Log Message Reference 510
Log Message Reference 510
Page 3
Log Field Name Changes in FortiOS 5.0
4.3 5 4.3 5
app_cat appcat pri level
app_list applist profile_group profilegroup
app_type apptype profile_type profiletype
asset_id assetid quota_exceeded quotaexceeded
asset_name assetname quota_max quotamax
attack_id attackid quota_used quotaused
attack_name attackname rcvd rcvdbyte
carrier_ep carrierep rcvd_pkt rcvdpkt
cat_desc catdesc rem_ip remip
class_desc classdesc rem_port remport
conn-mode connmode remote_ip remip
content_type contenttype req_type reqtype
dec_spi decspi request_name requestname
dir direction rule_data ruledata
dir_disp dirdisp rule_type ruletype
dlp_sensor dlpsensor sent sentbyte
dst dstip sent_pkt sentpkt
dst_country dstcountry shaper_drop_rcvd shaperdroprcvdbyte
dst_int dstintf shaper_drop_sent shaperdropsentbyte
dst_port dstport shaper_rcvd_name shaperrcvdname
enc_spi encspi shaper_sent_name shapersentname
end-date enddate src srcip
esp_auth espauth src_country srccountry
esp_transform esptransform src_int srcintf
filter_type filtertype src_port srcport
icmp_code icmpcode start-date startdate
icmp_id icmpid tran_disp trandisp
icmp_type icmptype tran_ip tranip
incident_serialno incidentserialno tran_port tranport
lan_in lanin tran_sip transip
lan_out lanout tran_sport transport
loc_ip locip url_type urltype
loc_port locport urlfilter_idx urlfilteridx
local_ip locip urlfilter_list urlfilterlist
log_id logid voip_proto voipproto
malform_data malformdata vpn_tunnel vpntunnel
malform_desc malformdesc vpn_type vpntype
message msg vuln_cat vulncat
message_type messagetype vuln_cnt vulncnt
os_family osfamily vuln_id vulnid
os_gen osgen vuln_ref vulnref
os_vendor osvendor wan_in wanin
out_intf outintf wan_out wanout
ovrd_id ovrdid wanopt_app_type wanoptapptype
ovrd_tbl ovrdtbl xauth_group xauthgroup
perip_drop shaperperipdropbyte xauth_user xauthuser
perip_name shaperperipname
Page 4
Log Subtype Name Changes in FortiOS 5.0
4.3 subtypes 5.0 subtypes
traffic allowed forward/local/multicast
webcache-traffic, wanopt-traffic, explicit-proxy-traffic forward
failed-conn, violation, other forward
Page 5
netscan discovery discovery
vulnerability vulnerability
Page 6
Page 7
Traffic
2
Message ID: 000002
Message Description: allowed message
Type (type): traffic
Subtype (subtype): forward
Level/Severity: notice
type traffic
subtype forward
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
trandisp Whether the packet is source NAT translated (snat) or destination NAT translated (dnat), both (snat+dnat) or neither
(noop).
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
tranport The translated port number in NAT mode. For Transparent mode, it is zero.
transip The translated source IP in NAT mode. For Transparent mode, it is zero.
transport The translated source port number in NAT mode. For Transparent mode, it is zero.
proto The protocol number that applies to the session or packet. This is the protocol number in the packet header that
identifies the next level protocol. Protocol numbers are assigned by the Internet Assigned Number Authority (IANA).
Page 8
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched.
This number is not globally unique, it is only locally unique within a given firewall policy.
vpntype The type of VPN tunnel that the traffic is flowing through. This field can be any one of the following: ipsec-static,
ipsec-dynamic, ipsec-ddns, sslvpn.
vpntunnel The name of the VPN tunnel that was used. For example, ssl_vpn1.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
app The name of the application that triggered the action within the control list. For example, SSL.
applist The name of the application control list that was used to detect and take action.
Page 9
3
Message ID: 000003
Message Description: violation message
Type (type): traffic
Subtype (subtype): invalid
Level/Severity: warning
type traffic
subtype invalid
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
proto The protocol number that applies to the session or packet. This is the protocol number in the packet header that
identifies the next level protocol. Protocol numbers are assigned by the Internet Assigned Number Authority (IANA).
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched.
This number is not globally unique, it is only locally unique within a given firewall policy.
Page 10
shapersentname The name of the traffic shaper sending the bytes.
vpntype The type of VPN tunnel that the traffic is flowing through. This field can be any one of the following: ipsec-static,
ipsec-dynamic, ipsec-ddns, sslvpn.
vpntunnel The name of the VPN tunnel that was used. For example, ssl_vpn1.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
app The name of the application that triggered the action within the control list. For example, SSL.
applist The name of the application control list that was used to detect and take action.
Page 11
4
Message ID: 000004
Message Description: other message
Type (type): traffic
Subtype (subtype): invalid
Level/Severity: notice
type traffic
subtype invalid
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
tranport The translated port number in NAT mode. For Transparent mode, it is zero.
transip The translated source IP in NAT mode. For Transparent mode, it is zero.
transport The translated source port number in NAT mode. For Transparent mode, it is zero.
proto The protocol number that applies to the session or packet. This is the protocol number in the packet header that
identifies the next level protocol. Protocol numbers are assigned by the Internet Assigned Number Authority (IANA).
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched.
This number is not globally unique, it is only locally unique within a given firewall policy.
Page 12
rcvdbyte The number of received bytes related to the log message.
vpntype The type of VPN tunnel that the traffic is flowing through. This field can be any one of the following: ipsec-static,
ipsec-dynamic, ipsec-ddns, sslvpn.
vpntunnel The name of the VPN tunnel that was used. For example, ssl_vpn1.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
app The name of the application that triggered the action within the control list. For example, SSL.
applist The name of the application control list that was used to detect and take action.
Page 13
5
Message ID: 000005
Message Description: allowed icmp message
Type (type): traffic
Subtype (subtype): invalid
Level/Severity: notice
type traffic
subtype invalid
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
trandisp Whether the packet is source NAT translated (snat) or destination NAT translated (dnat), both (snat+dnat) or neither
(noop).
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
tranport The translated port number in NAT mode. For Transparent mode, it is zero.
transip The translated source IP in NAT mode. For Transparent mode, it is zero.
transport The translated source port number in NAT mode. For Transparent mode, it is zero.
proto The protocol number that applies to the session or packet. This is the protocol number in the packet header that
identifies the next level protocol. Protocol numbers are assigned by the Internet Assigned Number Authority (IANA).
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched.
This number is not globally unique, it is only locally unique within a given firewall policy.
Page 14
sentbyte The number of sent bytes related to the log message.
vpntype The type of VPN tunnel that the traffic is flowing through. This field can be any one of the following: ipsec-static,
ipsec-dynamic, ipsec-ddns, sslvpn.
vpntunnel The name of the VPN tunnel that was used. For example, ssl_vpn1.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
app The name of the application that triggered the action within the control list. For example, SSL.
applist The name of the application control list that was used to detect and take action.
Page 15
6
Message ID: 000006
Message Description: deny internal icmp message
Type (type): traffic
Subtype (subtype): invalid
Level/Severity: warning
type traffic
subtype invalid
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
proto The protocol number that applies to the session or packet. This is the protocol number in the packet header that
identifies the next level protocol. Protocol numbers are assigned by the Internet Assigned Number Authority (IANA).
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched.
This number is not globally unique, it is only locally unique within a given firewall policy.
Page 16
shapersentname The name of the traffic shaper sending the bytes.
vpntype The type of VPN tunnel that the traffic is flowing through. This field can be any one of the following: ipsec-static,
ipsec-dynamic, ipsec-ddns, sslvpn.
vpntunnel The name of the VPN tunnel that was used. For example, ssl_vpn1.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
app The name of the application that triggered the action within the control list. For example, SSL.
applist The name of the application control list that was used to detect and take action.
Page 17
7
Message ID: 000007
Message Description: deny external icmp message
Type (type): traffic
Subtype (subtype): invalid
Level/Severity: warning
type traffic
subtype invalid
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
proto The protocol number that applies to the session or packet. This is the protocol number in the packet header that
identifies the next level protocol. Protocol numbers are assigned by the Internet Assigned Number Authority (IANA).
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched.
This number is not globally unique, it is only locally unique within a given firewall policy.
Page 18
shapersentname The name of the traffic shaper sending the bytes.
vpntype The type of VPN tunnel that the traffic is flowing through. This field can be any one of the following: ipsec-static,
ipsec-dynamic, ipsec-ddns, sslvpn.
vpntunnel The name of the VPN tunnel that was used. For example, ssl_vpn1.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
app The name of the application that triggered the action within the control list. For example, SSL.
applist The name of the application control list that was used to detect and take action.
Page 19
8
Message ID: 000008
Message Description: WAN optimization traffic
Type (type): traffic
Subtype (subtype): forward
Level/Severity: notice
type traffic
subtype forward
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
wanoptapptype WANOpt app type. One of: web-cache, cifs, tcp, ftp, mapi, http, web-proxy, ftp-proxy.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
Page 20
unauthusersource Method used to detect username.
Page 21
9
Message ID: 000009
Message Description: webcache traffic
Type (type): traffic
Subtype (subtype): forward
Level/Severity: notice
type traffic
subtype forward
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
wanoptapptype WANOpt app type. One of: web-cache, cifs, tcp, ftp, mapi, http, web-proxy, ftp-proxy.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
Page 22
unauthusersource Method used to detect username.
Page 23
10
Message ID: 000010
Message Description: explicit proxy traffic
Type (type): traffic
Subtype (subtype): forward
Level/Severity: notice
type traffic
subtype forward
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
wanoptapptype WANOpt app type. One of: web-cache, cifs, tcp, ftp, mapi, http, web-proxy, ftp-proxy.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
Page 24
unauthusersource Method used to detect username.
Page 25
11
Message ID: 000011
Message Description: failed connection attempts
Type (type): traffic
Subtype (subtype): invalid
Level/Severity: warning
type traffic
subtype invalid
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
Page 26
12
Message ID: 000012
Message Description: multicast allowed message
Type (type): traffic
Subtype (subtype): multicast
Level/Severity: notice
type traffic
subtype multicast
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
trandisp Whether the packet is source NAT translated (snat) or destination NAT translated (dnat), both (snat+dnat) or neither
(noop).
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
tranport The translated port number in NAT mode. For Transparent mode, it is zero.
transip The translated source IP in NAT mode. For Transparent mode, it is zero.
transport The translated source port number in NAT mode. For Transparent mode, it is zero.
proto The protocol number that applies to the session or packet. This is the protocol number in the packet header that
identifies the next level protocol. Protocol numbers are assigned by the Internet Assigned Number Authority (IANA).
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched.
This number is not globally unique, it is only locally unique within a given firewall policy.
Page 27
sentbyte The number of sent bytes related to the log message.
vpntype The type of VPN tunnel that the traffic is flowing through. This field can be any one of the following: ipsec-static,
ipsec-dynamic, ipsec-ddns, sslvpn.
vpntunnel The name of the VPN tunnel that was used. For example, ssl_vpn1.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
app The name of the application that triggered the action within the control list. For example, SSL.
applist The name of the application control list that was used to detect and take action.
Page 28
13
Message ID: 000013
Message Description: traffic forward message
Type (type): traffic
Subtype (subtype): forward
Level/Severity: notice
type traffic
subtype forward
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
trandisp Whether the packet is source NAT translated (snat) or destination NAT translated (dnat), both (snat+dnat) or neither
(noop).
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
tranport The translated port number in NAT mode. For Transparent mode, it is zero.
transip The translated source IP in NAT mode. For Transparent mode, it is zero.
transport The translated source port number in NAT mode. For Transparent mode, it is zero.
proto The protocol number that applies to the session or packet. This is the protocol number in the packet header that
identifies the next level protocol. Protocol numbers are assigned by the Internet Assigned Number Authority (IANA).
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched.
This number is not globally unique, it is only locally unique within a given firewall policy.
Page 29
sentbyte The number of sent bytes related to the log message.
vpntype The type of VPN tunnel that the traffic is flowing through. This field can be any one of the following: ipsec-static,
ipsec-dynamic, ipsec-ddns, sslvpn.
vpntunnel The name of the VPN tunnel that was used. For example, ssl_vpn1.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
app The name of the application that triggered the action within the control list. For example, SSL.
applist The name of the application control list that was used to detect and take action.
attack ATTACK
sender SENDER
recipient RECIPIENT
mailcount MAILCOUNT
Page 30
spamcount SPAMCOUNT
Page 31
14
Message ID: 000014
Message Description: traffic local message
Type (type): traffic
Subtype (subtype): local
Level/Severity: notice
type traffic
subtype local
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
trandisp Whether the packet is source NAT translated (snat) or destination NAT translated (dnat), both (snat+dnat) or neither
(noop).
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
tranport The translated port number in NAT mode. For Transparent mode, it is zero.
transip The translated source IP in NAT mode. For Transparent mode, it is zero.
transport The translated source port number in NAT mode. For Transparent mode, it is zero.
proto The protocol number that applies to the session or packet. This is the protocol number in the packet header that
identifies the next level protocol. Protocol numbers are assigned by the Internet Assigned Number Authority (IANA).
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched.
This number is not globally unique, it is only locally unique within a given firewall policy.
Page 32
sentbyte The number of sent bytes related to the log message.
vpntype The type of VPN tunnel that the traffic is flowing through. This field can be any one of the following: ipsec-static,
ipsec-dynamic, ipsec-ddns, sslvpn.
vpntunnel The name of the VPN tunnel that was used. For example, ssl_vpn1.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
app The name of the application that triggered the action within the control list. For example, SSL.
applist The name of the application control list that was used to detect and take action.
Page 33
15
Message ID: 000015
Message Description: start forward message
Type (type): traffic
Subtype (subtype): forward
Level/Severity: notice
type traffic
subtype forward
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
trandisp Whether the packet is source NAT translated (snat) or destination NAT translated (dnat), both (snat+dnat) or neither
(noop).
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
tranport The translated port number in NAT mode. For Transparent mode, it is zero.
transip The translated source IP in NAT mode. For Transparent mode, it is zero.
transport The translated source port number in NAT mode. For Transparent mode, it is zero.
proto The protocol number that applies to the session or packet. This is the protocol number in the packet header that
identifies the next level protocol. Protocol numbers are assigned by the Internet Assigned Number Authority (IANA).
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched.
This number is not globally unique, it is only locally unique within a given firewall policy.
Page 34
sentbyte The number of sent bytes related to the log message.
vpntype The type of VPN tunnel that the traffic is flowing through. This field can be any one of the following: ipsec-static,
ipsec-dynamic, ipsec-ddns, sslvpn.
vpntunnel The name of the VPN tunnel that was used. For example, ssl_vpn1.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
app The name of the application that triggered the action within the control list. For example, SSL.
applist The name of the application control list that was used to detect and take action.
Page 35
16
Message ID: 000016
Message Description: start local message
Type (type): traffic
Subtype (subtype): local
Level/Severity: notice
type traffic
subtype local
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
tranport The translated port number in NAT mode. For Transparent mode, it is zero.
transip The translated source IP in NAT mode. For Transparent mode, it is zero.
transport The translated source port number in NAT mode. For Transparent mode, it is zero.
proto The protocol number that applies to the session or packet. This is the protocol number in the packet header that
identifies the next level protocol. Protocol numbers are assigned by the Internet Assigned Number Authority (IANA).
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched.
This number is not globally unique, it is only locally unique within a given firewall policy.
Page 36
rcvdbyte The number of received bytes related to the log message.
vpntype The type of VPN tunnel that the traffic is flowing through. This field can be any one of the following: ipsec-static,
ipsec-dynamic, ipsec-ddns, sslvpn.
vpntunnel The name of the VPN tunnel that was used. For example, ssl_vpn1.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
app The name of the application that triggered the action within the control list. For example, SSL.
applist The name of the application control list that was used to detect and take action.
Page 37
Netscan
4096
Message ID: 004096
Message Description: Network scan performed
Type (type): utm
Subtype (subtype): netscan
Event Type (eventtype): vulnerability
Level/Severity: notice
type utm
subtype netscan
eventtype vulnerability
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
action The nature of the netscan event. Scan, vuln-detection, host-detection, os-scan, port-detection, service-detection, vuln-count.
Page 38
4097
Message ID: 004097
Message Description: Network scan performed
Type (type): utm
Subtype (subtype): netscan
Event Type (eventtype): discovery
Level/Severity: notice
type utm
subtype netscan
eventtype discovery
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
action The nature of the netscan event. Scan, vuln-detection, host-detection, os-scan, port-detection, service-detection, vuln-count.
Page 39
4098
Message ID: 004098
Message Description: Netscan vulnerability detected
Type (type): utm
Subtype (subtype): netscan
Event Type (eventtype): vulnerability
Level/Severity: notice
type utm
subtype netscan
eventtype vulnerability
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
action The nature of the netscan event. Scan, vuln-detection, host-detection, os-scan, port-detection, service-detection, vuln-count.
severity The priority level of the attack log. Can be info, low, medium, high, or critical.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 40
4099
Message ID: 004099
Message Description: Netscan OS detected
Type (type): utm
Subtype (subtype): netscan
Event Type (eventtype): discovery
Level/Severity: notice
type utm
subtype netscan
eventtype discovery
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
action The nature of the netscan event. Scan, vuln-detection, host-detection, os-scan, port-detection, service-detection, vuln-count.
osfamily OS family.
osgen OS generation.
osvendor OS vendor.
Page 41
4100
Message ID: 004100
Message Description: Netscan service detected
Type (type): utm
Subtype (subtype): netscan
Event Type (eventtype): discovery
Level/Severity: notice
type utm
subtype netscan
eventtype discovery
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
action The nature of the netscan event. Scan, vuln-detection, host-detection, os-scan, port-detection, service-detection, vuln-count.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 42
4101
Message ID: 004101
Message Description: Notification message
Type (type): utm
Subtype (subtype): netscan
Event Type (eventtype): vulnerability
Level/Severity: notice
type utm
subtype netscan
eventtype vulnerability
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
action The nature of the netscan event. Scan, vuln-detection, host-detection, os-scan, port-detection, service-detection, vuln-count.
Page 43
4102
Message ID: 004102
Message Description: Notification message
Type (type): utm
Subtype (subtype): netscan
Event Type (eventtype): discovery
Level/Severity: notice
type utm
subtype netscan
eventtype discovery
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
action The nature of the netscan event. Scan, vuln-detection, host-detection, os-scan, port-detection, service-detection, vuln-count.
Page 44
4103
Message ID: 004103
Message Description: Netscan number of vulnerabilities detected
Type (type): utm
Subtype (subtype): netscan
Event Type (eventtype): vulnerability
Level/Severity: notice
type utm
subtype netscan
eventtype vulnerability
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
action The nature of the netscan event. Scan, vuln-detection, host-detection, os-scan, port-detection, service-detection, vuln-count.
Page 45
4104
Message ID: 004104
Message Description: Netscan host detected
Type (type): utm
Subtype (subtype): netscan
Event Type (eventtype): discovery
Level/Severity: notice
type utm
subtype netscan
eventtype discovery
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
action The nature of the netscan event. Scan, vuln-detection, host-detection, os-scan, port-detection, service-detection, vuln-count.
Page 46
4105
Message ID: 004105
Message Description: Netscan port detected
Type (type): utm
Subtype (subtype): netscan
Event Type (eventtype): discovery
Level/Severity: notice
type utm
subtype netscan
eventtype discovery
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
action The nature of the netscan event. Scan, vuln-detection, host-detection, os-scan, port-detection, service-detection, vuln-count.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 47
Virus
8192
Message ID: 008192
Message Description: virus infected block
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): infected
Level/Severity: warning
type utm
subtype virus
eventtype infected
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same
checksum, the FortiGate unit assumes that they have the same content.
Page 48
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern
block), oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
dtype Dtype.
ref URL of the FortiGuard IPS database entry for the attack.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
agent Agent.
to Destination identifier.
Page 49
8193
Message ID: 008193
Message Description: virus infected pass
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): infected
Level/Severity: notice
type utm
subtype virus
eventtype infected
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same
checksum, the FortiGate unit assumes that they have the same content.
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern
block), oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
dtype Dtype.
Page 50
ref URL of the FortiGuard IPS database entry for the attack.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
agent Agent.
to Destination identifier.
Page 51
8194
Message ID: 008194
Message Description: virus infected mime block
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): infected
Level/Severity: warning
type utm
subtype virus
eventtype infected
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same
checksum, the FortiGate unit assumes that they have the same content.
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern
block), oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
dtype Dtype.
Page 52
ref URL of the FortiGuard IPS database entry for the attack.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
agent Agent.
to Destination identifier.
Page 53
8195
Message ID: 008195
Message Description: virus infected mime pass
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): infected
Level/Severity: notice
type utm
subtype virus
eventtype infected
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same
checksum, the FortiGate unit assumes that they have the same content.
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern
block), oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
dtype Dtype.
Page 54
ref URL of the FortiGuard IPS database entry for the attack.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
agent Agent.
to Destination identifier.
Page 55
8196
Message ID: 008196
Message Description: virus infected worm block
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): infected
Level/Severity: warning
type utm
subtype virus
eventtype infected
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
dtype Dtype.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
Page 56
msg "Worm detected."
Page 57
8197
Message ID: 008197
Message Description: virus infected worm monitor
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): infected
Level/Severity: notice
type utm
subtype virus
eventtype infected
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
dtype Dtype.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
Page 58
msg "Worm detected."
Page 59
8198
Message ID: 008198
Message Description: virus infected worm mime block
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): infected
Level/Severity: warning
type utm
subtype virus
eventtype infected
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
dtype Dtype.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
Page 60
from Source identifier.
to Destination identifier.
Page 61
8199
Message ID: 008199
Message Description: virus infected worm mime monitor
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): infected
Level/Severity: notice
type utm
subtype virus
eventtype infected
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
dtype Dtype.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
Page 62
from Source identifier.
to Destination identifier.
Page 63
8448
Message ID: 008448
Message Description: virus blocked (warning)
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): filename
Level/Severity: warning
type utm
subtype virus
eventtype filename
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same checksum, the
FortiGate unit assumes that they have the same content.
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern block),
oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
Page 64
url The URL address.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
agent Agent.
to Destination identifier.
Page 65
8449
Message ID: 008449
Message Description: virus blocked (notice)
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): filename
Level/Severity: notice
type utm
subtype virus
eventtype filename
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same checksum, the
FortiGate unit assumes that they have the same content.
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern block),
oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
Page 66
url The URL address.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
agent Agent.
to Destination identifier.
Page 67
8450
Message ID: 008450
Message Description: virus blocked mime (warning)
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): filename
Level/Severity: warning
type utm
subtype virus
eventtype filename
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same checksum, the
FortiGate unit assumes that they have the same content.
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern block),
oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
Page 68
url The URL address.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
agent Agent.
to Destination identifier.
Page 69
8451
Message ID: 008451
Message Description: virus blocked mime (notice)
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): filename
Level/Severity: notice
type utm
subtype virus
eventtype filename
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same checksum, the
FortiGate unit assumes that they have the same content.
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern block),
oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
Page 70
url The URL address.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
agent Agent.
to Destination identifier.
Page 71
8452
Message ID: 008452
Message Description: virus blocked command
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): filename
Level/Severity: warning
type utm
subtype virus
eventtype filename
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
agent Agent.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
Page 72
msg "Command blocked."
Page 73
8453
Message ID: 008453
Message Description: virus intercepted
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): filename
Level/Severity: notice
type utm
subtype virus
eventtype filename
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same checksum, the
FortiGate unit assumes that they have the same content.
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern block),
oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
Page 74
url The URL address.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
agent Agent.
to Destination identifier.
Page 75
8454
Message ID: 008454
Message Description: virus intercepted mime
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): filename
Level/Severity: notice
type utm
subtype virus
eventtype filename
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same checksum, the
FortiGate unit assumes that they have the same content.
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern block),
oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
Page 76
virus The name of the virus detected.
dtype Dtype.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
agent Agent.
to Destination identifier.
Page 77
8455
Message ID: 008455
Message Description: virus exempted
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): filename
Level/Severity: notice
type utm
subtype virus
eventtype filename
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
Page 78
user User name.
agent Agent.
to Destination identifier.
Page 79
8456
Message ID: 008456
Message Description: virus exempted mime
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): filename
Level/Severity: notice
type utm
subtype virus
eventtype filename
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
Page 80
user User name.
agent Agent.
to Destination identifier.
Page 81
8457
Message ID: 008457
Message Description: mms content checksum
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): infected
Level/Severity: warning
type utm
subtype virus
eventtype infected
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same checksum, the
FortiGate unit assumes that they have the same content.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
Page 82
group The group name.
agent Agent.
to Destination identifier.
Page 83
8458
Message ID: 008458
Message Description: mms content checksum
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): infected
Level/Severity: warning
type utm
subtype virus
eventtype infected
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same checksum, the
FortiGate unit assumes that they have the same content.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
Page 84
user User name.
agent Agent.
to Destination identifier.
Page 85
8704
Message ID: 008704
Message Description: oversized block
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): oversize
Level/Severity: warning
type utm
subtype virus
eventtype oversize
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
agent Agent.
Page 86
from Source identifier.
to Destination identifier.
Page 87
8705
Message ID: 008705
Message Description: oversized pass
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): oversize
Level/Severity: notice
type utm
subtype virus
eventtype oversize
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
agent Agent.
Page 88
from Source identifier.
to Destination identifier.
Page 89
8706
Message ID: 008706
Message Description: oversized mime block
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): oversize
Level/Severity: warning
type utm
subtype virus
eventtype oversize
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
Page 90
to Destination identifier.
Page 91
8707
Message ID: 008707
Message Description: oversized mime pass
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): oversize
Level/Severity: notice
type utm
subtype virus
eventtype oversize
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
Page 92
to Destination identifier.
Page 93
8720
Message ID: 008720
Message Description: switching protocols block
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): switchproto
Level/Severity: warning
type utm
subtype virus
eventtype switchproto
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
to Destination identifier.
Page 94
agent Agent.
Page 95
8721
Message ID: 008721
Message Description: switching protocols bypass
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): switchproto
Level/Severity: notice
type utm
subtype virus
eventtype switchproto
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
to Destination identifier.
Page 96
agent Agent.
Page 97
8960
Message ID: 008960
Message Description: uncompressed nested limit reached
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): scanerror
Level/Severity: notice
type utm
subtype virus
eventtype scanerror
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same
checksum, the FortiGate unit assumes that they have the same content.
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern
block), oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
dtype Dtype.
Page 98
ref URL of the FortiGuard IPS database entry for the attack.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
agent Agent.
to Destination identifier.
Page 99
8961
Message ID: 008961
Message Description: uncompressed size limit reached
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): scanerror
Level/Severity: notice
type utm
subtype virus
eventtype scanerror
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same
checksum, the FortiGate unit assumes that they have the same content.
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern
block), oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
dtype Dtype.
Page 100
ref URL of the FortiGuard IPS database entry for the attack.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
agent Agent.
to Destination identifier.
Page 101
8962
Message ID: 008962
Message Description: archive is encrypted
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): scanerror
Level/Severity: warning
type utm
subtype virus
eventtype scanerror
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same
checksum, the FortiGate unit assumes that they have the same content.
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern
block), oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
dtype Dtype.
Page 102
ref URL of the FortiGuard IPS database entry for the attack.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
agent Agent.
to Destination identifier.
Page 103
8963
Message ID: 008963
Message Description: archive is encrypted
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): scanerror
Level/Severity: notice
type utm
subtype virus
eventtype scanerror
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same
checksum, the FortiGate unit assumes that they have the same content.
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern
block), oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
dtype Dtype.
Page 104
ref URL of the FortiGuard IPS database entry for the attack.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
agent Agent.
to Destination identifier.
Page 105
8964
Message ID: 008964
Message Description: archive is corrupted
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): scanerror
Level/Severity: warning
type utm
subtype virus
eventtype scanerror
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same
checksum, the FortiGate unit assumes that they have the same content.
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern
block), oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
dtype Dtype.
Page 106
ref URL of the FortiGuard IPS database entry for the attack.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
agent Agent.
to Destination identifier.
Page 107
8965
Message ID: 008965
Message Description: archive is corrupted
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): scanerror
Level/Severity: notice
type utm
subtype virus
eventtype scanerror
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same
checksum, the FortiGate unit assumes that they have the same content.
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern
block), oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
dtype Dtype.
Page 108
ref URL of the FortiGuard IPS database entry for the attack.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
agent Agent.
to Destination identifier.
Page 109
8966
Message ID: 008966
Message Description: multipart archive
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): scanerror
Level/Severity: warning
type utm
subtype virus
eventtype scanerror
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same
checksum, the FortiGate unit assumes that they have the same content.
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern
block), oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
dtype Dtype.
Page 110
ref URL of the FortiGuard IPS database entry for the attack.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
agent Agent.
to Destination identifier.
Page 111
8967
Message ID: 008967
Message Description: multipart archive
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): scanerror
Level/Severity: notice
type utm
subtype virus
eventtype scanerror
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same
checksum, the FortiGate unit assumes that they have the same content.
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern
block), oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
dtype Dtype.
Page 112
ref URL of the FortiGuard IPS database entry for the attack.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
agent Agent.
to Destination identifier.
Page 113
8968
Message ID: 008968
Message Description: nested archive
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): scanerror
Level/Severity: warning
type utm
subtype virus
eventtype scanerror
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same
checksum, the FortiGate unit assumes that they have the same content.
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern
block), oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
dtype Dtype.
Page 114
ref URL of the FortiGuard IPS database entry for the attack.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
agent Agent.
to Destination identifier.
Page 115
8969
Message ID: 008969
Message Description: nested archive
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): scanerror
Level/Severity: notice
type utm
subtype virus
eventtype scanerror
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same
checksum, the FortiGate unit assumes that they have the same content.
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern
block), oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
dtype Dtype.
Page 116
ref URL of the FortiGuard IPS database entry for the attack.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
agent Agent.
to Destination identifier.
Page 117
8970
Message ID: 008970
Message Description: archive is oversized
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): scanerror
Level/Severity: warning
type utm
subtype virus
eventtype scanerror
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same
checksum, the FortiGate unit assumes that they have the same content.
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern
block), oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
dtype Dtype.
Page 118
ref URL of the FortiGuard IPS database entry for the attack.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
agent Agent.
to Destination identifier.
Page 119
8971
Message ID: 008971
Message Description: archive is oversized
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): scanerror
Level/Severity: notice
type utm
subtype virus
eventtype scanerror
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same
checksum, the FortiGate unit assumes that they have the same content.
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern
block), oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
dtype Dtype.
Page 120
ref URL of the FortiGuard IPS database entry for the attack.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
agent Agent.
to Destination identifier.
Page 121
8972
Message ID: 008972
Message Description: unhandled archive type
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): scanerror
Level/Severity: warning
type utm
subtype virus
eventtype scanerror
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same
checksum, the FortiGate unit assumes that they have the same content.
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern
block), oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
dtype Dtype.
Page 122
ref URL of the FortiGuard IPS database entry for the attack.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
agent Agent.
to Destination identifier.
Page 123
8973
Message ID: 008973
Message Description: unhandled archive type
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): scanerror
Level/Severity: notice
type utm
subtype virus
eventtype scanerror
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same
checksum, the FortiGate unit assumes that they have the same content.
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern
block), oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
dtype Dtype.
Page 124
ref URL of the FortiGuard IPS database entry for the attack.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
agent Agent.
to Destination identifier.
Page 125
9233
Message ID: 009233
Message Description: FortiGuard analytics
Type (type): utm
Subtype (subtype): virus
Event Type (eventtype): analytics
Level/Severity: notice
type utm
subtype virus
eventtype analytics
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
status The status of the virus or packet: blocked, passthrough, monitored, analytics.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
checksum The checksum of the file that was scanned by the FortiGate unit. If two files have different names but the same
checksum, the FortiGate unit assumes that they have the same content.
quarskip Quarantine skip explanation: notskip (file quarantined), filepattern (not quarantined due to HTTP GET file pattern
block), oversized (not quarantined due to no oversize rule), unknown (not quarantined for other reason).
dtype Dtype.
Page 126
ref URL of the FortiGuard IPS database entry for the attack.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
agent Agent.
to Destination identifier.
msg
Page 127
Webfilter
12288
Message ID: 012288
Message Description: Web content banned word
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): content
Level/Severity: warning
type utm
subtype webfilter
eventtype content
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
Page 128
dstip The destination IP.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
agent Agent.
to Destination identifier.
Page 129
12289
Message ID: 012289
Message Description: Web content MMS banned word
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): content
Level/Severity: warning
type utm
subtype webfilter
eventtype content
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 130
hostname The hostname information.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
agent Agent.
to Destination identifier.
Page 131
12290
Message ID: 012290
Message Description: Web content exempt word
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): content
Level/Severity: notice
type utm
subtype webfilter
eventtype content
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 132
hostname The hostname information.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
agent Agent.
to Destination identifier.
Page 133
12291
Message ID: 012291
Message Description: Web content MMS exempt word
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): content
Level/Severity: notice
type utm
subtype webfilter
eventtype content
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 134
hostname The hostname information.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
agent Agent.
to Destination identifier.
Page 135
12292
Message ID: 012292
Message Description: Web search key word
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): content
Level/Severity: notice
type utm
subtype webfilter
eventtype content
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 136
hostname The hostname information.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
agent Agent.
to Destination identifier.
Page 137
12293
Message ID: 012293
Message Description: Web search
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): content
Level/Severity: notice
type utm
subtype webfilter
eventtype content
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 138
hostname The hostname information.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
agent Agent.
to Destination identifier.
Page 139
12305
Message ID: 012305
Message Description: Web content MMS banned word
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): content
Level/Severity: notice
type utm
subtype webfilter
eventtype content
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 140
hostname The hostname information.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
agent Agent.
to Destination identifier.
Page 141
12544
Message ID: 012544
Message Description: URL filter block
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): urlfilter
Level/Severity: warning
type utm
subtype webfilter
eventtype urlfilter
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 142
dstintf The destination interface.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
Page 143
12545
Message ID: 012545
Message Description: URL filter exempt
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): urlfilter
Level/Severity: information
type utm
subtype webfilter
eventtype urlfilter
level information
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 144
dstintf The destination interface.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
Page 145
12546
Message ID: 012546
Message Description: URL filter allow
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): urlfilter
Level/Severity: information
type utm
subtype webfilter
eventtype urlfilter
level information
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 146
dstintf The destination interface.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
Page 147
12547
Message ID: 012547
Message Description: URL filter invalid hostname (Block/HTTP)
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): urlfilter
Level/Severity: notice
type utm
subtype webfilter
eventtype urlfilter
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
Page 148
rcvdbyte The number of received bytes related to the log message.
Page 149
12548
Message ID: 012548
Message Description: URL filter invalid hostname (Block/HTTPS)
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): urlfilter
Level/Severity: notice
type utm
subtype webfilter
eventtype urlfilter
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
Page 150
rcvdbyte The number of received bytes related to the log message.
msg "The certificate for the HTTPS session contained an invalid domain name."
Page 151
12549
Message ID: 012549
Message Description: URL filter invalid hostname (Filter/HTTP)
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): urlfilter
Level/Severity: information
type utm
subtype webfilter
eventtype urlfilter
level information
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
Page 152
rcvdbyte The number of received bytes related to the log message.
msg "The HTTP request contained an invalid domain name. The session has been filtered by IP only."
Page 153
12550
Message ID: 012550
Message Description: URL filter invalid hostname (Filter/HTTPS)
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): urlfilter
Level/Severity: information
type utm
subtype webfilter
eventtype urlfilter
level information
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
Page 154
rcvdbyte The number of received bytes related to the log message.
msg "The certificate for this HTTPS session contained an invalid domain name. The session has been filtered by IP only."
Page 155
12553
Message ID: 012553
Message Description: Server certificate validation failed
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): urlfilter
Level/Severity: notice
type utm
subtype webfilter
eventtype urlfilter
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
Page 156
12554
Message ID: 012554
Message Description: Unknown SSL session ID
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): urlfilter
Level/Severity: notice
type utm
subtype webfilter
eventtype urlfilter
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
msg "The SSL session was blocked because the session ID was unknown."
Page 157
12555
Message ID: 012555
Message Description: SSL session blocked due to invalid/missing server certificate
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): urlfilter
Level/Severity: notice
type utm
subtype webfilter
eventtype urlfilter
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
msg "The SSL session was blocked because the server certificate was missing or invalid."
Page 158
12556
Message ID: 012556
Message Description: SSL session ignored due to invalid/missing server certificate
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): urlfilter
Level/Severity: notice
type utm
subtype webfilter
eventtype urlfilter
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
msg "The SSL session was ignored because the server certificate was missing or invalid."
Page 159
12557
Message ID: 012557
Message Description: FortiGuard service inactive
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): urlfilter
Level/Severity: critical
type utm
subtype webfilter
eventtype urlfilter
level critical
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
msg "FortiGuard is enabled in the protection profile but the FortiGuard service is not enabled."
Page 160
12558
Message ID: 012558
Message Description: Rating error occurs
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): urlfilter
Level/Severity: information
type utm
subtype webfilter
eventtype urlfilter
level information
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
urltype URL type. One of: HTTP, HTTPS, FTP, Telnet, mail, phishing.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
error Error.
Page 161
12559
Message ID: 012559
Message Description: URL filter pass
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): urlfilter
Level/Severity: information
type utm
subtype webfilter
eventtype urlfilter
level information
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 162
dstintf The destination interface.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
Page 163
12800
Message ID: 012800
Message Description: FortiGuard webfilter error
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): ftgd_err
Level/Severity: error
type utm
subtype webfilter
eventtype ftgd_err
level error
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 164
hostname The hostname information.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
error Error.
Page 165
12801
Message ID: 012801
Message Description: FortiGuard webfilter error
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): ftgd_err
Level/Severity: warning
type utm
subtype webfilter
eventtype ftgd_err
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 166
hostname The hostname information.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
error Error.
Page 167
12802
Message ID: 012802
Message Description: Daily fortiguard quota status
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): ftgd_quota
Level/Severity: information
type utm
subtype webfilter
eventtype ftgd_quota
level information
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
profile The name of the profile that was used to detect and take action.
Page 168
13056
Message ID: 013056
Message Description: FortiGuard webfilter category block
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): ftgd_blk
Level/Severity: warning
type utm
subtype webfilter
eventtype ftgd_blk
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 169
hostname The hostname information.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
Page 170
13057
Message ID: 013057
Message Description: FortiGuard webfilter category block
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): ftgd_blk
Level/Severity: warning
type utm
subtype webfilter
eventtype ftgd_blk
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 171
hostname The hostname information.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
Page 172
13312
Message ID: 013312
Message Description: FortiGuard webfilter category allow
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): ftgd_allow
Level/Severity: notice
type utm
subtype webfilter
eventtype ftgd_allow
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 173
hostname The hostname information.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
Page 174
13313
Message ID: 013313
Message Description: FortiGuard webfilter allow
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): ftgd_allow
Level/Severity: notice
type utm
subtype webfilter
eventtype ftgd_allow
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 175
hostname The hostname information.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
mode Mode.
Page 176
13314
Message ID: 013314
Message Description: FortiGuard webfilter allow
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): ftgd_allow
Level/Severity: information
type utm
subtype webfilter
eventtype ftgd_allow
level information
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 177
hostname The hostname information.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
mode Mode.
Page 178
13315
Message ID: 013315
Message Description: FortiGuard webfilter category quota counting
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): ftgd_quota_counting
Level/Severity: notice
type utm
subtype webfilter
eventtype ftgd_quota_counting
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 179
hostname The hostname information.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
Page 180
13316
Message ID: 013316
Message Description: FortiGuard webfilter category quota expired
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): urlfilter
Level/Severity: warning
type utm
subtype webfilter
eventtype urlfilter
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 181
hostname The hostname information.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
Page 182
13317
Message ID: 013317
Message Description: URL visited
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): urlfilter
Level/Severity: notice
type utm
subtype webfilter
eventtype urlfilter
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 183
hostname The hostname information.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
Page 184
13568
Message ID: 013568
Message Description: Web script filter ActiveX
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): activexfilter
Level/Severity: notice
type utm
subtype webfilter
eventtype activexfilter
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 185
hostname The hostname information.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
Page 186
13573
Message ID: 013573
Message Description: Web script filter cookie
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): cookiefilter
Level/Severity: notice
type utm
subtype webfilter
eventtype cookiefilter
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 187
hostname The hostname information.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
Page 188
13584
Message ID: 013584
Message Description: Web script filter applet
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): appletfilter
Level/Severity: notice
type utm
subtype webfilter
eventtype appletfilter
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 189
hostname The hostname information.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
Page 190
13601
Message ID: 013601
Message Description: Web cookie filter
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): cookiefilter
Level/Severity: notice
type utm
subtype webfilter
eventtype cookiefilter
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 191
hostname The hostname information.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
filtertype The script filter type. Can be: N/A, jscript, javascript, vbscript, or unknown.
Page 192
13602
Message ID: 013602
Message Description: Web referer filter
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): cookiefilter
Level/Severity: notice
type utm
subtype webfilter
eventtype cookiefilter
level notice
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 193
hostname The hostname information.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
filtertype The script filter type. Can be: N/A, jscript, javascript, vbscript, or unknown.
Page 194
13603
Message ID: 013603
Message Description: Command blocked
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): webfilter_command_block
Level/Severity: warning
type utm
subtype webfilter
eventtype webfilter_command_block
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an identity-based
policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This number is not globally
unique, it is only locally unique within a given firewall policy.
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
Page 195
msg "Command blocked."
Page 196
13616
Message ID: 013616
Message Description: Content type blocked
Type (type): utm
Subtype (subtype): webfilter
Event Type (eventtype): content
Level/Severity: warning
type utm
subtype webfilter
eventtype content
level warning
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
Page 197
hostname The hostname information.
profiletype The type of profile responsible for the UTM action taken.
profile The name of the profile that was used to detect and take action.
status The status of the traffic: blocked, exempted, allowed, passthrough, filtered, DLP.
agent Agent.
to Destination identifier.
Page 198
IPS
16384
Message ID: 016384
Message Description: attack signature (tcp/udp)
Type (type): utm
Subtype (subtype): ips
Event Type (eventtype): signature
Level/Severity: alert
type utm
subtype ips
eventtype signature
level alert
severity The priority level of the attack log. Can be info, low, medium, high, or critical.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
status The status of the packet that was flagged as part of an attack. Can be detected, dropped, or reset.
proto The protocol number that applies to the session or packet. This is the protocol number in the packet header that
identifies the next level protocol. Protocol numbers are assigned by the Internet Assigned Number Authority (IANA).
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
Page 199
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
sensor Sensor.
ref URL of the FortiGuard IPS database entry for the attack.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
Page 200
16385
Message ID: 016385
Message Description: attack signature (icmp)
Type (type): utm
Subtype (subtype): ips
Event Type (eventtype): signature
Level/Severity: alert
type utm
subtype ips
eventtype signature
level alert
severity The priority level of the attack log. Can be info, low, medium, high, or critical.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
status The status of the packet that was flagged as part of an attack. Can be detected, dropped, or reset.
proto The protocol number that applies to the session or packet. This is the protocol number in the packet header that
identifies the next level protocol. Protocol numbers are assigned by the Internet Assigned Number Authority (IANA).
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
Page 201
sensor Sensor.
ref URL of the FortiGuard IPS database entry for the attack.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
Page 202
16386
Message ID: 016386
Message Description: attack signature (others)
Type (type): utm
Subtype (subtype): ips
Event Type (eventtype): signature
Level/Severity: alert
type utm
subtype ips
eventtype signature
level alert
severity The priority level of the attack log. Can be info, low, medium, high, or critical.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
status The status of the packet that was flagged as part of an attack. Can be detected, dropped, or reset.
proto The protocol number that applies to the session or packet. This is the protocol number in the packet header that
identifies the next level protocol. Protocol numbers are assigned by the Internet Assigned Number Authority (IANA).
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
sensor Sensor.
ref URL of the FortiGuard IPS database entry for the attack.
Page 203
group The group name.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
Page 204
18432
Message ID: 018432
Message Description: attack anomaly (tcp/udp)
Type (type): utm
Subtype (subtype): ips
Event Type (eventtype): anomaly
Level/Severity: alert
type utm
subtype ips
eventtype anomaly
level alert
severity The priority level of the attack log. Can be info, low, medium, high, or critical.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
status The status of the packet that was flagged as part of an attack. Can be detected, dropped, or reset.
proto The protocol number that applies to the session or packet. This is the protocol number in the packet header that
identifies the next level protocol. Protocol numbers are assigned by the Internet Assigned Number Authority (IANA).
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
sensor Sensor.
Page 205
ref URL of the FortiGuard IPS database entry for the attack.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
Page 206
18433
Message ID: 018433
Message Description: attack anomaly (icmp)
Type (type): utm
Subtype (subtype): ips
Event Type (eventtype): anomaly
Level/Severity: alert
type utm
subtype ips
eventtype anomaly
level alert
severity The priority level of the attack log. Can be info, low, medium, high, or critical.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
status The status of the packet that was flagged as part of an attack. Can be detected, dropped, or reset.
proto The protocol number that applies to the session or packet. This is the protocol number in the packet header that
identifies the next level protocol. Protocol numbers are assigned by the Internet Assigned Number Authority (IANA).
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
Page 207
sensor Sensor.
ref URL of the FortiGuard IPS database entry for the attack.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
Page 208
18434
Message ID: 018434
Message Description: attack anomaly (others)
Type (type): utm
Subtype (subtype): ips
Event Type (eventtype): anomaly
Level/Severity: alert
type utm
subtype ips
eventtype anomaly
level alert
severity The priority level of the attack log. Can be info, low, medium, high, or critical.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
status The status of the packet that was flagged as part of an attack. Can be detected, dropped, or reset.
proto The protocol number that applies to the session or packet. This is the protocol number in the packet header that
identifies the next level protocol. Protocol numbers are assigned by the Internet Assigned Number Authority (IANA).
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
sensor Sensor.
ref URL of the FortiGuard IPS database entry for the attack.
Page 209
group The group name.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
Page 210
Spam
20480
Message ID: 020480
Message Description: antispam smtp (warning)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): smtp
Level/Severity: notice
type utm
subtype spam
eventtype smtp
level notice
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
Page 211
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
Page 212
20481
Message ID: 020481
Message Description: antispam smtp (warning)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): smtp
Level/Severity: notice
type utm
subtype spam
eventtype smtp
level notice
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 213
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
subject Subject.
Page 214
20482
Message ID: 020482
Message Description: antispam pop3 (warning)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): pop3
Level/Severity: notice
type utm
subtype spam
eventtype pop3
level notice
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 215
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
Page 216
20483
Message ID: 020483
Message Description: antispam pop3 (warning)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): pop3
Level/Severity: notice
type utm
subtype spam
eventtype pop3
level notice
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 217
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
Page 218
20484
Message ID: 020484
Message Description: antispam imap (notice)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): imap
Level/Severity: notice
type utm
subtype spam
eventtype imap
level notice
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 219
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
Page 220
20485
Message ID: 020485
Message Description: antispam endpoint filter (warning)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): endpointfilter
Level/Severity: warning
type utm
subtype spam
eventtype endpointfilter
level warning
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 221
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
Page 222
20486
Message ID: 020486
Message Description: antispam endpoint filter (notice)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): endpointfilter
Level/Severity: notice
type utm
subtype spam
eventtype endpointfilter
level notice
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 223
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
Page 224
20487
Message ID: 020487
Message Description: antispam endpoint filter (mm7 warning)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): endpointfilter
Level/Severity: warning
type utm
subtype spam
eventtype endpointfilter
level warning
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 225
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
agent Agent.
Page 226
20488
Message ID: 020488
Message Description: antispam endpoint filter (mm7 notice)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): endpointfilter
Level/Severity: notice
type utm
subtype spam
eventtype endpointfilter
level notice
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 227
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
agent Agent.
Page 228
20489
Message ID: 020489
Message Description: antispam endpoint filter (mm1 warning)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): endpointfilter
Level/Severity: warning
type utm
subtype spam
eventtype endpointfilter
level warning
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 229
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
agent Agent.
Page 230
20490
Message ID: 020490
Message Description: antispam endpoint filter (mm1 notice)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): endpointfilter
Level/Severity: notice
type utm
subtype spam
eventtype endpointfilter
level notice
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 231
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
agent Agent.
Page 232
20491
Message ID: 020491
Message Description: antispam imap banned-word (notice)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): imap
Level/Severity: notice
type utm
subtype spam
eventtype imap
level notice
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 233
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
subject Subject.
Page 234
20492
Message ID: 020492
Message Description: antispam MM1 flood detection (warning)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): mms
Level/Severity: warning
type utm
subtype spam
eventtype mms
level warning
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 235
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
agent Agent.
Page 236
20493
Message ID: 020493
Message Description: antispam MM1 flood detection (notice)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): mms
Level/Severity: notice
type utm
subtype spam
eventtype mms
level notice
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 237
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
agent Agent.
Page 238
20494
Message ID: 020494
Message Description: antispam MM4 flood detection (warning)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): mms
Level/Severity: warning
type utm
subtype spam
eventtype mms
level warning
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 239
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
Page 240
20495
Message ID: 020495
Message Description: antispam MM4 flood detection (notice)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): mms
Level/Severity: notice
type utm
subtype spam
eventtype mms
level notice
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 241
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
Page 242
20496
Message ID: 020496
Message Description: antispam MM1 duplicate detection (warning)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): mms
Level/Severity: warning
type utm
subtype spam
eventtype mms
level warning
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 243
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
agent Agent.
Page 244
20497
Message ID: 020497
Message Description: antispam MM1 duplicate detection (notice)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): mms
Level/Severity: notice
type utm
subtype spam
eventtype mms
level notice
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 245
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
agent Agent.
Page 246
20498
Message ID: 020498
Message Description: antispam MM4 duplicate detection (warning)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): mms
Level/Severity: warning
type utm
subtype spam
eventtype mms
level warning
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 247
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
Page 248
20499
Message ID: 020499
Message Description: antispam MM4 duplicate detection (notice)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): mms
Level/Severity: notice
type utm
subtype spam
eventtype mms
level notice
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 249
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
Page 250
20500
Message ID: 020500
Message Description: antispam msn hotmail (notice)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): msn
Level/Severity: information
type utm
subtype spam
eventtype msn
level information
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 251
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
subject Subject.
Page 252
20501
Message ID: 020501
Message Description: antispam yahoo mail (notice)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): yahoo
Level/Severity: information
type utm
subtype spam
eventtype yahoo
level information
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 253
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
subject Subject.
Page 254
20502
Message ID: 020502
Message Description: antispam gmail (notice)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): google
Level/Severity: information
type utm
subtype spam
eventtype google
level information
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 255
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
subject Subject.
Page 256
20503
Message ID: 020503
Message Description: antispam smtp general (info)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): smtp
Level/Severity: information
type utm
subtype spam
eventtype smtp
level information
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 257
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
subject Subject.
Page 258
20504
Message ID: 020504
Message Description: antispam pop3 general (info)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): pop3
Level/Severity: information
type utm
subtype spam
eventtype pop3
level information
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 259
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
subject Subject.
Page 260
20505
Message ID: 020505
Message Description: antispam imap general (info)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): imap
Level/Severity: information
type utm
subtype spam
eventtype imap
level information
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 261
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
subject Subject.
Page 262
20506
Message ID: 020506
Message Description: antispam mapi (warning)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): mapi
Level/Severity: information
type utm
subtype spam
eventtype mapi
level information
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 263
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
subject Subject.
Page 264
20507
Message ID: 020507
Message Description: antispam mapi (warning)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): mapi
Level/Severity: notice
type utm
subtype spam
eventtype mapi
level notice
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 265
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
Page 266
20508
Message ID: 020508
Message Description: antispam mapi (warning)
Type (type): utm
Subtype (subtype): spam
Event Type (eventtype): mapi
Level/Severity: notice
type utm
subtype spam
eventtype mapi
level notice
policyid The ID number of the firewall policy that applies to the session or packet.
indentidx The identity-based policy identification number. This field displays zero if the firewall policy does not use an
identity-based policy; otherwise, it displays the number of the identity-based policy entry that the traffic matched. This
number is not globally unique, it is only locally unique within a given firewall policy.
srcname The name of the source device, if it has one. Ex. "MACMINI-######", or "My PC".
vd The virtual domain in which the logging occurred. If VDOMs are not configured, this will display "root".
srcport The source port of the TCP or UDP traffic. The source port appears as zero for other types of traffic.
srcintf The source interface. For outgoing traffic originating from the firewall, it is unknown.
dstport The destination port number of the TCP or UDP traffic. The destination port appears as zero for other types of traffic.
profile The name of the profile that was used to detect and take action.
Page 267
profiletype The type of profile responsible for the UTM action taken.
status The status of the email message. One of: exempted, blocked, or detected.
to Destination identifier.
subject Subject.
Page 268
Addendum: Variable Event Logs
20002 notice system LOG_ID_DOMAIN_ user=system ui=system The domain name in alert
UNRESOLVABLE action=[s] status=failure e-mail.s sender is not
msg="Can't resolve the IP resolvable
address of [s]"
20003 notice system LOG_ID_MAIL_SENT_FAIL user=system ui=system The alert e-mail send failed
action=alert-email
status=failure count=[n]
msg="Failed to send alert
email from [s] to ([s])"
20013 information system LOG_ID_CLIENT_WPA_SSN Client [s] does WPA paed log
Page 594
ID Severity Subtype Macro Format Description
20021 information system LOG_ID_MAIL_RESENT user=system ui=system The alert e-mail resend
action=alert-email
status=success count=[n]
msg="Resending alert
e-mail with [n] pending
alert(s) from [s] to ([s])"
20027 warning system LOG_ID_REPORT_DEL_OLD_ msg="Delete old report db Delete old report db records
REC records" datarange="[s]"
20033 information system LOG_ID_RAD_MOBILE_IPV6 msg="using Mobile IPv6 An interface uses Mobile IPv6
extensions" extensions
Page 595
ID Severity Subtype Macro Format Description
20045 critical system LOG_ID_RAD_PREFIX_TOO_ msg="invalid prefix length prefix length is too long
LONG for [s]"
Page 596
ID Severity Subtype Macro Format Description
20054 information system LOG_ID_RAD_EXIT_BY_ msg="radvd receive radvd has received a signal,
SIGNAL signal=[n]" and is going to exit
20055 critical system LOG_ID_RAD_FAIL_CMDB_ msg="Can not create query Radvd cannot create query to
QUERY to interface at [s]:[s]:[n]!" interface by using cmf_query_
create()
20056 critical system LOG_ID_RAD_FAIL_CMDB_ msg="Internal error in cmf_ Radvd occurs an internal error
FOR_EACH query_for_each()!" when it uses cmf_query_for_
each()
20057 critical system LOG_ID_RAD_FAIL_FIND_ msg="Interface [s]:[n] not Radvd failed to find a virtual
VIRT_INTF found in the list!" interface by interface index
20059 warning system LOG_ID_RAD_NO_PKT_INFO msg="received packet with Radvd received a packet with
no pkt_info!" no pkt_info
20061 critical system LOG_ID_RAD_INV_ICMPV6_ msg="icmpv6 filter failed" Radvd received an unwanted
TYPE type of icmpv6 packet
20065 warning system LOG_ID_RAD_INV_ICMPV6_ msg="received icmpv6 Radvd received icmpv6 RS/RA
CODE RS/RA packet with invalid packet with invalid code
code: [n]"
Page 597
ID Severity Subtype Macro Format Description
20072 critical system LOG_ID_RAD_EXTRA_DATA msg="trailing garbage in Radvd finds extra data in RA
RA on [s] from [s]" packet
20073 critical system LOG_ID_RAD_NO_OPT_DATA msg="zero length option in Radvd finds a RA packet with
RA on [s] from [s]" no option data
20074 critical system LOG_ID_RAD_INV_OPT_LEN msg="option length greater option length is greater than
than total length in RA on total length in RA packet
[s] from [s]"
20078 critical system LOG_ID_RAD_INV_OPT msg="invalid option [n] in Radvd finds an invalid option in
RA on [s] from [s]" RA packet from a remote site
20081 critical system LOG_ID_RAD_INV_HOP msg="received a bogus Radvd received a packet with a
IPV6_HOPLIMIT from the wrong IPV6_HOPLIMIT
kernel! len=[n], data=[n]"
20082 critical system LOG_ID_RAD_INV_PKTINFO msg="received a bogus Radvd received a packet with a
IPV6_PKTINFO from the wrong IPV6_PKTINFO
kernel! len=[n], index=[n]"
Page 598
ID Severity Subtype Macro Format Description
20083 warning system LOG_ID_RAD_FAIL_TO_ msg="problem checking Radvd failed to check whether
CHECK all-routers membership on we've joined the all-routers
[s]" multicast group
20090 notice | system LOG_ID_INTF_LINK_STA_ intf=[s] status=[s] Interface link status changed
information CHG msg="interface [s] link
status is [s]"
20101 warning system LOG_ID_WEB_LIC_EXPIRE msg="FortiGuard web FortiGuard web filtering license
filtering license will expire in expiring
[n] day(s)"
20104 warning system LOG_ID_IPS_LIC_EXPIRE msg="FortiGuard IPS FortiGuard IPS update license
update license will expire in expiring
[n] day(s)"
Page 599
ID Severity Subtype Macro Format Description
20114 error system LOG_ID_IPSA_SELFTEST_ msg="IPSA self test failed, IPSA error
FAIL disable IPSA!"
22000 warning system LOG_ID_INV_PKT_LEN msg="Packet length does Packet length does not match
not match that specified in that specified in the request
the request header." header.
22002 warning system LOG_ID_INV_REQ_TYPE msg="Request type [n] is Other request than http, https,
not supported." ftp, mail and av is not
supported
Page 600
ID Severity Subtype Macro Format Description
22003 warning system LOG_ID_FAIL_SET_SIG_ sigaction([n])failed: [s] failed to set up a signal handler
HANDLER
22004 warning system LOG_ID_FAIL_CREATE_ Socket() failed: [s] failed to create a socket
SOCKET
22005 warning system LOG_ID_FAIL_CREATE_ failed to create a [s]/udp failed to create a udp socket to
SOCKET_RETRY socket to receive URL receive URL request
request: [s]
22006 warning system LOG_ID_FAIL_REG_CMDB_ msg="Failed to register for Failed to register for cmdb
EVENT cmdb events." events
22013 alert system 22013 action=pba-block-exhaust Alert ippool pba block exhaust
saddr=[n].[n].[n].[n]
poolname="[s]" msg="Pba
ippool port-block has been
exhausted"
22014 alert | system 22014 action=pba-natip-exhaust Alert ippool pba natip exhaust
notice saddr=[n].[n].[n].[n]
poolname="[s]" msg="Pba
ippool natip has been
exhausted"
22015 notice system LOG_ID_EXCEED_VD_RES_ service=kernel msg="[s] Exceed vdom resource limit
LIMIT vdom([n]) limit. count=[n]
limit=[n]"
22020 warning system LOG_ID_FAIL_CREATE_HA_ msg="Socket() failed: [s]" Failed to create a ha_socket
SOCKET
Page 601
ID Severity Subtype Macro Format Description
22021 warning system LOG_ID_FAIL_CREATE_HA_ msg="Failed to create a Failed to create a udp socket
SOCKET_RETRY udp socket to relay URL to relay URL requests
requests: [s]"
22102 critical system LOG_ID_LOG_DISK_FAILURE msg="Log disk failure is Erroneous SMART status
imminent, logs should be
backed up"
22110 critical system LOG_ID_SPARE_BLOCK_ msg="Available spare Available spare blocks is low
LOW blocks of boot device are
getting low (remaining [n])."
Page 602
ID Severity Subtype Macro Format Description
22700 critical system LOG_ID_IPS_FAIL_OPEN msg="IPS session scan IPS fail open
resumed, exit fail open
mode."
22800 critical system LOG_ID_SCAN_SERV_FAIL service=[s] mode=[s] Scan services session fail
msg="The system has [s] mode
session fail mode"
22801 critical system LOG_ID_SCAN_LEAVE_ service=[s] conserve=exit Scan services exited conserve
CONSERVE_MODE total=[n] free=[n] mode
entermargin=[n]
exitmargin=[n] msg="The
system exited conserve
mode"
Page 603
ID Severity Subtype Macro Format Description
22910 notice system LOG_ID_EVENT_SLA_ [s]="[n]" [s]="[s]" [s]="ping" SLA Probe information
PROBE_PING [s]="[s]" msg="SLA Probe
event: change state from [s]
to [s]"
22911 notice system LOG_ID_EVENT_SLA_ [s]="[n]" [s]="[s]" [s]="[s]" SLA Probe information
PROBE_HTTPGET [s]="http-get" [s]="[s]"
msg="SLA Probe event:
change state from [s] to [s]"
23101 unknown vpn LOG_ID_IPSEC_TUNNEL_UP action=[s] tunnel_id=[n] VPN event log message
[s]tunneltype=[s] remote_
ip=[s] tunnel_ip=[s]
user="[s]" group="[s]"
[s][s][s][s]msg="[s] [s]"
23102 unknown vpn LOG_ID_IPSEC_TUNNEL_ action=[s] tunnel_id=[n] VPN event log message
DOWN [s]tunneltype=[s] remote_
ip=[s] tunnel_ip=[s]
user="[s]" group="[s]"
[s][s][s][s]msg="[s] [s]"
23103 unknown vpn LOG_ID_IPSEC_TUNNEL_ action=[s] tunnel_id=[n] VPN event log message
STAT [s]tunneltype=[s] remote_
ip=[s] tunnel_ip=[s]
user="[s]" group="[s]"
[s][s][s][s]msg="[s] [s]"
26001 information router LOG_ID_DHCP_MSG interface="[s]" dhcp_ DHCP request and response
| unknown msg="[s]" dir=[s] log
mac=[s]:[s]:[s]:[s]:[s]:[s]
ip=[n].[n].[n].[n] lease=[n]
hostname="[s]" msg="[s]"
Page 604
ID Severity Subtype Macro Format Description
26004 error router LOG_ID_DHCP_MULT_SUB_ interface="[s]" Address Address range spans multiple
NET range [s] to [s], netmask [s] subnets
spans [s]!
26005 error router LOG_ID_DHCP_INV_ADDR_ interface="[s]" Address Address range doesn't belong
RANGE range [s] to [s] not on net to the net
[s]/[s]!
29011 error router LOG_ID_PPPD_FAIL_TO_ Can't execute [s]: [s] pppd cannot execute a
EXEC program
29015 error router LOG_ID_PPP_RCV_BAD_ Peer IP is the same as an ppp has received bad options
PEER_IP interface IP[s].
IP([n].[n].[n].[n])
29016 error router LOG_ID_PPP_RCV_BAD_ Local IP is the same as an ppp has received bad options
LOCAL_IP interface IP[s].
IP([n].[n].[n].[n])
Page 605
ID Severity Subtype Macro Format Description
32002 alert system LOG_ID_ADMIN_LOGIN_FAIL user=test ui=cli Failed admin login attempt
action=login status=failed
reason=test msg="Alarm
testing"
32006 information system LOG_ID_ADMIN_ENTER_ user="[s]" ui=[s] A super admin has entered to
VDOM action=vdom-switch this vdom
reason=none msg="User [s]
has entered the virtual
domain [s]"
32007 information system LOG_ID_ADMIN_LEFT_VDOM user="[s]" ui=[s] A super admin has left the
action=vdom-switch current vdom
reason=none msg="User [s]
has left the virtual domain
[s]"
32008 warning system LOG_ID_VIEW_LOG_FAIL user="[s]" ui=[s] msg="User Failed to view log
[s] failed to access the [s]
logs from [s]"
Page 606
ID Severity Subtype Macro Format Description
32015 warning system LOG_ID_DISK_LOG_USAGE msg="Log disk is [n]% full" Log full
32026 critical system LOG_ID_STORE_CONF_FAIL Cannot store config due to Cannot store config due to first
first line error: require first line error
line in file [s] from process
[n]
32027 notice system LOG_ID_VIEW_LOG_SUCC user="[s]" ui=[s] log=[s] User displayed disk logs
msg="User [s] has viewed
the disk logs from [s]"
Page 607
ID Severity Subtype Macro Format Description
32048 warning system LOG_ID_SCHEDULE_EXPIRE msg="onetime schedule [s] onetime schedule expiring
will expire in [n] day(s)"
32086 warning system LOG_ID_ENTER_ user=[s] ui=lcd action=[s] System has been changed to
TRANSPARENT status=success transparent mode LCD via LCD
msg="System has been
changed to transparent
mode LCD via LCD"
32087 warning system LOG_ID_ENTER_NAT user=[s] ui=lcd action=[s] System has been changed to
status=success NAT mode LCD via LCD
msg="System has been
changed to NAT mode LCD
via LCD"
32095 warning system LOG_ID_GUI_CHG_SUB_ user="[s]" ui=[s] action=[s] A user has performed an action
MODULE status=[s] msg="[s] by user to the firewall via GUI. The
[s] via [s]" action can be one of the
followings: reboot, shutdown,
reload, backup, factory_reset,
restore, upgrade,switch_mode,
download, upload, clear_mlog,
del_log, update, downgrade,
del_session, bootup
32096 warning system LOG_ID_GUI_DOWNLOAD_ user="[s]" ui=[s] action=[s] A user has downloaded a
LOG status=[s] hash=[s] file=[s] logging file from the firewall via
msg="[s] by user [s] via [s]" GUI
32101 notice system LOG_ID_LCD_CHG_CONF user="[s]" ui=[s] msg="[s] Administrator has changed
by [s]" configuration from LCD
Page 608
ID Severity Subtype Macro Format Description
32102 unknown system LOG_ID_CHG_CONFIG user="[s]" ui=[s] A user has changed the
module="[s]" configuration
submodule="[s]" msg="[s]
made a change from [s]:[s]"
32120 notice system LOG_ID_RPT_ADD_DATASET user="[s]" ui=[s] name="[s]" Report Dataset is added
msg="User [s] added a
report dataset [s] from [s]"
32122 notice system LOG_ID_RPT_DEL_DATASET user="[s]" ui=[s] name="[s]" A report dataset is deleted
msg="User [s] delete a
report dataset [s] from [s]"
32123 notice system LOG_ID_RPT_ADD_LAYOUT_ user="[s]" ui=[s] name="[n]" Report Summary entries is
ITEM msg="User [s] added a added
report summary entry [n]
from [s]"
32124 notice system LOG_ID_RPT_DEL_LAYOUT_ user="[s]" ui=[s] name="[n]" A report summary entries is
ITEM msg="User [s] delete a deleted
report summary entry [n]
from [s]"
32125 notice system LOG_ID_RPT_ADD_CHART user="[s]" ui=[s] name="[s]" Report Chart widget is added
msg="User [s] added a
report chart widget [s] from
[s]"
32126 notice system LOG_ID_RPT_DEL_CHART user="[s]" ui=[s] name="[s]" A report chart widget is deleted
msg="User [s] delete a
report chart widget [s] from
[s]"
32129 notice system LOG_ID_ADD_GUEST user="[s]" ui=[s] name="[s]" A new guest user is added
status=[s] msg="User [s]
added guest user [s] from
[s]"
32130 notice system LOG_ID_CHG_USER user="[s]" ui=[s] name="[s]" A local user's setting is
old_status=[s] new_ changed
status=[s] passwd=[s]
msg="User [s] changed
local user [s] setting from
[s]"
32131 notice system LOG_ID_DEL_GUEST user="[s]" ui=[s] name="[s]" A guest user is deleted
status=[s] msg="User [s]
deleted guest user [s] from
[s]"
32132 notice system LOG_ID_ADD_USER user="[s]" ui=[s] name="[s]" A new local user is added
status=[s] msg="User [s]
added local user [s] from
[s]"
Page 609
ID Severity Subtype Macro Format Description
32140 notice system 32140 user="[s]" ui=[s] ntp server status change
field=date-time msg="The
[s] ntp server, [s]([s]), is
determined [s] at [s]"
Page 610
ID Severity Subtype Macro Format Description
32168 notice system LOG_ID_REACH_VDOM_ user="[s]" ui=[s] adding new entry failed
LIMIT msg="Adding new entry
failed: vdom property limit
has been reached when
user [s] adds [s].[s] from [s]"
Page 611
ID Severity Subtype Macro Format Description
32204 critical | system LOG_ID_RESTORE_FGD_ user="[s]" ui=[s] action=[s] restore the fortiguard service
notice SVR msg="User [s] restored [s]
file from [s]"
32207 warning system LOG_ID_RETRIEVE_CONF_ user="[s]" ui=[s] retrieve configuration list failure
LIST action=retrieve-[s]
msg="User [s] failed to
retrieve the [s] list from
management station"
32208 critical system LOG_ID_IMP_PKCS12_CERT user="[s]" ui=[s] import the pkcs12 certificate
action=import-certificate
msg="User [s] imported the
certificate from [s]"
32209 critical | system LOG_ID_RESTORE_USR_ user="[s]" ui=[s] restore the user-defined IPS
notice DEF_IPS action=restore-ips-signatur signatures
e status=success
msg="Administrator [s]
restored the user-defined
IPS signatures from [s]"
Page 612
ID Severity Subtype Macro Format Description
32217 warning | system LOG_ID_UPD_IPS user="[s]" ui="[s]" An user has updated the IPS
notice action=update msg="User package by SCP
[s] has updated IPS
package by SCP"
32219 warning system LOG_ID_BACKUP_OUTPUT user="[s]" ui="[s]" An user has backed up the
action=backup msg="User result of standardized error
[s] backed up the result of output by SCP
batch mode commands by
SCP"
32220 warning system LOG_ID_BACKUP_ user="[s]" ui="[s]" An user has backed up the
COMMAND action=backup msg="User result of batch mode
[s] backed up the result of commands by SCP
batch mode commands by
SCP"
32221 warning system LOG_ID_UPD_VDOM_LIC user="[s]" ui="[s]" An user has installed the VM
action=update msg="User license by SCP
[s] has installed VM license
by SCP"
32223 error | system LOG_ID_BACKUP_USER_ user="[s]" ui=[s] backup the user-defined IPS
notice DEF_IPS action=backup signatures failure
status=failure
msg="Administrator [s]
failed to back up the
user-defined IPS signatures
from [s]"
Page 613
ID Severity Subtype Macro Format Description
32300 notice system LOG_ID_UPLOAD_RPT_IMG user="[s]" ui=[s] status=[s] upload the report image file
action=upload-report-imag
e reason="[s]" msg="User
'[s]' [s] upload the report
image file '[s]' from [s]([s])"
Page 614
ID Severity Subtype Macro Format Description
32341 notice system LOG_ID_LOG_DISK_ msg="Disk log status disk log status changed
DEFAULT_DISABLED changed to disabled in
upgrade process."
35001 notice system LOG_ID_HA_SYNC_VIRDB msg="HA slave sync HA slave sync virdb
virdb([s]) [s]"
35002 notice system LOG_ID_HA_SYNC_ETDB msg="HA slave sync HA slave sync etdb
etdb([s]) [s]"
35003 notice system LOG_ID_HA_SYNC_EXDB msg="HA slave sync HA slave sync exdb
exdb([s]) [s]"
35004 notice system LOG_ID_HA_SYNC_FLDB msg="HA slave sync HA slave sync fldb
fldb([s]) [s]"
35005 notice system LOG_ID_HA_SYNC_IPS msg="HA slave sync ids([s]) HA slave sync ids package
package [s]"
35007 notice system LOG_ID_HA_SYNC_AV msg="HA slave sync AV([s]) HA slave sync AV package
package [s]"
35008 notice system LOG_ID_HA_SYNC_VCM msg="HA slave sync HA slave sync VCM package
VCM([s]) package [s]"
35009 notice system LOG_ID_HA_SYNC_CID msg="HA slave sync HA slave sync CID package
CID([s]) package [s]"
35010 error system LOG_ID_HA_SYNC_FAIL msg="HA slave sync failed HA slave sync failed
in [n] turns"
36880 warning system LOG_ID_EVENT_SYSTEM_ msg="Number of detected user device data store limit
MAC_HOST_STORE_LIMIT user devices exceeds limit
that can be persistently
stored. Detected [n]; can
save [n]."
Page 615
ID Severity Subtype Macro Format Description
37124 error vpn MESGID_NEG_I_P1_ERROR msg="IPsec phase 1 error" IPsec phase 1 error log
action=[s] remip=[s]
locip=[s] remport=[n]
locport=[n] outintf=[s]
cookies="[s]" user="[s]"
group="[s]" xauthuser="[s]"
xauthgroup="[s]"
vpntunnel="[s]" status=[s]
error_reason="[s]" peer_
notif="[s]"
37125 error vpn MESGID_NEG_I_P2_ERROR msg="IPsec phase 2 error" IPsec phase 2 error log
action=[s] remip=[s]
locip=[s] remport=[n]
locport=[n] outintf=[s]
cookies="[s]" user="[s]"
group="[s]" xauthuser="[s]"
xauthgroup="[s]"
vpntunnel="[s]" status=[s]
error_reason="[s]"
37126 error vpn MESGID_NEG_NO_STATE_ msg="IPsec no state error" IPsec no state error log
ERROR action=[s] remip=[s]
locip=[s] remport=[n]
locport=[n] outintf=[s]
cookies="[s]" user="[s]"
group="[s]" xauthuser="[s]"
xauthgroup="[s]"
vpntunnel="[s]" status=[s]
error_reason="[s]"
37133 notice vpn MESGID_INSTALL_SA msg="install IPsec SA" install IPsec SA log
action=[s] remip=[s]
locip=[s] remport=[n]
locport=[n] outintf=[s]
cookies="[s]" user="[s]"
group="[s]" xauthuser="[s]"
xauthgroup="[s]"
vpntunnel="[s]" role=[s] in_
spi="[s]" out_spi="[s]"
37134 notice vpn MESGID_DELETE_P1_SA msg="delete IPsec phase 1 delete IPsec phase 1 SA log
SA" action=[s] remip=[s]
locip=[s] remport=[n]
locport=[n] outintf=[s]
cookies="[s]" user="[s]"
group="[s]" xauthuser="[s]"
xauthgroup="[s]"
vpntunnel="[s]"
37135 notice vpn MESGID_DELETE_P2_SA msg="delete IPsec phase 2 delete IPsec phase 2 SA log
SA" action=[s] remip=[s]
locip=[s] remport=[n]
locport=[n] outintf=[s]
cookies="[s]" user="[s]"
group="[s]" xauthuser="[s]"
xauthgroup="[s]"
vpntunnel="[s]" enc_
spi="[s]" dec_spi="[s]"
Page 616
ID Severity Subtype Macro Format Description
37136 error vpn MESGID_DPD_FAILURE msg="IPsec DPD failure" IPsec DPD failure log
action=[s] remip=[s]
locip=[s] remport=[n]
locport=[n] outintf=[s]
cookies="[s]" user="[s]"
group="[s]" xauthuser="[s]"
xauthgroup="[s]"
vpntunnel="[s]" status=[s]
37137 error vpn MESGID_CONN_FAILURE msg="IPsec connection IPsec connection failure log
failure" action=[s] remip=[s]
locip=[s] remport=[n]
locport=[n] outintf=[s]
cookies="[s]" user="[s]"
group="[s]" xauthuser="[s]"
xauthgroup="[s]"
vpntunnel="[s]" status=[s]
37139 notice vpn MESGID_P2_UPDOWN msg="IPsec phase 2 status IPsec phase 2 status change
change" action=[s] log
remip=[s] locip=[s]
remport=[n] locport=[n]
outintf=[s] cookies="[s]"
user="[s]" group="[s]"
xauthuser="[s]"
xauthgroup="[s]"
vpntunnel="[s]" phase2_
name=[s]
Page 617
ID Severity Subtype Macro Format Description
37141 notice vpn MESGID_CONN_STATS msg="IPsec tunnel IPsec tunnel statistics log
statistics" action=[s]
remip=[s] locip=[s]
remport=[n] locport=[n]
outintf=[s] cookies="[s]"
user="[s]" group="[s]"
xauthuser="[s]"
xauthgroup="[s]"
vpntunnel="[s]" tunnelip=[s]
tunnelid=[n]
tunneltype="[s]"
duration=[n] sent=[n]
rcvd=[n] nextstat=[n]
tunnel="[s]"
37188 error vpn MESGID_NEG_I_P1_ERROR_ msg="IPsec phase 1 error" IPsec phase 1 error log
IKEV2 action=[s] remip=[s]
locip=[s] remport=[n]
locport=[n] outintf=[s]
cookies="[s]" user="[s]"
group="[s]" vpntunnel="[s]"
status=[s] error_
reason="[s]"
37189 error vpn MESGID_NEG_I_P2_ERROR_ msg="IPsec phase 2 error" IPsec phase 2 error log
IKEV2 action=[s] remip=[s]
locip=[s] remport=[n]
locport=[n] outintf=[s]
cookies="[s]" user="[s]"
group="[s]" vpntunnel="[s]"
status=[s] error_
reason="[s]"
37190 error vpn MESGID_NEG_NO_STATE_ msg="IPsec no state error" IPsec no state error log
ERROR_IKEV2 action=[s] remip=[s]
locip=[s] remport=[n]
locport=[n] outintf=[s]
cookies="[s]" user="[s]"
group="[s]" vpntunnel="[s]"
status=[s] error_
reason="[s]"
37197 notice vpn MESGID_INSTALL_SA_IKEV2 msg="install IPsec SA" install IPsec SA log
action=[s] remip=[s]
locip=[s] remport=[n]
locport=[n] outintf=[s]
cookies="[s]" user="[s]"
group="[s]" vpntunnel="[s]"
role=[s] in_spi="[s]" out_
spi="[s]"
37198 notice vpn MESGID_DELETE_P1_SA_ msg="delete IPsec phase 1 delete IPsec phase 1 SA log
IKEV2 SA" action=[s] remip=[s]
locip=[s] remport=[n]
locport=[n] outintf=[s]
cookies="[s]" user="[s]"
group="[s]" vpntunnel="[s]"
Page 618
ID Severity Subtype Macro Format Description
37199 notice vpn MESGID_DELETE_P2_SA_ msg="delete IPsec phase 2 delete IPsec phase 2 SA log
IKEV2 SA" action=[s] remip=[s]
locip=[s] remport=[n]
locport=[n] outintf=[s]
cookies="[s]" user="[s]"
group="[s]" vpntunnel="[s]"
enc_spi="[s]" dec_spi="[s]"
37200 error vpn MESGID_DPD_FAILURE_ msg="IPsec DPD failure" IPsec DPD failure log
IKEV2 action=[s] remip=[s]
locip=[s] remport=[n]
locport=[n] outintf=[s]
cookies="[s]" user="[s]"
group="[s]" vpntunnel="[s]"
status=[s]
37201 error vpn MESGID_CONN_FAILURE_ msg="IPsec connection IPsec connection failure log
IKEV2 failure" action=[s] remip=[s]
locip=[s] remport=[n]
locport=[n] outintf=[s]
cookies="[s]" user="[s]"
group="[s]" vpntunnel="[s]"
status=[s]
37203 notice vpn MESGID_P2_UPDOWN_ msg="IPsec phase 2 status IPsec phase 2 status change
IKEV2 change" action=[s] log
remip=[s] locip=[s]
remport=[n] locport=[n]
outintf=[s] cookies="[s]"
user="[s]" group="[s]"
vpntunnel="[s]" phase2_
name="[s]"
37204 notice vpn MESGID_CONN_STATS_ msg="IPsec tunnel IPsec tunnel statistics log
IKEV2 statistics" action=[s]
remip=[s] locip=[s]
remport=[n] locport=[n]
outintf=[s] cookies="[s]"
user="[s]" group="[s]"
vpntunnel="[s]" tunnelip=[s]
tunnelid=[n]
tunneltype="[s]"
duration=[n] sent=[n]
rcvd=[n] nextstat=[n]
tunnel="[s]"
Page 619
ID Severity Subtype Macro Format Description
37888 notice system MESGID_HA_GROUP_ msg="HA group is deleted" HA group delete log
DELETE ha_group=[n]
37889 notice system MESGID_VC_DELETE msg="Virtual cluster is Virtual cluster delete log
deleted" vcluster=[n]
37890 notice system MESGID_VC_MOVE_VDOM msg="Virtual cluster's Virtual cluster move vdom log
vdom is moved" from_
vcluster=[n] to_vcluster=[n]
vdname="[s]"
37891 notice system MESGID_VC_ADD_VDOM msg="Virtual cluster's Virtual cluster add vdom log
vdom is added" to_
vcluster=[n] vdname="[s]"
37893 notice system MESGID_VC_DETECT_ msg="Virtual cluster Virtual cluster detect member
MEMB_DEAD detected member dead" dead log
vcluster=[n] ha_group=[n]
sn="[s]"
37894 notice system MESGID_VC_DETECT_ msg="Virtual cluster Virtual cluster detect member
MEMB_JOIN detected member join" join log
vcluster=[n] ha_group=[n]
sn="[s]"
37895 notice system MESGID_VC_ADD_HADEV msg="Virtual cluster add Virtual cluster add HA
HA device" vcluster=[n] device(interface) log
devintfname="[s]"
37896 notice system MESGID_VC_DEL_HADEV msg="Virtual cluster delete Virtual cluster delete HA
HA device(interface)" device(interface) log
vcluster=[n]
devintfname="[s]"
Page 620
ID Severity Subtype Macro Format Description
37903 information system MESGID_SYNC_STATUS msg="The sync status with The sync status with the
the master" sync_type=[s] master log
sync_status="[s]"
37904 information system MESGID_HA_ACTIVITY msg="HA activity report" HA activity report log
ip=[s] ha-prio=[n]
activity="[s]"
Page 621
ID Severity Subtype Macro Format Description
38400 notice system LOGID_EVENT_NOTIF_ user="[s]" from="[s]" The system successfully sent a
SEND_SUCC to="[s]" service="[s]" notification message log
proto=[s] dst=[s] dport=[n]
nf_type=[s] virus="[s]"
profile="[s]"
profiletype="[s]"
profilegroup="[s]" count=[n]
duration=[n]
msg="Successfuly sent a
notification message."
38401 warning system LOGID_EVENT_NOTIF_ user="[s]" from="[s]" The system was unable to
SEND_FAIL to="[s]" service="[s]" send a notification message
proto=[s] dst=[s] dport=[n] log
nf_type=[s] virus="[s]"
profile="[s]"
profiletype="[s]"
profilegroup="[s]" count=[n]
duration=[n] msg="Unable
to send notification
message." sess_
duration=[n]
Page 622
ID Severity Subtype Macro Format Description
38662 notice user LOGID_EVENT_RAD_STAT_ carrier_ep="[s]" ip=[s] rsso_ RADIUS protocol errors
PROTO_ERROR key="[s]" msg="[s]" acct_ occurred log
stat=[s] reason="[s]"
38663 notice user LOGID_EVENT_RAD_STAT_ carrier_ep="[s]" ip=[s] rsso_ RADIUS start or interim-update
PROF_NOT_FOUND key="[s]" msg="[s]" acct_ packet receivedwith missing or
stat=[s] reason="[s]" invalid profile specified
38664 notice user LOGID_EVENT_RAD_STAT_ carrier_ep="[s]" ip=[s] rsso_ RADIUS no context found for
CTX_NOT_FOUND key="[s]" msg="[s]" user
Page 623
ID Severity Subtype Macro Format Description
38665 notice user LOGID_EVENT_RAD_STAT_ carrier_ep="[s]" ip=[s] rsso_ RADIUS stop packet was
ACCT_STOP_MISSED key="[s]" msg="[s]" acct_ missed
stat=[s] reason="[s]"
38666 notice user LOGID_EVENT_RAD_STAT_ carrier_ep="[s]" ip=[s] rsso_ RADIUS accounting event
ACCT_EVENT key="[s]" msg="[s]" acct_
stat=[s] reason="[s]"
38667 notice user LOGID_EVENT_RAD_STAT_ carrier_ep="[s]" ip=[s] rsso_ RADIUS other dynamic profile
OTHER key="[s]" msg="[s]" acct_ event
stat=[s] reason="[s]"
count=[n]
Page 624
ID Severity Subtype Macro Format Description
Page 625
ID Severity Subtype Macro Format Description
40001 unknown vpn LOG_ID_PPTP_TUNNEL_UP action=[s] tunnel_id=[n] VPN event log message
[s]tunneltype=[s] remote_
ip=[s] tunnel_ip=[s]
user="[s]" group="[s]"
[s][s][s][s]msg="[s] [s]"
Page 626
ID Severity Subtype Macro Format Description
40002 unknown vpn LOG_ID_PPTP_TUNNEL_ action=[s] tunnel_id=[n] VPN event log message
DOWN [s]tunneltype=[s] remote_
ip=[s] tunnel_ip=[s]
user="[s]" group="[s]"
[s][s][s][s]msg="[s] [s]"
40003 unknown vpn LOG_ID_PPTP_TUNNEL_ action=[s] tunnel_id=[n] VPN event log message
STAT [s]tunneltype=[s] remote_
ip=[s] tunnel_ip=[s]
user="[s]" group="[s]"
[s][s][s][s]msg="[s] [s]"
40021 debug vpn LOG_ID_PPTP_NOT_CONIG status=failure pptp is not configured (in this
action=connect virtual domain)
msg="PPTP: connection
request in unconfigured
virtual domain: [s]"
Page 627
ID Severity Subtype Macro Format Description
40101 unknown vpn LOG_ID_L2TP_TUNNEL_UP action=[s] tunnel_id=[n] VPN event log message
[s]tunneltype=[s] remote_
ip=[s] tunnel_ip=[s]
user="[s]" group="[s]"
[s][s][s][s]msg="[s] [s]"
40102 unknown vpn LOG_ID_L2TP_TUNNEL_ action=[s] tunnel_id=[n] VPN event log message
DOWN [s]tunneltype=[s] remote_
ip=[s] tunnel_ip=[s]
user="[s]" group="[s]"
[s][s][s][s]msg="[s] [s]"
40103 unknown vpn LOG_ID_L2TP_TUNNEL_ action=[s] tunnel_id=[n] VPN event log message
STAT [s]tunneltype=[s] remote_
ip=[s] tunnel_ip=[s]
user="[s]" group="[s]"
[s][s][s][s]msg="[s] [s]"
Page 628
ID Severity Subtype Macro Format Description
40960 notice wad LOGID_EVENT_WAD_ fwserver_name="[s]" addr_ Web proxy forward server error
WEBPROXY_FWD_SRV_ type=[s] ip=[s] fqdn="[s]"
ERROR port=[n] msg="[s]"
41000 notice system LOG_ID_UPD_FGT_SUCC [s] msg="Fortigate [s] Administrator has updated
[s][s][s] [s][s][s] [s][s][s] fortigate successfully
[s][s][s] [s][s][s] [s][s][s]
[s][s][s] [s][s][s] from [s]"
41001 critical system LOG_ID_UPD_FGT_FAIL [s] msg="Fortigate [s] Administrator has failed to
failed" update fortigate
Page 629
ID Severity Subtype Macro Format Description
43012 notice user LOG_ID_EVENT_AUTH_ src=[s] dst=[s] proto=[n] FSSO Authentication log
FSAE_AUTH_SUCCESS policyid=[n] user="[s]"
adgroup="[s]" ui="[s]"
action=[s] status=[s]
reason="[s]" msg="[s]"
43013 notice user LOG_ID_EVENT_AUTH_ src=[s] dst=[s] proto=[n] FSSO Authentication log
FSAE_AUTH_FAIL policyid=[n] user="[s]"
adgroup="[s]" ui="[s]"
action=[s] status=[s]
reason="[s]" msg="[s]"
Page 630
ID Severity Subtype Macro Format Description
43016 notice user LOG_ID_EVENT_AUTH_ src=[s] dst=[s] policyid=[n] NTLM authentication log
NTLM_AUTH_SUCCESS user="[s]" adgroup="[s]"
group="[s]" ui="[s]"
action=[s] status=[s]
reason="[s]" msg="[s]"
43017 notice user LOG_ID_EVENT_AUTH_ src=[s] dst=[s] policyid=[n] NTLM authentication log
NTLM_AUTH_FAIL user="[s]" adgroup="[s]"
group="[s]" ui="[s]"
action=[s] status=[s]
reason="[s]" msg="[s]"
43018 warning user LOG_ID_EVENT_AUTH_ src=[s] dst=[s] initiator=[s] Fortiguard override failed log
FGOVRD_FAIL status=[s] reason="[s]"
msg="[s]"
43019 warning user LOG_ID_EVENT_AUTH_ src=[s] dst=[s] initiator=N/A Fortiguard override log
FGOVRD_TBL_FULL status=failure
reason="reason"
msg="FortiGuard Web
Filtering override table is
full"
43020 notice user LOG_ID_EVENT_AUTH_ src=[s] dst=[s] initiator=[s] Fortiguard override succeeded
FGOVRD_SUCCESS status=[s] reason="[s]" log
scope=[s] scope_data="[s]"
rule_type=[s] rule_
data="[s]" offsite=[s]
expiry="[s]" oldwprof="[s]"
newwprof="[s]" msg="[s]"
43025 notice user LOG_ID_EVENT_AUTH_ src=[s] dst=[s] policyid=[n] Wad-auth HTTP log
PROXY_SUCCESS user="[s]" group="[s]"
ui="[s]" action=[s]
status=[s] reason="[s]"
msg="[s]"
43026 notice user LOG_ID_EVENT_AUTH_ src=[s] dst=[s] policyid=[n] Wad-auth FTP log
PROXY_FAILED user="[s]" group="[s]"
ui="[s]" action=[s]
status=[s] reason="[s]"
msg="[s]"
43027 notice user LOG_ID_EVENT_AUTH_ src=[s] dst=[s] policyid=[n] Wad-auth time out log
PROXY_TIME_OUT user="[s]" group="[s]"
ui="[s]" action=[s]
status=[s] reason="user
timed out" msg="[s]"
Page 631
ID Severity Subtype Macro Format Description
43028 notice user LOG_ID_EVENT_AUTH_ src=[s] dst=[s] policyid=[n] Wad-auth HTTP log
PROXY_AUTHORIZATION_ user="[s]" group="[s]"
FAILED ui="[s]" action=[s]
status=[s] reason="[s]"
msg="[s]"
43029 notice user LOG_ID_EVENT_AUTH_ src=[s] dst=[s] initiator=[s] Fortiguard override succeeded
WARNING_SUCCESS status=[s] reason="[s]" log
scope=[s] scope_data="[s]"
rule_type=[s] rule_
data="[s]" offsite=[s]
expiry="[s]" oldwprof="[s]"
newwprof="[s]" msg="[s]"
43030 warning user LOG_ID_EVENT_AUTH_ src=[s] dst=[s] initiator=[s] Fortiguard override failed log
WARNING_TBL_FULL status=[s] reason="[s]"
msg="[s]"
43520 notice wireless LOG_ID_EVENT_WIRELESS_ action="[s]" msg="[s]" wireless system activity log
SYS
43524 notice wireless LOG_ID_EVENT_WIRELESS_ sn="[s]" ap="[s]" vap="[s]" wireless client activity log
STA ssid="[s]" user="[s]"
group="[s]" mac=[s] ip=[s]
channel=[n] radioband="[s]"
security="[s]" action="[s]"
reason="[s]" msg="[s]"
43526 notice wireless LOG_ID_EVENT_WIRELESS_ sn="[s]" ap="[s]" ip="[s]" physical AP radio activity log
WTPR radioid=[n]
configcountry="[s]"
opercountry="[s]"
cfgtxpower=[n]
opertxpower=[n]
action="[s]" msg="[s]"
43527 notice wireless LOG_ID_EVENT_WIRELESS_ action="[s]" ssid="[s]" wireless rogue AP status config
ROGUE_CFG bssid=[s] apstatus=[n] log
msg="[s]"
43529 notice wireless LOG_ID_EVENT_WIRELESS_ sn="[s]" ap="[s]" vap="[s]" wireless client load balancing
CLB ssid="[s]" mac="[s]" log
radioband="[s]"
stacount=[n] action="[s]"
reason="[s]" msg="[s]"
Page 632
ID Severity Subtype Macro Format Description
Page 633
ID Severity Subtype Macro Format Description
43550 notice wireless LOG_ID_EVENT_WIRELESS_ sn="[s]" ap="[s]" radioid=[n] wireless station presence
STA_LOCATE radioband="[s]" detection log
stamac="[s]" signal=[n]
noise=[n] action="[s]"
msg="[s]"
43776 notice system LOGID_EVENT_NAC_ src=[s] dst=[s] src_int=[s] NAC quarantine event log
QUARANTINE proto=[n] service="[s]"
action=[s] user="[s]"
group="[s]" policyid=[n]
banned_src=[s] banned_
rule="[s]" sensor="[s][n]"
Page 634
ID Severity Subtype Macro Format Description
Page 635
ID Severity Subtype Macro Format Description
44288 information router LOG_ID_DNS_RESPONSE policyid=22 src=[s] dst=[s] test dns event log
src_int="eth0" dst_
int="switch0" user="user"
group="group" dns_
name="fotinet dns" dns_
ip="1.1.1.1"
44547 information system LOGID_EVENT_CONFIG_ user="[s]" ui="[s]" config obj attr log
OBJATTR action=[s] cfgtid=[n]
cfgpath="[s]" cfgobj="[s]"
cfgattr=[s] msg="[s]"
Page 636
ID Severity Subtype Macro Format Description
45003 error router LOG_ID_VSD_SSL_WRG_ serial=[s] policy=[n] SSL handshake has invalid
HS_LEN identidx=[n] vip="[s]" length
src=[s] src-port=[n] dst=[s]
dst-port=[n] action=receive
len=[n] msg="Incorrect SSL
handshake length"
45007 error router LOG_ID_VSD_SSL_BAD_ serial=[s] policy=[n] Hash in SSL Finished does not
HASH identidx=[n] vip="[s]" match calculated hash
src=[s] src-port=[n] dst=[s]
dst-port=[n] local=[s]
remote=[s] action=close
msg="Hash in SSL Finished
does not match calculated
hash"
45011 error router LOG_ID_VSD_SSL_LESS_ serial=[s] policy=[n] SSL minor version less than
MINOR identidx=[n] vip="[s]" configured minimum value
src=[s] src-port=[n] dst=[s]
dst-port=[n] action=close
min-minor=[n]
recv-minor=[n] msg="SSL
minor below mininum
configured value"
Page 637
ID Severity Subtype Macro Format Description
45012 warning router LOG_ID_VSD_SSL_REACH_ serial=[s] policy=[n] SSL maximum connection limit
MAX_CON identidx=[n] vip="[s]" reached
src=[s] src-port=[n] dst=[s]
dst-port=[n] action=close
msg="SSL maximum
connections reached"
45013 error router LOG_ID_VSD_SSL_NOT_ serial=[s] policy=[n] None of the offered SSL
SUPPORT_CS identidx=[n] vip="[s]" CipherSuites are supported
src=[s] src-port=[n] dst=[s]
dst-port=[n] action=close
msg="None of the offered
CipherSuites are
supported"
45017 error router LOG_ID_VSD_SSL_HS_TOO_ serial=[s] policy=[n] SSL handshake too long
LONG identidx=[n] vip="[s]"
src=[s] src-port=[n] dst=[s]
dst-port=[n] action=receive
handshake=[s] len=[n]
max=[n] msg="SSL
Handshake too long"
45018 debug router LOG_ID_VSD_SSL_MORE_ serial=[s] policy=[n] SSL minor version larger than
MINOR identidx=[n] vip="[s]" configured maximum value
src=[s] src-port=[n] dst=[s]
dst-port=[n] action=recv
max-minor=[n]
recv-minor=[n] msg="SSL
capping minor version at
maximum configured value"
45020 debug router LOG_ID_VSD_SSL_ vip="[s]" addr=[s] port=[n] SSL session state expiry
SESSION_EXPIRE created="[s]" id=[s]
action=expire msg="SSL
session state expired"
Page 638
ID Severity Subtype Macro Format Description
45031 error router LOG_ID_VSD_SSL_BAD_DH serial=[s] policy=[n] SSL Diffie-Hellman has bad
identidx=[n] vip="[s]" value
src=[s] src-port=[n] dst=[s]
dst-port=[n]min=[n] max=[n]
received=[n] action=close
msg="[s]"
Page 639
ID Severity Subtype Macro Format Description
45032 error router LOG_ID_VSD_SSL_PUB_ serial=[s] policy=[n] Certificate's public key is too
KEY_TOO_BIG identidx=[n] vip="[s]" big for SSL offloading
src=[s] src-port=[n] dst=[s]
dst-port=[n]len=[n] max=[n]
action=close msg="[s]"
45033 error router LOG_ID_VSD_SSL_NOT_ serial=[s] policy=[n] None of the offered SSL
SUPPORT_CM identidx=[n] vip="[s]" CompressionMethods are
src=[s] src-port=[n] dst=[s] supported
dst-port=[n] action=close
msg="None of the offered
CompressionMethods are
supported"
45056 notice system LOG_ID_FCC_EXCEED action=[s] status=[s] forticlient license exceed msg
license_limit=[n]
reason="[s]" repeat=[n]
msg="FortiClient license
maximum has been
reached."
45057 information system LOG_ID_FCC_ADD action=[s] status=[s] add forticlient connection msg
license_limit=[s] license_
used=[n] used_for_type=[n]
connection_type=[s]
count=[n] user="[s]" ip=[s]
name="[s]" forticlient_
id="[s]" msg="Add a
FortiClient Connection."
45059 notice system LOG_ID_FCC_UPGRADE_ action=[s] status=[s] upgrade forticlient license msg
SUCC ui="[s]" user="[s]" license_
limit=[s] msg="FortiClient
license has been
upgraded."
45100 warning system LOG_ID_EC_REG_FAIL user="[s]" hostname="[s]" FortiClient registration fail msg
ip=[n].[n].[n].[n] forticlient_
id=[s] interface=[s]
msg="FortiClient
registration failed due to
blocked UID."
Page 640
ID Severity Subtype Macro Format Description
46002 notice system LOG_ID_VIP_REAL_SVR_UP vip="[s]" VIP realserver has become up.
server=[n].[n].[n].[n] port=[n]
status=[s] action=up
msg="ldb server up"
Page 641
ID Severity Subtype Macro Format Description
46003 alert system LOG_ID_VIP_REAL_SVR_ vip="[s]" VIP realserver has been down.
DOWN server=[n].[n].[n].[n] port=[n]
status=[s] action=down
msg="ldb server down"
47201 emergency system LOG_ID_AMC_ENTER_ msg="The AMC card in slot AMC card entered bypass
BYPASS [s] has entered bypass mode
mode due to [s]."
47202 emergency system LOG_ID_AMC_EXIT_BYPASS msg="The AMC card in slot AMC card exited bypass mode
[s] has exited bypass mode
due to [s]."
47203 emergency system LOG_ID_ENTER_BYPASS msg="The bypass ports Bypass ports pair entered
pair have entered bypass bypass mode
mode."
Page 642
ID Severity Subtype Macro Format Description
47204 emergency system LOG_ID_EXIT_BYPASS msg="The bypass ports Bypass ports pair exited
pair have exited bypass bypass mode
mode."
48001 error wad LOG_ID_WAD_SSL_RCV_ session_id=[s] policyid=[n] SSL handshake has invalid
WRG_HS src=[n].[n].[n].[n] srcport=[n] length
dst=[n].[n].[n].[n] dstport=[n]
action=receive
msg="Incorrect SSL
handshake length. len:[n]"
Page 643