USB
32200 - LOG_ID_SHUTDOWN
32201 - LOG_ID_LOAD_IMG_SUCC
32202 - LOG_ID_RESTORE_IMG
32203 - LOG_ID_RESTORE_CONF
32204 - LOG_ID_RESTORE_FGD_SVR
32205 - LOG_ID_RESTORE_VDOM_LIC
32206 - LOG_ID_RESTORE_SCRIPT
32207 - LOG_ID_RETRIEVE_CONF_LIST
32208 - LOG_ID_IMP_PKCS12_CERT
32209 - LOG_ID_RESTORE_USR_DEF_IPS
32210 - LOG_ID_BACKUP_IMG_SUCC
32211 - LOG_ID_UPLOAD_REVISION
32212 - LOG_ID_DEL_REVISION
32213 - LOG_ID_RESTORE_TEMPLATE
32214 - LOG_ID_RESTORE_FILE
32215 - LOG_ID_UPT_IMG
32217 - LOG_ID_UPD_IPS
32218 - LOG_ID_UPD_DLP
32219 - LOG_ID_BACKUP_OUTPUT
32220 - LOG_ID_BACKUP_COMMAND
32221 - LOG_ID_UPD_VDOM_LIC
32222 - LOG_ID_GLB_SETTING_CHG
32223 - LOG_ID_BACKUP_USER_DEF_IPS
32224 - LOG_ID_BACKUP_DISK_LOG
32225 - LOG_ID_DEL_ALL_REVISION
32226 - LOG_ID_LOAD_IMG_FAIL
32227 - LOG_ID_UPD_DLP_FAIL
32228 - LOG_ID_LOAD_IMG_FAIL_WRONG_IMG
32229 - LOG_ID_LOAD_IMG_FAIL_NO_RSA
32230 - LOG_ID_LOAD_IMG_FAIL_INVALID_RSA
32231 - LOG_ID_RESTORE_FGD_SVR_FAIL
32232 - LOG_ID_RESTORE_VDOM_LIC_FAIL
32233 - LOG_ID_BACKUP_IMG_FAIL
32234 - LOG_ID_RESTORE_IMG_INVALID_CC
32235 - LOG_ID_RESTORE_IMG_FORTIGUARD
32236 - LOG_ID_BACKUP_MEM_LOG
32237 - LOG_ID_BACKUP_MEM_LOG_FAIL
Type: Event
Category: SYSTEM
Severity: Notice
32238 - LOG_ID_BACKUP_DISK_LOG_FAIL
32239 - LOG_ID_BACKUP_DISK_LOG_USB
32240 - LOG_ID_SYS_USB_MODE
32241 - LOG_ID_BACKUP_DISK_LOG_USB_FAIL
32242 - LOG_ID_UPD_VDOM_LIC_FAIL
32243 - LOG_ID_UPD_IPS_SCP
32244 - LOG_ID_UPD_IPS_SCP_FAIL
32245 - LOG_ID_BACKUP_USER_DEF_IPS_FAIL
32246 - LOG_ID_RESTORE_USR_DEF_IPS_CRITICAL
32247 - LOG_ID_SSH_NEGOTIATION_FAILURE
32252 - LOG_ID_FACTORY_RESET
32253 - LOG_ID_FORMAT_RAID
32254 - LOG_ID_ENABLE_RAID
32255 - LOG_ID_DISABLE_RAID
Type: Event
Category: SYSTEM
Severity: Critical
32300 - LOG_ID_UPLOAD_RPT_IMG
32301 - LOG_ID_ADD_VDOM
32302 - LOG_ID_DEL_VDOM
32545 - LOG_ID_SYS_RESTART
32546 - LOG_ID_APPLICATION_CRASH
Type: Event
Category: SYSTEM
Severity: Warning
32547 - LOG_ID_AUTOSCRIPT_START
32548 - LOG_ID_AUTOSCRIPT_STOP
32549 - LOG_ID_AUTOSCRIPT_STOP_AUTO
32550 - LOG_ID_AUTOSCRIPT_DELETE_RSLT
Category: SYSTEM
Severity: Information
32551 - LOG_ID_AUTOSCRIPT_BACKUP_RSLT
32552 - LOG_ID_AUTOSCRIPT_CHECK_STATUS
32553 - LOG_ID_AUTOSCRIPT_STOP_REACH_LIMIT
32561 - LOG_ID_ADMIN_LOGOUT_DISCONNECT
Category: SYSTEM
Severity: Information
dstip Destination IP ip 39
srcip Source IP ip 39
32562 - LOG_ID_STORE_CONF_FAIL_SPACE
Category: SYSTEM
Severity: Critical
32564 - LOG_ID_RESTORE_CONF_FAIL
32565 - LOG_ID_RESTORE_CONF_BY_MGMT
32566 - LOG_ID_RESTORE_CONF_BY_SCP
32567 - LOG_ID_RESTORE_CONF_BY_USB
32568 - LOG_ID_DEL_REVISION_DB
32569 - LOG_ID_FSW_SWITCH_LOG_EVENT
cfgtid uint32 10
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32570 - LOG_ID_ADMIN_MTNER_LOGOUT_DISCONNECT
dstip Destination IP ip 39
srcip Source IP ip 39
32601 - LOG_ID_FGT_SWITCH_LOG_DISCOVER
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32602 - LOG_ID_FGT_SWITCH_LOG_AUTH
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32603 - LOG_ID_FGT_SWITCH_LOG_DEAUTH
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32604 - LOG_ID_FGT_SWITCH_LOG_DELETE
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32605 - LOG_ID_FGT_SWITCH_LOG_TUNNEL_UP
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32606 - LOG_ID_FGT_SWITCH_LOG_TUNNEL_DOWN
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32607 - LOG_ID_FGT_SWITCH_PUSH_IMAGE
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32608 - LOG_ID_FGT_SWITCH_STAGE_IMAGE
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32609 - LOG_ID_FGT_SWITCH_DISABLE_DISCOVERY
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32610 - LOG_ID_FGT_SWITCH_LOG_WARNING
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32611 - LOG_ID_FGT_SWITCH_EXPORT_POOL
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32612 - LOG_ID_FGT_SWITCH_EXPORT_VDOM
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32613 - LOG_ID_FGT_SWITCH_REQUEST_PORT
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32614 - LOG_ID_FGT_SWITCH_RETURN_PORT
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32615 - LOG_ID_FGT_SWITCH_MAC_ADD
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32616 - LOG_ID_FGT_SWITCH_MAC_DEL
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32617 - LOG_ID_FGT_SWITCH_MAC_MOVE
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32693 - LOG_ID_FGT_SWITCH_GROUP_SWC
cfgtid uint32 10
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32694 - LOG_ID_FGT_SWITCH_GROUP_POE
cfgtid uint32 10
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32695 - LOG_ID_FGT_SWITCH_GROUP_LINK
cfgtid uint32 10
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32696 - LOG_ID_FGT_SWITCH_GROUP_STP
cfgtid uint32 10
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32697 - LOG_ID_FGT_SWITCH_GROUP_SWITCH
cfgtid uint32 10
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32698 - LOG_ID_FGT_SWITCH_GROUP_ROUTER
cfgtid uint32 10
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32699 - LOG_ID_FGT_SWITCH_GROUP_SYSTEM
cfgtid uint32 10
date string 10
devid string 16
eventtime uint64 20
level string 11
logid string 10
sn string 64
subtype string 20
time string 8
type string 16
tz string 5
ui string 64
vd string 32
32700 - LOG_ID_DPDK_EARLY_INIT_FAIL
34415 - LOG_ID_NP6_IPSEC_ENGINE_BUSY
34416 - LOG_ID_NP6_IPSEC_ENGINE_POSSIBLY_LOCKUP
Type: Event
Category: SYSTEM
Severity: Warning
34417 - LOG_ID_NP6_IPSEC_ENGINE_LOCKUP
34418 - LOG_ID_NP6_HPE_PACKET_DROP
34419 - LOG_ID_NP6_HPE_PACKET_FLOOD
35001 - LOG_ID_HA_SYNC_VIRDB
35002 - LOG_ID_HA_SYNC_ETDB
35003 - LOG_ID_HA_SYNC_EXDB
35004 - LOG_ID_HA_SYNC_FLDB
35005 - LOG_ID_HA_SYNC_IPS
35007 - LOG_ID_HA_SYNC_AV
35009 - LOG_ID_HA_SYNC_CID
35011 - LOG_ID_HA_SYNC_FAIL
35012 - LOG_ID_CONF_SYNC_FAIL
35013 - LOG_ID_HA_FAILOVER_FAIL
35014 - LOG_ID_HA_RESET_UPTIME
35015 - LOG_ID_HA_CLEAR_HISTORY
35016 - LOG_ID_HA_FAILOVER_SUCCESS
Type: Event
Category: HA
Severity: Information
36881 - LOG_ID_EVENT_SYSTEM_CFG_REVERT
36882 - LOG_ID_EVENT_SYSTEM_CFG_MANUALLY_SAVED
37120 - MESGID_NEG_GENERIC_P1_NOTIF
37121 - MESGID_NEG_GENERIC_P1_ERROR
37122 - MESGID_NEG_GENERIC_P2_NOTIF
37123 - MESGID_NEG_GENERIC_P2_ERROR
37124 - MESGID_NEG_I_P1_ERROR
37125 - MESGID_NEG_I_P2_ERROR
37126 - MESGID_NEG_NO_STATE_ERROR
37127 - MESGID_NEG_PROGRESS_P1_NOTIF
init string 6
stage uint8 3
37128 - MESGID_NEG_PROGRESS_P1_ERROR
init string 6
stage uint8 3
37129 - MESGID_NEG_PROGRESS_P2_NOTIF
init string 6
stage uint8 3
37130 - MESGID_NEG_PROGRESS_P2_ERROR
init string 6
stage uint8 3
37131 - MESGID_ESP_ERROR
37132 - MESGID_ESP_CRITICAL
Severity: Critical
37133 - MESGID_INSTALL_SA
37134 - MESGID_DELETE_P1_SA
37135 - MESGID_DELETE_P2_SA
37136 - MESGID_DPD_FAILURE
37137 - MESGID_CONN_FAILURE
37138 - MESGID_CONN_UPDOWN
37139 - MESGID_P2_UPDOWN
37141 - MESGID_CONN_STATS
37889 - MESGID_VC_DELETE
37890 - MESGID_VC_MOVE_VDOM
37891 - MESGID_VC_ADD_VDOM
37892 - MESGID_VC_MOVE_MEMB_STATE
37893 - MESGID_VC_DETECT_MEMB_DEAD
37894 - MESGID_VC_DETECT_MEMB_JOIN
37895 - MESGID_VC_ADD_HADEV
37896 - MESGID_VC_DEL_HADEV
37897 - MESGID_HADEV_READY
37898 - MESGID_HADEV_FAIL
37899 - MESGID_HADEV_PEERINFO
37900 - MESGID_HBDEV_DELETE
37901 - MESGID_HBDEV_DOWN
37902 - MESGID_HBDEV_UP
37903 - MESGID_SYNC_STATUS
37904 - MESGID_HA_ACTIVITY
ip ip 39
37907 - MESGID_VLAN_HB_UP
37908 - MESGID_VLAN_HB_DOWN
37909 - MESGID_VLAN_HB_DOWN_SUM
37910 - MESGID_HB_PACKET_LOST
Severity: Critical
38010 - LOG_ID_FIPS_ENCRY_FAIL
38011 - LOG_ID_FIPS_DECRY_FAIL
38012 - LOG_ID_ENTROPY_TOKEN
38031 - LOG_ID_FSSO_LOGON
srcip Source IP ip 39
38032 - LOG_ID_FSSO_LOGOFF
srcip Source IP ip 39
38033 - LOG_ID_FSSO_SVR_STATUS
38403 - LOGID_EVENT_NOTIF_INSUFFICIENT_RESOURCE
38404 - LOGID_EVENT_NOTIF_HOSTNAME_ERROR
38405 - LOGID_NOTIF_CODE_SENDTO_SMS_PHONE
Category: SYSTEM
Severity: Notice
38406 - LOGID_NOTIF_CODE_SENDTO_SMS_TO
38407 - LOGID_NOTIF_CODE_SENDTO_EMAIL
38408 - LOGID_EVENT_OFTP_SSL_CONNECTED
dstip Destination IP ip 39
38409 - LOGID_EVENT_OFTP_SSL_DISCONNECTED
dstip Destination IP ip 39
38410 - LOGID_EVENT_OFTP_SSL_FAILED
dstip Destination IP ip 39
38411 - LOGID_EVENT_TWO_F_AUTH_CODE_SENDTO
38412 - LOGID_EVENT_TOKEN_CODE_SENDTO
38656 - LOGID_EVENT_RAD_RPT_PROTO_ERROR
38657 - LOGID_EVENT_RAD_RPT_PROF_NOT_FOUND
38658 - LOGID_EVENT_RAD_RPT_CTX_NOT_FOUND
38659 - LOGID_EVENT_RAD_RPT_ACCT_STOP_MISSED
38660 - LOGID_EVENT_RAD_RPT_ACCT_EVENT
38661 - LOGID_EVENT_RAD_RPT_OTHER
38662 - LOGID_EVENT_RAD_STAT_PROTO_ERROR
srcip Source IP ip 39
38663 - LOGID_EVENT_RAD_STAT_PROF_NOT_FOUND
srcip Source IP ip 39
38665 - LOGID_EVENT_RAD_STAT_ACCT_STOP_MISSED
srcip Source IP ip 39
38666 - LOGID_EVENT_RAD_STAT_ACCT_EVENT
srcip Source IP ip 39
38667 - LOGID_EVENT_RAD_STAT_OTHER
srcip Source IP ip 39
38668 - LOGID_EVENT_RAD_STAT_EP_BLK
srcip Source IP ip 39
39424 - LOG_ID_EVENT_SSL_VPN_USER_TUNNEL_UP
39425 - LOG_ID_EVENT_SSL_VPN_USER_TUNNEL_DOWN
39426 - LOG_ID_EVENT_SSL_VPN_USER_SSL_LOGIN_FAIL
39936 - LOG_ID_EVENT_SSL_VPN_SESSION_WEB_TUNNEL_STATS
39937 - LOG_ID_EVENT_SSL_VPN_SESSION_WEBAPP_DENY
39938 - LOG_ID_EVENT_SSL_VPN_SESSION_WEBAPP_PASS
39939 - LOG_ID_EVENT_SSL_VPN_SESSION_WEBAPP_TIMEOUT
39940 - LOG_ID_EVENT_SSL_VPN_SESSION_WEBAPP_CLOSE
39941 - LOG_ID_EVENT_SSL_VPN_SESSION_SYS_BUSY
39942 - LOG_ID_EVENT_SSL_VPN_SESSION_CERT_OK
39943 - LOG_ID_EVENT_SSL_VPN_SESSION_NEW_CON
39944 - LOG_ID_EVENT_SSL_VPN_SESSION_ALERT
39945 - LOG_ID_EVENT_SSL_VPN_SESSION_EXIT_FAIL
39946 - LOG_ID_EVENT_SSL_VPN_SESSION_EXIT_ERR
39947 - LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_UP
39948 - LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_DOWN
39949 - LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_STATS
39950 - LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_UNKNOWNTAG
39951 - LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_ERROR
39952 - LOG_ID_EVENT_SSL_VPN_SESSION_ENTER_CONSERVE_MODE
39953 - LOG_ID_EVENT_SSL_VPN_SESSION_LEAVE_CONSERVE_MODE
40001 - LOG_ID_PPTP_TUNNEL_UP
40002 - LOG_ID_PPTP_TUNNEL_DOWN
40003 - LOG_ID_PPTP_TUNNEL_STAT
40014 - LOG_ID_PPTP_REACH_MAX_CON
40017 - LOG_ID_L2TPD_CLIENT_CON_FAIL
40019 - LOG_ID_L2TPD_CLIENT_DISCON
40021 - LOG_ID_PPTP_NOT_CONIG
40022 - LOG_ID_PPTP_NO_IP_AVAIL
40024 - LOG_ID_PPTP_OUT_MEM
40034 - LOG_ID_PPTP_START
40035 - LOG_ID_PPTP_START_FAIL
40036 - LOG_ID_PPTP_EXIT
40037 - LOG_ID_PPTPD_SVR_DISCON
40038 - LOG_ID_PPTPD_CLIENT_CON
40039 - LOG_ID_PPTPD_CLIENT_DISCON
40101 - LOG_ID_L2TP_TUNNEL_UP
40102 - LOG_ID_L2TP_TUNNEL_DOWN
Type: Event
Category: VPN
Severity: Information
40103 - LOG_ID_L2TP_TUNNEL_STAT
40114 - LOG_ID_L2TPD_START
40115 - LOG_ID_L2TPD_EXIT
40118 - LOG_ID_L2TPD_CLIENT_CON
40704 - LOG_ID_EVENT_SYS_PERF
freediskstorage uint32 10
sysuptime uint32 10
40705 - LOG_ID_EVENT_SYS_CPU_USAGE
40706 - LOG_ID_EVENT_SYS_BROKEN_SYMBOLIC_LINK
40960 - LOGID_EVENT_WAD_WEBPROXY_FWD_SRV_ERROR
ip ip 39
41000 - LOG_ID_UPD_FGT_SUCC
41001 - LOG_ID_UPD_FGT_FAIL
41002 - LOG_ID_UPD_SRC_VIS
41006 - LOG_ID_UPD_FSA_VIRDB
41984 - LOG_ID_EVENT_VPN_CERT_LOAD
41985 - LOG_ID_EVENT_VPN_CERT_REMOVAL
41986 - LOG_ID_EVENT_VPN_CERT_REGEN
Category: VPN
Severity: Information
41987 - LOG_ID_EVENT_VPN_CERT_UPDATE
41988 - LOG_ID_EVENT_SSL_VPN_SETTING_UPDATE
41989 - LOG_ID_EVENT_VPN_CERT_ERR
41990 - LOG_ID_EVENT_VPN_CERT_UPDATE_FAILED
41991 - LOG_ID_EVENT_VPN_CERT_EXPORT
41992 - LOG_ID_EVENT_VPN_CERT_CRL_EXPIRED
42201 - LOG_ID_NETX_VMX_ATTACH
Severity: Notice
42202 - LOG_ID_NETX_VMX_DETACH
42203 - LOG_ID_NETX_VMX_DENIED
43008 - LOG_ID_EVENT_AUTH_SUCCESS
Category: USER
Severity: Notice
dstip Destination IP ip 39
srcip Source IP ip 39
43009 - LOG_ID_EVENT_AUTH_FAILED
dstip Destination IP ip 39
srcip Source IP ip 39
43010 - LOG_ID_EVENT_AUTH_LOCKOUT
dstip Destination IP ip 39
srcip Source IP ip 39
43011 - LOG_ID_EVENT_AUTH_TIME_OUT
dstip Destination IP ip 39
srcip Source IP ip 39
43014 - LOG_ID_EVENT_AUTH_FSAE_LOGON
srcip Source IP ip 39
43015 - LOG_ID_EVENT_AUTH_FSAE_LOGOFF
srcip Source IP ip 39
43016 - LOG_ID_EVENT_AUTH_NTLM_AUTH_SUCCESS
dstip Destination IP ip 39
srcip Source IP ip 39
43017 - LOG_ID_EVENT_AUTH_NTLM_AUTH_FAIL
dstip Destination IP ip 39
srcip Source IP ip 39
43018 - LOG_ID_EVENT_AUTH_FGOVRD_FAIL
dstip Destination IP ip 39
srcip Source IP ip 39
43020 - LOG_ID_EVENT_AUTH_FGOVRD_SUCCESS
dstip Destination IP ip 39
srcip Source IP ip 39
43025 - LOG_ID_EVENT_AUTH_PROXY_SUCCESS
authid string 36
dstip Destination IP ip 39
srcip Source IP ip 39
43026 - LOG_ID_EVENT_AUTH_PROXY_FAILED
authid string 36
dstip Destination IP ip 39
srcip Source IP ip 39
43027 - LOG_ID_EVENT_AUTH_PROXY_TIME_OUT
dstip Destination IP ip 39
srcip Source IP ip 39
43028 - LOG_ID_EVENT_AUTH_PROXY_GROUP_INFO_FAILED
authid string 36
dstip Destination IP ip 39
srcip Source IP ip 39
43029 - LOG_ID_EVENT_AUTH_WARNING_SUCCESS
dstip Destination IP ip 39
srcip Source IP ip 39
43030 - LOG_ID_EVENT_AUTH_WARNING_TBL_FULL
dstip Destination IP ip 39
srcip Source IP ip 39
43032 - LOG_ID_EVENT_AUTH_PROXY_USER_LIMIT_REACHED
authid string 36
dstip Destination IP ip 39
srcip Source IP ip 39
43033 - LOG_ID_EVENT_AUTH_PROXY_MULTIPLE_LOGIN
authid string 36
dstip Destination IP ip 39
srcip Source IP ip 39
43034 - LOG_ID_EVENT_AUTH_PROXY_NO_RESP
dstip Destination IP ip 39
srcip Source IP ip 39
43037 - LOG_ID_EVENT_AUTH_IPV4_FLUSH
43038 - LOG_ID_EVENT_AUTH_IPV6_FLUSH
43039 - LOG_ID_EVENT_AUTH_LOGON
srcip Source IP ip 39
43040 - LOG_ID_EVENT_AUTH_LOGOUT
srcip Source IP ip 39
43041 - LOG_ID_EVENT_AUTH_DISCLAIMER_ACCEPT
dstip Destination IP ip 39
srcip Source IP ip 39
43042 - LOG_ID_EVENT_AUTH_DISCLAIMER_DECLINE
dstip Destination IP ip 39
srcip Source IP ip 39
43043 - LOG_ID_EVENT_AUTH_EMAIL_COLLECTING_SUCCESS
dstip Destination IP ip 39
srcip Source IP ip 39
43044 - LOG_ID_EVENT_AUTH_EMAIL_COLLECTING_FAIL
dstip Destination IP ip 39
srcip Source IP ip 39
43045 - LOG_ID_EVENT_AUTH_8021X_SUCCESS
43046 - LOG_ID_EVENT_AUTH_8021X_FAIL
43050 - LOG_ID_EVENT_AUTH_FSAE_CONNECT
43051 - LOG_ID_EVENT_AUTH_FSAE_DISCONNECT
43520 - LOG_ID_EVENT_WIRELESS_SYS
43521 - LOG_ID_EVENT_WIRELESS_ROGUE
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43522 - LOG_ID_EVENT_WIRELESS_WTP
Severity: Notice
ip ip 39
43524 - LOG_ID_EVENT_WIRELESS_STA
snr int8 4
srcip Source IP ip 39
43525 - LOG_ID_EVENT_WIRELESS_ONWIRE
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43526 - LOG_ID_EVENT_WIRELESS_WTPR
ip ip 39
operdrmamode string 10
slctdrmamode string 10
43527 - LOG_ID_EVENT_WIRELESS_ROGUE_CFG
43528 - LOG_ID_EVENT_WIRELESS_WTPR_ERROR
ip ip 39
operdrmamode string 10
slctdrmamode string 10
43529 - LOG_ID_EVENT_WIRELESS_CLB
43530 - LOG_ID_EVENT_WIRELESS_WIDS_WL_BRIDGE
43531 - LOG_ID_EVENT_WIRELESS_WIDS_BR_DEAUTH
43532 - LOG_ID_EVENT_WIRELESS_WIDS_NL_PBRESP
43533 - LOG_ID_EVENT_WIRELESS_WIDS_MAC_OUI
43534 - LOG_ID_EVENT_WIRELESS_WIDS_LONG_DUR
43535 - LOG_ID_EVENT_WIRELESS_WIDS_WEP_IV
43542 - LOG_ID_EVENT_WIRELESS_WIDS_EAPOL_FLOOD
43544 - LOG_ID_EVENT_WIRELESS_WIDS_MGMT_FLOOD
43546 - LOG_ID_EVENT_WIRELESS_WIDS_SPOOF_DEAUTH
Severity: Notice
43548 - LOG_ID_EVENT_WIRELESS_WIDS_ASLEAP
43550 - LOG_ID_EVENT_WIRELESS_STA_LOCATE
43551 - LOG_ID_EVENT_WIRELESS_WTP_JOIN
ip ip 39
43552 - LOG_ID_EVENT_WIRELESS_WTP_LEAVE
ip ip 39
43553 - LOG_ID_EVENT_WIRELESS_WTP_FAIL
ip ip 39
43554 - LOG_ID_EVENT_WIRELESS_WTP_UPDATE
ip ip 39
43555 - LOG_ID_EVENT_WIRELESS_WTP_RESET
ip ip 39
43556 - LOG_ID_EVENT_WIRELESS_WTP_KICK
ip ip 39
43557 - LOG_ID_EVENT_WIRELESS_WTP_ADD_FAILURE
ip ip 39
43558 - LOG_ID_EVENT_WIRELESS_WTP_CFG_ERR
ip ip 39
43559 - LOG_ID_EVENT_WIRELESS_WTP_SN_MISMATCH
ip ip 39
43560 - LOG_ID_EVENT_WIRELESS_SYS_AC_RESTARTED
43561 - LOG_ID_EVENT_WIRELESS_SYS_AC_HOSTAPD_UP
43562 - LOG_ID_EVENT_WIRELESS_SYS_AC_HOSTAPD_DOWN
43563 - LOG_ID_EVENT_WIRELESS_ROGUE_DETECT
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43564 - LOG_ID_EVENT_WIRELESS_ROGUE_OFFAIR
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43565 - LOG_ID_EVENT_WIRELESS_ROGUE_ONAIR
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43566 - LOG_ID_EVENT_WIRELESS_ROGUE_OFFWIRE
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43567 - LOG_ID_EVENT_WIRELESS_FAKEAP_DETECT
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43568 - LOG_ID_EVENT_WIRELESS_FAKEAP_ONAIR
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43569 - LOG_ID_EVENT_WIRELESS_ROGUE_SUPPRESSED
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43570 - LOG_ID_EVENT_WIRELESS_ROGUE_UNSUPPRESSED
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43571 - LOG_ID_EVENT_WIRELESS_ROGUE_DETECT_CHG
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43572 - LOG_ID_EVENT_WIRELESS_STA_ASSO
snr int8 4
srcip Source IP ip 39
43573 - LOG_ID_EVENT_WIRELESS_STA_AUTH
snr int8 4
srcip Source IP ip 39
43574 - LOG_ID_EVENT_WIRELESS_STA_DASS
snr int8 4
srcip Source IP ip 39
43575 - LOG_ID_EVENT_WIRELESS_STA_DAUT
snr int8 4
srcip Source IP ip 39
43576 - LOG_ID_EVENT_WIRELESS_STA_IDLE
snr int8 4
srcip Source IP ip 39
43577 - LOG_ID_EVENT_WIRELESS_STA_DENY
snr int8 4
srcip Source IP ip 39
43578 - LOG_ID_EVENT_WIRELESS_STA_KICK
snr int8 4
srcip Source IP ip 39
43579 - LOG_ID_EVENT_WIRELESS_STA_IP
snr int8 4
srcip Source IP ip 39
43580 - LOG_ID_EVENT_WIRELESS_STA_LEAVE_WTP
snr int8 4
srcip Source IP ip 39
43581 - LOG_ID_EVENT_WIRELESS_STA_WTP_DISCONN
snr int8 4
srcip Source IP ip 39
43582 - LOG_ID_EVENT_WIRELESS_ROGUE_CFG_UNCLASSIFIED
43583 - LOG_ID_EVENT_WIRELESS_ROGUE_CFG_ACCEPTED
Severity: Notice
43584 - LOG_ID_EVENT_WIRELESS_ROGUE_CFG_ROGUE
43585 - LOG_ID_EVENT_WIRELESS_ROGUE_CFG_SUPPRESSED
43586 - LOG_ID_EVENT_WIRELESS_WTPR_DARRP_CHAN
ip ip 39
operdrmamode string 10
slctdrmamode string 10
43587 - LOG_ID_EVENT_WIRELESS_WTPR_DARRP_START
ip ip 39
operdrmamode string 10
slctdrmamode string 10
43588 - LOG_ID_EVENT_WIRELESS_WTPR_OPER_CHAN
ip ip 39
operdrmamode string 10
slctdrmamode string 10
43589 - LOG_ID_EVENT_WIRELESS_WTPR_RADAR
ip ip 39
operdrmamode string 10
slctdrmamode string 10
43590 - LOG_ID_EVENT_WIRELESS_WTPR_NOL
Type: Event
Category: WIRELESS
Severity: Notice
ip ip 39
operdrmamode string 10
slctdrmamode string 10
43591 - LOG_ID_EVENT_WIRELESS_WTPR_COUNTRY_CFG_SUCCESS
ip ip 39
operdrmamode string 10
slctdrmamode string 10
43592 - LOG_ID_EVENT_WIRELESS_WTPR_OPER_COUNTRY
ip ip 39
operdrmamode string 10
slctdrmamode string 10
43593 - LOG_ID_EVENT_WIRELESS_WTPR_CFG_TXPOWER
ip ip 39
operdrmamode string 10
slctdrmamode string 10
43594 - LOG_ID_EVENT_WIRELESS_WTPR_OPER_TXPOWER
ip ip 39
operdrmamode string 10
slctdrmamode string 10
43595 - LOG_ID_EVENT_WIRELESS_CLB_DENY
43596 - LOG_ID_EVENT_WIRELESS_CLB_RETRY
43597 - LOG_ID_EVENT_WIRELESS_WTP_ADD
ip ip 39
43598 - LOG_ID_EVENT_WIRELESS_WTP_ADD_XSS
ip ip 39
43599 - LOG_ID_EVENT_WIRELESS_WTP_DEL
ip ip 39
43600 - LOG_ID_EVENT_WIRELESS_WTPR_DARRP_STOP
ip ip 39
operdrmamode string 10
slctdrmamode string 10
43601 - LOG_ID_EVENT_WIRELESS_STA_CAP_SIGNON
snr int8 4
srcip Source IP ip 39
43602 - LOG_ID_EVENT_WIRELESS_STA_CAP_SIGNON_SUCCESS
snr int8 4
srcip Source IP ip 39
43603 - LOG_ID_EVENT_WIRELESS_STA_CAP_SIGNON_FAILURE
snr int8 4
srcip Source IP ip 39
43604 - LOG_ID_EVENT_WIRELESS_STA_CAP_EMAIL_REQUEST
snr int8 4
srcip Source IP ip 39
43605 - LOG_ID_EVENT_WIRELESS_STA_CAP_EMAIL_SUCCESS
Severity: Notice
snr int8 4
srcip Source IP ip 39
43606 - LOG_ID_EVENT_WIRELESS_STA_CAP_EMAIL_FAILURE
snr int8 4
srcip Source IP ip 39
43607 - LOG_ID_EVENT_WIRELESS_STA_CAP_DISCLAIMER_CHECK
snr int8 4
srcip Source IP ip 39
43608 - LOG_ID_EVENT_WIRELESS_STA_CAP_DISCLAIMER_DECLINE
snr int8 4
srcip Source IP ip 39
43609 - LOG_ID_EVENT_WIRELESS_WTPR_DARRP_OPTIMIZATION_START
Severity: Notice
ip ip 39
operdrmamode string 10
slctdrmamode string 10
43610 - LOG_ID_EVENT_WIRELESS_WTPR_DARRP_OPTIMIZATION_STOP
ip ip 39
operdrmamode string 10
slctdrmamode string 10
43611 - LOG_ID_EVENT_WIRELESS_SYS_AC_UP
43612 - LOG_ID_EVENT_WIRELESS_SYS_AC_CFG_LOADED
43613 - LOG_ID_EVENT_WIRELESS_WTP_ERR
ip ip 39
43614 - LOG_ID_EVENT_WIRELESS_DHCP_STAVATION
xid uint32 10
43615 - LOG_ID_EVENT_WIRELESS_SYS_AC_IPSEC_FAIL
43616 - LOG_ID_EVENT_WIRELESS_WTPR_NOL_ADD
ip ip 39
operdrmamode string 10
slctdrmamode string 10
43618 - LOG_ID_EVENT_WIRELESS_WTP_IMAGE_RC_SUCCESS
ip ip 39
43619 - LOG_ID_EVENT_WIRELESS_OFFENDINGAP_DETECT
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43620 - LOG_ID_EVENT_WIRELESS_OFFENDINGAP_ONAIR
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43621 - LOG_ID_EVENT_WIRELESS_WTP_DATA_CHAN_CHG
ip ip 39
43622 - LOG_ID_EVENT_WIRELESS_WTP_VLAN_PROBE
ip ip 39
43623 - LOG_ID_EVENT_WIRELESS_WTP_VLAN_MISSING
ip ip 39
43624 - LOG_ID_EVENT_WIRELESS_WTP_VLAN_DETECTED
ip ip 39
43625 - LOG_ID_EVENT_WIRELESS_STA_CAP_CMCC_SUCCESS
snr int8 4
srcip Source IP ip 39
43626 - LOG_ID_EVENT_WIRELESS_STA_CAP_CMCC_FAILURE
snr int8 4
srcip Source IP ip 39
43627 - LOG_ID_EVENT_WIRELESS_STA_CAP_CMCC_TIMEOUT
snr int8 4
srcip Source IP ip 39
43628 - LOG_ID_EVENT_WIRELESS_STA_CAP_CMCC_MAC_AUTH_SUCCESS
snr int8 4
srcip Source IP ip 39
43629 - LOG_ID_EVENT_WIRELESS_STA_RADIUS_AUTH_FAILURE
43630 - LOG_ID_EVENT_WIRELESS_STA_RADIUS_AUTH_SUCCESS
43631 - LOG_ID_EVENT_WIRELESS_STA_RADIUS_AUTH_NO_RESP
43632 - LOG_ID_EVENT_WIRELESS_STA_RADIUS_MAC_AUTH_FAILURE
43633 - LOG_ID_EVENT_WIRELESS_STA_RADIUS_MAC_AUTH_SUCCESS
43634 - LOG_ID_EVENT_WIRELESS_STA_RADIUS_MAC_AUTH_NO_RESP
Severity: Notice
43635 - LOG_ID_EVENT_WIRELESS_STA_OKC_NO_MATCH
Type: Event
Category: WIRELESS
Severity: Notice
43636 - LOG_ID_EVENT_WIRELESS_STA_OKC_LOCAL_MATCH
43637 - LOG_ID_EVENT_WIRELESS_STA_OKC_INTER_AC_MATCH
43638 - LOG_ID_EVENT_WIRELESS_STA_OKC_INTER_AP_MATCH
43639 - LOG_ID_EVENT_WIRELESS_STA_FT_INVALID_ACTION_REQ
43640 - LOG_ID_EVENT_WIRELESS_STA_FT_INVALID_AUTH_REQ
43641 - LOG_ID_EVENT_WIRELESS_STA_FT_INVALID_REASSOC_REQ
43642 - LOG_ID_EVENT_WIRELESS_STA_FT_ACTION_REQ
43643 - LOG_ID_EVENT_WIRELESS_STA_FT_ACTION_RESP
43644 - LOG_ID_EVENT_WIRELESS_STA_FT_AUTH_REQ
Severity: Notice
43645 - LOG_ID_EVENT_WIRELESS_STA_FT_AUTH_RESP
Type: Event
Category: WIRELESS
Severity: Notice
43646 - LOG_ID_EVENT_WIRELESS_STA_FT_REASSOC_REQ
43647 - LOG_ID_EVENT_WIRELESS_STA_FT_REASSOC_RESP
43648 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_INVALID_SECOND_MSG
43649 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_INVALID_FOURTH_MSG
43650 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_FIRST_MSG
43651 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_SECOND_MSG
43652 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_THIRD_MSG
43653 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_FOURTH_MSG
43654 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_FIRST_GROUP_MSG
Severity: Notice
43655 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_SECOND_GROUP_MSG
Type: Event
Category: WIRELESS
Severity: Notice
43656 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_MAX_STA_CNT
43657 - LOG_ID_EVENT_WIRELESS_STA_ASSOC_FAIL
43658 - LOG_ID_EVENT_WIRELESS_STA_DHCP_NO_RESP
43659 - LOG_ID_EVENT_WIRELESS_STA_DHCP_DIFF_OFFER
43660 - LOG_ID_EVENT_WIRELESS_STA_DHCP_NO_ACK
43661 - LOG_ID_EVENT_WIRELESS_STA_DHCP_NAK
43662 - LOG_ID_EVENT_WIRELESS_STA_DHCP_DUP_IP
43663 - LOG_ID_EVENT_WIRELESS_STA_DHCP_DISCOVER
43664 - LOG_ID_EVENT_WIRELESS_STA_DHCP_OFFER
43665 - LOG_ID_EVENT_WIRELESS_STA_DHCP_DECLINE
43666 - LOG_ID_EVENT_WIRELESS_STA_DHCP_REQUEST
43667 - LOG_ID_EVENT_WIRELESS_STA_DHCP_ACK
43668 - LOG_ID_EVENT_WIRELESS_STA_DHCP_RELEASE
43669 - LOG_ID_EVENT_WIRELESS_STA_DHCP_INFORM
43670 - LOG_ID_EVENT_WIRELESS_STA_DHCP_SELF_ASSIGNED
43671 - LOG_ID_EVENT_WIRELESS_STA_DNS_NO_RESP
43672 - LOG_ID_EVENT_WIRELESS_STA_DNS_SERVER_FAILURE
43673 - LOG_ID_EVENT_WIRELESS_STA_DNS_NO_DOMAIN
43674 - LOG_ID_EVENT_WIRELESS_STA_WPA_KRACK_FT_REASSOC
43675 - LOG_ID_EVENT_WIRELESS_STA_AUTH_REQ
43676 - LOG_ID_EVENT_WIRELESS_STA_AUTH_RESP
Severity: Notice
43677 - LOG_ID_EVENT_WIRELESS_STA_ASSOC_REQ
Type: Event
Category: WIRELESS
Severity: Notice
43678 - LOG_ID_EVENT_WIRELESS_STA_REASSOC_REQ
43679 - LOG_ID_EVENT_WIRELESS_STA_ASSOC_RESP
43680 - LOG_ID_EVENT_WIRELESS_STA_REASSOC_RESP
43681 - LOG_ID_EVENT_WIRELESS_STA_PROBE_REQ
43682 - LOG_ID_EVENT_WIRELESS_STA_PROBE_RESP
43683 - LOG_ID_EVENT_WIRELESS_BLE_DEV_LOCATE
43684 - LOG_ID_EVENT_WIRELESS_ADDRGRP_DUPLICATE_MAC
addrgrp string 36
43685 - LOG_ID_EVENT_WIRELESS_ADDRGRP_ADDR_APPLY
addrgrp string 36
43686 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_INVALID_SCHEDULE
Type: Event
Category: WIRELESS
Severity: Notice
43687 - LOG_ID_EVENT_WIRELESS_STA_WL_BRIDGE_TRAFFIC_STATS
snr int8 4
srcip Source IP ip 39
43688 - LOG_ID_EVENT_WIRELESS_APCFG_RECEIVE
43689 - LOG_ID_EVENT_WIRELESS_APCFG_VALIDATING
43690 - LOG_ID_EVENT_WIRELESS_APCFG_APPLY
43691 - LOG_ID_EVENT_WIRELESS_APCFG_REJECT
43692 - LOG_ID_EVENT_WIRELESS_WTPR_ANTENNA_DEFECT_DETECT
ip ip 39
operdrmamode string 10
slctdrmamode string 10
43693 - LOG_ID_EVENT_WIRELESS_STA_WNM_ACTION_BSTM_REQ
43694 - LOG_ID_EVENT_WIRELESS_STA_WNM_ACTION_BSTM_RESP_ACCEPT
43695 - LOG_ID_EVENT_WIRELESS_STA_WNM_ACTION_BSTM_RESP_REJECT
43696 - LOG_ID_EVENT_WIRELESS_WTPR_DRMA_START
ip ip 39
operdrmamode string 10
slctdrmamode string 10
43697 - LOG_ID_EVENT_WIRELESS_WTPR_DRMA_STOP
Type: Event
Category: WIRELESS
Severity: Notice
ip ip 39
operdrmamode string 10
slctdrmamode string 10
43698 - LOG_ID_EVENT_WIRELESS_WTPR_DRMA_MODE
ip ip 39
operdrmamode string 10
slctdrmamode string 10
43699 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_SOLICIT
43700 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_ADVERTISE
43701 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_REQUEST
43702 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_CONFIRM
43703 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_RENEW
43704 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_REPLY
43705 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_RELEASE
43706 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_RECONFIGURE
43707 - LOG_ID_EVENT_WIRELESS_WTPR_SSID_UP
ip ip 39
operdrmamode string 10
slctdrmamode string 10
43708 - LOG_ID_EVENT_WIRELESS_WTPR_SSID_DOWN
ip ip 39
operdrmamode string 10
slctdrmamode string 10
43776 - LOG_ID_EVENT_NAC_QUARANTINE
dstip Destination IP ip 39
srcip Source IP ip 39
43777 - LOG_ID_EVENT_NAC_ANOMALY_QUARANTINE
dstip Destination IP ip 39
srcip Source IP ip 39
43800 - LOG_ID_EVENT_ELBC_BLADE_JOIN
43801 - LOG_ID_EVENT_ELBC_BLADE_LEAVE
43802 - LOG_ID_EVENT_ELBC_MASTER_BLADE_FOUND
43803 - LOG_ID_EVENT_ELBC_MASTER_BLADE_LOST
43804 - LOG_ID_EVENT_ELBC_MASTER_BLADE_CHANGE
43805 - LOG_ID_EVENT_ELBC_ACTIVE_CHANNEL_FOUND
43806 - LOG_ID_EVENT_ELBC_ACTIVE_CHANNEL_LOST
43807 - LOG_ID_EVENT_ELBC_ACTIVE_CHANNEL_CHANGE
Severity: Critical
43808 - LOG_ID_EVENT_ELBC_CHASSIS_ACTIVE
43809 - LOG_ID_EVENT_ELBC_CHASSIS_INACTIVE
44544 - LOGID_EVENT_CONFIG_PATH
44545 - LOGID_EVENT_CONFIG_OBJ
44546 - LOGID_EVENT_CONFIG_ATTR
44547 - LOGID_EVENT_CONFIG_OBJATTR
Category: SYSTEM
Severity: Information
44548 - LOGID_EVENT_CONFIG_EXEC
44549 - LOGID_EVENT_CONFIG_OBJATTR_MTNER
44550 - LOGID_EVENT_CONFIG_OBJ_MTNER
44551 - LOGID_EVENT_CONFIG_ATTR_MTNER
44552 - LOGID_EVENT_CONFIG_PATH_MTNER
44553 - LOGID_EVENT_CONFIG_FIXEDPORT_DIS
44554 - LOGID_EVENT_CONFIG_POL_CHANGED
Category: SYSTEM
Severity: Notice
44555 - LOGID_EVENT_CMDB_DEADLOCK_DETECTED
45057 - LOG_ID_FCC_ADD
ip Source IP ip 39
45058 - LOG_ID_FCC_CLOSE
45061 - LOG_ID_FCC_CLOSE_BY_TYPE
ip Source IP ip 39
45071 - LOG_ID_FCC_VULN_SCAN
Category: ENDPOINT
Severity: Notice
scantime uint64 20
srcip Source IP ip 39
45114 - LOG_ID_EC_REG_QUARANTINE
fctemssn string 16
ip Source IP ip 39
45115 - LOG_ID_EC_REG_UNQUARANTINE
fctemssn string 16
ip Source IP ip 39
46000 - LOG_ID_VIP_REAL_SVR_ENA
46001 - LOG_ID_VIP_REAL_SVR_DISA
46002 - LOG_ID_VIP_REAL_SVR_UP
46003 - LOG_ID_VIP_REAL_SVR_DOWN
46004 - LOG_ID_VIP_REAL_SVR_ENT_HOLDDOWN
46005 - LOG_ID_VIP_REAL_SVR_FAIL_HOLDDOWN
Severity: Alert
46006 - LOG_ID_VIP_REAL_SVR_FAIL
46400 - LOG_ID_EVENT_EXT_SYS
46401 - LOG_ID_EVENT_EXT_LOCAL
46402 - LOG_ID_EVENT_EXT_LOCAL_ERROR
46403 - LOG_ID_EVENT_EXT_REMOTE_EMERG
ip ip 39
46404 - LOG_ID_EVENT_EXT_REMOTE_ALERT
ip ip 39
46405 - LOG_ID_EVENT_EXT_REMOTE_CRITICAL
ip ip 39
46406 - LOG_ID_EVENT_EXT_REMOTE_ERROR
ip ip 39
46407 - LOG_ID_EVENT_EXT_REMOTE_WARNING
ip ip 39
46408 - LOG_ID_EVENT_EXT_REMOTE_NOTIF
ip ip 39
46409 - LOG_ID_EVENT_EXT_REMOTE_INFO
ip ip 39
46410 - LOG_ID_EVENT_EXT_REMOTE_DEBUG
ip ip 39
46501 - LOG_ID_INTERNAL_LTE_MODEM_DETECTION
46502 - LOG_ID_INTERNAL_LTE_MODEM_GPSD
46503 - LOG_ID_INTERNAL_LTE_MODEM_GPS_LOC_ACQUISITION
Type: Event
Category: SYSTEM
Severity: Information
46504 - LOG_ID_INTERNAL_LTE_MODEM_BILLD
46505 - LOG_ID_INTERNAL_LTE_MODEM_BILLING_PURGED
46506 - LOG_ID_INTERNAL_LTE_MODEM_BILLING_DAILY_LOG
46507 - LOG_ID_INTERNAL_LTE_MODEM_FW_UPGRADE
46508 - LOG_ID_INTERNAL_LTE_MODEM_QDL_DETECTION
46509 - LOG_ID_INTERNAL_LTE_MODEM_REBOOT
46510 - LOG_ID_INTERNAL_LTE_MODEM_OP_MODE
46511 - LOG_ID_INTERNAL_LTE_MODEM_POWER_ON_OFF
46512 - LOG_ID_INTERNAL_LTE_MODEM_SIM_STATE
46513 - LOG_ID_INTERNAL_LTE_MODEM_LINK_CONNECTION
46514 - LOG_ID_INTERNAL_LTE_MODEM_MANUAL_HANDOVER
46515 - LOG_ID_INTERNAL_LTE_MODEM_IP_ADDR
46516 - LOG_ID_INTERNAL_LTE_MODEM_BEARER_TECH_CHANGE
46600 - LOG_ID_EVENT_AUTOMATION_TRIGGERED
46900 - LOG_ID_POE_STATUS_REPORT
47000 - LOG_ID_MALWARE_LIST_TRUNCATED_ENTER
Type: Event
Category: SYSTEM
Severity: Warning
47001 - LOG_ID_MALWARE_LIST_TRUNCATED_EXIT
47203 - LOG_ID_ENTER_BYPASS
47204 - LOG_ID_EXIT_BYPASS
48000 - LOG_ID_WAD_SSL_RCV_HS
dstip Destination IP ip 39
srcip Source IP ip 39
48001 - LOG_ID_WAD_SSL_RCV_WRG_HS
dstip Destination IP ip 39
srcip Source IP ip 39
48002 - LOG_ID_WAD_SSL_SENT_HS
dstip Destination IP ip 39
srcip Source IP ip 39
48003 - LOG_ID_WAD_SSL_WRG_HS_LEN
dstip Destination IP ip 39
srcip Source IP ip 39
48004 - LOG_ID_WAD_SSL_RCV_CCS
dstip Destination IP ip 39
srcip Source IP ip 39
48005 - LOG_ID_WAD_SSL_RSA_DH_FAIL
dstip Destination IP ip 39
srcip Source IP ip 39
48006 - LOG_ID_WAD_SSL_SENT_CCS
dstip Destination IP ip 39
srcip Source IP ip 39
48007 - LOG_ID_WAD_SSL_BAD_HASH
dstip Destination IP ip 39
srcip Source IP ip 39
48009 - LOG_ID_WAD_SSL_DECRY_FAIL
dstip Destination IP ip 39
srcip Source IP ip 39
48011 - LOG_ID_WAD_SSL_LESS_MINOR
dstip Destination IP ip 39
srcip Source IP ip 39
48013 - LOG_ID_WAD_SSL_NOT_SUPPORT_CS
dstip Destination IP ip 39
srcip Source IP ip 39
48016 - LOG_ID_WAD_SSL_HS_FIN
dstip Destination IP ip 39
srcip Source IP ip 39
48017 - LOG_ID_WAD_SSL_HS_TOO_LONG
Type: Event
Category: WAD
Severity: Error
dstip Destination IP ip 39
srcip Source IP ip 39
48019 - LOG_ID_WAD_SSL_SENT_ALERT
dstip Destination IP ip 39
srcip Source IP ip 39
48023 - LOG_ID_WAD_SSL_RCV_ALERT
dstip Destination IP ip 39
srcip Source IP ip 39
48027 - LOG_ID_WAD_SSL_INVALID_CONT_TYPE
dstip Destination IP ip 39
srcip Source IP ip 39
48029 - LOG_ID_WAD_SSL_BAD_CCS_LEN
dstip Destination IP ip 39
srcip Source IP ip 39
48031 - LOG_ID_WAD_SSL_BAD_DH
dstip Destination IP ip 39
srcip Source IP ip 39
48032 - LOG_ID_WAD_SSL_PUB_KEY_TOO_BIG
dstip Destination IP ip 39
srcip Source IP ip 39
48034 - LOG_ID_WAD_SSL_SERVER_KEY_HASH_ALGORITHM_MISMATCH
dstip Destination IP ip 39
received uint8 3
srcip Source IP ip 39
48035 - LOG_ID_WAD_SSL_SERVER_KEY_SIGNATURE_ALGORITHM_MISMATCH
dstip Destination IP ip 39
expectedsignature uint8 3
receivedsignature uint8 3
srcip Source IP ip 39
48038 - LOG_ID_WAD_SSL_RCV_FATAL_ALERT
dstip Destination IP ip 39
srcip Source IP ip 39
48039 - LOG_ID_WAD_SSL_SENT_FATAL_ALERT
dstip Destination IP ip 39
srcip Source IP ip 39
48101 - LOG_ID_WAD_AUTH_FAIL_PSK
dstip Destination IP ip 39
srcip Source IP ip 39
48102 - LOG_ID_WAD_AUTH_FAIL_OTH
dstip Destination IP ip 39
srcip Source IP ip 39
48301 - LOG_ID_UNEXP_APP_TYPE
dstip Destination IP ip 39
srcip Source IP ip 39
49002 - LOG_ID_VNP_DPDK_PRIMARY_RESTART
49004 - LOGID_EVENT_HYPERV_SRIOV_SHOW_UP
49005 - LOGID_EVENT_HYPERV_SRIOV_DISAPPEAR
51000 - LOG_ID_NB_TBL_CHG
srcip Source IP ip 39
52000 - LOG_ID_EVENT_SECURITY_AUDIT_FABRIC_SUMMARY
highcount Security Rating result failed count for high severity int32 10
lowcount Security Rating result failed count for low severity int32 10
mediumcount Security Rating result failed count for medium severity int32 10
52001 - LOG_ID_EVENT_SECURITY_AUDIT_FABRIC_CHANGE
highcount Security Rating result failed count for high severity int32 10
lowcount Security Rating result failed count for low severity int32 10
mediumcount Security Rating result failed count for medium severity int32 10
53000 - LOG_ID_SDNC_CONNECTED
53001 - LOG_ID_SDNC_DISCONNECTED
53002 - LOG_ID_SDNC_SUBSCRIBE
53003 - LOG_ID_SDNC_UNSUBSCRIBE
53100 - LOG_ID_VPN_OCVPN_REGISTERED
53101 - LOG_ID_VPN_OCVPN_UNREGISTERED
53102 - LOG_ID_VPN_OCVPN_COMM_ESTABLISHED
53103 - LOG_ID_VPN_OCVPN_COMM_ERROR
53104 - LOG_ID_VPN_OCVPN_DNS_ERROR
Type: Event
Category: VPN
Severity: Notice
53105 - LOG_ID_VPN_OCVPN_ROUTE_ERROR
53200 - LOG_ID_CONNECTOR_OBJECT_ADD
fctemssn string 16
53201 - LOG_ID_CONNECTOR_OBJECT_REMOVE
fctemssn string 16
53202 - LOG_ID_CONNECTOR_API_FAILED
fctemssn string 16
53203 - LOG_ID_CONNECTOR_OBJECT_UPDATE
Category: CONNECTOR
Severity: Information
fctemssn string 16
53204 - LOG_ID_CONNECTOR_OBJECT_CANT_ADD
fctemssn string 16
53205 - LOG_ID_CONNECTOR_OBJECT_CANT_REMOVE
fctemssn string 16
53300 - LOG_ID_VNE_PRO_UPDATE_COMPLETED
53301 - LOG_ID_VNE_PRO_UPDATE_FAILED
53312 - LOG_ID_NPD_INFO
53313 - LOG_ID_NPD_WARNING
53314 - LOG_ID_NPD_ERROR
FILE-FILTER
64000 - LOG_ID_FILE_FILTER_BLOCK
action string 20
agent string 64
attachment string 3
authserver string 64
cc string 512
date string 10
devid string 16
direction string 8
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
eventtime uint64 20
eventtype string 32
fctuid string 32
filesize uint64 10
filetype string 23
filtername string 32
group string 64
level string 11
logid string 10
matchfiletype string 23
policyid uint32 10
profile string 64
proto uint8 3
service string 36
sessionid uint32 10
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
64001 - LOG_ID_FILE_FILTER_LOG
action string 20
agent string 64
attachment string 3
authserver string 64
cc string 512
date string 10
devid string 16
direction string 8
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
eventtime uint64 20
eventtype string 32
fctuid string 32
filesize uint64 10
filetype string 23
filtername string 32
group string 64
level string 11
logid string 10
matchfiletype string 23
policyid uint32 10
profile string 64
proto uint8 3
service string 36
sessionid uint32 10
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
GTP
41216 - LOGID_GTP_FORWARD
cgsn6 ip 39
endusraddress6 ip 39
from6 ip 39
to To ip 512
to6 ip 39
ugsn6 ip 39
ulimcc uint16 3
ulimnc uint16 3
41217 - LOGID_GTP_DENY
cgsn6 ip 39
endusraddress6 ip 39
from6 ip 39
to To ip 512
to6 ip 39
ugsn6 ip 39
ulimcc uint16 3
ulimnc uint16 3
41218 - LOGID_GTP_RATE_LIMIT
cgsn6 ip 39
endusraddress6 ip 39
from6 ip 39
to To ip 512
to6 ip 39
ugsn6 ip 39
ulimcc uint16 3
ulimnc uint16 3
41219 - LOGID_GTP_STATE_INVALID
cgsn6 ip 39
endusraddress6 ip 39
from6 ip 39
to To ip 512
to6 ip 39
ugsn6 ip 39
ulimcc uint16 3
ulimnc uint16 3
41220 - LOGID_GTP_TUNNEL_LIMIT
cgsn6 ip 39
endusraddress6 ip 39
from6 ip 39
to To ip 512
to6 ip 39
ugsn6 ip 39
ulimcc uint16 3
ulimnc uint16 3
41221 - LOGID_GTP_TRAFFIC_COUNT
cggsn6 ip 39
csgsn6 ip 39
endusraddress6 ip 39
uggsn6 ip 39
ulimcc uint16 3
ulimnc uint16 3
usgsn6 ip 39
41222 - LOGID_GTP_USER_DATA
endusraddress6 ip 39
from6 ip 39
to To ip 512
to6 ip 39
41223 - LOGID_GTPV2_FORWARD
cpaddr6 ip 39
endusraddress6 ip 39
from6 ip 39
to To ip 512
to6 ip 39
ulimcc uint16 3
ulimnc uint16 3
41224 - LOGID_GTPV2_DENY
cpaddr6 ip 39
endusraddress6 ip 39
from6 ip 39
to To ip 512
to6 ip 39
ulimcc uint16 3
ulimnc uint16 3
41225 - LOGID_GTPV2_RATE_LIMIT
cpaddr6 ip 39
endusraddress6 ip 39
from6 ip 39
to To ip 512
to6 ip 39
ulimcc uint16 3
ulimnc uint16 3
41226 - LOGID_GTPV2_STATE_INVALID
cpaddr6 ip 39
endusraddress6 ip 39
from6 ip 39
to To ip 512
to6 ip 39
ulimcc uint16 3
ulimnc uint16 3
41227 - LOGID_GTPV2_TUNNEL_LIMIT
cpaddr6 ip 39
endusraddress6 ip 39
from6 ip 39
to To ip 512
to6 ip 39
ulimcc uint16 3
ulimnc uint16 3
41228 - LOGID_GTPV2_TRAFFIC_COUNT
cpdladdr6 ip 39
cpdlisraddr6 ip 39
cpuladdr6 ip 39
endusraddress6 ip 39
ulimcc uint16 3
ulimnc uint16 3
41229 - LOGID_GTPU_FORWARD
from6 ip 39
to To ip 512
to6 ip 39
41230 - LOGID_GTPU_DENY
from6 ip 39
to To ip 512
to6 ip 39
ICAP
60000 - LOG_ID_ICAP_SERVER_ERROR
action string 17
date string 10
devid string 16
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
eventtime uint64 20
eventtype string 32
level string 11
logid string 10
policyid uint32 10
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
vd string 32
IPS
16384 - LOGID_ATTCK_SIGNATURE_TCP_UDP
attackcontext The trigger patterns and the packet data with base64 encoding string 2048
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
rawdataid string 10
ref URL of the FortiGuard IPS database entry for the attack. string 4096
srcip Source IP ip 39
tz string 5
16385 - LOGID_ATTCK_SIGNATURE_ICMP
attackcontext The trigger patterns and the packet data with base64 encoding string 2048
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
rawdataid string 10
ref URL of the FortiGuard IPS database entry for the attack. string 4096
srcip Source IP ip 39
tz string 5
16386 - LOGID_ATTCK_SIGNATURE_OTHERS
attackcontext The trigger patterns and the packet data with base64 encoding string 2048
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
rawdataid string 10
ref URL of the FortiGuard IPS database entry for the attack. string 4096
srcip Source IP ip 39
tz string 5
16399 - LOGID_ATTACK_MALICIOUS_URL
attackcontext The trigger patterns and the packet data with base64 encoding string 2048
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
rawdataid string 10
srcip Source IP ip 39
tz string 5
16400 - LOGID_ATTACK_BOTNET_WARNING
attackcontext The trigger patterns and the packet data with base64 encoding string 2048
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
rawdataid string 10
ref URL of the FortiGuard IPS database entry for the attack. string 4096
srcip Source IP ip 39
tz string 5
16401 - LOGID_ATTACK_BOTNET_NOTIF
Severity: Notice
attackcontext The trigger patterns and the packet data with base64 encoding string 2048
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
rawdataid string 10
ref URL of the FortiGuard IPS database entry for the attack. string 4096
srcip Source IP ip 39
tz string 5
SSH
61000 - LOG_ID_SSH_COMMAND_BLOCK
Type: SSH
Category: SSH-COMMAND
Severity: Warning
dstip Destination IP ip 39
srcip Source IP ip 39
61001 - LOG_ID_SSH_COMMAND_BLOCK_ALERT
dstip Destination IP ip 39
srcip Source IP ip 39
61002 - LOG_ID_SSH_COMMAND_PASS
dstip Destination IP ip 39
srcip Source IP ip 39
61003 - LOG_ID_SSH_COMMAND_PASS_ALERT
dstip Destination IP ip 39
srcip Source IP ip 39
61010 - LOG_ID_SSH_CHANNEL_BLOCK
dstip Destination IP ip 39
srcip Source IP ip 39
61011 - LOG_ID_SSH_CHANNEL_PASS
dstip Destination IP ip 39
srcip Source IP ip 39
SSL
62004 - LOG_ID_SSL_EXEMPT_ADDR
action string 20
cat uint8 3
catdesc string 64
date string 10
devid string 16
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
group string 64
level string 11
logid string 10
policyid uint32 10
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62006 - LOG_ID_SSL_EXEMPT_WHITELIST
action string 20
cat uint8 3
catdesc string 64
date string 10
devid string 16
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
group string 64
level string 11
logid string 10
policyid uint32 10
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62007 - LOG_ID_SSL_EXEMPT_FTGD_CATEGORY
action string 20
cat uint8 3
catdesc string 64
date string 10
devid string 16
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
group string 64
level string 11
logid string 10
policyid uint32 10
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62008 - LOG_ID_SSL_EXEMPT_LOCAL_CATEGORY
action string 20
cat uint8 3
catdesc string 64
date string 10
devid string 16
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
group string 64
level string 11
logid string 10
policyid uint32 10
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62009 - LOG_ID_SSL_EXEMPT_USER_CATEGORY
action string 20
cat uint8 3
catdesc string 64
date string 10
devid string 16
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
group string 64
level string 11
logid string 10
policyid uint32 10
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62100 - LOG_ID_SSL_NEGOTIATION_INSPECT
action string 20
date string 10
devid string 16
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
group string 64
level string 11
logid string 10
policyid uint32 10
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62101 - LOG_ID_SSL_NEGOTIATION_BLOCK
action string 20
date string 10
devid string 16
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
group string 64
level string 11
logid string 10
policyid uint32 10
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62102 - LOG_ID_SSL_NEGOTIATION_BYPASS
action string 20
date string 10
devid string 16
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
group string 64
level string 11
logid string 10
policyid uint32 10
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62300 - LOG_ID_SSL_ANOMALY_CERT_BLACKLISTED
action string 20
certdesc string 64
certhash string 40
date string 10
devid string 16
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
group string 64
level string 11
logid string 10
policyid uint32 10
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62301 - LOG_ID_SSL_ANOMALY_CERT_RESIGN_TRUSTED
action string 20
certdesc string 64
certhash string 40
date string 10
devid string 16
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
group string 64
level string 11
logid string 10
policyid uint32 10
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62302 - LOG_ID_SSL_ANOMALY_CERT_RESIGN_UNTRUSTED
action string 20
certdesc string 64
certhash string 40
date string 10
devid string 16
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
group string 64
level string 11
logid string 10
policyid uint32 10
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62303 - LOG_ID_SSL_ANOMALY_CERT_BLOCKED
action string 20
certdesc string 64
certhash string 40
date string 10
devid string 16
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
group string 64
level string 11
logid string 10
policyid uint32 10
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62304 - LOG_ID_SSL_ANOMALY_CERT_SNI_MISMATCHED
action string 20
certdesc string 64
certhash string 40
date string 10
devid string 16
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
group string 64
level string 11
logid string 10
policyid uint32 10
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
Traffic
2 - LOG_ID_TRAFFIC_ALLOW
Message ID: 2
Message Description: LOG_ID_TRAFFIC_ALLOW
Message Meaning: Allowed traffic
Type: Traffic
Category: FORWARD
Severity: Notice
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
dstauthserver string 32
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstswversion string 66
dstunauthuser string 66
dstunauthusersource string 66
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcregion string 64
srcswversion string 66
tunnelid uint32 10
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
3 - LOG_ID_TRAFFIC_DENY
Message ID: 3
Message Description: LOG_ID_TRAFFIC_DENY
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
dstauthserver string 32
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstswversion string 66
dstunauthuser string 66
dstunauthusersource string 66
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcregion string 64
srcswversion string 66
tunnelid uint32 10
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
4 - LOG_ID_TRAFFIC_OTHER_START
Message ID: 4
Message Description: LOG_ID_TRAFFIC_OTHER_START
Message Meaning: Traffic other session start
Type: Traffic
Category: FORWARD
Severity: Notice
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
dstauthserver string 32
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstswversion string 66
dstunauthuser string 66
dstunauthusersource string 66
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcregion string 64
srcswversion string 66
tunnelid uint32 10
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
5 - LOG_ID_TRAFFIC_OTHER_ICMP_ALLOW
Message ID: 5
Message Description: LOG_ID_TRAFFIC_OTHER_ICMP_ALLOW
Message Meaning: Traffic allowed ICMP
Type: Traffic
Category: FORWARD
Severity: Notice
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
dstauthserver string 32
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstswversion string 66
dstunauthuser string 66
dstunauthusersource string 66
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcregion string 64
srcswversion string 66
tunnelid uint32 10
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
6 - LOG_ID_TRAFFIC_OTHER_ICMP_DENY
Message ID: 6
Message Description: LOG_ID_TRAFFIC_OTHER_ICMP_DENY
Message Meaning: Traffic denied ICMP
Type: Traffic
Category: FORWARD
Severity: Warning
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
dstauthserver string 32
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstswversion string 66
dstunauthuser string 66
dstunauthusersource string 66
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcregion string 64
srcswversion string 66
tunnelid uint32 10
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
7 - LOG_ID_TRAFFIC_OTHER_INVALID
Message ID: 7
Message Description: LOG_ID_TRAFFIC_OTHER_INVALID
Message Meaning: Traffic other invalid
Type: Traffic
Category: FORWARD
Severity: Warning
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
dstauthserver string 32
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstswversion string 66
dstunauthuser string 66
dstunauthusersource string 66
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcregion string 64
srcswversion string 66
tunnelid uint32 10
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
8 - LOG_ID_TRAFFIC_WANOPT
Message ID: 8
Message Description: LOG_ID_TRAFFIC_WANOPT
Message Meaning: WAN optimization traffic
Type: Traffic
Category: FORWARD
Severity: Notice
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
countapp Number of App Ctrl logs associated with the session uint32 10
countcifs uint32 10
countdns Number of DNS Query logs associated with the session uint32 10
countff uint32 10
counticap uint32 10
countssl uint32 10
countweb Number of Web Filter logs associated with the session uint32 10
dstauthserver string 32
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstswversion string 66
dstunauthuser string 66
dstunauthusersource string 66
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcregion string 64
srcswversion string 66
tunnelid uint32 10
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
9 - LOG_ID_TRAFFIC_WEBCACHE
Message ID: 9
Message Description: LOG_ID_TRAFFIC_WEBCACHE
Message Meaning: Web cache traffic
Type: Traffic
Category: FORWARD
Severity: Notice
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
countapp Number of App Ctrl logs associated with the session uint32 10
countcifs uint32 10
countdns Number of DNS Query logs associated with the session uint32 10
countff uint32 10
counticap uint32 10
countssl uint32 10
countweb Number of Web Filter logs associated with the session uint32 10
dstauthserver string 32
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstswversion string 66
dstunauthuser string 66
dstunauthusersource string 66
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcregion string 64
srcswversion string 66
tunnelid uint32 10
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
10 - LOG_ID_TRAFFIC_EXPLICIT_PROXY
Message ID: 10
Message Description: LOG_ID_TRAFFIC_EXPLICIT_PROXY
Message Meaning: Explicit proxy traffic
Type: Traffic
Category: FORWARD
Severity: Notice
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
countapp Number of App Ctrl logs associated with the session uint32 10
countcifs uint32 10
countdns Number of DNS Query logs associated with the session uint32 10
countff uint32 10
counticap uint32 10
countssl uint32 10
countweb Number of Web Filter logs associated with the session uint32 10
dstauthserver string 32
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstswversion string 66
dstunauthuser string 66
dstunauthusersource string 66
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcregion string 64
srcswversion string 66
tunnelid uint32 10
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
11 - LOG_ID_TRAFFIC_FAIL_CONN
Message ID: 11
Message Description: LOG_ID_TRAFFIC_FAIL_CONN
Message Meaning: Failed connection attempts
Type: Traffic
Category: FORWARD
Severity: Warning
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
dstauthserver string 32
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstswversion string 66
dstunauthuser string 66
dstunauthusersource string 66
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcregion string 64
srcswversion string 66
tunnelid uint32 10
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
12 - LOG_ID_TRAFFIC_MULTICAST
Message ID: 12
Message Description: LOG_ID_TRAFFIC_MULTICAST
Message Meaning: Multicast traffic
Type: Traffic
Category: MULTICAST
Severity: Notice
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
dstauthserver string 32
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstswversion string 66
dstunauthuser string 66
dstunauthusersource string 66
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcregion string 64
srcswversion string 66
tunnelid uint32 10
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
13 - LOG_ID_TRAFFIC_END_FORWARD
Message ID: 13
Message Description: LOG_ID_TRAFFIC_END_FORWARD
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
countapp Number of App Ctrl logs associated with the session uint32 10
countcifs uint32 10
countdns Number of DNS Query logs associated with the session uint32 10
countff uint32 10
counticap uint32 10
countssl uint32 10
countweb Number of Web Filter logs associated with the session uint32 10
dstauthserver string 32
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstswversion string 66
dstunauthuser string 66
dstunauthusersource string 66
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcregion string 64
srcswversion string 66
tunnelid uint32 10
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
14 - LOG_ID_TRAFFIC_END_LOCAL
Message ID: 14
Message Description: LOG_ID_TRAFFIC_END_LOCAL
Message Meaning: Local traffic
Type: Traffic
Category: LOCAL
Severity: Notice
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
dstauthserver string 32
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstswversion string 66
dstunauthuser string 66
dstunauthusersource string 66
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcregion string 64
srcswversion string 66
tunnelid uint32 10
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
15 - LOG_ID_TRAFFIC_START_FORWARD
Message ID: 15
Message Description: LOG_ID_TRAFFIC_START_FORWARD
Message Meaning: Forward traffic session start
Type: Traffic
Category: FORWARD
Severity: Notice
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
dstauthserver string 32
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstswversion string 66
dstunauthuser string 66
dstunauthusersource string 66
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcregion string 64
srcswversion string 66
tunnelid uint32 10
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
16 - LOG_ID_TRAFFIC_START_LOCAL
Message ID: 16
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
dstauthserver string 32
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstswversion string 66
dstunauthuser string 66
dstunauthusersource string 66
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcregion string 64
srcswversion string 66
tunnelid uint32 10
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
17 - LOG_ID_TRAFFIC_SNIFFER
Message ID: 17
Message Description: LOG_ID_TRAFFIC_SNIFFER
Message Meaning: Sniffer traffic
Type: Traffic
Category: SNIFFER
Severity: Notice
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
countapp Number of App Ctrl logs associated with the session uint32 10
countcifs uint32 10
countdns Number of DNS Query logs associated with the session uint32 10
countff uint32 10
counticap uint32 10
countssl uint32 10
countweb Number of Web Filter logs associated with the session uint32 10
dstauthserver string 32
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstswversion string 66
dstunauthuser string 66
dstunauthusersource string 66
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcregion string 64
srcswversion string 66
tunnelid uint32 10
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
19 - LOG_ID_TRAFFIC_BROADCAST
Message ID: 19
Message Description: LOG_ID_TRAFFIC_BROADCAST
Message Meaning: Broadcast traffic
Type: Traffic
Category: MULTICAST
Severity: Notice
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
dstauthserver string 32
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstswversion string 66
dstunauthuser string 66
dstunauthusersource string 66
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcregion string 64
srcswversion string 66
tunnelid uint32 10
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
20 - LOG_ID_TRAFFIC_STAT
Message ID: 20
Message Description: LOG_ID_TRAFFIC_STAT
Message Meaning: Forward traffic statistics
Type: Traffic
Category: FORWARD
Severity: Notice
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
dstauthserver string 32
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstswversion string 66
dstunauthuser string 66
dstunauthusersource string 66
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcregion string 64
srcswversion string 66
tunnelid uint32 10
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
21 - LOG_ID_TRAFFIC_SNIFFER_STAT
Message ID: 21
Message Description: LOG_ID_TRAFFIC_SNIFFER_STAT
Message Meaning: Sniffer traffic statistics
Type: Traffic
Category: SNIFFER
Severity: Notice
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
dstauthserver string 32
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstswversion string 66
dstunauthuser string 66
dstunauthusersource string 66
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcregion string 64
srcswversion string 66
tunnelid uint32 10
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
22 - LOG_ID_TRAFFIC_UTM_CORRELATION
Message ID: 22
Message Description: LOG_ID_TRAFFIC_UTM_CORRELATION
Message Meaning: Forward traffic for UTM correlation
Type: Traffic
Category: FORWARD
Severity: Notice
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
countapp Number of App Ctrl logs associated with the session uint32 10
countcifs uint32 10
countdns Number of DNS Query logs associated with the session uint32 10
countff uint32 10
counticap uint32 10
countssl uint32 10
countweb Number of Web Filter logs associated with the session uint32 10
dstauthserver string 32
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstswversion string 66
dstunauthuser string 66
dstunauthusersource string 66
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcregion string 64
srcswversion string 66
tunnelid uint32 10
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
VoIP
44032 - LOGID_EVENT_VOIP_SIP
date Day, month, and year when the log message was recorded. string 10
devid Serial number of the device for the traffic's origin. string 16
dstip Destination IP ip 39
policy_id Name of the firewall policy governing the traffic which caused uint32 10
the log message.
time Hour clock when the log message was recorded. string 8
vd Name of the virtual domain in which the log message was string 32
recorded.
44033 - LOGID_EVENT_VOIP_SIP_BLOCK
Severity: Notice
date Day, month, and year when the log message was recorded. string 10
devid Serial number of the device for the traffic's origin. string 16
dstip Destination IP ip 39
policy_id Name of the firewall policy governing the traffic which caused uint32 10
the log message.
time Hour clock when the log message was recorded. string 8
vd Name of the virtual domain in which the log message was string 32
recorded.
44034 - LOGID_EVENT_VOIP_SIP_FUZZING
date Day, month, and year when the log message was recorded. string 10
devid Serial number of the device for the traffic's origin. string 16
dstip Destination IP ip 39
policy_id Name of the firewall policy governing the traffic which caused uint32 10
the log message.
time Hour clock when the log message was recorded. string 8
vd Name of the virtual domain in which the log message was string 32
recorded.
44035 - LOGID_EVENT_VOIP_SCCP_REGISTER
date Day, month, and year when the log message was recorded. string 10
devid Serial number of the device for the traffic's origin. string 16
dstip Destination IP ip 39
locip Local IP ip 39
policy_id Name of the firewall policy governing the traffic which caused uint32 10
the log message.
time Hour clock when the log message was recorded. string 8
vd Name of the virtual domain in which the log message was string 32
recorded.
44036 - LOGID_EVENT_VOIP_SCCP_UNREGISTER
date Day, month, and year when the log message was recorded. string 10
devid Serial number of the device for the traffic's origin. string 16
dstip Destination IP ip 39
locip Local IP ip 39
policy_id Name of the firewall policy governing the traffic which caused uint32 10
the log message.
time Hour clock when the log message was recorded. string 8
vd Name of the virtual domain in which the log message was string 32
recorded.
44037 - LOGID_EVENT_VOIP_SCCP_CALL_BLOCK
date Day, month, and year when the log message was recorded. string 10
devid Serial number of the device for the traffic's origin. string 16
dstip Destination IP ip 39
locip Local IP ip 39
policy_id Name of the firewall policy governing the traffic which caused uint32 10
the log message.
time Hour clock when the log message was recorded. string 8
vd Name of the virtual domain in which the log message was string 32
recorded.
44038 - LOGID_EVENT_VOIP_SCCP_CALL_INFO
date Day, month, and year when the log message was recorded. string 10
devid Serial number of the device for the traffic's origin. string 16
dstip Destination IP ip 39
locip Local IP ip 39
policy_id Name of the firewall policy governing the traffic which caused uint32 10
the log message.
remip Remote IP ip 39
time Hour clock when the log message was recorded. string 8
vd Name of the virtual domain in which the log message was string 32
recorded.
WAF
30248 - LOGID_WAF_SIGNATURE_BLOCK
Severity: Warning
30249 - LOGID_WAF_SIGNATURE_PASS
30250 - LOGID_WAF_SIGNATURE_ERASE
30251 - LOGID_WAF_CUSTOM_SIGNATURE_BLOCK
30252 - LOGID_WAF_CUSTOM_SIGNATURE_PASS
30253 - LOGID_WAF_METHOD_BLOCK
30255 - LOGID_WAF_ADDRESS_LIST_BLOCK
30257 - LOGID_WAF_CONSTRAINTS_BLOCK
30258 - LOGID_WAF_CONSTRAINTS_PASS
30259 - LOGID_WAF_URL_ACCESS_PERMIT
30260 - LOGID_WAF_URL_ACCESS_BYPASS
30261 - LOGID_WAF_URL_ACCESS_BLOCK
Web
12288 - LOG_ID_WEB_CONTENT_BANWORD
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
12290 - LOG_ID_WEB_CONTENT_EXEMPTWORD
Category: CONTENT
Severity: Notice
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
12292 - LOG_ID_WEB_CONTENT_KEYWORD
Type: Web
Category: CONTENT
Severity: Notice
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
12293 - LOG_ID_WEB_CONTENT_SEARCH
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
12544 - LOG_ID_URL_FILTER_BLOCK
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
12545 - LOG_ID_URL_FILTER_EXEMPT
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
12546 - LOG_ID_URL_FILTER_ALLOW
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
12547 - LOG_ID_URL_FILTER_INVALID_HOSTNAME_HTTP_BLK
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
12548 - LOG_ID_URL_FILTER_INVALID_HOSTNAME_HTTPS_BLK
Severity: Notice
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
12549 - LOG_ID_URL_FILTER_INVALID_HOSTNAME_HTTP_PASS
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
12550 - LOG_ID_URL_FILTER_INVALID_HOSTNAME_HTTPS_PASS
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
12551 - LOG_ID_URL_FILTER_INVALID_HOSTNAME_SNI_BLK
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
12552 - LOG_ID_URL_FILTER_INVALID_HOSTNAME_SNI_PASS
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
12553 - LOG_ID_URL_FILTER_INVALID_CERT
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
12554 - LOG_ID_URL_FILTER_INVALID_SESSION
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
12555 - LOG_ID_URL_FILTER_SRV_CERT_ERR_BLK
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
12556 - LOG_ID_URL_FILTER_SRV_CERT_ERR_PASS
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
12557 - LOG_ID_URL_FILTER_FAMS_NOT_ACTIVE
12558 - LOG_ID_URL_FILTER_RATING_ERR
dstip Destination IP ip 39
srcip Source IP ip 39
12559 - LOG_ID_URL_FILTER_PASS
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
12560 - LOG_ID_URL_WISP_BLOCK
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
12561 - LOG_ID_URL_WISP_REDIR
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
12562 - LOG_ID_URL_WISP_ALLOW
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
12688 - LOG_ID_WEB_SSL_EXEMPT
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
12800 - LOG_ID_WEB_FTGD_ERR
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
12801 - LOG_ID_WEB_FTGD_WARNING
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
12802 - LOG_ID_WEB_FTGD_QUOTA
13056 - LOG_ID_WEB_FTGD_CAT_BLK
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
13057 - LOG_ID_WEB_FTGD_CAT_WARN
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
13312 - LOG_ID_WEB_FTGD_CAT_ALLOW
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
13315 - LOG_ID_WEB_FTGD_QUOTA_COUNTING
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
13316 - LOG_ID_WEB_FTGD_QUOTA_EXPIRED
Message Meaning: FortiGuard web filter category quota expired log message
Type: Web
Category: FTGD_QUOTA_EXPIRED
Severity: Warning
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
13317 - LOG_ID_WEB_URL
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
13568 - LOG_ID_WEB_SCRIPTFILTER_ACTIVEX
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
13573 - LOG_ID_WEB_SCRIPTFILTER_COOKIE
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
13584 - LOG_ID_WEB_SCRIPTFILTER_APPLET
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
13600 - LOG_ID_WEB_SCRIPTFILTER_OTHER
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
13601 - LOG_ID_WEB_WF_COOKIE
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
13602 - LOG_ID_WEB_WF_REFERER
Severity: Notice
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
13603 - LOG_ID_WEB_WF_COMMAND_BLOCK
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
13616 - LOG_ID_CONTENT_TYPE_BLOCK
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
13632 - LOGID_HTTP_HDR_CHG_REQ
dstip Destination IP ip 39
srcip Source IP ip 39
13633 - LOGID_HTTP_HDR_CHG_RESP
dstip Destination IP ip 39
srcip Source IP ip 39
13648 - LOG_ID_WEB_WF_ANTIPHISH_MATCH_URL_ALLOW
antiphishdc string 64
antiphishrule string 64
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
13649 - LOG_ID_WEB_WF_ANTIPHISH_MATCH_FTGD_ALLOW
antiphishdc string 64
antiphishrule string 64
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
13650 - LOG_ID_WEB_WF_ANTIPHISH_MATCH_DEFAULT_ALLOW
antiphishdc string 64
antiphishrule string 64
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
13651 - LOG_ID_WEB_WF_ANTIPHISH_MATCH_URL_BLOCK
antiphishdc string 64
antiphishrule string 64
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
13652 - LOG_ID_WEB_WF_ANTIPHISH_MATCH_FTGD_BLOCK
antiphishdc string 64
antiphishrule string 64
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39
13653 - LOG_ID_WEB_WF_ANTIPHISH_MATCH_DEFAULT_BLOCK
Severity: Warning
antiphishdc string 64
antiphishrule string 64
dstip Destination IP ip 39
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srcip Source IP ip 39