0% found this document useful (0 votes)
145 views

FortiOS 7.2.1 Log Reference

This document provides a log reference for FortiOS version 7.2.1. It includes information on log types and subtypes, the log schema structure including field formats and definitions, mappings for Common Event Format (CEF) support, enabling extended logging, and definitions for individual log messages.

Uploaded by

menap42333
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
145 views

FortiOS 7.2.1 Log Reference

This document provides a log reference for FortiOS version 7.2.1. It includes information on log types and subtypes, the log schema structure including field formats and definitions, mappings for Common Event Format (CEF) support, enabling extended logging, and definitions for individual log messages.

Uploaded by

menap42333
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1643

Log Reference

FortiOS 7.2.1
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com

FORTINET VIDEO GUIDE


https://video.fortinet.com

FORTINET BLOG
https://blog.fortinet.com

CUSTOMER SERVICE & SUPPORT


https://support.fortinet.com

FORTINET TRAINING & CERTIFICATION PROGRAM


https://www.fortinet.com/training-certification

NSE INSTITUTE
https://training.fortinet.com

FORTIGUARD CENTER
https://www.fortiguard.com

END USER LICENSE AGREEMENT


https://www.fortinet.com/doc/legal/EULA.pdf

FEEDBACK
Email: [email protected]

August 04, 2022


FortiOS 7.2.1 Log Reference
01-721-791443-20220804
TABLE OF CONTENTS

Change Log 31
Introduction 32
Before you begin 32
What's new 33
FortiOS 7.2.1 33
FortiOS 7.2.0 37
Log types and subtypes 42
Type 42
Subtype 42
List of log types and subtypes 42
UTM log subtypes 43
FortiOS priority levels 45
Log field format 46
Log schema structure 47
Log message fields 47
Log ID numbers 50
Log ID definitions 51
FortiGuard web filter categories 54
CEF support 57
FortiOS to CEF log field mapping guidelines 57
CEF priority levels 57
Examples of CEF support 58
Traffic log support for CEF 58
Event log support for CEF 60
Antivirus log support for CEF 61
Webfilter log support for CEF 62
IPS log support for CEF 63
Email Spamfilter log support for CEF 63
Anomaly log support for CEF 64
VoIP log support for CEF 64
DLP log support for CEF 65
Application log support for CEF 66
WAF log support for CEF 66
DNS log support for CEF 66
SSH log support for CEF 67
UTM extended logging 68
Enabling extended logging 68
Extended logging option in UTM profiles 68
Syslog server mode 69
Example of an extended log 69
Log Messages 70
Anomaly 71

FortiOS 7.2.1 Log Reference 3


Fortinet Inc.
18432 - LOGID_ATTCK_ANOMALY_TCP_UDP 71
18433 - LOGID_ATTCK_ANOMALY_ICMP 72
18434 - LOGID_ATTCK_ANOMALY_OTHERS 74
App 77
28672 - LOGID_APP_CTRL_IM_BASIC 77
28673 - LOGID_APP_CTRL_IM_BASIC_WITH_STATUS 78
28674 - LOGID_APP_CTRL_IM_BASIC_WITH_COUNT 80
28675 - LOGID_APP_CTRL_IM_FILE 82
28676 - LOGID_APP_CTRL_IM_CHAT 83
28677 - LOGID_APP_CTRL_IM_CHAT_BLOCK 85
28678 - LOGID_APP_CTRL_IM_BLOCK 87
28704 - LOGID_APP_CTRL_IPS_PASS 88
28705 - LOGID_APP_CTRL_IPS_BLOCK 91
28706 - LOGID_APP_CTRL_IPS_RESET 94
28720 - LOGID_APP_CTRL_SSH_PASS 97
28721 - LOGID_APP_CTRL_SSH_BLOCK 98
28736 - LOGID_APP_CTRL_PORT_ENF 100
28737 - LOGID_APP_CTRL_PROTO_ENF 103
AV 106
8192 - MESGID_INFECT_WARNING 106
8193 - MESGID_INFECT_NOTIF 109
8194 - MESGID_INFECT_MIME_WARNING 113
8195 - MESGID_INFECT_MIME_NOTIF 116
8200 - MESGID_MIME_FILETYPE_EXE_WARNING 119
8201 - MESGID_MIME_FILETYPE_EXE_NOTIF 122
8202 - MESGID_AVQUERY_WARNING 125
8203 - MESGID_AVQUERY_NOTIF 128
8204 - MESGID_MIME_AVQUERY_WARNING 131
8205 - MESGID_MIME_AVQUERY_NOTIF 135
8212 - MESGID_MALWARE_LIST_WARNING 138
8213 - MESGID_MALWARE_LIST_NOTIF 142
8214 - MESGID_MIME_MALWARE_LIST_WARNING 145
8215 - MESGID_MIME_MALWARE_LIST_NOTIF 149
8216 - MESGID_FILE_HASH_EMS_WARNING 152
8217 - MESGID_FILE_HASH_EMS_NOTIF 156
8218 - MESGID_MIME_FILE_HASH_EMS_WARNING 159
8219 - MESGID_MIME_FILE_HASH_EMS_NOTIF 162
8220 - MESGID_ICB_FAI_WARNING 166
8221 - MESGID_ICB_FAI_NOTIF 169
8222 - MESGID_MIME_ICB_FAI_WARNING 172
8223 - MESGID_MIME_ICB_FAI_NOTIF 176
8224 - MESGID_ICB_FAI_TIMEOUT_WARNING 179
8225 - MESGID_ICB_FAI_TIMEOUT_NOTIF 182
8226 - MESGID_MIME_ICB_FAI_TIMEOUT_WARNING 186
8227 - MESGID_MIME_ICB_FAI_TIMEOUT_NOTIF 189
8228 - MESGID_ICB_FAI_ERROR_WARNING 192
8229 - MESGID_ICB_FAI_ERROR_NOTIF 196
8230 - MESGID_MIME_ICB_FAI_ERROR_WARNING 199
8231 - MESGID_MIME_ICB_FAI_ERROR_NOTIF 202

FortiOS 7.2.1 Log Reference 4


Fortinet Inc.
8232 - MESGID_ICB_FSA_WARNING 206
8233 - MESGID_ICB_FSA_NOTIF 209
8234 - MESGID_MIME_ICB_FSA_WARNING 212
8235 - MESGID_MIME_ICB_FSA_NOTIF 216
8236 - MESGID_ICB_FSA_TIMEOUT_WARNING 219
8237 - MESGID_ICB_FSA_TIMEOUT_NOTIF 222
8238 - MESGID_MIME_ICB_FSA_TIMEOUT_WARNING 226
8239 - MESGID_MIME_ICB_FSA_TIMEOUT_NOTIF 229
8240 - MESGID_ICB_FSA_ERROR_WARNING 232
8241 - MESGID_ICB_FSA_ERROR_NOTIF 236
8242 - MESGID_MIME_ICB_FSA_ERROR_WARNING 239
8243 - MESGID_MIME_ICB_FSA_ERROR_NOTIF 242
8448 - MESGID_BLOCK_WARNING 246
8450 - MESGID_BLOCK_MIME_WARNING 248
8451 - MESGID_BLOCK_MIME_NOTIF 251
8452 - MESGID_BLOCK_COMMAND 253
8704 - MESGID_OVERSIZE_WARNING 255
8705 - MESGID_OVERSIZE_NOTIF 258
8708 - MESGID_OVERSIZE_STREAM_UNCOMP_WARNING 260
8709 - MESGID_OVERSIZE_STREAM_UNCOMP_NOTIF 262
8720 - MESGID_SWITCH_PROTO_WARNING 265
8721 - MESGID_SWITCH_PROTO_NOTIF 267
8960 - MESGID_SCAN_UNCOMPSIZELIMIT_WARNING 269
8961 - MESGID_SCAN_UNCOMPSIZELIMIT_NOTIF 273
8962 - MESGID_SCAN_ARCHIVE_ENCRYPTED_WARNING 276
8963 - MESGID_SCAN_ARCHIVE_ENCRYPTED_NOTIF 280
8964 - MESGID_SCAN_ARCHIVE_CORRUPTED_WARNING 283
8965 - MESGID_SCAN_ARCHIVE_CORRUPTED_NOTIF 287
8966 - MESGID_SCAN_ARCHIVE_MULTIPART_WARNING 290
8967 - MESGID_SCAN_ARCHIVE_MULTIPART_NOTIF 294
8968 - MESGID_SCAN_ARCHIVE_NESTED_WARNING 297
8969 - MESGID_SCAN_ARCHIVE_NESTED_NOTIF 301
8970 - MESGID_SCAN_ARCHIVE_OVERSIZE_WARNING 304
8971 - MESGID_SCAN_ARCHIVE_OVERSIZE_NOTIF 308
8972 - MESGID_SCAN_ARCHIVE_UNHANDLED_WARNING 311
8973 - MESGID_SCAN_ARCHIVE_UNHANDLED_NOTIF 315
8974 - MESGID_SCAN_AV_ENGINE_LOAD_FAILED_ERROR 318
8975 - MESGID_SCAN_ARCHIVE_PARTIALLYCORRUPTED_WARNING 322
8976 - MESGID_SCAN_ARCHIVE_PARTIALLYCORRUPTED_NOTIF 325
8979 - MESGID_SCAN_ARCHIVE_TIMEOUT_WARNING 329
8980 - MESGID_SCAN_ARCHIVE_TIMEOUT_NOTIF 332
8981 - MESGID_SCAN_AV_CDR_INTERNAL_ERROR 336
9233 - MESGID_ANALYTICS_SUBMITTED 339
9234 - MESGID_ANALYTICS_INFECT_WARNING 343
9235 - MESGID_ANALYTICS_INFECT_NOTIF 346
9236 - MESGID_ANALYTICS_INFECT_MIME_WARNING 350
9237 - MESGID_ANALYTICS_INFECT_MIME_NOTIF 353
9238 - MESGID_ANALYTICS_FSA_RESULT 357
9239 - MESGID_CONTENT_DISARM_NOTIF 358

FortiOS 7.2.1 Log Reference 5


Fortinet Inc.
9240 - MESGID_CONTENT_DISARM_WARNING 361
DLP 364
24576 - LOG_ID_DLP_WARN 364
24577 - LOG_ID_DLP_NOTIF 367
DNS 370
54000 - LOG_ID_DNS_QUERY 370
54200 - LOG_ID_DNS_RESOLV_ERROR 371
54400 - LOG_ID_DNS_URL_FILTER_BLOCK 373
54401 - LOG_ID_DNS_URL_FILTER_ALLOW 375
54600 - LOG_ID_DNS_BOTNET_IP 377
54601 - LOG_ID_DNS_BOTNET_DOMAIN 379
54800 - LOG_ID_DNS_FTGD_WARNING 381
54801 - LOG_ID_DNS_FTGD_ERROR 383
54802 - LOG_ID_DNS_FTGD_CAT_ALLOW 385
54803 - LOG_ID_DNS_FTGD_CAT_BLOCK 387
54804 - LOG_ID_DNS_SAFE_SEARCH 389
54805 - LOG_ID_DNS_LOCAL 391
Email 394
20480 - LOGID_ANTISPAM_EMAIL_NOTIF 394
20481 - LOGID_EMAIL_GENERAL_NOTIF 396
20482 - LOGID_ANTISPAM_EMAIL_BWORD_NOTIF 398
20509 - LOGID_ANTISPAM_FTGD_ERR 400
20510 - LOGID_ANTISPAM_EMAIL_WEBMAIL_NOTIF 402
Event 405
20002 - LOG_ID_DOMAIN_UNRESOLVABLE 405
20003 - LOG_ID_MAIL_SENT_FAIL 405
20004 - LOG_ID_POLICY_TOO_BIG 406
20005 - LOG_ID_PPP_LINK_UP 407
20006 - LOG_ID_PPP_LINK_DOWN 408
20007 - LOG_ID_SOCKET_EXHAUSTED 408
20008 - LOG_ID_POLICY6_TOO_BIG 409
20010 - LOG_ID_KERNEL_ERROR 410
20016 - LOG_ID_MODEM_EXCEED_REDIAL_COUNT 411
20017 - LOG_ID_MODEM_FAIL_TO_OPEN 411
20020 - LOG_ID_MODEM_USB_DETECTED 412
20021 - LOG_ID_MAIL_RESENT 413
20022 - LOG_ID_MODEM_USB_REMOVED 414
20023 - LOG_ID_MODEM_USBLTE_DETECTED 414
20024 - LOG_ID_MODEM_USBLTE_REMOVED 415
20025 - LOG_ID_REPORTD_REPORT_SUCCESS 416
20026 - LOG_ID_REPORTD_REPORT_FAILURE 417
20028 - LOG_ID_REPORT_RECREATE_DB 417
20031 - LOG_ID_RAD_OUT_OF_MEM 418
20032 - LOG_ID_RAD_NOT_FOUND 419
20033 - LOG_ID_RAD_MOBILE_IPV6 419
20034 - LOG_ID_RAD_IPV6_OUT_OF_RANGE 420
20035 - LOG_ID_RAD_MIN_OUT_OF_RANGE 421
20036 - LOG_ID_RAD_MAX_OUT_OF_RANGE 421
20037 - LOG_ID_RAD_MAX_ADV_OUT_OF_RANGE 422

FortiOS 7.2.1 Log Reference 6


Fortinet Inc.
20039 - LOG_ID_RAD_MTU_TOO_SMALL 423
20040 - LOG_ID_RAD_TIME_TOO_SMALL 423
20041 - LOG_ID_RAD_HOP_OUT_OF_RANGE 424
20042 - LOG_ID_RAD_DFT_HOP_OUT_OF_RANGE 425
20043 - LOG_ID_RAD_AGENT_OUT_OF_RANGE 425
20044 - LOG_ID_RAD_AGENT_FLAG_NOT_SET 426
20045 - LOG_ID_RAD_PREFIX_TOO_LONG 427
20046 - LOG_ID_RAD_PREF_TIME_TOO_SMALL 427
20061 - LOG_ID_RAD_INV_ICMPV6_TYPE 428
20062 - LOG_ID_RAD_INV_ICMPV6_RA_LEN 429
20063 - LOG_ID_RAD_ICMPV6_NO_SRC_ADDR 429
20064 - LOG_ID_RAD_INV_ICMPV6_RS_LEN 430
20065 - LOG_ID_RAD_INV_ICMPV6_CODE 431
20066 - LOG_ID_RAD_INV_ICMPV6_HOP 431
20067 - LOG_ID_RAD_MISMATCH_HOP 432
20068 - LOG_ID_RAD_MISMATCH_MGR_FLAG 433
20069 - LOG_ID_RAD_MISMATCH_OTH_FLAG 433
20070 - LOG_ID_RAD_MISMATCH_TIME 434
20071 - LOG_ID_RAD_MISMATCH_TIMER 435
20072 - LOG_ID_RAD_EXTRA_DATA 435
20073 - LOG_ID_RAD_NO_OPT_DATA 436
20074 - LOG_ID_RAD_INV_OPT_LEN 437
20075 - LOG_ID_RAD_MISMATCH_MTU 437
20077 - LOG_ID_RAD_MISMATCH_PREF_TIME 438
20078 - LOG_ID_RAD_INV_OPT 439
20080 - LOG_ID_RAD_FAIL_TO_RCV 439
20081 - LOG_ID_RAD_INV_HOP 440
20082 - LOG_ID_RAD_INV_PKTINFO 441
20083 - LOG_ID_RAD_FAIL_TO_CHECK 441
20084 - LOG_ID_RAD_FAIL_TO_SEND 442
20085 - LOG_ID_SESSION_CLASH 443
20090 - LOG_ID_INTF_LINK_STA_CHG 443
20099 - LOG_ID_INTF_STA_CHG 444
20100 - LOG_ID_WEB_CAT_UPDATED 445
20101 - LOG_ID_WEB_LIC_EXPIRE 445
20102 - LOG_ID_SPAM_LIC_EXPIRE 446
20103 - LOG_ID_AV_LIC_EXPIRE 447
20104 - LOG_ID_IPS_LIC_EXPIRE 448
20107 - LOG_ID_LOG_UPLOAD_ERR 448
20108 - LOG_ID_LOG_UPLOAD_DONE 449
20109 - LOG_ID_WEB_LIC_EXPIRED 450
20113 - LOG_ID_IPSA_DOWNLOAD_FAIL 451
20114 - LOG_ID_IPSA_SELFTEST_FAIL 451
20115 - LOG_ID_IPSA_STATUSUPD_FAIL 452
20116 - LOG_ID_SPAM_LIC_EXPIRED 453
20117 - LOG_ID_AV_LIC_EXPIRED 453
20118 - LOG_ID_WEBF_STATUS_REACH 454
20119 - LOG_ID_WEBF_STATUS_UNREACH 455
20120 - LOG_ID_FMGC_LIC_EXPIRE 455

FortiOS 7.2.1 Log Reference 7


Fortinet Inc.
20121 - LOG_ID_FAZC_LIC_EXPIRE 456
20122 - LOG_ID_SWNO_LIC_EXPIRE 457
20123 - LOG_ID_SWNM_LIC_EXPIRE 457
20124 - LOG_ID_VMLS_LIC_EXPIRE 458
20125 - LOG_ID_SFAS_LIC_EXPIRE 459
20126 - LOG_ID_IPMC_LIC_EXPIRE 459
20127 - LOG_ID_IOTH_LIC_EXPIRE 460
20128 - LOG_ID_FSAC_LIC_EXPIRE 461
20129 - LOG_ID_AFAC_LIC_EXPIRE 461
20130 - LOG_ID_EMSC_ACC_LIC_EXPIRE 462
20131 - LOG_ID_FMGC_ACC_LIC_EXPIRE 463
20132 - LOG_ID_FSAP_ACC_LIC_EXPIRE 463
20133 - LOG_ID_FIREWALL_POLICY_EXPIRE 464
20134 - LOG_ID_FIREWALL_POLICY_EXPIRED 465
20135 - LOG_ID_FAIS_LIC_EXPIRE 465
20200 - LOG_ID_FIPS_SELF_TEST 466
20201 - LOG_ID_FIPS_SELF_ALL_TEST 467
20202 - LOG_ID_DISK_FORMAT_ERROR 468
20203 - LOG_ID_DAEMON_SHUTDOWN 468
20204 - LOG_ID_DAEMON_START 469
20205 - LOG_ID_DISK_FORMAT_REQ 470
20206 - LOG_ID_DISK_SCAN_REQ 471
20207 - LOG_ID_RAD_MISMATCH_VALID_TIME 471
20208 - LOG_ID_ZOMBIE_DAEMON_CLEANUP 472
20209 - LOG_ID_DISK_UNAVAIL 473
20210 - LOG_ID_DISK_TRIM_START 473
20211 - LOG_ID_DISK_TRIM_END 474
20212 - LOG_ID_DISK_SCAN_NEEDED 475
20213 - LOG_ID_DISK_LOG_CORRUPTED 476
20214 - LOG_ID_LOCAL_OUT_IOC 476
20220 - LOGID_EVENT_SHAPER_OUTBOUND_MAXED_OUT 477
20221 - LOGID_EVENT_SHAPER_INBOUND_MAXED_OUT 478
20300 - LOG_ID_BGP_NB_STAT_CHG 479
20301 - LOG_ID_VZ_LOG_INFO 479
20302 - LOG_ID_OSPF_NB_STAT_CHG 480
20303 - LOG_ID_OSPF6_NB_STAT_CHG 481
20304 - LOG_ID_VZ_LOG_WARNING 481
20305 - LOG_ID_VZ_LOG_CRITICAL 482
20306 - LOG_ID_VZ_LOG_ERROR 483
20401 - LOG_ID_ROUTER_CLEAR 483
22000 - LOG_ID_INV_PKT_LEN 484
22001 - LOG_ID_UNSUPPORTED_PROT_VER 485
22002 - LOG_ID_INV_REQ_TYPE 485
22003 - LOG_ID_FAIL_SET_SIG_HANDLER 486
22004 - LOG_ID_FAIL_CREATE_SOCKET 487
22005 - LOG_ID_FAIL_CREATE_SOCKET_RETRY 487
22006 - LOG_ID_FAIL_REG_CMDB_EVENT 488
22009 - LOG_ID_FAIL_FIND_AV_PROFILE 489
22010 - LOG_ID_SENDTO_FAIL 490

FortiOS 7.2.1 Log Reference 8


Fortinet Inc.
22011 - LOG_ID_ENTER_MEM_CONSERVE_MODE 490
22012 - LOG_ID_LEAVE_MEM_CONSERVE_MODE 491
22013 - LOG_ID_IPPOOLPBA_BLOCK_EXHAUSTED 492
22014 - LOG_ID_IPPOOLPBA_NATIP_EXHAUSTED 493
22015 - LOG_ID_IPPOOLPBA_CREATE 494
22016 - LOG_ID_IPPOOLPBA_DEALLOCATE 495
22017 - LOG_ID_EXCEED_GLOB_RES_LIMIT 495
22018 - LOG_ID_EXCEED_VD_RES_LIMIT 496
22019 - LOG_ID_LOGRATE_OVER_LIMIT 497
22020 - LOG_ID_FAIL_CREATE_HA_SOCKET 498
22021 - LOG_ID_FAIL_CREATE_HA_SOCKET_RETRY 498
22031 - LOG_ID_SUCCESS_CSF_LOG_SYNC_CONFIG_CHANGED 499
22032 - LOG_ID_CSF_LOOP_FOUND 500
22035 - LOG_ID_CSF_UPSTREAM_SN_CHANGED 501
22036 - LOG_ID_CSF_FGT_CONNECTED 501
22037 - LOG_ID_CSF_FGT_DISCONNECTED 502
22038 - LOG_ID_CSF_GLOBAL_SYNC_FAILED 503
22039 - LOG_ID_CSF_GLOBAL_SYNC_REPORT 504
22040 - LOG_ID_CSF_DEVICE_JOIN 505
22041 - LOG_ID_CSF_DEVICE_LEAVE 505
22042 - LOG_ID_CSF_DEVICE_UPDATE 506
22043 - LOG_ID_CSF_NEW_AUTH_REQ 507
22044 - LOG_ID_CSF_UPDATE_AUTH_REQ 508
22045 - LOG_ID_CSF_REMOVE_AUTH_REQ 508
22046 - LOG_ID_CSF_ROLE_CHANGE 509
22050 - LOG_ID_IPAMD_ADDRESS_ALLOCATED 510
22051 - LOG_ID_IPAMD_ADDRESS_SET_FAILED 510
22052 - LOG_ID_IPAMD_ADDRESS_INVALIDATED 511
22053 - LOG_ID_IPAMD_VALIDATION_COMPLETE 512
22060 - LOG_ID_IPAMSD_ADD_ENTRY 513
22061 - LOG_ID_IPAMSD_DELETE_ENTRY 513
22062 - LOG_ID_IPAMSD_FLAG_CONFLICT 514
22063 - LOG_ID_IPAMSD_UNFLAG_CONFLICT 515
22080 - LOG_ID_PROVISION_LATEST_SUCCEEDED 516
22081 - LOG_ID_PROVISION_LATEST_FAILED 516
22090 - LOG_ID_FEDERATED_UPGRADE_CANCELLED 517
22091 - LOG_ID_FEDERATED_UPGRADE_SUCCEEDED 518
22092 - LOG_ID_FEDERATED_UPGRADE_FAILED 519
22093 - LOG_ID_FEDERATED_UPGRADE_STEP_COMPLETE 519
22100 - LOG_ID_QUAR_DROP_TRAN_JOB 520
22101 - LOG_ID_QUAR_DROP_TLL_JOB 521
22102 - LOG_ID_LOG_DISK_FAILURE 522
22103 - LOG_ID_QUAR_LIMIT_REACHED 523
22104 - LOG_ID_POWER_RESTORE 523
22105 - LOG_ID_POWER_FAILURE 524
22106 - LOG_ID_POWER_OPTIONAL_NOT_DETECTED 525
22107 - LOG_ID_VOLT_ANOM 526
22108 - LOG_ID_FAN_ANOM 527
22109 - LOG_ID_TEMP_TOO_HIGH 527

FortiOS 7.2.1 Log Reference 9


Fortinet Inc.
22110 - LOG_ID_SPARE_BLOCK_LOW 528
22113 - LOG_ID_FNBAM_FAILURE 529
22114 - LOG_ID_POWER_FAILURE_WARNING 529
22115 - LOG_ID_POWER_RESTORE_NOTIF 530
22116 - LOG_ID_POWER_REDUNDANCY_DEGRADE 531
22117 - LOG_ID_POWER_REDUNDANCY_FAILURE 532
22150 - LOG_ID_VOLT_NOM 532
22151 - LOG_ID_FAN_NOM 533
22152 - LOG_ID_TEMP_TOO_LOW 534
22153 - LOG_ID_TEMP_NORM 535
22200 - LOG_ID_AUTO_UPT_CERT 535
22201 - LOG_ID_AUTO_GEN_CERT 536
22203 - LOG_ID_AUTO_GEN_CERT_FAIL 537
22204 - LOG_ID_AUTO_GEN_CERT_PENDING 538
22205 - LOG_ID_AUTO_GEN_CERT_SUCC 539
22206 - LOG_ID_CRL_EXPIRED 540
22207 - LOG_ID_CERT_EXPIRE_WARNING 540
22220 - LOG_ID_EXT_RESOURCE 541
22221 - LOG_ID_EXT_RESOURCE_FAIL 542
22222 - LOG_ID_EXT_RESOURCE_LOAD 543
22223 - LOG_ID_EXT_RESOURCE_DEBUG 544
22700 - LOG_ID_IPS_FAIL_OPEN 544
22701 - LOG_ID_IPS_FAIL_OPEN_END 545
22800 - LOG_ID_SCAN_SERV_FAIL 546
22802 - LOG_ID_ENTER_FD_CONSERVE_MODE 547
22803 - LOG_ID_LEAVE_FD_CONSERVE_MODE 548
22804 - LOG_ID_LIC_STATUS_CHG 548
22805 - LOG_ID_FAIL_TO_VALIDATE_LIC 549
22806 - LOG_ID_DUP_LIC 550
22807 - LOG_ID_VDOM_LIC 551
22808 - LOG_ID_LIC_EXPIRE 551
22809 - LOG_ID_LIC_WILL_EXPIRE 552
22810 - LOG_ID_SCANUNIT_ERROR_BLOCK 553
22811 - LOG_ID_SCANUNIT_ERROR_PASS 554
22812 - LOG_ID_SCANUNIT_AVENG_RELOAD 555
22813 - LOG_ID_SCANUNIT_AVDB_RELOAD 556
22814 - LOG_ID_SCANUNIT_AVDB_RELOAD_ERROR 557
22815 - LOG_ID_SCANUNIT_AVDB_LOAD 557
22816 - LOG_ID_SCANUNIT_AVDB_LOAD_ERROR 558
22850 - LOG_ID_USER_QUARANTINE_MAC_ADD 559
22851 - LOG_ID_USER_QUARANTINE_MAC_DELETE 560
22852 - LOG_ID_USER_QUARANTINE_MAC_BOUNCE_PORT_HIT 560
22853 - LOG_ID_USER_QUARANTINE_MAC_BOUNCE_PORT_MISS 561
22861 - LOG_ID_FLPOLD_NAC_ADD 562
22862 - LOG_ID_FLPOLD_NAC_DELETE 563
22863 - LOG_ID_FLPOLD_NAC_MODIFY 564
22864 - LOG_ID_FLPOLD_DPP_ADD 565
22865 - LOG_ID_FLPOLD_DPP_DELETE 565
22866 - LOG_ID_FLPOLD_DPP_MODIFY 566

FortiOS 7.2.1 Log Reference 10


Fortinet Inc.
22867 - LOG_ID_FLPOLD_DPP_INTF_TAGS_ADD 567
22868 - LOG_ID_FLPOLD_DPP_INTF_TAGS_DELETE 568
22869 - LOG_ID_FLPOLD_NAC_DYNAMIC_ADDRESS_ADD 569
22870 - LOG_ID_FLPOLD_NAC_DYNAMIC_ADDRESS_DELETE 570
22871 - LOG_ID_FLPOLD_NAC_MAC_CACHE_SYNC 570
22890 - LOG_ID_FORTILINKD 571
22891 - LOG_ID_FLCFGD_SYNC_ERROR 572
22892 - LOG_ID_FLCFGD_SYNC_COMPLETE 573
22893 - LOG_ID_FLCFGD_SYNC_STATE 574
22894 - LOG_ID_FLCFGD_UPGRADE_ERROR 575
22895 - LOG_ID_FLCFGD_UPGRADE_STATUS 575
22896 - LOG_ID_FORTILINKD_CRITICAL 576
22897 - LOG_ID_FORTILINKD_SPLIT_PORT_INFO 577
22900 - LOG_ID_CAPUTP_SESSION 578
22901 - LOG_ID_FAZ_CON 578
22902 - LOG_ID_FAZ_DISCON 579
22903 - LOG_ID_FAZ_CON_ERR 580
22904 - LOG_ID_CAPUTP_SESSION_NOTIF 581
22912 - LOG_ID_FDS_SRV_ERRCON 582
22913 - LOG_ID_FDS_SRV_DISCON 582
22915 - LOG_ID_FDS_SRV_CON 583
22916 - LOG_ID_FDS_STATUS 584
22917 - LOG_ID_FDS_SMS_QUOTA 585
22918 - LOG_ID_FDS_CTRL_STATUS 585
22919 - LOG_ID_SVR_LOG_STATUS_CHANGED 586
22921 - LOG_ID_EVENT_ROUTE_INFO_CHANGED 587
22922 - LOG_ID_EVENT_LINK_MONITOR_STATUS 588
22923 - LOG_ID_EVENT_VWL_LQTY_STATUS 588
22924 - LOG_ID_EVENT_VWL_VOLUME_STATUS 589
22925 - LOG_ID_EVENT_VWL_SLA_INFO 590
22926 - LOG_ID_EVENT_VWL_NEIGHBOR_STATUS 591
22927 - LOG_ID_EVENT_VWL_NEIGHBOR_STANDALONE 592
22928 - LOG_ID_EVENT_VWL_NEIGHBOR_PRIMARY 593
22929 - LOG_ID_EVENT_VWL_NEIGHBOR_SECONDARY 594
22930 - LOG_ID_EVENT_VWL_LQTY_STATUS_WARNING 594
22931 - LOG_ID_EVENT_VWL_SLA_INFO_WARNING 595
22932 - LOG_ID_EVENT_LINK_MONITOR_STATUS_WARNING 596
22933 - LOG_ID_EVENT_VWL_SLA_INFO_NOTIF 597
22934 - LOG_ID_EVENT_VWL_LQTY_STATUS_INFO 598
22935 - LOG_ID_EVENT_VWL_LQTY_STATUS_DEBUG 599
22936 - LOG_ID_EVENT_VWL_INET_SVC_PQTY_STATUS_INFO 600
22949 - LOG_ID_FDS_JOIN 601
22950 - LOG_ID_FDS_LOGIN_SUCC 602
22951 - LOG_ID_FDS_LOGOUT 602
22952 - LOG_ID_FDS_LOGIN_FAIL 603
22954 - LOG_ID_INET_SVC_OBSOLETE 604
22955 - LOG_ID_INET_SVC_NAME_FAILURE 605
22956 - LOG_ID_INET_SVC_NAME_UPDATE 605
23101 - LOG_ID_IPSEC_TUNNEL_UP 606

FortiOS 7.2.1 Log Reference 11


Fortinet Inc.
23102 - LOG_ID_IPSEC_TUNNEL_DOWN 607
23103 - LOG_ID_IPSEC_TUNNEL_STAT 608
26001 - LOG_ID_DHCP_ACK 609
26002 - LOG_ID_DHCP_RELEASE 610
26003 - LOG_ID_DHCP_STAT 611
26004 - LOG_ID_DHCP_CLIENT_LEASE 611
26005 - LOG_ID_DHCP_LEASE_USAGE_HIGH 612
26006 - LOG_ID_DHCP_LEASE_USAGE_FULL 613
26007 - LOG_ID_DHCP_BLOCKED_MAC 613
26008 - LOG_ID_DHCP_DDNS_ADD 614
26009 - LOG_ID_DHCP_DDNS_DELETE 615
26010 - LOG_ID_DHCP_DDNS_COMPLETED 616
26011 - LOG_ID_DHCPV6_REPLY 617
26012 - LOG_ID_DHCPV6_RELEASE 618
27001 - LOG_ID_VRRP_STATE_CHG 618
29001 - LOG_ID_PPPD_MSG 619
29002 - LOG_ID_PPPD_AUTH_SUC 620
29003 - LOG_ID_PPPD_AUTH_FAIL 621
29004 - LOG_ID_PPPD_MSG_ERROR 622
29005 - LOG_ID_PPPD_MSG_DEBUG 622
29010 - LOG_ID_PPPOE_STATUS_REPORT_NOTIF 623
29011 - LOG_ID_PPPD_FAIL_TO_EXEC 624
29013 - LOG_ID_PPPD_START 625
29014 - LOG_ID_PPPD_EXIT 625
29015 - LOG_ID_PPP_RCV_BAD_PEER_IP 626
29016 - LOG_ID_PPP_RCV_BAD_LOCAL_IP 627
29021 - LOG_ID_EVENT_AUTH_SNMP_QUERY_FAILED 627
29022 - LOG_ID_DDNS_UPDATE_FAIL 628
32001 - LOG_ID_ADMIN_LOGIN_SUCC 629
32002 - LOG_ID_ADMIN_LOGIN_FAIL 630
32003 - LOG_ID_ADMIN_LOGOUT 631
32005 - LOG_ID_ADMIN_OVERIDE_VDOM 632
32006 - LOG_ID_ADMIN_ENTER_VDOM 633
32007 - LOG_ID_ADMIN_LEFT_VDOM 634
32008 - LOG_ID_VIEW_DISK_LOG_FAIL 635
32009 - LOG_ID_SYSTEM_START 635
32010 - LOG_ID_DISK_LOG_FULL 636
32011 - LOG_ID_LOG_ROLL 637
32014 - LOG_ID_CS_LIC_EXPIRE 637
32015 - LOG_ID_DISK_LOG_USAGE 638
32017 - LOG_ID_FDS_DAILY_QUOTA_FULL 639
32018 - LOG_ID_FIPS_ENTER_ERR_MOD 640
32019 - LOG_ID_CC_ENTER_ERR_MOD 640
32020 - LOG_ID_SSH_CORRPUT_MAC 641
32021 - LOG_ID_ADMIN_LOGIN_DISABLE 642
32022 - LOG_ID_VDOM_ENABLED 643
32023 - LOG_ID_MEM_LOG_FIRST_FULL 643
32024 - LOG_ID_ADMIN_PASSWD_EXPIRE 644
32025 - LOG_ID_SSH_REKEY 645

FortiOS 7.2.1 Log Reference 12


Fortinet Inc.
32026 - LOG_ID_SSH_BAD_PACKET_LENGTH 645
32027 - LOG_ID_VIEW_DISK_LOG_SUCC 646
32028 - LOG_ID_LOG_DEL_DIR 647
32029 - LOG_ID_LOG_DEL_FILE 648
32030 - LOG_ID_SEND_FDS_STAT 648
32031 - LOG_ID_VIEW_MEM_LOG_FAIL 649
32032 - LOG_ID_DISK_DLP_ARCH_FULL 650
32033 - LOG_ID_DISK_QUAR_FULL 651
32034 - LOG_ID_DISK_REPORT_FULL 651
32035 - LOG_ID_VDOM_DISABLED 652
32036 - LOG_ID_DISK_IPS_ARCH_FULL 653
32037 - LOG_ID_DISK_LOG_FIRST_FULL 653
32038 - LOG_ID_LOG_ROLL_FORTICRON 654
32039 - LOG_ID_VIEW_MEM_LOG_SUCC 655
32040 - LOG_ID_REPORT_DELETED 656
32041 - LOG_ID_REPORT_DELETED_GUI 656
32042 - LOG_ID_MEM_LOG_SECOND_FULL 657
32043 - LOG_ID_MEM_LOG_FINAL_FULL 658
32044 - LOG_ID_LOG_DELETE 658
32045 - LOG_ID_MGR_LIC_EXPIRE 659
32048 - LOG_ID_SCHEDULE_EXPIRE 660
32049 - LOG_ID_FC_EXPIRE 661
32050 - LOG_ID_POL_PKT_CAPTURE_FULL 661
32051 - LOG_ID_LOG_UPLOAD 662
32052 - LOG_ID_UPLOAD_RUN_SCRIPT 663
32053 - LOG_ID_ADMIN_MTNER_LOGIN_SUCC 663
32054 - LOG_ID_ADMIN_MTNER_LOGOUT 664
32057 - LOG_ID_VIEW_FAZ_LOG_FAIL 665
32058 - LOG_ID_VIEW_FAZ_LOG_SUCC 666
32095 - LOG_ID_GUI_CHG_SUB_MODULE 667
32096 - LOG_ID_GUI_DOWNLOAD_LOG 668
32097 - LOG_ID_DELETE_CAPTURE_PKT 668
32099 - LOG_ID_CHG_CONFIG_INFO 669
32100 - LOG_ID_FORTI_TOKEN_SYNC 670
32102 - LOG_ID_CHG_CONFIG 671
32103 - LOG_ID_NEW_FIRMWARE 672
32104 - LOG_ID_CHG_CONFIG_GUI 672
32105 - LOG_ID_NTP_SVR_STAUS_CHG_REACHABLE 673
32106 - LOG_ID_NTP_SVR_STAUS_CHG_RESOLVABLE 674
32107 - LOG_ID_NTP_SVR_STAUS_CHG_UNRESOLVABLE 675
32108 - LOG_ID_NTP_SVR_STAUS_CHG_UNREACHABLE 675
32109 - LOG_ID_UPD_SIGN_AV_DB 676
32110 - LOG_ID_UPD_SIGN_IPS_DB 677
32111 - LOG_ID_UPD_SIGN_AVIPS_DB 678
32113 - LOG_ID_UPD_SIGN_SRCVIS_DB 679
32114 - LOG_ID_UPD_SIGN_GEOIP_DB 679
32116 - LOG_ID_UPD_SIGN_AVPKG_FAILURE 680
32117 - LOG_ID_UPD_SIGN_AVPKG_SUCCESS 681
32118 - LOG_ID_UPD_ADMIN_AV_DB 682

FortiOS 7.2.1 Log Reference 13


Fortinet Inc.
32119 - LOG_ID_UPD_SCANUNIT_AV_DB 682
32129 - LOG_ID_ADD_GUEST 683
32130 - LOG_ID_CHG_USER 684
32131 - LOG_ID_DEL_GUEST 685
32132 - LOG_ID_ADD_USER 686
32138 - LOG_ID_REBOOT 687
32139 - LOG_ID_WAKE_ON_LAN 687
32140 - LOG_ID_TIME_USER_SETTING_CHG 688
32141 - LOG_ID_TIME_NTP_SETTING_CHG 689
32142 - LOG_ID_BACKUP_CONF 690
32143 - LOG_ID_BACKUP_CONF_BY_SCP 691
32144 - LOG_ID_BACKUP_CONF_ERROR 691
32145 - LOG_ID_BACKUP_CONF_ALERT 692
32146 - LOG_ID_TIME_PTP_SETTING_CHG 693
32148 - LOG_ID_GET_CRL 694
32149 - LOG_ID_COMMAND_FAIL 695
32151 - LOG_ID_ADD_IP6_LOCAL_POL 695
32152 - LOG_ID_CHG_IP6_LOCAL_POL 696
32153 - LOG_ID_DEL_IP6_LOCAL_POL 697
32155 - LOG_ID_ACT_FTOKEN_REQ 698
32156 - LOG_ID_ACT_FTOKEN_SUCC 699
32157 - LOG_ID_SYNC_FTOKEN_SUCC 700
32158 - LOG_ID_SYNC_FTOKEN_FAIL 701
32159 - LOG_ID_ACT_FTOKEN_FAIL 702
32160 - LOG_ID_FTM_PUSH_SUCC 702
32161 - LOG_ID_FTM_PUSH_FAIL 703
32168 - LOG_ID_REACH_VDOM_LIMIT 704
32169 - LOG_ID_ALARM_DLP_DB 705
32170 - LOG_ID_ALARM_MSG 705
32171 - LOG_ID_ALARM_ACK 706
32172 - LOG_ID_ADD_IP4_LOCAL_POL 707
32173 - LOG_ID_CHG_IP4_LOCAL_POL 708
32174 - LOG_ID_DEL_IP4_LOCAL_POL 709
32180 - LOG_ID_GEOIP_DB_INIT_FAIL 710
32190 - LOG_ID_UPT_INVALID_IMG 711
32191 - LOG_ID_UPT_INVALID_IMG_CC 711
32192 - LOG_ID_UPT_INVALID_IMG_RSA 712
32193 - LOG_ID_UPT_IMG_RSA 713
32194 - LOG_ID_UPT_IMG_FAIL 714
32200 - LOG_ID_SHUTDOWN 714
32201 - LOG_ID_LOAD_IMG_SUCC 715
32202 - LOG_ID_RESTORE_IMG 716
32203 - LOG_ID_RESTORE_CONF 717
32204 - LOG_ID_RESTORE_FGD_SVR 718
32205 - LOG_ID_RESTORE_VDOM_LIC 718
32206 - LOG_ID_RESTORE_SCRIPT 719
32207 - LOG_ID_RETRIEVE_CONF_LIST 720
32208 - LOG_ID_IMP_PKCS12_CERT 721
32209 - LOG_ID_RESTORE_USR_DEF_IPS 722

FortiOS 7.2.1 Log Reference 14


Fortinet Inc.
32210 - LOG_ID_BACKUP_IMG_SUCC 722
32211 - LOG_ID_UPLOAD_REVISION 723
32212 - LOG_ID_DEL_REVISION 724
32213 - LOG_ID_RESTORE_TEMPLATE 725
32214 - LOG_ID_RESTORE_FILE 726
32215 - LOG_ID_UPT_IMG 726
32217 - LOG_ID_UPD_IPS 727
32218 - LOG_ID_UPD_DLP 728
32219 - LOG_ID_BACKUP_OUTPUT 729
32220 - LOG_ID_BACKUP_COMMAND 729
32221 - LOG_ID_UPD_VDOM_LIC 730
32222 - LOG_ID_GLB_SETTING_CHG 731
32223 - LOG_ID_BACKUP_USER_DEF_IPS 732
32224 - LOG_ID_BACKUP_DISK_LOG 733
32225 - LOG_ID_DEL_ALL_REVISION 733
32226 - LOG_ID_LOAD_IMG_FAIL 734
32227 - LOG_ID_UPD_DLP_FAIL 735
32228 - LOG_ID_LOAD_IMG_FAIL_WRONG_IMG 736
32229 - LOG_ID_LOAD_IMG_FAIL_NO_RSA 736
32230 - LOG_ID_LOAD_IMG_FAIL_INVALID_RSA 737
32231 - LOG_ID_RESTORE_FGD_SVR_FAIL 738
32232 - LOG_ID_RESTORE_VDOM_LIC_FAIL 739
32233 - LOG_ID_BACKUP_IMG_FAIL 740
32234 - LOG_ID_RESTORE_IMG_INVALID_CC 740
32235 - LOG_ID_RESTORE_IMG_FORTIGUARD 741
32236 - LOG_ID_BACKUP_MEM_LOG 742
32237 - LOG_ID_BACKUP_MEM_LOG_FAIL 743
32238 - LOG_ID_BACKUP_DISK_LOG_FAIL 743
32239 - LOG_ID_BACKUP_DISK_LOG_USB 744
32240 - LOG_ID_SYS_USB_MODE 745
32241 - LOG_ID_BACKUP_DISK_LOG_USB_FAIL 746
32242 - LOG_ID_UPD_VDOM_LIC_FAIL 746
32243 - LOG_ID_UPD_IPS_SCP 747
32244 - LOG_ID_UPD_IPS_SCP_FAIL 748
32245 - LOG_ID_BACKUP_USER_DEF_IPS_FAIL 749
32246 - LOG_ID_RESTORE_USR_DEF_IPS_CRITICAL 750
32247 - LOG_ID_SSH_NEGOTIATION_FAILURE 750
32252 - LOG_ID_FACTORY_RESET 751
32253 - LOG_ID_FORMAT_RAID 752
32254 - LOG_ID_ENABLE_RAID 753
32255 - LOG_ID_DISABLE_RAID 753
32260 - LOG_ID_RESTORE_IMG_FORTIGUARD_NOTIF 754
32261 - LOG_ID_RESTORE_SCRIPT_NOTIF 755
32262 - LOG_ID_RESTORE_IMG_CONFIRM 756
32263 - LOG_ID_AUTO_IMG_UPD_SCHEDULED 757
32300 - LOG_ID_UPLOAD_RPT_IMG 757
32301 - LOG_ID_ADD_VDOM 758
32302 - LOG_ID_DEL_VDOM 759
32545 - LOG_ID_SYS_RESTART 760

FortiOS 7.2.1 Log Reference 15


Fortinet Inc.
32546 - LOG_ID_APPLICATION_CRASH 760
32547 - LOG_ID_AUTOSCRIPT_START 761
32548 - LOG_ID_AUTOSCRIPT_STOP 762
32549 - LOG_ID_AUTOSCRIPT_STOP_AUTO 763
32550 - LOG_ID_AUTOSCRIPT_DELETE_RSLT 763
32551 - LOG_ID_AUTOSCRIPT_BACKUP_RSLT 764
32552 - LOG_ID_AUTOSCRIPT_CHECK_STATUS 765
32553 - LOG_ID_AUTOSCRIPT_STOP_REACH_LIMIT 766
32554 - LOG_ID_UPD_ADMIN_DB 766
32561 - LOG_ID_ADMIN_LOGOUT_DISCONNECT 767
32562 - LOG_ID_STORE_CONF_FAIL_SPACE 768
32564 - LOG_ID_RESTORE_CONF_FAIL 769
32565 - LOG_ID_RESTORE_CONF_BY_MGMT 770
32566 - LOG_ID_RESTORE_CONF_BY_SCP 771
32568 - LOG_ID_DEL_REVISION_DB 771
32569 - LOG_ID_FSW_SWITCH_LOG_EVENT 772
32570 - LOG_ID_ADMIN_MTNER_LOGOUT_DISCONNECT 773
32571 - LOG_ID_RESTORE_CONF_FAIL_WARNING 774
32601 - LOG_ID_FGT_SWITCH_LOG_DISCOVER 775
32602 - LOG_ID_FGT_SWITCH_LOG_AUTH 776
32603 - LOG_ID_FGT_SWITCH_LOG_DEAUTH 777
32604 - LOG_ID_FGT_SWITCH_LOG_DELETE 777
32605 - LOG_ID_FGT_SWITCH_LOG_TUNNEL_UP 778
32606 - LOG_ID_FGT_SWITCH_LOG_TUNNEL_DOWN 779
32607 - LOG_ID_FGT_SWITCH_PUSH_IMAGE 780
32608 - LOG_ID_FGT_SWITCH_STAGE_IMAGE 781
32609 - LOG_ID_FGT_SWITCH_DISABLE_DISCOVERY 781
32610 - LOG_ID_FGT_SWITCH_LOG_WARNING 782
32611 - LOG_ID_FGT_SWITCH_EXPORT_POOL 783
32612 - LOG_ID_FGT_SWITCH_EXPORT_VDOM 784
32613 - LOG_ID_FGT_SWITCH_REQUEST_PORT 784
32614 - LOG_ID_FGT_SWITCH_RETURN_PORT 785
32615 - LOG_ID_FGT_SWITCH_MAC_ADD 786
32616 - LOG_ID_FGT_SWITCH_MAC_DEL 787
32617 - LOG_ID_FGT_SWITCH_MAC_MOVE 788
32693 - LOG_ID_FGT_SWITCH_GROUP_SWC 788
32694 - LOG_ID_FGT_SWITCH_GROUP_POE 789
32695 - LOG_ID_FGT_SWITCH_GROUP_LINK 790
32696 - LOG_ID_FGT_SWITCH_GROUP_STP 791
32697 - LOG_ID_FGT_SWITCH_GROUP_SWITCH 792
32698 - LOG_ID_FGT_SWITCH_GROUP_ROUTER 793
32699 - LOG_ID_FGT_SWITCH_GROUP_SYSTEM 794
34415 - LOG_ID_NP6_IPSEC_ENGINE_BUSY 795
34416 - LOG_ID_NP6_IPSEC_ENGINE_POSSIBLY_LOCKUP 796
34417 - LOG_ID_NP6_IPSEC_ENGINE_LOCKUP 796
34418 - LOG_ID_NP6_HPE_PACKET_DROP 797
34419 - LOG_ID_NP6_HPE_PACKET_FLOOD 798
34428 - LOG_ID_NP7_HPE_PACKET_DROP 798
34430 - LOG_ID_NP7_HPE_PACKET_FLOOD 799

FortiOS 7.2.1 Log Reference 16


Fortinet Inc.
35001 - LOG_ID_HA_SYNC_VIRDB 800
35002 - LOG_ID_HA_SYNC_ETDB 800
35003 - LOG_ID_HA_SYNC_EXDB 801
35004 - LOG_ID_HA_SYNC_FLDB 802
35005 - LOG_ID_HA_SYNC_IPS 803
35007 - LOG_ID_HA_SYNC_AV 803
35009 - LOG_ID_HA_SYNC_CID 804
35011 - LOG_ID_HA_SYNC_FAIL 805
35012 - LOG_ID_CONF_SYNC_FAIL 805
35013 - LOG_ID_HA_FAILOVER_FAIL 806
35014 - LOG_ID_HA_RESET_UPTIME 807
35015 - LOG_ID_HA_CLEAR_HISTORY 807
35016 - LOG_ID_HA_FAILOVER_SUCCESS 808
36881 - LOG_ID_EVENT_SYSTEM_CFG_REVERT 809
36882 - LOG_ID_EVENT_SYSTEM_CFG_MANUALLY_SAVED 809
36883 - LOG_ID_EVENT_SYSTEM_CLEAR_ACTIVE_SESSION 810
37120 - MESGID_NEG_GENERIC_P1_NOTIF 811
37121 - MESGID_NEG_GENERIC_P1_ERROR 812
37122 - MESGID_NEG_GENERIC_P2_NOTIF 814
37123 - MESGID_NEG_GENERIC_P2_ERROR 815
37124 - MESGID_NEG_I_P1_ERROR 816
37125 - MESGID_NEG_I_P2_ERROR 817
37126 - MESGID_NEG_NO_STATE_ERROR 819
37127 - MESGID_NEG_PROGRESS_P1_NOTIF 820
37128 - MESGID_NEG_PROGRESS_P1_ERROR 821
37129 - MESGID_NEG_PROGRESS_P2_NOTIF 823
37130 - MESGID_NEG_PROGRESS_P2_ERROR 824
37131 - MESGID_ESP_ERROR 826
37132 - MESGID_ESP_CRITICAL 827
37133 - MESGID_INSTALL_SA 828
37134 - MESGID_DELETE_P1_SA 830
37135 - MESGID_DELETE_P2_SA 831
37136 - MESGID_DPD_FAILURE 832
37137 - MESGID_CONN_FAILURE 833
37138 - MESGID_CONN_UPDOWN 834
37139 - MESGID_P2_UPDOWN 836
37141 - MESGID_CONN_STATS 837
37889 - MESGID_VC_DELETE 838
37890 - MESGID_VC_MOVE_VDOM 839
37891 - MESGID_VC_ADD_VDOM 840
37892 - MESGID_VC_MOVE_MEMB_STATE 841
37893 - MESGID_VC_DETECT_MEMB_DEAD 842
37894 - MESGID_VC_DETECT_MEMB_JOIN 842
37895 - MESGID_VC_ADD_HADEV 843
37896 - MESGID_VC_DEL_HADEV 844
37897 - MESGID_HADEV_READY 845
37898 - MESGID_HADEV_FAIL 845
37899 - MESGID_HADEV_PEERINFO 846
37900 - MESGID_HBDEV_DELETE 847

FortiOS 7.2.1 Log Reference 17


Fortinet Inc.
37901 - MESGID_HBDEV_DOWN 848
37902 - MESGID_HBDEV_UP 848
37903 - MESGID_SYNC_STATUS 849
37904 - MESGID_HA_ACTIVITY 850
37907 - MESGID_VLAN_HB_UP 851
37908 - MESGID_VLAN_HB_DOWN 851
37909 - MESGID_VLAN_HB_DOWN_SUM 852
37910 - MESGID_HB_PACKET_LOST 853
37911 - MESGID_HA_ACTIVITY_INFO 853
37912 - MESGID_FGSP_MEMBER_JOIN 854
37913 - MESGID_FGSP_MEMBER_LEAVE 855
38010 - LOG_ID_FIPS_ENCRY_FAIL 856
38011 - LOG_ID_FIPS_DECRY_FAIL 856
38012 - LOG_ID_ENTROPY_TOKEN 857
38031 - LOG_ID_FSSO_LOGON 858
38032 - LOG_ID_FSSO_LOGOFF 859
38033 - LOG_ID_FSSO_SVR_STATUS 860
38403 - LOGID_EVENT_NOTIF_INSUFFICIENT_RESOURCE 860
38404 - LOGID_EVENT_NOTIF_HOSTNAME_ERROR 861
38405 - LOGID_NOTIF_CODE_SENDTO_SMS_PHONE 862
38406 - LOGID_NOTIF_CODE_SENDTO_SMS_TO 863
38407 - LOGID_NOTIF_CODE_SENDTO_EMAIL 863
38408 - LOGID_EVENT_OFTP_SSL_CONNECTED 864
38409 - LOGID_EVENT_OFTP_SSL_DISCONNECTED 865
38410 - LOGID_EVENT_OFTP_SSL_FAILED 866
38411 - LOGID_EVENT_TWO_F_AUTH_CODE_SENDTO 867
38412 - LOGID_EVENT_TOKEN_CODE_SENDTO 867
38656 - LOGID_EVENT_RAD_RPT_PROTO_ERROR 868
38657 - LOGID_EVENT_RAD_RPT_PROF_NOT_FOUND 869
38658 - LOGID_EVENT_RAD_RPT_CTX_NOT_FOUND 870
38659 - LOGID_EVENT_RAD_RPT_ACCT_STOP_MISSED 870
38660 - LOGID_EVENT_RAD_RPT_ACCT_EVENT 871
38661 - LOGID_EVENT_RAD_RPT_OTHER 872
38662 - LOGID_EVENT_RAD_STAT_PROTO_ERROR 873
38663 - LOGID_EVENT_RAD_STAT_PROF_NOT_FOUND 873
38665 - LOGID_EVENT_RAD_STAT_ACCT_STOP_MISSED 874
38666 - LOGID_EVENT_RAD_STAT_ACCT_EVENT 875
38667 - LOGID_EVENT_RAD_STAT_OTHER 876
38668 - LOGID_EVENT_RAD_STAT_EP_BLK 877
39424 - LOG_ID_EVENT_SSL_VPN_USER_TUNNEL_UP 878
39425 - LOG_ID_EVENT_SSL_VPN_USER_TUNNEL_DOWN 879
39426 - LOG_ID_EVENT_SSL_VPN_USER_SSL_LOGIN_FAIL 880
39936 - LOG_ID_EVENT_SSL_VPN_SESSION_WEB_TUNNEL_STATS 880
39937 - LOG_ID_EVENT_SSL_VPN_SESSION_WEBAPP_DENY 881
39938 - LOG_ID_EVENT_SSL_VPN_SESSION_WEBAPP_PASS 882
39939 - LOG_ID_EVENT_SSL_VPN_SESSION_WEBAPP_TIMEOUT 883
39940 - LOG_ID_EVENT_SSL_VPN_SESSION_WEBAPP_CLOSE 884
39941 - LOG_ID_EVENT_SSL_VPN_SESSION_SYS_BUSY 885
39942 - LOG_ID_EVENT_SSL_VPN_SESSION_CERT_OK 886

FortiOS 7.2.1 Log Reference 18


Fortinet Inc.
39943 - LOG_ID_EVENT_SSL_VPN_SESSION_NEW_CON 887
39944 - LOG_ID_EVENT_SSL_VPN_SESSION_ALERT 888
39945 - LOG_ID_EVENT_SSL_VPN_SESSION_EXIT_FAIL 889
39946 - LOG_ID_EVENT_SSL_VPN_SESSION_EXIT_ERR 890
39947 - LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_UP 891
39948 - LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_DOWN 892
39949 - LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_STATS 893
39950 - LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_UNKNOWNTAG 894
39951 - LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_ERROR 895
39952 - LOG_ID_EVENT_SSL_VPN_SESSION_ENTER_CONSERVE_MODE 896
39953 - LOG_ID_EVENT_SSL_VPN_SESSION_LEAVE_CONSERVE_MODE 897
40001 - LOG_ID_PPTP_TUNNEL_UP 898
40002 - LOG_ID_PPTP_TUNNEL_DOWN 899
40003 - LOG_ID_PPTP_TUNNEL_STAT 900
40014 - LOG_ID_PPTP_REACH_MAX_CON 901
40017 - LOG_ID_L2TPD_CLIENT_CON_FAIL 902
40019 - LOG_ID_L2TPD_CLIENT_DISCON 902
40021 - LOG_ID_PPTP_NOT_CONIG 903
40022 - LOG_ID_PPTP_NO_IP_AVAIL 904
40024 - LOG_ID_PPTP_OUT_MEM 905
40034 - LOG_ID_PPTP_START 905
40035 - LOG_ID_PPTP_START_FAIL 906
40036 - LOG_ID_PPTP_EXIT 907
40037 - LOG_ID_PPTPD_SVR_DISCON 908
40038 - LOG_ID_PPTPD_CLIENT_CON 908
40039 - LOG_ID_PPTPD_CLIENT_DISCON 909
40101 - LOG_ID_L2TP_TUNNEL_UP 910
40102 - LOG_ID_L2TP_TUNNEL_DOWN 911
40103 - LOG_ID_L2TP_TUNNEL_STAT 912
40114 - LOG_ID_L2TPD_START 913
40115 - LOG_ID_L2TPD_EXIT 913
40118 - LOG_ID_L2TPD_CLIENT_CON 914
40704 - LOG_ID_EVENT_SYS_PERF 915
40705 - LOG_ID_EVENT_SYS_CPU_USAGE 916
40706 - LOG_ID_EVENT_SYS_BROKEN_SYMBOLIC_LINK 917
40960 - LOGID_EVENT_WAD_WEBPROXY_FWD_SRV_ERROR 918
41000 - LOG_ID_UPD_FGT_SUCC 918
41001 - LOG_ID_UPD_FGT_FAIL 919
41002 - LOG_ID_UPD_SRC_VIS 920
41006 - LOG_ID_UPD_FSA_VIRDB 920
41007 - LOG_ID_UPD_MANUAL_LICENSE_SUCC 921
41008 - LOG_ID_UPD_MANUAL_LICENSE_FAIL 922
41009 - LOG_ID_UPD_DB_SIGN_INVALID 923
41010 - LOG_ID_UPD_DB_SIGN_PASSED 924
41984 - LOG_ID_EVENT_VPN_CERT_LOAD 924
41985 - LOG_ID_EVENT_VPN_CERT_REMOVAL 925
41986 - LOG_ID_EVENT_VPN_CERT_REGEN 926
41987 - LOG_ID_EVENT_VPN_CERT_UPDATE 927
41988 - LOG_ID_EVENT_SSL_VPN_SETTING_UPDATE 928

FortiOS 7.2.1 Log Reference 19


Fortinet Inc.
41989 - LOG_ID_EVENT_VPN_CERT_ERR 929
41990 - LOG_ID_EVENT_VPN_CERT_UPDATE_FAILED 929
41991 - LOG_ID_EVENT_VPN_CERT_EXPORT 930
41992 - LOG_ID_EVENT_VPN_CERT_CRL_EXPIRED 931
42201 - LOG_ID_NETX_VMX_ATTACH 932
42202 - LOG_ID_NETX_VMX_DETACH 933
42203 - LOG_ID_NETX_VMX_DENIED 933
43008 - LOG_ID_EVENT_AUTH_SUCCESS 934
43009 - LOG_ID_EVENT_AUTH_FAILED 935
43010 - LOG_ID_EVENT_AUTH_LOCKOUT 936
43011 - LOG_ID_EVENT_AUTH_TIME_OUT 937
43014 - LOG_ID_EVENT_AUTH_FSAE_LOGON 938
43015 - LOG_ID_EVENT_AUTH_FSAE_LOGOFF 939
43016 - LOG_ID_EVENT_AUTH_NTLM_AUTH_SUCCESS 940
43017 - LOG_ID_EVENT_AUTH_NTLM_AUTH_FAIL 941
43018 - LOG_ID_EVENT_AUTH_FGOVRD_FAIL 942
43020 - LOG_ID_EVENT_AUTH_FGOVRD_SUCCESS 943
43025 - LOG_ID_EVENT_AUTH_PROXY_SUCCESS 944
43026 - LOG_ID_EVENT_AUTH_PROXY_FAILED 945
43027 - LOG_ID_EVENT_AUTH_PROXY_TIME_OUT 946
43028 - LOG_ID_EVENT_AUTH_PROXY_GROUP_INFO_FAILED 947
43029 - LOG_ID_EVENT_AUTH_WARNING_SUCCESS 948
43030 - LOG_ID_EVENT_AUTH_WARNING_TBL_FULL 949
43032 - LOG_ID_EVENT_AUTH_PROXY_USER_LIMIT_REACHED 950
43033 - LOG_ID_EVENT_AUTH_PROXY_MULTIPLE_LOGIN 951
43034 - LOG_ID_EVENT_AUTH_PROXY_NO_RESP 952
43037 - LOG_ID_EVENT_AUTH_IPV4_FLUSH 953
43038 - LOG_ID_EVENT_AUTH_IPV6_FLUSH 953
43039 - LOG_ID_EVENT_AUTH_LOGON 954
43040 - LOG_ID_EVENT_AUTH_LOGOUT 955
43041 - LOG_ID_EVENT_AUTH_DISCLAIMER_ACCEPT 956
43042 - LOG_ID_EVENT_AUTH_DISCLAIMER_DECLINE 957
43043 - LOG_ID_EVENT_AUTH_EMAIL_COLLECTING_SUCCESS 958
43044 - LOG_ID_EVENT_AUTH_EMAIL_COLLECTING_FAIL 959
43045 - LOG_ID_EVENT_AUTH_8021X_SUCCESS 960
43046 - LOG_ID_EVENT_AUTH_8021X_FAIL 961
43050 - LOG_ID_EVENT_AUTH_FSAE_CONNECT 962
43051 - LOG_ID_EVENT_AUTH_FSAE_DISCONNECT 962
43520 - LOG_ID_EVENT_WIRELESS_SYS 963
43521 - LOG_ID_EVENT_WIRELESS_ROGUE 964
43522 - LOG_ID_EVENT_WIRELESS_WTP 965
43524 - LOG_ID_EVENT_WIRELESS_STA 966
43525 - LOG_ID_EVENT_WIRELESS_ONWIRE 968
43526 - LOG_ID_EVENT_WIRELESS_WTPR 969
43527 - LOG_ID_EVENT_WIRELESS_ROGUE_CFG 970
43528 - LOG_ID_EVENT_WIRELESS_WTPR_ERROR 971
43529 - LOG_ID_EVENT_WIRELESS_CLB 972
43530 - LOG_ID_EVENT_WIRELESS_WIDS_WL_BRIDGE 973
43531 - LOG_ID_EVENT_WIRELESS_WIDS_BR_DEAUTH 974

FortiOS 7.2.1 Log Reference 20


Fortinet Inc.
43532 - LOG_ID_EVENT_WIRELESS_WIDS_NL_PBRESP 975
43533 - LOG_ID_EVENT_WIRELESS_WIDS_MAC_OUI 977
43534 - LOG_ID_EVENT_WIRELESS_WIDS_LONG_DUR 978
43535 - LOG_ID_EVENT_WIRELESS_WIDS_WEP_IV 979
43542 - LOG_ID_EVENT_WIRELESS_WIDS_EAPOL_FLOOD 980
43544 - LOG_ID_EVENT_WIRELESS_WIDS_MGMT_FLOOD 981
43546 - LOG_ID_EVENT_WIRELESS_WIDS_SPOOF_DEAUTH 982
43548 - LOG_ID_EVENT_WIRELESS_WIDS_ASLEAP 983
43550 - LOG_ID_EVENT_WIRELESS_STA_LOCATE 985
43551 - LOG_ID_EVENT_WIRELESS_WTP_JOIN 985
43552 - LOG_ID_EVENT_WIRELESS_WTP_LEAVE 986
43553 - LOG_ID_EVENT_WIRELESS_WTP_FAIL 987
43554 - LOG_ID_EVENT_WIRELESS_WTP_UPDATE 988
43555 - LOG_ID_EVENT_WIRELESS_WTP_RESET 989
43556 - LOG_ID_EVENT_WIRELESS_WTP_KICK 990
43557 - LOG_ID_EVENT_WIRELESS_WTP_ADD_FAILURE 991
43558 - LOG_ID_EVENT_WIRELESS_WTP_CFG_ERR 992
43559 - LOG_ID_EVENT_WIRELESS_WTP_SN_MISMATCH 993
43560 - LOG_ID_EVENT_WIRELESS_SYS_AC_RESTARTED 994
43561 - LOG_ID_EVENT_WIRELESS_SYS_AC_HOSTAPD_UP 995
43562 - LOG_ID_EVENT_WIRELESS_SYS_AC_HOSTAPD_DOWN 995
43563 - LOG_ID_EVENT_WIRELESS_ROGUE_DETECT 996
43564 - LOG_ID_EVENT_WIRELESS_ROGUE_OFFAIR 998
43565 - LOG_ID_EVENT_WIRELESS_ROGUE_ONAIR 999
43566 - LOG_ID_EVENT_WIRELESS_ROGUE_OFFWIRE 1001
43567 - LOG_ID_EVENT_WIRELESS_FAKEAP_DETECT 1002
43568 - LOG_ID_EVENT_WIRELESS_FAKEAP_ONAIR 1004
43569 - LOG_ID_EVENT_WIRELESS_ROGUE_SUPPRESSED 1005
43570 - LOG_ID_EVENT_WIRELESS_ROGUE_UNSUPPRESSED 1007
43571 - LOG_ID_EVENT_WIRELESS_ROGUE_DETECT_CHG 1008
43572 - LOG_ID_EVENT_WIRELESS_STA_ASSO 1010
43573 - LOG_ID_EVENT_WIRELESS_STA_AUTH 1011
43574 - LOG_ID_EVENT_WIRELESS_STA_DASS 1012
43575 - LOG_ID_EVENT_WIRELESS_STA_DAUT 1014
43576 - LOG_ID_EVENT_WIRELESS_STA_IDLE 1015
43577 - LOG_ID_EVENT_WIRELESS_STA_DENY 1016
43578 - LOG_ID_EVENT_WIRELESS_STA_KICK 1018
43579 - LOG_ID_EVENT_WIRELESS_STA_IP 1019
43580 - LOG_ID_EVENT_WIRELESS_STA_LEAVE_WTP 1020
43581 - LOG_ID_EVENT_WIRELESS_STA_WTP_DISCONN 1022
43582 - LOG_ID_EVENT_WIRELESS_ROGUE_CFG_UNCLASSIFIED 1023
43583 - LOG_ID_EVENT_WIRELESS_ROGUE_CFG_ACCEPTED 1024
43584 - LOG_ID_EVENT_WIRELESS_ROGUE_CFG_ROGUE 1025
43585 - LOG_ID_EVENT_WIRELESS_ROGUE_CFG_SUPPRESSED 1025
43586 - LOG_ID_EVENT_WIRELESS_WTPR_DARRP_CHAN 1026
43587 - LOG_ID_EVENT_WIRELESS_WTPR_DARRP_START 1027
43588 - LOG_ID_EVENT_WIRELESS_WTPR_OPER_CHAN 1028
43589 - LOG_ID_EVENT_WIRELESS_WTPR_RADAR 1030
43590 - LOG_ID_EVENT_WIRELESS_WTPR_NOL 1031

FortiOS 7.2.1 Log Reference 21


Fortinet Inc.
43591 - LOG_ID_EVENT_WIRELESS_WTPR_COUNTRY_CFG_SUCCESS 1032
43592 - LOG_ID_EVENT_WIRELESS_WTPR_OPER_COUNTRY 1033
43593 - LOG_ID_EVENT_WIRELESS_WTPR_CFG_TXPOWER 1034
43594 - LOG_ID_EVENT_WIRELESS_WTPR_OPER_TXPOWER 1035
43595 - LOG_ID_EVENT_WIRELESS_CLB_DENY 1036
43596 - LOG_ID_EVENT_WIRELESS_CLB_RETRY 1037
43597 - LOG_ID_EVENT_WIRELESS_WTP_ADD 1038
43598 - LOG_ID_EVENT_WIRELESS_WTP_ADD_XSS 1039
43599 - LOG_ID_EVENT_WIRELESS_WTP_DEL 1040
43600 - LOG_ID_EVENT_WIRELESS_WTPR_DARRP_STOP 1041
43601 - LOG_ID_EVENT_WIRELESS_STA_CAP_SIGNON 1042
43602 - LOG_ID_EVENT_WIRELESS_STA_CAP_SIGNON_SUCCESS 1044
43603 - LOG_ID_EVENT_WIRELESS_STA_CAP_SIGNON_FAILURE 1045
43604 - LOG_ID_EVENT_WIRELESS_STA_CAP_EMAIL_REQUEST 1046
43605 - LOG_ID_EVENT_WIRELESS_STA_CAP_EMAIL_SUCCESS 1047
43606 - LOG_ID_EVENT_WIRELESS_STA_CAP_EMAIL_FAILURE 1049
43607 - LOG_ID_EVENT_WIRELESS_STA_CAP_DISCLAIMER_CHECK 1050
43608 - LOG_ID_EVENT_WIRELESS_STA_CAP_DISCLAIMER_DECLINE 1051
43609 - LOG_ID_EVENT_WIRELESS_WTPR_DARRP_OPTIMIZATION_START 1053
43610 - LOG_ID_EVENT_WIRELESS_WTPR_DARRP_OPTIMIZATION_STOP 1054
43611 - LOG_ID_EVENT_WIRELESS_SYS_AC_UP 1055
43612 - LOG_ID_EVENT_WIRELESS_SYS_AC_CFG_LOADED 1056
43613 - LOG_ID_EVENT_WIRELESS_WTP_ERR 1056
43614 - LOG_ID_EVENT_WIRELESS_DHCP_STAVATION 1057
43615 - LOG_ID_EVENT_WIRELESS_SYS_AC_IPSEC_FAIL 1058
43616 - LOG_ID_EVENT_WIRELESS_WTPR_NOL_ADD 1059
43618 - LOG_ID_EVENT_WIRELESS_WTP_IMAGE_RC_SUCCESS 1060
43619 - LOG_ID_EVENT_WIRELESS_OFFENDINGAP_DETECT 1061
43620 - LOG_ID_EVENT_WIRELESS_OFFENDINGAP_ONAIR 1063
43621 - LOG_ID_EVENT_WIRELESS_WTP_DATA_CHAN_CHG 1064
43622 - LOG_ID_EVENT_WIRELESS_WTP_VLAN_PROBE 1065
43623 - LOG_ID_EVENT_WIRELESS_WTP_VLAN_MISSING 1066
43624 - LOG_ID_EVENT_WIRELESS_WTP_VLAN_DETECTED 1067
43625 - LOG_ID_EVENT_WIRELESS_STA_CAP_CMCC_SUCCESS 1068
43626 - LOG_ID_EVENT_WIRELESS_STA_CAP_CMCC_FAILURE 1069
43627 - LOG_ID_EVENT_WIRELESS_STA_CAP_CMCC_TIMEOUT 1071
43628 - LOG_ID_EVENT_WIRELESS_STA_CAP_CMCC_MAC_AUTH_
SUCCESS 1072
43629 - LOG_ID_EVENT_WIRELESS_STA_RADIUS_AUTH_FAILURE 1073
43630 - LOG_ID_EVENT_WIRELESS_STA_RADIUS_AUTH_SUCCESS 1074
43631 - LOG_ID_EVENT_WIRELESS_STA_RADIUS_AUTH_NO_RESP 1075
43632 - LOG_ID_EVENT_WIRELESS_STA_RADIUS_MAC_AUTH_FAILURE 1077
43633 - LOG_ID_EVENT_WIRELESS_STA_RADIUS_MAC_AUTH_SUCCESS 1078
43634 - LOG_ID_EVENT_WIRELESS_STA_RADIUS_MAC_AUTH_NO_RESP 1079
43635 - LOG_ID_EVENT_WIRELESS_STA_OKC_NO_MATCH 1080
43636 - LOG_ID_EVENT_WIRELESS_STA_OKC_LOCAL_MATCH 1081
43637 - LOG_ID_EVENT_WIRELESS_STA_OKC_INTER_AC_MATCH 1082
43638 - LOG_ID_EVENT_WIRELESS_STA_OKC_INTER_AP_MATCH 1083
43639 - LOG_ID_EVENT_WIRELESS_STA_FT_INVALID_ACTION_REQ 1085

FortiOS 7.2.1 Log Reference 22


Fortinet Inc.
43640 - LOG_ID_EVENT_WIRELESS_STA_FT_INVALID_AUTH_REQ 1086
43641 - LOG_ID_EVENT_WIRELESS_STA_FT_INVALID_REASSOC_REQ 1087
43642 - LOG_ID_EVENT_WIRELESS_STA_FT_ACTION_REQ 1088
43643 - LOG_ID_EVENT_WIRELESS_STA_FT_ACTION_RESP 1089
43644 - LOG_ID_EVENT_WIRELESS_STA_FT_AUTH_REQ 1090
43645 - LOG_ID_EVENT_WIRELESS_STA_FT_AUTH_RESP 1091
43646 - LOG_ID_EVENT_WIRELESS_STA_FT_REASSOC_REQ 1093
43647 - LOG_ID_EVENT_WIRELESS_STA_FT_REASSOC_RESP 1094
43648 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_INVALID_SECOND_
MSG 1095
43649 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_INVALID_FOURTH_
MSG 1096
43650 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_FIRST_MSG 1097
43651 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_SECOND_MSG 1098
43652 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_THIRD_MSG 1099
43653 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_FOURTH_MSG 1101
43654 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_FIRST_GROUP_MSG 1102
43655 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_SECOND_GROUP_
MSG 1103
43656 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_MAX_STA_CNT 1104
43657 - LOG_ID_EVENT_WIRELESS_STA_ASSOC_FAIL 1105
43658 - LOG_ID_EVENT_WIRELESS_STA_DHCP_NO_RESP 1106
43659 - LOG_ID_EVENT_WIRELESS_STA_DHCP_DIFF_OFFER 1107
43660 - LOG_ID_EVENT_WIRELESS_STA_DHCP_NO_ACK 1108
43661 - LOG_ID_EVENT_WIRELESS_STA_DHCP_NAK 1109
43662 - LOG_ID_EVENT_WIRELESS_STA_DHCP_DUP_IP 1110
43663 - LOG_ID_EVENT_WIRELESS_STA_DHCP_DISCOVER 1111
43664 - LOG_ID_EVENT_WIRELESS_STA_DHCP_OFFER 1112
43665 - LOG_ID_EVENT_WIRELESS_STA_DHCP_DECLINE 1113
43666 - LOG_ID_EVENT_WIRELESS_STA_DHCP_REQUEST 1114
43667 - LOG_ID_EVENT_WIRELESS_STA_DHCP_ACK 1115
43668 - LOG_ID_EVENT_WIRELESS_STA_DHCP_RELEASE 1116
43669 - LOG_ID_EVENT_WIRELESS_STA_DHCP_INFORM 1117
43670 - LOG_ID_EVENT_WIRELESS_STA_DHCP_SELF_ASSIGNED 1118
43671 - LOG_ID_EVENT_WIRELESS_STA_DNS_NO_RESP 1119
43672 - LOG_ID_EVENT_WIRELESS_STA_DNS_SERVER_FAILURE 1120
43673 - LOG_ID_EVENT_WIRELESS_STA_DNS_NO_DOMAIN 1121
43674 - LOG_ID_EVENT_WIRELESS_STA_WPA_KRACK_FT_REASSOC 1122
43675 - LOG_ID_EVENT_WIRELESS_STA_AUTH_REQ 1123
43676 - LOG_ID_EVENT_WIRELESS_STA_AUTH_RESP 1125
43677 - LOG_ID_EVENT_WIRELESS_STA_ASSOC_REQ 1126
43678 - LOG_ID_EVENT_WIRELESS_STA_REASSOC_REQ 1127
43679 - LOG_ID_EVENT_WIRELESS_STA_ASSOC_RESP 1128
43680 - LOG_ID_EVENT_WIRELESS_STA_REASSOC_RESP 1129
43681 - LOG_ID_EVENT_WIRELESS_STA_PROBE_REQ 1130
43682 - LOG_ID_EVENT_WIRELESS_STA_PROBE_RESP 1131
43683 - LOG_ID_EVENT_WIRELESS_BLE_DEV_LOCATE 1133
43684 - LOG_ID_EVENT_WIRELESS_ADDRGRP_DUPLICATE_MAC 1133
43685 - LOG_ID_EVENT_WIRELESS_ADDRGRP_ADDR_APPLY 1134

FortiOS 7.2.1 Log Reference 23


Fortinet Inc.
43686 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_INVALID_SCHEDULE 1135
43687 - LOG_ID_EVENT_WIRELESS_STA_WL_BRIDGE_TRAFFIC_STATS 1136
43688 - LOG_ID_EVENT_WIRELESS_APCFG_RECEIVE 1137
43689 - LOG_ID_EVENT_WIRELESS_APCFG_VALIDATING 1138
43690 - LOG_ID_EVENT_WIRELESS_APCFG_APPLY 1139
43691 - LOG_ID_EVENT_WIRELESS_APCFG_REJECT 1140
43692 - LOG_ID_EVENT_WIRELESS_WTPR_ANTENNA_DEFECT_DETECT 1140
43693 - LOG_ID_EVENT_WIRELESS_STA_WNM_ACTION_BSTM_REQ 1142
43694 - LOG_ID_EVENT_WIRELESS_STA_WNM_ACTION_BSTM_RESP_
ACCEPT 1143
43695 - LOG_ID_EVENT_WIRELESS_STA_WNM_ACTION_BSTM_RESP_
REJECT 1144
43696 - LOG_ID_EVENT_WIRELESS_WTPR_DRMA_START 1145
43697 - LOG_ID_EVENT_WIRELESS_WTPR_DRMA_STOP 1146
43698 - LOG_ID_EVENT_WIRELESS_WTPR_DRMA_MODE 1147
43699 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_SOLICIT 1148
43700 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_ADVERTISE 1149
43701 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_REQUEST 1150
43702 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_CONFIRM 1151
43703 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_RENEW 1152
43704 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_REPLY 1153
43705 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_RELEASE 1154
43706 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_RECONFIGURE 1155
43707 - LOG_ID_EVENT_WIRELESS_WTPR_SSID_UP 1156
43708 - LOG_ID_EVENT_WIRELESS_WTPR_SSID_DOWN 1158
43709 - LOG_ID_EVENT_WIRELESS_STA_DHCP_ENFORCEMENT 1159
43710 - LOG_ID_EVENT_WIRELESS_SAM_IPERF 1160
43711 - LOG_ID_EVENT_WIRELESS_SAM_PING 1161
43712 - LOG_ID_EVENT_WIRELESS_SAM_AUTH_FAILED 1162
43713 - LOG_ID_EVENT_WIRELESS_SAM_CWP_AUTH_FAILED 1163
43714 - LOG_ID_EVENT_WIRELESS_WTP_PARTIAL_PASSWD 1164
43715 - LOG_ID_EVENT_WIRELESS_WTPR_BSS_COLOR_COLLISION 1165
43716 - LOG_ID_EVENT_WIRELESS_ADDRGRP_MAX_FW_ADDR 1166
43717 - LOG_ID_EVENT_WIRELESS_STA_L3R_REHOME 1167
43719 - LOG_ID_EVENT_WIRELESS_STA_PROBE_LOW_RSSI 1168
43776 - LOG_ID_EVENT_NAC_QUARANTINE 1169
43777 - LOG_ID_EVENT_NAC_ANOMALY_QUARANTINE 1171
43800 - LOG_ID_EVENT_ELBC_BLADE_JOIN 1172
43801 - LOG_ID_EVENT_ELBC_BLADE_LEAVE 1173
43802 - LOG_ID_EVENT_ELBC_MASTER_BLADE_FOUND 1173
43803 - LOG_ID_EVENT_ELBC_MASTER_BLADE_LOST 1174
43804 - LOG_ID_EVENT_ELBC_MASTER_BLADE_CHANGE 1175
43805 - LOG_ID_EVENT_ELBC_ACTIVE_CHANNEL_FOUND 1176
43806 - LOG_ID_EVENT_ELBC_ACTIVE_CHANNEL_LOST 1177
43807 - LOG_ID_EVENT_ELBC_ACTIVE_CHANNEL_CHANGE 1178
43808 - LOG_ID_EVENT_ELBC_CHASSIS_ACTIVE 1178
43809 - LOG_ID_EVENT_ELBC_CHASSIS_INACTIVE 1179
44544 - LOGID_EVENT_CONFIG_PATH 1180
44545 - LOGID_EVENT_CONFIG_OBJ 1181

FortiOS 7.2.1 Log Reference 24


Fortinet Inc.
44546 - LOGID_EVENT_CONFIG_ATTR 1182
44547 - LOGID_EVENT_CONFIG_OBJATTR 1183
44548 - LOGID_EVENT_CONFIG_EXEC 1183
44549 - LOGID_EVENT_CONFIG_OBJATTR_MTNER 1184
44550 - LOGID_EVENT_CONFIG_OBJ_MTNER 1185
44551 - LOGID_EVENT_CONFIG_ATTR_MTNER 1186
44552 - LOGID_EVENT_CONFIG_PATH_MTNER 1187
44555 - LOGID_EVENT_CMDB_DEADLOCK_DETECTED 1188
45057 - LOG_ID_FCC_ADD 1188
45058 - LOG_ID_FCC_CLOSE 1189
45061 - LOG_ID_FCC_CLOSE_BY_TYPE 1190
45071 - LOG_ID_FCC_VULN_SCAN 1191
45114 - LOG_ID_EC_REG_QUARANTINE 1192
45115 - LOG_ID_EC_REG_UNQUARANTINE 1193
45121 - LOG_ID_EC_EMS_WS_NOTIFICATION 1194
45122 - LOG_ID_EC_EMS_REST_API_ERROR 1195
45123 - LOG_ID_EC_EMS_WS_CONN_ERROR 1196
45124 - LOG_ID_EC_VPND_CONNECT 1196
45125 - LOG_ID_EC_VPND_DISCONNECT 1197
45126 - LOG_ID_EC_CLOUD_ENTITLEMENT_LOST 1198
45128 - LOG_ID_EC_EMS_REST_API_NEW_SUCCESS 1199
45129 - LOG_ID_EC_EMS_EMS_VERIFY 1200
45130 - LOG_ID_EC_EMS_EMS_VERIFY_FAILED 1200
45131 - LOG_ID_EC_EMS_EMS_UNVERIFY 1201
46000 - LOG_ID_VIP_REAL_SVR_ENA 1202
46001 - LOG_ID_VIP_REAL_SVR_DISA 1203
46002 - LOG_ID_VIP_REAL_SVR_UP 1203
46003 - LOG_ID_VIP_REAL_SVR_DOWN 1204
46004 - LOG_ID_VIP_REAL_SVR_ENT_HOLDDOWN 1205
46005 - LOG_ID_VIP_REAL_SVR_FAIL_HOLDDOWN 1206
46006 - LOG_ID_VIP_REAL_SVR_FAIL 1207
46400 - LOG_ID_EVENT_EXT_SYS 1208
46401 - LOG_ID_EVENT_EXT_LOCAL 1208
46402 - LOG_ID_EVENT_EXT_LOCAL_ERROR 1209
46403 - LOG_ID_EVENT_EXT_REMOTE_EMERG 1210
46404 - LOG_ID_EVENT_EXT_REMOTE_ALERT 1211
46405 - LOG_ID_EVENT_EXT_REMOTE_CRITICAL 1212
46406 - LOG_ID_EVENT_EXT_REMOTE_ERROR 1212
46407 - LOG_ID_EVENT_EXT_REMOTE_WARNING 1213
46408 - LOG_ID_EVENT_EXT_REMOTE_NOTIF 1214
46409 - LOG_ID_EVENT_EXT_REMOTE_INFO 1215
46410 - LOG_ID_EVENT_EXT_REMOTE_DEBUG 1215
46501 - LOG_ID_INTERNAL_LTE_MODEM_DETECTION 1216
46502 - LOG_ID_INTERNAL_LTE_MODEM_GPSD 1217
46503 - LOG_ID_INTERNAL_LTE_MODEM_GPS_LOC_ACQUISITION 1217
46504 - LOG_ID_INTERNAL_LTE_MODEM_BILLD 1218
46505 - LOG_ID_INTERNAL_LTE_MODEM_BILLING_PURGED 1219
46506 - LOG_ID_INTERNAL_LTE_MODEM_BILLING_DAILY_LOG 1219
46507 - LOG_ID_INTERNAL_LTE_MODEM_FW_UPGRADE 1220

FortiOS 7.2.1 Log Reference 25


Fortinet Inc.
46508 - LOG_ID_INTERNAL_LTE_MODEM_QDL_DETECTION 1221
46509 - LOG_ID_INTERNAL_LTE_MODEM_REBOOT 1221
46510 - LOG_ID_INTERNAL_LTE_MODEM_OP_MODE 1222
46511 - LOG_ID_INTERNAL_LTE_MODEM_POWER_ON_OFF 1223
46512 - LOG_ID_INTERNAL_LTE_MODEM_SIM_STATE 1224
46513 - LOG_ID_INTERNAL_LTE_MODEM_LINK_CONNECTION 1224
46514 - LOG_ID_INTERNAL_LTE_MODEM_MANUAL_HANDOVER 1225
46515 - LOG_ID_INTERNAL_LTE_MODEM_IP_ADDR 1226
46516 - LOG_ID_INTERNAL_LTE_MODEM_BEARER_TECH_CHANGE 1226
46517 - LOG_ID_INTERNAL_LTE_MODEM_WRONG_PIN 1227
46600 - LOG_ID_EVENT_AUTOMATION_TRIGGERED 1228
46900 - LOG_ID_POE_STATUS_REPORT 1228
47000 - LOG_ID_MALWARE_LIST_TRUNCATED_ENTER 1229
47001 - LOG_ID_MALWARE_LIST_TRUNCATED_EXIT 1230
47002 - LOG_ID_FILE_HASH_EMS_LIST_TRUNCATED_ENTER 1230
47003 - LOG_ID_FILE_HASH_EMS_LIST_TRUNCATED_EXIT 1231
47004 - LOG_ID_FILE_HASH_EMS_LIST_LOAD 1232
47203 - LOG_ID_ENTER_BYPASS 1232
47204 - LOG_ID_EXIT_BYPASS 1233
47301 - LOG_ID_EVENT_REST_API_OK 1234
47302 - LOG_ID_EVENT_REST_API_ERR 1235
48040 - LOG_ID_WAD_WANOPT_TUNNEL_CREATE 1236
48041 - LOG_ID_WAD_WANOPT_TUNNEL_CLOSED 1236
48101 - LOG_ID_WAD_AUTH_FAIL_PSK 1237
48102 - LOG_ID_WAD_AUTH_FAIL_OTH 1238
48301 - LOG_ID_UNEXP_APP_TYPE 1239
49002 - LOG_ID_VNP_DPDK_PRIMARY_RESTART 1240
49004 - LOGID_EVENT_HYPERV_SRIOV_SHOW_UP 1241
49005 - LOGID_EVENT_HYPERV_SRIOV_DISAPPEAR 1242
51000 - LOG_ID_NB_TBL_CHG 1242
52000 - LOG_ID_EVENT_SECURITY_AUDIT_FABRIC_SUMMARY 1243
52001 - LOG_ID_EVENT_SECURITY_AUDIT_FABRIC_CHANGE 1244
53000 - LOG_ID_SDNC_CONNECTED 1245
53001 - LOG_ID_SDNC_DISCONNECTED 1246
53002 - LOG_ID_SDNC_SUBSCRIBE 1247
53003 - LOG_ID_SDNC_UNSUBSCRIBE 1247
53100 - LOG_ID_VPN_OCVPN_REGISTERED 1248
53101 - LOG_ID_VPN_OCVPN_UNREGISTERED 1249
53102 - LOG_ID_VPN_OCVPN_COMM_ESTABLISHED 1249
53103 - LOG_ID_VPN_OCVPN_COMM_ERROR 1250
53104 - LOG_ID_VPN_OCVPN_DNS_ERROR 1251
53105 - LOG_ID_VPN_OCVPN_ROUTE_ERROR 1251
53200 - LOG_ID_CONNECTOR_OBJECT_ADD 1252
53201 - LOG_ID_CONNECTOR_OBJECT_REMOVE 1253
53202 - LOG_ID_CONNECTOR_API_FAILED 1254
53203 - LOG_ID_CONNECTOR_OBJECT_UPDATE 1255
53204 - LOG_ID_CONNECTOR_OBJECT_CANT_ADD 1256
53205 - LOG_ID_CONNECTOR_OBJECT_CANT_REMOVE 1256
53300 - LOG_ID_VNE_PRO_UPDATE_COMPLETED 1257

FortiOS 7.2.1 Log Reference 26


Fortinet Inc.
53301 - LOG_ID_VNE_PRO_UPDATE_FAILED 1258
53311 - LOG_ID_NPU_PER_MAPPING_ALLOCATION 1259
53312 - LOG_ID_NPD_INFO 1259
53313 - LOG_ID_NPD_WARNING 1260
53314 - LOG_ID_NPD_ERROR 1261
53315 - LOG_ID_LPM_ERROR 1261
53316 - LOG_ID_LPM_INFO 1262
53400 - LOG_ID_FMG_TUNNEL_UP 1263
53401 - LOG_ID_FMG_TUNNEL_DOWN 1263
63002 - LOG_ID_CIFS_CONN_FAIL 1264
63003 - LOG_ID_CIFS_AUTH_FAIL 1265
63004 - LOG_ID_CIFS_AUTH_INTERNAL_ERROR 1267
63005 - LOG_ID_CIFS_AUTH_KRB_ERROR 1268
FILE-FILTER 1270
64000 - LOG_ID_FILE_FILTER_BLOCK 1270
64001 - LOG_ID_FILE_FILTER_LOG 1272
FORTI-SWITCH 1276
56001 - LOG_ID_FSW_FLOW 1276
GTP 1277
41216 - LOGID_GTP_FORWARD 1277
41217 - LOGID_GTP_DENY 1278
41218 - LOGID_GTP_RATE_LIMIT 1280
41219 - LOGID_GTP_STATE_INVALID 1282
41220 - LOGID_GTP_TUNNEL_LIMIT 1284
41221 - LOGID_GTP_TRAFFIC_COUNT 1286
41222 - LOGID_GTP_USER_DATA 1288
41223 - LOGID_GTPV2_FORWARD 1289
41224 - LOGID_GTPV2_DENY 1291
41225 - LOGID_GTPV2_RATE_LIMIT 1292
41226 - LOGID_GTPV2_STATE_INVALID 1294
41227 - LOGID_GTPV2_TUNNEL_LIMIT 1296
41228 - LOGID_GTPV2_TRAFFIC_COUNT 1297
41229 - LOGID_GTPU_FORWARD 1299
41230 - LOGID_GTPU_DENY 1300
41231 - LOGID_PFCP_FORWARD 1301
41232 - LOGID_PFCP_DENY 1303
41233 - LOGID_PFCP_TRAFFIC_COUNT 1304
ICAP 1306
60000 - LOG_ID_ICAP_SERVER_ERROR 1306
60001 - LOG_ID_ICAP_INFECTION_BLOCK 1307
60002 - LOG_ID_ICAP_SERVER_CLOSE_CONN 1309
IPS 1311
16384 - LOGID_ATTCK_SIGNATURE_TCP_UDP 1311
16385 - LOGID_ATTCK_SIGNATURE_ICMP 1313
16386 - LOGID_ATTCK_SIGNATURE_OTHERS 1316
16399 - LOGID_ATTACK_MALICIOUS_URL 1318
16400 - LOGID_ATTACK_BOTNET_WARNING 1320
16401 - LOGID_ATTACK_BOTNET_NOTIF 1323

FortiOS 7.2.1 Log Reference 27


Fortinet Inc.
SSH 1326
61000 - LOG_ID_SSH_COMMAND_BLOCK 1326
61001 - LOG_ID_SSH_COMMAND_BLOCK_ALERT 1327
61002 - LOG_ID_SSH_COMMAND_PASS 1329
61003 - LOG_ID_SSH_COMMAND_PASS_ALERT 1331
61010 - LOG_ID_SSH_CHANNEL_BLOCK 1332
61011 - LOG_ID_SSH_CHANNEL_PASS 1334
61012 - LOG_ID_SSH_HOST_KEY_WARNING 1336
61013 - LOG_ID_SSH_HOST_KEY_NOTIF 1338
SSL 1340
62004 - LOG_ID_SSL_EXEMPT_ADDR 1340
62006 - LOG_ID_SSL_EXEMPT_ALLOWLIST 1342
62007 - LOG_ID_SSL_EXEMPT_FTGD_CATEGORY 1343
62008 - LOG_ID_SSL_EXEMPT_LOCAL_CATEGORY 1345
62009 - LOG_ID_SSL_EXEMPT_USER_CATEGORY 1347
62100 - LOG_ID_SSL_NEGOTIATION_INSPECT 1349
62101 - LOG_ID_SSL_NEGOTIATION_BLOCK 1351
62102 - LOG_ID_SSL_NEGOTIATION_BYPASS 1354
62103 - LOG_ID_SSL_NEGOTIATION_INFO 1356
62200 - LOG_ID_SSL_SERVER_CERT_INFO 1358
62220 - LOG_ID_SSL_HANDSHAKE_INFO 1360
62300 - LOG_ID_SSL_ANOMALY_CERT_BLOCKLISTED 1362
62301 - LOG_ID_SSL_ANOMALY_CERT_RESIGN_TRUSTED 1364
62302 - LOG_ID_SSL_ANOMALY_CERT_RESIGN_UNTRUSTED 1366
62303 - LOG_ID_SSL_ANOMALY_CERT_BLOCKED 1368
62304 - LOG_ID_SSL_ANOMALY_CERT_SNI_MISMATCHED 1370
62305 - LOG_ID_SSL_ANOMALY_CERT_PROBE_FAILURE_BLOCK 1372
62306 - LOG_ID_SSL_ANOMALY_CERT_PROBE_FAILURE_PASS 1374
62307 - LOG_ID_SSL_ANOMALY_CERT_SNI_MISMATCHED_INFO 1376
Traffic 1379
2 - LOG_ID_TRAFFIC_ALLOW 1379
3 - LOG_ID_TRAFFIC_DENY 1384
4 - LOG_ID_TRAFFIC_OTHER_START 1389
5 - LOG_ID_TRAFFIC_OTHER_ICMP_ALLOW 1394
6 - LOG_ID_TRAFFIC_OTHER_ICMP_DENY 1399
7 - LOG_ID_TRAFFIC_OTHER_INVALID 1404
8 - LOG_ID_TRAFFIC_WANOPT 1409
9 - LOG_ID_TRAFFIC_WEBCACHE 1415
10 - LOG_ID_TRAFFIC_EXPLICIT_PROXY 1420
11 - LOG_ID_TRAFFIC_FAIL_CONN 1426
12 - LOG_ID_TRAFFIC_MULTICAST 1431
13 - LOG_ID_TRAFFIC_END_FORWARD 1436
14 - LOG_ID_TRAFFIC_END_LOCAL 1442
15 - LOG_ID_TRAFFIC_START_FORWARD 1447
16 - LOG_ID_TRAFFIC_START_LOCAL 1452
17 - LOG_ID_TRAFFIC_SNIFFER 1457
19 - LOG_ID_TRAFFIC_BROADCAST 1462
20 - LOG_ID_TRAFFIC_STAT 1467
21 - LOG_ID_TRAFFIC_SNIFFER_STAT 1472

FortiOS 7.2.1 Log Reference 28


Fortinet Inc.
22 - LOG_ID_TRAFFIC_UTM_CORRELATION 1477
24 - LOG_ID_TRAFFIC_ZTNA 1483
25 - LOG_ID_TRAFFIC_SFLOW 1488
VoIP 1490
44032 - LOGID_EVENT_VOIP_SIP 1490
44033 - LOGID_EVENT_VOIP_SIP_BLOCK 1491
44034 - LOGID_EVENT_VOIP_SIP_FUZZING 1492
44035 - LOGID_EVENT_VOIP_SCCP_REGISTER 1494
44036 - LOGID_EVENT_VOIP_SCCP_UNREGISTER 1495
44037 - LOGID_EVENT_VOIP_SCCP_CALL_BLOCK 1496
44038 - LOGID_EVENT_VOIP_SCCP_CALL_INFO 1498
WAF 1500
30248 - LOGID_WAF_SIGNATURE_BLOCK 1500
30249 - LOGID_WAF_SIGNATURE_PASS 1502
30250 - LOGID_WAF_SIGNATURE_ERASE 1504
30251 - LOGID_WAF_CUSTOM_SIGNATURE_BLOCK 1506
30252 - LOGID_WAF_CUSTOM_SIGNATURE_PASS 1508
30253 - LOGID_WAF_METHOD_BLOCK 1510
30255 - LOGID_WAF_ADDRESS_LIST_BLOCK 1512
30257 - LOGID_WAF_CONSTRAINTS_BLOCK 1514
30258 - LOGID_WAF_CONSTRAINTS_PASS 1516
30259 - LOGID_WAF_URL_ACCESS_PERMIT 1518
30260 - LOGID_WAF_URL_ACCESS_BYPASS 1520
30261 - LOGID_WAF_URL_ACCESS_BLOCK 1522
Web 1525
12288 - LOG_ID_WEB_CONTENT_BANWORD 1525
12290 - LOG_ID_WEB_CONTENT_EXEMPTWORD 1527
12292 - LOG_ID_WEB_CONTENT_KEYWORD 1530
12293 - LOG_ID_WEB_CONTENT_SEARCH 1532
12544 - LOG_ID_URL_FILTER_BLOCK 1534
12545 - LOG_ID_URL_FILTER_EXEMPT 1537
12546 - LOG_ID_URL_FILTER_ALLOW 1539
12547 - LOG_ID_URL_FILTER_INVALID_HOSTNAME_HTTP_BLK 1542
12548 - LOG_ID_URL_FILTER_INVALID_HOSTNAME_HTTPS_BLK 1544
12549 - LOG_ID_URL_FILTER_INVALID_HOSTNAME_HTTP_PASS 1546
12550 - LOG_ID_URL_FILTER_INVALID_HOSTNAME_HTTPS_PASS 1548
12551 - LOG_ID_URL_FILTER_INVALID_HOSTNAME_SNI_BLK 1551
12552 - LOG_ID_URL_FILTER_INVALID_HOSTNAME_SNI_PASS 1553
12553 - LOG_ID_URL_FILTER_INVALID_CERT 1555
12554 - LOG_ID_URL_FILTER_INVALID_SESSION 1557
12555 - LOG_ID_URL_FILTER_SRV_CERT_ERR_BLK 1560
12556 - LOG_ID_URL_FILTER_SRV_CERT_ERR_PASS 1562
12557 - LOG_ID_URL_FILTER_FAMS_NOT_ACTIVE 1564
12558 - LOG_ID_URL_FILTER_RATING_ERR 1565
12559 - LOG_ID_URL_FILTER_PASS 1566
12560 - LOG_ID_URL_WISP_BLOCK 1568
12561 - LOG_ID_URL_WISP_REDIR 1571
12562 - LOG_ID_URL_WISP_ALLOW 1573
12688 - LOG_ID_WEB_SSL_EXEMPT 1575

FortiOS 7.2.1 Log Reference 29


Fortinet Inc.
12800 - LOG_ID_WEB_FTGD_ERR 1578
12801 - LOG_ID_WEB_FTGD_WARNING 1580
12802 - LOG_ID_WEB_FTGD_QUOTA 1582
13056 - LOG_ID_WEB_FTGD_CAT_BLK 1583
13057 - LOG_ID_WEB_FTGD_CAT_WARN 1586
13312 - LOG_ID_WEB_FTGD_CAT_ALLOW 1588
13315 - LOG_ID_WEB_FTGD_QUOTA_COUNTING 1591
13317 - LOG_ID_WEB_URL 1593
13568 - LOG_ID_WEB_SCRIPTFILTER_ACTIVEX 1596
13573 - LOG_ID_WEB_SCRIPTFILTER_COOKIE 1598
13584 - LOG_ID_WEB_SCRIPTFILTER_APPLET 1601
13600 - LOG_ID_WEB_SCRIPTFILTER_OTHER 1603
13601 - LOG_ID_WEB_WF_COOKIE 1605
13602 - LOG_ID_WEB_WF_REFERER 1607
13603 - LOG_ID_WEB_WF_COMMAND_BLOCK 1610
13616 - LOG_ID_CONTENT_TYPE_BLOCK 1612
13632 - LOGID_HTTP_HDR_CHG_REQ 1614
13633 - LOGID_HTTP_HDR_CHG_RESP 1616
13648 - LOG_ID_WEB_WF_ANTIPHISH_MATCH_URL_ALLOW 1618
13649 - LOG_ID_WEB_WF_ANTIPHISH_MATCH_FTGD_ALLOW 1620
13650 - LOG_ID_WEB_WF_ANTIPHISH_MATCH_DEFAULT_ALLOW 1623
13651 - LOG_ID_WEB_WF_ANTIPHISH_MATCH_URL_BLOCK 1625
13652 - LOG_ID_WEB_WF_ANTIPHISH_MATCH_FTGD_BLOCK 1628
13653 - LOG_ID_WEB_WF_ANTIPHISH_MATCH_DEFAULT_BLOCK 1630
13664 - LOG_ID_VIDEOFILTER_CATEGORY_BLOCK 1632
13665 - LOG_ID_VIDEOFILTER_CATEGORY_MONITOR 1634
13666 - LOG_ID_VIDEOFILTER_CATEGORY_ALLOW 1636
13680 - LOG_ID_VIDEOFILTER_CHANNEL_BLOCK 1637
13681 - LOG_ID_VIDEOFILTER_CHANNEL_MONITOR 1639
13682 - LOG_ID_VIDEOFILTER_CHANNEL_ALLOW 1640

FortiOS 7.2.1 Log Reference 30


Fortinet Inc.
Change Log

Date Change Description

2022-08-04 Initial release.

FortiOS 7.2.1 Log Reference 31


Fortinet Inc.
Introduction

This document provides information about all the log messages applicable to the FortiGate devices running FortiOS
version 7.2.1 or higher. The logs are intended for administrators to use as reference for more information about a specific
log entry and message generated by FortiOS.
This document also provides information about log fields when FortiOS sends log messages to remote syslog servers in
Common Event Format (CEF). See CEF support on page 57. It also describes how to enable extended logging. See
UTM extended logging on page 68.

Performance statistics are not logged to disk. Performance statistics can be received by a
syslog server or by FortiAnalyzer.

Before you begin

Before you begin using this reference, read the following notes:
l Information in this document applies to all FortiGate units that are currently running FortiOS 7.2.1 or higher.
l Ensure that you have enabled logging for the FortiOS unit.
l Each log message is displayed in the Log & Report pane of the GUI. You can also download the RAW format from
the Log & Report pane.
l Each log message is documented similar to how it appears in the RAW format.

This reference contains detailed information for each log type and subtype; however, this
reference contains only information gathered at publication and, as a result, not every log
message field contains detailed information.

FortiOS 7.2.1 Log Reference 32


Fortinet Inc.
Introduction

What's new

This section identifies major changes in the Log Reference from version 7.2.0 and later. For more information about new
features, please see the FortiOS 7.2 New Features Guide.

FortiOS 7.2.1

Log type and subtype changes

l The FortiSwitch log type is added.

Log field values

The following log field values are changed:


AV logs:

Field Change

epoch Field Added

eventid Field Added

fndrverdict Field Added

Event logs:

Field Change

alert Field Removed

expectedsignature Field Removed

handshake Field Removed

protocol Field Added

received Field Removed

receivedsignature Field Removed

remotetunnelid Field Added

ssllocal Field Removed

sslremote Field Removed

wanin Field Added

wanout Field Added

FortiSwitch logs:

FortiOS 7.2.1 Log Reference 33


Fortinet Inc.
Introduction

Field Change

date Field Added

devid Field Added

dstip Field Added

duration Field Added

eventtime Field Added

ftlkintf Field Added

level Field Added

logid Field Added

proto Field Added

rcvdbyte Field Added

rcvdpkt Field Added

srcip Field Added

subtype Field Added

switchid Field Added

time Field Added

type Field Added

tz Field Added

vd Field Added

GTP logs:

Field Change

clashtunnelidx Field Added

Traffic logs:

Field Change

saasname Field Added

shapingpolicyname Field Added

srcmacvendor Field Added

Web logs:

Field Change

videocategoryname Field Added

FortiOS 7.2.1 Log Reference 34


Fortinet Inc.
Introduction

Log ID changes

Event logs:

Log ID Message Change

20047 LOG_ID_RAD_FAIL_IPV6_SOCKET Log ID Removed

20048 LOG_ID_RAD_FAIL_OPT_IPV6_PKTINFO Log ID Removed

20049 LOG_ID_RAD_FAIL_OPT_IPV6_CHECKSUM Log ID Removed

20050 LOG_ID_RAD_FAIL_OPT_IPV6_UNICAST_HOPS Log ID Removed

20051 LOG_ID_RAD_FAIL_OPT_IPV6_MULTICAST_HOPS Log ID Removed

20052 LOG_ID_RAD_FAIL_OPT_IPV6_HOPLIMIT Log ID Removed

20053 LOG_ID_RAD_FAIL_OPT_IPPROTO_ICMPV6 Log ID Removed

20054 LOG_ID_RAD_EXIT_BY_SIGNAL Log ID Removed

20055 LOG_ID_RAD_FAIL_CMDB_QUERY Log ID Removed

20056 LOG_ID_RAD_FAIL_CMDB_FOR_EACH Log ID Removed

20057 LOG_ID_RAD_FAIL_FIND_VIRT_INTF Log ID Removed

20058 LOG_ID_RAD_UNLOAD_INTF Log ID Removed

20133 LOG_ID_FIREWALL_POLICY_EXPIRE Log ID Added

20134 LOG_ID_FIREWALL_POLICY_EXPIRED Log ID Added

20135 LOG_ID_FAIS_LIC_EXPIRE Log ID Added

22062 LOG_ID_IPAMSD_FLAG_CONFLICT Log ID Added

22063 LOG_ID_IPAMSD_UNFLAG_CONFLICT Log ID Added

22116 LOG_ID_POWER_REDUNDANCY_DEGRADE Log ID Added

22117 LOG_ID_POWER_REDUNDANCY_FAILURE Log ID Added

22207 LOG_ID_CERT_EXPIRE_WARNING Log ID Added

22914 LOG_ID_FDS_SRV_CHG Log ID Removed

32263 LOG_ID_AUTO_IMG_UPD_SCHEDULED Log ID Added

32554 LOG_ID_UPD_ADMIN_DB Log ID Added

34428 LOG_ID_NP7_HPE_PACKET_DROP Log ID Added

34430 LOG_ID_NP7_HPE_PACKET_FLOOD Log ID Added

37912 MESGID_FGSP_MEMBER_JOIN Log ID Added

37913 MESGID_FGSP_MEMBER_LEAVE Log ID Added

43719 LOG_ID_EVENT_WIRELESS_STA_PROBE_LOW_RSSI Log ID Added

FortiOS 7.2.1 Log Reference 35


Fortinet Inc.
Introduction

Log ID Message Change

45128 LOG_ID_EC_EMS_REST_API_NEW_SUCCESS Log ID Added

45129 LOG_ID_EC_EMS_EMS_VERIFY Log ID Added

45130 LOG_ID_EC_EMS_EMS_VERIFY_FAILED Log ID Added

45131 LOG_ID_EC_EMS_EMS_UNVERIFY Log ID Added

46517 LOG_ID_INTERNAL_LTE_MODEM_WRONG_PIN Log ID Added

48000 LOG_ID_WAD_SSL_RCV_HS Log ID Removed

48001 LOG_ID_WAD_SSL_RCV_WRG_HS Log ID Removed

48002 LOG_ID_WAD_SSL_SENT_HS Log ID Removed

48003 LOG_ID_WAD_SSL_WRG_HS_LEN Log ID Removed

48004 LOG_ID_WAD_SSL_RCV_CCS Log ID Removed

48005 LOG_ID_WAD_SSL_RSA_DH_FAIL Log ID Removed

48006 LOG_ID_WAD_SSL_SENT_CCS Log ID Removed

48007 LOG_ID_WAD_SSL_BAD_HASH Log ID Removed

48009 LOG_ID_WAD_SSL_DECRY_FAIL Log ID Removed

48011 LOG_ID_WAD_SSL_LESS_MINOR Log ID Removed

48013 LOG_ID_WAD_SSL_NOT_SUPPORT_CS Log ID Removed

48016 LOG_ID_WAD_SSL_HS_FIN Log ID Removed

48017 LOG_ID_WAD_SSL_HS_TOO_LONG Log ID Removed

48018 LOG_ID_WAD_SSL_MORE_MINOR Log ID Removed

48019 LOG_ID_WAD_SSL_SENT_ALERT Log ID Removed

48023 LOG_ID_WAD_SSL_RCV_ALERT Log ID Removed

48027 LOG_ID_WAD_SSL_INVALID_CONT_TYPE Log ID Removed

48029 LOG_ID_WAD_SSL_BAD_CCS_LEN Log ID Removed

48031 LOG_ID_WAD_SSL_BAD_DH Log ID Removed

48032 LOG_ID_WAD_SSL_PUB_KEY_TOO_BIG Log ID Removed

48034 LOG_ID_WAD_SSL_SERVER_KEY_HASH_ALGORITHM_MISMATCH Log ID Removed

48035 LOG_ID_WAD_SSL_SERVER_KEY_SIGNATURE_ALGORITHM_ Log ID Removed


MISMATCH

48038 LOG_ID_WAD_SSL_RCV_FATAL_ALERT Log ID Removed

48039 LOG_ID_WAD_SSL_SENT_FATAL_ALERT Log ID Removed

48040 LOG_ID_WAD_WANOPT_TUNNEL_CREATE Log ID Added

FortiOS 7.2.1 Log Reference 36


Fortinet Inc.
Introduction

Log ID Message Change

48041 LOG_ID_WAD_WANOPT_TUNNEL_CLOSED Log ID Added

53311 LOG_ID_NPU_PER_MAPPING_ALLOCATION Log ID Added

53315 LOG_ID_LPM_ERROR Log ID Added

53316 LOG_ID_LPM_INFO Log ID Added

FortiSwitch logs:

Log ID Message Change

56001 LOG_ID_FSW_FLOW Log ID Added

SSL logs:

Log ID Message Change

62307 LOG_ID_SSL_ANOMALY_CERT_SNI_MISMATCHED_INFO Log ID Added

FortiOS 7.2.0

Log field values

The following log field values are changed:


App logs:

Field Change

agent Field Added

clouddevice Field Added

httpmethod Field Added

referralurl Field Added

AV logs:

Field Change

faiaction Field Removed

faiconfidence Field Removed

faifileid Field Removed

faifiletype Field Removed

faiseverity Field Removed

FortiOS 7.2.1 Log Reference 37


Fortinet Inc.
Introduction

Field Change

fndraction Field Added

fndrconfidence Field Added

fndrfileid Field Added

fndrfiletype Field Added

fndrseverity Field Added

fsaaction Field Added

fsafileid Field Added

fsafiletype Field Added

fsaseverity Field Added

httpmethod Field Added

referralurl Field Added

DLP logs:

Field Change

httpmethod Field Added

referralurl Field Added

Email logs:

Field Change

poluuid Field Added

Event logs:

Field Change

advpnsc Field Added

failuredev Field Added

localdevcount Field Added

moscodec Field Added

mosvalue Field Added

sensor Field Removed

upgradedevice Field Added

FILE-FILTER logs:

FortiOS 7.2.1 Log Reference 38


Fortinet Inc.
Introduction

Field Change

httpmethod Field Added

referralurl Field Added

GTP logs:

Field Change

timeoutdelete Field Added

IPS logs:

Field Change

agent Field Added

httpmethod Field Added

referralurl Field Added

WAF logs:

Field Change

httpmethod Field Added

method Field Removed

poluuid Field Added

ratemethod Field Added

referralurl Field Added

Web logs:

Field Change

httpmethod Field Added

method Field Removed

ratemethod Field Added

Log ID changes

The following log IDs are changed:


AV logs:

Log ID Message Change

8224 MESGID_ICB_FAI_TIMEOUT_WARNING Log ID Added

FortiOS 7.2.1 Log Reference 39


Fortinet Inc.
Introduction

Log ID Message Change

8225 MESGID_ICB_FAI_TIMEOUT_NOTIF Log ID Added

8226 MESGID_MIME_ICB_FAI_TIMEOUT_WARNING Log ID Added

8227 MESGID_MIME_ICB_FAI_TIMEOUT_NOTIF Log ID Added

8228 MESGID_ICB_FAI_ERROR_WARNING Log ID Added

8229 MESGID_ICB_FAI_ERROR_NOTIF Log ID Added

8230 MESGID_MIME_ICB_FAI_ERROR_WARNING Log ID Added

8231 MESGID_MIME_ICB_FAI_ERROR_NOTIF Log ID Added

8232 MESGID_ICB_FSA_WARNING Log ID Added

8233 MESGID_ICB_FSA_NOTIF Log ID Added

8234 MESGID_MIME_ICB_FSA_WARNING Log ID Added

8235 MESGID_MIME_ICB_FSA_NOTIF Log ID Added

8236 MESGID_ICB_FSA_TIMEOUT_WARNING Log ID Added

8237 MESGID_ICB_FSA_TIMEOUT_NOTIF Log ID Added

8238 MESGID_MIME_ICB_FSA_TIMEOUT_WARNING Log ID Added

8239 MESGID_MIME_ICB_FSA_TIMEOUT_NOTIF Log ID Added

8240 MESGID_ICB_FSA_ERROR_WARNING Log ID Added

8241 MESGID_ICB_FSA_ERROR_NOTIF Log ID Added

8242 MESGID_MIME_ICB_FSA_ERROR_WARNING Log ID Added

8243 MESGID_MIME_ICB_FSA_ERROR_NOTIF Log ID Added

8983 MESGID_FORTIAI_FAILURE_WARNING Log ID Removed

8984 MESGID_FORTIAI_FAILURE_NOTIF Log ID Removed

8985 MESGID_FORTIAI_TIMEOUT_WARNING Log ID Removed

8986 MESGID_FORTIAI_TIMEOUT_NOTIF Log ID Removed

Event logs:

Log ID Message Change

20214 LOG_ID_LOCAL_OUT_IOC Log ID Added

22080 LOG_ID_PROVISION_LATEST_SUCCEEDED Log ID Added

22081 LOG_ID_PROVISION_LATEST_FAILED Log ID Added

22093 LOG_ID_FEDERATED_UPGRADE_STEP_COMPLETE Log ID Added

22897 LOG_ID_FORTILINKD_SPLIT_PORT_INFO Log ID Added

FortiOS 7.2.1 Log Reference 40


Fortinet Inc.
Introduction

Log ID Message Change

32180 LOG_ID_GEOIP_DB_INIT_FAIL Log ID Added

32199 LOG_ID_RESTORE_IMG_USB Log ID Removed

32262 LOG_ID_RESTORE_IMG_CONFIRM Log ID Added

32567 LOG_ID_RESTORE_CONF_BY_USB Log ID Removed

41007 LOG_ID_UPD_MANUAL_LICENSE_SUCC Log ID Added

41008 LOG_ID_UPD_MANUAL_LICENSE_FAIL Log ID Added

41009 LOG_ID_UPD_DB_SIGN_INVALID Log ID Added

41010 LOG_ID_UPD_DB_SIGN_PASSED Log ID Added

43716 LOG_ID_EVENT_WIRELESS_ADDRGRP_MAX_FW_ADDR Log ID Added

43717 LOG_ID_EVENT_WIRELESS_STA_L3R_REHOME Log ID Added

45126 LOG_ID_EC_CLOUD_ENTITLEMENT_LOST Log ID Added

FortiOS 7.2.1 Log Reference 41


Fortinet Inc.
Log types and subtypes

This section describes the log types, subtypes, and priority levels. It also describes the log field format.

Type

Each log entry contains a Type (type) or category field that indicates its log type and which log file stores the log entry.

Subtype

Each log entry contains a Sub Type (subtype) or subcategory field within a log type, based on the feature associated with
the cause of the log entry.
For example:
l In event logs, some of the subtypes are compliance check, system, and user.
l In traffic logs, the subtypes are forward, local, multicast, and sniffer.

List of log types and subtypes

FortiGate devices can record the following types and subtypes of log entry information:

Type Description Subtype

Traffic Records traffic flow information, such as an l FORWARD


HTTP/HTTPS request and its response, if l LOCAL
any. l MULTICAST
l SNIFFER
l ZTNA

Event Records system and administrative events, l CIFS-AUTH-FAILS


such as downloading a backup copy of the l CONNECTOR
configuration, or daemon activities. l ENDPOINT
l FORTIEXTENDER
l HA
l REST-API
l ROUTER
l SDWAN

FortiOS 7.2.1 Log Reference 42


Fortinet Inc.
Log types and subtypes

Type Description Subtype


l SECURITY-RATING
l SWITCH-CONTROLLER
l SYSTEM
l USER
l VPN
l WAD
l WIRELESS

UTM Records UTM events. See list of UTM log subtypes below

UTM log subtypes

UTM Log Description Event Type


Subtypes

Anomaly Records intrusion attempts. l ANOMALY

App Records intrusion attempts. Application l PORT-VIOLATION


control log is output when a signature l PROTOCOL-VIOLATION
matches an application pattern. l SIGNATURE

AV Records virus attacks. l ANALYTICS


l COMMAND-BLOCKED
l CONTENT-DISARM
l EMS-THREAT-FEED
l FILENAME
l FILETYPE-EXECUTABLE
l FORTINDR
l FORTISANDBOX
l INFECTED
l MALWARE-LIST
l MIMEFRAGMENTED
l OUTBREAK-PREVENTION
l OVERSIZE
l SCANERROR
l SWITCHPROTO

DLP Records data leak prevention events. l DLP


l DLP-DOCSOURCE

DNS Records domain name server events. l DNS-QUERY


l DNS-RESPONSE

Email Records email filter events. l BANNEDWORD

FortiOS 7.2.1 Log Reference 43


Fortinet Inc.
Log types and subtypes

UTM Log Description Event Type


Subtypes
l EMAIL
l FTGD_ERR
l SPAM
l WEBMAIL

FILE-FILTER Records file filter events. l FILE-FILTER

FORTISWITCH Records FortiSwitch events. l FSW-FLOW

GTP Records GTP events. l GTP-ALL


l PFCP-ALL

ICAP Records ICAP events. l ICAP

IPS Records intrusion prevention events. l BOTNET


l MALICIOUS-URL
l SIGNATURE

SSH Records Secure Socket Shell events. l SSH-CHANNEL


l SSH-COMMAND
l SSH-HOSTKEY

SSL Records detected/blocked malicious SSL l SSL-ANOMALY


connections. l SSL-EXEMPT
l SSL-HANDSHAKE
l SSL-NEGOTIATION
l SSL-SERVER-CERT-INFO

VoIP Records voice over IP events. l VOIP

WAF Records web application firewall information l WAF-ADDRESS-LIST


for FortiWeb appliances and virtual l WAF-CUSTOM-SIGNATURE
appliances. l WAF-HTTP-CONSTRAINT
l WAF-HTTP-METHOD
l WAF-SIGNATURE
l WAF-URL-ACCESS

Web Records web filter events. l ACTIVEXFILTER


l ANTIPHISHING
l APPLETFILTER
l CONTENT
l COOKIEFILTER
l FTGD_ALLOW
l FTGD_BLK
l FTGD_ERR
l FTGD_QUOTA

FortiOS 7.2.1 Log Reference 44


Fortinet Inc.
Log types and subtypes

UTM Log Description Event Type


Subtypes
l FTGD_QUOTA_COUNTING
l FTGD_QUOTA_EXPIRED
l HTTP_HEADER_CHANGE
l SCRIPTFILTER
l SSL-EXEMPT
l URLFILTER
l URLMONITOR
l VIDEOFILTER-CATEGORY
l VIDEOFILTER-CHANNEL
l WEBFILTER_COMMAND_BLOCK

FortiOS priority levels

Each log entry contains a Level (level) field that indicates the estimated severity of the event that caused the log entry,
such as level=warning, and therefore how high a priority it is likely to be. Level (level) associations with the
descriptions below are not always uniform. They also may not correspond with your own definitions of how severe each
event is. If you require notification when a specific event occurs, either configure SNMP traps or alert email by
administrator-defined Severity Level (severity_level) or ID (logid), not by Level (level).

Level (0 is Name Description


highest)

0 Emergency The system is unusable or not responding.

1 Alert Immediate action required. Used in security logs.

2 Critical Functionality is affected.

3 Error An error exists and functionality could be affected.

4 Warning Functionality could be affected.

5 Notification Information about normal events.

6 Information General information about system operations. Used in event logs to


record configuration changes.

For each location where the FortiGate device can store log files (disk, memory, Syslog or FortiAnalyzer), you can define
a severity threshold. FortiOS stores all log messages equal to or exceeding the log severity level selected. For example,
if you select Error, FortiOS will store log messages whose log severity level is Error, Critical, Alert, and Emergency.

FortiOS 7.2.1 Log Reference 45


Fortinet Inc.
Log types and subtypes

Log field format

The following table describes the standard format in which each log type is described in this document. For
documentation purposes, all log types and subtypes follow this generic table format to present the log entry information.

Log Field Name Description Data Type Length

appact The security action from app control string 16

FortiOS 7.2.1 Log Reference 46


Fortinet Inc.
Log schema structure

This section describes the schema of the FortiOS log messages.

Log message fields

Each log message consists of several sections of fields. In the FortiOS GUI, you can view the logs in the Log & Report
pane, which displays the formatted view. If you want to view logs in raw format, you must download the log and view it in
a text editor.
Following is an example of a traffic log message in raw format:
date=2017-11-15 time=11:44:16 logid="0000000013" type="traffic" subtype="forward"
level="notice" vd="vdom1" eventtime=1510775056 srcip=10.1.100.155 srcname="pc1"
srcport=40772 srcintf="port12" srcintfrole="undefined" dstip=35.197.51.42
dstname="fortiguard.com" dstport=443 dstintf="port11" dstintfrole="undefined"
poluuid="707a0d88-c972-51e7-bbc7-4d421660557b" sessionid=8058 proto=6 action="close"
policyid=1 policytype="policy" policymode="learn" service="HTTPS" dstcountry="United
States" srccountry="Reserved" trandisp="snat" transip=172.16.200.2 transport=40772
appid=40568 app="HTTPS.BROWSER" appcat="Web.Client" apprisk="medium" duration=2
sentbyte=1850 rcvdbyte=39898 sentpkt=25 rcvdpkt=37 utmaction="allow" countapp=1
devtype="Linux PC" osname="Linux" mastersrcmac="a2:e9:00:ec:40:01"
srcmac="a2:e9:00:ec:40:01" srcserver=0 utmref=0-220586

The following table provides an example of the log field information in the FortiOS GUI in the detailed view of the Log &
Report pane and in the downloaded, raw log file.

GUI Field Name Field Description Example Field Value in Raw Format
(Raw Field Name)

General

Date (date) Day, month, and year when the log date=2017-11-15
message was recorded.

Direction (direction) Indicates message/packets direction=incoming


direction.

Time (time) Hour clock when the log message time=11:44:16


was recorded.

Duration (seconds) Duration of the session, in seconds. duration=2

Session ID (sessionid) ID for the session. sessionid=8058

Virtual Domain (vd) Name of the virtual domain in which vd="vdom1"


the log message was recorded.

FortiOS 7.2.1 Log Reference 47


Fortinet Inc.
Log schema structure

GUI Field Name Field Description Example Field Value in Raw Format
(Raw Field Name)

NAT Translation NAT source port. transport=40772


(transport)

Source

IP (srcip) IP address of the traffic’s origin. The srcip=10.1.100.155


source varies by the direction:
l In HTTP requests, this is the
web browser or other client.
l In HTTP responses, this is the
physical server.

NAT IP (transip) NAT source IP. transip=172.16.200.2

Source Port (srcport) Port number of the traffic's origin. srcport=40772

Country (srccountry) Name of the source country. srccountry="Reserved"

Source Interface(srcintf) Interface name of the traffic's origin. srcintf="port12"

Source Name (srcname) Name of the source. srcname="pc1"

Source Interface Name Name of the source interface. srcintfrole="undefined"


(srcintfrole)

Device Type (devtype) Device type of the source. devtype="Linux PC"

OS Name (osname) OS of the source. osname="Linux"

Master Source MAC The master MAC address for a host mastersrcmac="a2:e9:00:ec:40:01"
(mastersrcmac) that has multiple network interfaces.

Source MAC (srcmac) MAC address associated with the srcmac="a2:e9:00:ec:40:01"


source IP address.

Source Server Server of the source. srcserver=0


(srcserver)

Device ID (devid) Serial number of the device for the devid="FGVM02Q105060010"


traffic's origin.

Destination

IP (dstip) Destination IP address for the web. dstip=35.197.51.42

Port (dstport) Port number of the traffic's dstport=443


destination.

Country (dstcountry) Name of the destination country. dstcountry="United States"

Destination Interface Interface of the traffic's destination. dstintf="port11"


(dstintf)

FortiOS 7.2.1 Log Reference 48


Fortinet Inc.
Log schema structure

GUI Field Name Field Description Example Field Value in Raw Format
(Raw Field Name)

Destination Name Name of the destination. dstname="fortiguard.com"


(dstname)

Destination Interface Name of the destination interface. dstintfrole="undefined"


Name (dstinfrole)

Application

Application Name (app) Name of the application. app="HTTPS.BROWSER"

Category (appcat) Category of the application. appcat="Web.Client"

Service (service) Name of the service. service="HTTPS"

Application ID (appid) ID of the application. appid=40568

Application Risk Risk level of the application. apprisk="medium"


(apprisk)

countapp Number of App Ctrl logs associated countapp=1


with the session.

Data

Received bytes Number of bytes received. rcvdbyte=39898


(rcvdbyte)

Received packets Number of packets received. rcvdpkt=37


(rcvdpkt)

Sent bytes (sentbyte) Number of bytes sent. sentbyte=1850

Sent packets (sentpkt) Number of packets sent. sentpkt=25

Action

Action (action) Status of the session. Uses action=close


following definitions:
l Deny: blocked by firewall policy

l Start: session start log (special

option to enable logging at start


of a session). This means
firewall allowed.
l All Others: allowed by Firewall

Policy and the status indicates


how it was closed.

Policy (policyid) Name of the firewall policy policyid=1


governing the traffic which caused
the log message.

Policy UUID (poluuid) UUID for the firewall policy. poluuid="707a0d88-c972-51e7-bbc7-


4d421660557b"

FortiOS 7.2.1 Log Reference 49


Fortinet Inc.
Log schema structure

GUI Field Name Field Description Example Field Value in Raw Format
(Raw Field Name)

Policy Type (policytype) policytype="policy"

Policy Mode Firewall policy mode. policymode="learn"


(policymode)

Security

Level (level) Security level rating. level="notice"

Other

Event Time (eventtime) Epoch time the log was triggered by eventtime=1510775056
FortiGate. If you convert the epoch
time to human readable time, it
might not match the Date and Time
in the header owing to a small delay
between the time the log was
triggered and recorded. The Log
Time field is the same for the same
log among all log devices, but the
Date and Time might differ.

Protocol Number (proto) tcp: The protocol used by web traffic proto=6
(tcp by default)

Type (type) Log type. See Type on page 42 type="traffic"

Log ID (logid) Log ID. See Log ID definitions on logid="0000000013"


page 51

Sub Type(subtype) Subtype of the traffic. See Subtype subtype="forward"


on page 42.

trandisp NAT translation type. trandisp="snat"

UTM Action (utmaction) Security action performed by UTM. utmaction="allow"

UTM Reference (utmref) UTM reference number. utmref=0-220586

UTM Reference (utmref) UTM reference number. utmref=0-220586

Log ID numbers

The ID (logid) is a 10-digit field. It is a unique identifier for that specific log and includes the following information about
the log entry.

FortiOS 7.2.1 Log Reference 50


Fortinet Inc.
Log schema structure

Log ID number Description Examples


components

Log Type Represented by the first two digits of l Traffic log IDs begin with "00".
the log ID. l Event log IDs begin with "01".

Sub Type or Event Type Represented by the second two digits l VPN log subtype is represented with
of the log ID. "01" which belongs to the Event log type
that is represented with "01".
Therefore, all VPN related Event log IDs
will begin with the 0101 log ID series.

Message ID The last six digits of the log ID l An administrator account always has the
represent the message ID. log ID 0000003401.

The logid field is a number assigned to all permutations of the same message. It classifies a log entry by the nature of the
cause of the log message, such as administrator authentication failures or traffic. Other log messages that share the
same cause will share the same logid.

Log ID definitions

Following are the definitions for the log type IDs and subtype IDs applicable to FortiOS:

Log Category IDs Subtype IDs

traffic: 0 l forward: 0
l local: 1
l multicast: 2
l sniffer: 4
l ztna: 5

event: 1 l system: 0
l vpn: 1
l user: 2
l router: 3
l wireless: 4
l wad: 5
l endpoint: 7
l ha: 8
l security-rating: 10
l fortiextender: 11
l connector: 12
l sdwan: 13
l cifs-auth-fails: 14
l switch-controller: 15
l rest-api: 16

FortiOS 7.2.1 Log Reference 51


Fortinet Inc.
Log schema structure

Log Category IDs Subtype IDs

voip: 2 l voip: 14

virus: 3 l analytics: 1
l filetype-executable: 3
l outbreak-prevention: 4
l content-disarm: 5
l command-blocked: 6
l malware-list: 7
l ems-threat-feed: 8
l fortindr: 9
l fortisandbox: 10
l infected: 11
l filename: 12
l oversize: 13
l mimefragmented: 61
l scanerror: 62
l switchproto: 63

webfilter: 4 l content: 14
l urlfilter: 15
l ftgd_blk: 16
l ftgd_allow: 17
l ftgd_err: 18
l urlmonitor: 19
l activexfilter: 35
l cookiefilter: 36
l appletfilter: 37
l ftgd_quota_counting: 38
l ftgd_quota_expired: 39
l ftgd_quota: 40
l scriptfilter: 41
l webfilter_command_block: 43
l http_header_change: 44
l ssl-exempt: 45
l antiphishing: 46
l videofilter-category: 47
l videofilter-channel: 48

ips: 5 l signature: 19
l malicious_url: 21
l botnet: 22

FortiOS 7.2.1 Log Reference 52


Fortinet Inc.
Log schema structure

Log Category IDs Subtype IDs

anomaly: 6 l anomaly: 20

emailfilter: 7 l email: 12
l spam: 13
l bannedword: 14
l webmail: 20
l ftgd_err: 53

dlp: 8 l dlp: 54
l dlp-docsource: 55

app-ctrl: 9 l signature: 59
l port-violation: 60
l protocol-violation: 61

waf: 10 l waf-signature: 0
l waf-custom-signature: 1
l waf-http-method: 2
l waf-http-constraint: 3
l waf-address-list: 4
l waf-url-access: 5

gtp: 11 l gtp-all: 0
l pfcp-all: 1

dns: 12 l dns-query: 0
l dns-response: 1

ssh: 13 l ssh-command: 0
l ssh-channel: 1
l ssh-hostkey: 2

ssl: 14 l ssl-anomaly: 0
l ssl-exempt: 1
l ssl-negotiation: 2
l ssl-server-cert-info: 3
l ssl-handshake: 4

file-filter: 15 l file-filter: 0

icap: 16 l icap: 0

forti-switch: 17 l fsw-flow: 0

FortiOS 7.2.1 Log Reference 53


Fortinet Inc.
FortiGuard web filter categories

The below details the mapping between FortiGuard Web Filter category names and numbers.

Number Category

0 Unrated

1 Drug abuse

2 Alternative beliefs

3 Hacking

4 Illegal or unethical

5 Discrimination

6 Explicit violence

7 Abortion

8 Other adult materials

9 Advocacy organizations

11 Gambling

12 Extremist groups

13 Nudity and risque

14 Pornography

15 Dating

16 Weapons (sales)

17 Advertising

18 Brokerage and trading

19 Freeware and software downloads

20 Games

23 Web-based email

24 File sharing and storage

25 Streaming media and download

26 Malicious websites

28 Entertainment

29 Arts and culture

30 Education

FortiOS 7.2.1 Log Reference 54


Fortinet Inc.
FortiGuard web filter categories

Number Category

31 Finance and banking

33 Health and wellness

34 Job search

35 Medicine

36 News and media

37 Social networking

38 Political organizations

39 Reference

40 Global religion

41 Search engines and portals

42 Shopping

43 General organizations

44 Society and lifestyles

46 Sports

47 Travel

48 Personal vehicles

49 Business

50 Information and computer security

51 Government and legal organizations

52 Information technology

53 Armed forces

54 Dynamic content

55 Meaningless content

56 Web hosting

57 Marijuana

58 Folklore

59 Proxy avoidance

61 Phishing

62 Plagiarism

63 Sex education

FortiOS 7.2.1 Log Reference 55


Fortinet Inc.
FortiGuard web filter categories

Number Category

64 Alcohol

65 Tobacco

66 Lingerie and swimsuit

67 Sports hunting and war games

68 Web chat

69 Instant messaging

70 Newsgroups and message boards

71 Digital postcards

72 Peer-to-peer file sharing

75 Internet radio and TV

76 Internet telephony

77 Child education

78 Real estate

79 Restaurant and dining

80 Personal websites and blogs

81 Secure websites

82 Content servers

83 Child abuse

84 Web-based applications

85 Domain parking

86 Spam URLs

87 Personal privacy

88 Dynamic DNS

89 Auction

90 Newly observed domain

91 Newly registered domain

92 Charitable organizations

93 Remote access

94 Web analytics

95 Online meeting

FortiOS 7.2.1 Log Reference 56


Fortinet Inc.
CEF support

You can configure FortiOS 7.2.1 to send logs to remote syslog servers in Common Event Format (CEF) by using the
config log syslogd setting command.
When CEF is enabled, FortiOS sends logs to syslog servers in CEF. This section describes how FortiOS logs support
CEF.

You can view logs in CEF on remote syslog servers or FortiAnalyzer, but not in the FortiOS
GUI.

FortiOS to CEF log field mapping guidelines

The following CEF format:


Date/Time host CEF:Version|Device Vendor|Device Product|Device Version|Signature
ID|Name|Severity|[Extension]

Displays as following in FortiOS logs with CEF enabled:


"MMM dd HH:mm:ss" "hostname of the fortigate"
CEF:0|Fortinet|Fortigate|version|logid|type:subtype +[eventtype] +[action] +
[status]|reversed level|...

The SignatureId field in FortiOS logs maps to the logid field in CEF and should be last 5 digits of logid.
The Name field in CEF uses the following formula:
type:subtype + [eventtype] + [action] + [status]

Following is an example of the header and one key-value pair for extension from the Event VPN log in CEF:
#Feb 12 10:31:04 syslog-800c CEF:0|Fortinet|Fortigate|v5.6.0|37127|event:vpn negotiate
success|3|FTNTFGTlogid=0101037127

The type:subtype field in FortiOS logs maps to the cat field in CEF.
Any fields in FortiOS logs that are unmatched to fields in CEF include the FTNTFGT prefix.
Quotes ("") are removed from FortiOS logs to support CEF.
Forward slashes (//) in string values as well as the equal sign (=) and backward slashes (\) are escaped in FortiOS logs
to support CEF.

CEF priority levels

Following are the CEF priority levels. They are opposite of FortiOS priority levels. See also FortiOS priority levels on
page 45.

FortiOS 7.2.1 Log Reference 57


Fortinet Inc.
CEF support

Level (8 is Name Description


highest)

8 Emergency The system is unusable or not responding.

7 Alert Immediate action required. Used in security logs.

6 Critical Functionality is affected.

5 Error An error exists and functionality could be affected.

4 Warning Functionality could be affected.

3 Notification Information about normal events.

2 Information General information about system operations. Used in event logs to


record configuration changes.

1 Debug Debug information.

Examples of CEF support

This section includes examples of how the different types of log message support CEF.

Traffic log support for CEF

The following is an example of a traffic log on the FortiGate disk:


date=2018-12-27 time=11:07:55 logid="0000000013" type="traffic" subtype="forward"
level="notice" vd="vdom1" eventtime=1545937675 srcip=10.1.100.11 srcport=54190
srcintf="port12" srcintfrole="undefined" dstip=52.53.140.235 dstport=443
dstintf="port11" dstintfrole="undefined" poluuid="c2d460aa-fe6f-51e8-9505-
41b5117dfdd4" sessionid=402 proto=6 action="close" policyid=1 policytype="policy"
service="HTTPS" dstcountry="United States" srccountry="Reserved" trandisp="snat"
transip=172.16.200.1 transport=54190 appid=40568 app="HTTPS.BROWSER"
appcat="Web.Client" apprisk="medium" applist="g-default" duration=2 sentbyte=3652
rcvdbyte=146668 sentpkt=58 rcvdpkt=105 utmaction="allow" countapp=2 utmref=65532-56

The following is an example of a traffic log sent in CEF format to a syslog server:
Dec 27 11:07:55 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|00013|traffic:forward
close|3|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0000000013
cat=traffic:forward FTNTFGTsubtype=forward FTNTFGTlevel=notice FTNTFGTvd=vdom1
FTNTFGTeventtime=1545937675 src=10.1.100.11 spt=54190 deviceInboundInterface=port12
FTNTFGTsrcintfrole=undefined dst=52.53.140.235 dpt=443
deviceOutboundInterface=port11 FTNTFGTdstintfrole=undefined FTNTFGTpoluuid=c2d460aa-
fe6f-51e8-9505-41b5117dfdd4 externalId=402 proto=6 act=close FTNTFGTpolicyid=1
FTNTFGTpolicytype=policy app=HTTPS FTNTFGTdstcountry=United States
FTNTFGTsrccountry=Reserved FTNTFGTtrandisp=snat sourceTranslatedAddress=172.16.200.1
sourceTranslatedPort=54190 FTNTFGTappid=40568 FTNTFGTapp=HTTPS.BROWSER
FTNTFGTappcat=Web.Client FTNTFGTapprisk=medium FTNTFGTapplist=g-default
FTNTFGTduration=2 out=3652 in=146668 FTNTFGTsentpkt=58 FTNTFGTrcvdpkt=105
FTNTFGTutmaction=allow FTNTFGTcountapp=2

The following table maps FortiOS log field names to CEF field names.

FortiOS 7.2.1 Log Reference 58


Fortinet Inc.
CEF support

FortiOS Log Field Name CEF Field Name

type: subtype cat

srcip src

srcport spt

srcintf deviceInboundInterface

dstip dst

dstport dpt

dstintf deviceOutboundInterface

sessionid externalID

proto proto

action act

transip sourceTranslatedAddress

transport sourceTranslatedPort

service app

sentbyte out

rcvdbyte in

Custom fields

To configure the traffic log with custom fields, enter the following CLI commands:
config log custom-field
edit 1
set name "custom_name1"
set value "HN123456"
next
edit 2
set name "custom_name2"
set value "accounting_dpt"
next
end
config firewall policy
edit 1
set name "A-v4-out"
set srcintf "port12"
set dstintf "port11"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set utm-status enable
set logtraffic all
set custom-log-fields "1" "2"

FortiOS 7.2.1 Log Reference 59


Fortinet Inc.
CEF support

set application-list "g-default"


set ssl-ssh-profile "certificate-inspection"
set nat enable
next
end

The following is an example of a traffic log with custom fields on the FortiGate disk:
date=2018-12-27 time=11:12:30 logid="0000000013" type="traffic" subtype="forward"
level="notice" vd="vdom1" eventtime=1545937950 srcip=10.1.100.11 srcport=58843
srcintf="port12" srcintfrole="undefined" dstip=172.16.200.55 dstport=53
dstintf="port11" dstintfrole="undefined" poluuid="c2d460aa-fe6f-51e8-9505-
41b5117dfdd4" sessionid=440 proto=17 action="accept" policyid=1 policytype="policy"
service="DNS" dstcountry="Reserved" srccountry="Reserved" trandisp="snat"
transip=172.16.200.1 transport=58843 appid=16195 app="DNS" appcat="Network.Service"
apprisk="elevated" applist="g-default" duration=180 sentbyte=70 rcvdbyte=528
sentpkt=1 rcvdpkt=1 custom_name1="HN123456" custom_name2="accounting_dpt"

The following is an example of a traffic log with custom fields sent in CEF format to a syslog server:
Dec 27 11:12:30 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|00013|traffic:forward
accept|3|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0000000013
cat=traffic:forward FTNTFGTsubtype=forward FTNTFGTlevel=notice FTNTFGTvd=vdom1
FTNTFGTeventtime=1545937950 src=10.1.100.11 spt=58843 deviceInboundInterface=port12
FTNTFGTsrcintfrole=undefined dst=172.16.200.55 dpt=53 deviceOutboundInterface=port11
FTNTFGTdstintfrole=undefined FTNTFGTpoluuid=c2d460aa-fe6f-51e8-9505-41b5117dfdd4
externalId=440 proto=17 act=accept FTNTFGTpolicyid=1 FTNTFGTpolicytype=policy
app=DNS FTNTFGTdstcountry=Reserved FTNTFGTsrccountry=Reserved FTNTFGTtrandisp=snat
sourceTranslatedAddress=172.16.200.1 sourceTranslatedPort=58843 FTNTFGTappid=16195
FTNTFGTapp=DNS FTNTFGTappcat=Network.Service FTNTFGTapprisk=elevated
FTNTFGTapplist=g-default FTNTFGTduration=180 out=70 in=528 FTNTFGTsentpkt=1
FTNTFGTrcvdpkt=1 FTNTFGTcustom_name1=HN123456 FTNTFGTcustom_name2=accounting_dpt

The following table maps FortiOS custom log field names to CEF field names.

FortiOS Log Field Name CEF Field Name

custom_name1 FTNTFGTcustom_name1

custom_name2 FTNTFGTcustom_name2

Event log support for CEF

The following table maps FortiOS log field names to CEF field names.

FortiOS Log Field Name CEF Field Name

msg msg

cookies requestCookies

user duser

status outcome

role sourceServiceName

ui sproc

FortiOS 7.2.1 Log Reference 60


Fortinet Inc.
CEF support

FortiOS Log Field Name CEF Field Name

reason reason

action act

system subtype

The following is an example of a system subtype event log on the FortiGate disk:
date=2018-12-27 time=11:15:40 logid="0100032002" type="event" subtype="system"
level="alert" vd="vdom1" eventtime=1545938140 logdesc="Admin login failed" sn="0"
user="admin1" ui="https(172.16.200.254)" method="https" srcip=172.16.200.254
dstip=172.16.200.1 action="login" status="failed" reason="name_invalid"
msg="Administrator admin1 login failed from https(172.16.200.254) because of invalid
user name"

The following is an example of a system subtype event log sent in CEF format to a syslog server:
Dec 27 11:15:40 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|32002|event:system login
failed|7|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0100032002 cat=event:system
FTNTFGTsubtype=system FTNTFGTlevel=alert FTNTFGTvd=vdom1 FTNTFGTeventtime=1545938140
FTNTFGTlogdesc=Admin login failed FTNTFGTsn=0 duser=admin1 sproc=https
(172.16.200.254) FTNTFGTmethod=https src=172.16.200.254 dst=172.16.200.1 act=login
outcome=failed reason=name_invalid msg=Administrator admin1 login failed from https
(172.16.200.254) because of invalid user name

user subtype

The following is an example of a user subtype log on the FortiGate disk:


date=2018-12-27 time=11:17:35 logid="0102043008" type="event" subtype="user"
level="notice" vd="vdom1" eventtime=1545938255 logdesc="Authentication success"
srcip=10.1.100.11 dstip=172.16.200.55 policyid=1 interface="port12" user="bob"
group="N/A" authproto="TELNET(10.1.100.11)" action="authentication" status="success"
reason="N/A" msg="User bob succeeded in authentication"

The following is an example of a user subtype log sent in CEF format to a syslog server:
Dec 27 11:17:35 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|43008|event:user
authentication success|3|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0102043008
cat=event:user FTNTFGTsubtype=user FTNTFGTlevel=notice FTNTFGTvd=vdom1
FTNTFGTeventtime=1545938255 FTNTFGTlogdesc=Authentication success src=10.1.100.11
dst=172.16.200.55 FTNTFGTpolicyid=1 deviceInboundInterface=port12 duser=bob
FTNTFGTgroup=N/A FTNTFGTauthproto=TELNET(10.1.100.11) act=authentication
outcome=success reason=N/A msg=User bob succeeded in authentication

Antivirus log support for CEF

The following is an example of an antivirus log on the FortiGate disk:


date=2018-12-27 time=11:20:49 logid="0211008192" type="utm" subtype="virus"
eventtype="infected" level="warning" vd="vdom1" eventtime=1545938448 msg="File is
infected." action="blocked" service="HTTP" sessionid=695 srcip=10.1.100.11
dstip=172.16.200.55 srcport=44356 dstport=80 srcintf="port12"
srcintfrole="undefined" dstintf="port11" dstintfrole="undefined" policyid=1 proto=6
direction="incoming" filename="eicar.com" quarskip="File-was-not-quarantined."

FortiOS 7.2.1 Log Reference 61


Fortinet Inc.
CEF support

virus="EICAR_TEST_FILE" dtype="Virus" ref="http://www.fortinet.com/ve?vn=EICAR_TEST_


FILE" virusid=2172 url="http://172.16.200.55/virus/eicar.com" profile="g-default"
user="bob" agent="curl/7.47.0"
analyticscksum="275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f"
analyticssubmit="false" crscore=50 crlevel="critical"

The following is an example of an antivirus log sent in CEF format to a syslog server:
Dec 27 11:20:48 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|08192|utm:virus infected
blocked|4|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0211008192 cat=utm:virus
FTNTFGTsubtype=virus FTNTFGTeventtype=infected FTNTFGTlevel=warning FTNTFGTvd=vdom1
FTNTFGTeventtime=1545938448 msg=File is infected. act=blocked app=HTTP
externalId=695 src=10.1.100.11 dst=172.16.200.55 spt=44356 dpt=80
deviceInboundInterface=port12 FTNTFGTsrcintfrole=undefined
deviceOutboundInterface=port11 FTNTFGTdstintfrole=undefined FTNTFGTpolicyid=1
proto=6 deviceDirection=0 fname=eicar.com FTNTFGTquarskip=File-was-not-quarantined.
FTNTFGTvirus=EICAR_TEST_FILE FTNTFGTdtype=Virus
FTNTFGTref=http://www.fortinet.com/ve?vn\=EICAR_TEST_FILE FTNTFGTvirusid=2172
request=http://172.16.200.55/virus/eicar.com FTNTFGTprofile=g-default duser=bob
requestClientApplication=curl/7.47.0
FTNTFGTanalyticscksum=275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd
0f FTNTFGTanalyticssubmit=false FTNTFGTcrscore=50 FTNTFGTcrlevel=critical

The following table maps FortiOS log field names to CEF field names.

FortiOS Log Field Name CEF Field Name

direction deviceDirection (inbound/outbound mapping to 0/1)

filename fname

ref FTNTFGTref (There is \ added to escape = )

url request

agent requestClientApplication

Webfilter log support for CEF

The following is an example of a webfilter log on the FortiGate disk:


date=2018-12-27 time=11:23:50 logid="0316013056" type="utm" subtype="webfilter"
eventtype="ftgd_blk" level="warning" vd="vdom1" eventtime=1545938629 policyid=1
sessionid=764 user="bob" srcip=10.1.100.11 srcport=59194 srcintf="port12"
srcintfrole="undefined" dstip=185.230.61.185 dstport=80 dstintf="port11"
dstintfrole="undefined" proto=6 service="HTTP" hostname="ambrishsriv.wixsite.com"
profile="g-default" action="blocked" reqtype="direct" url="/bizsquads" sentbyte=96
rcvdbyte=0 direction="outgoing" msg="URL belongs to a denied category in policy"
method="domain" cat=26 catdesc="Malicious Websites" crscore=60 crlevel="high"

The following is an example of a webfilter log sent in CEF format to a syslog server:
Dec 27 11:23:49 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|13056|utm:webfilter ftgd_blk
blocked|4|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0316013056
cat=utm:webfilter FTNTFGTsubtype=webfilter FTNTFGTeventtype=ftgd_blk
FTNTFGTlevel=warning FTNTFGTvd=vdom1 FTNTFGTeventtime=1545938629 FTNTFGTpolicyid=1
externalId=764 duser=bob src=10.1.100.11 spt=59194 deviceInboundInterface=port12
FTNTFGTsrcintfrole=undefined dst=185.230.61.185 dpt=80
deviceOutboundInterface=port11 FTNTFGTdstintfrole=undefined proto=6 app=HTTP
dhost=ambrishsriv.wixsite.com FTNTFGTprofile=g-default act=blocked
FTNTFGTreqtype=direct request=/bizsquads out=96 in=0 deviceDirection=1 msg=URL

FortiOS 7.2.1 Log Reference 62


Fortinet Inc.
CEF support

belongs to a denied category in policy FTNTFGTmethod=domain FTNTFGTcat=26


requestContext=Malicious Websites FTNTFGTcrscore=60 FTNTFGTcrlevel=high

The following table maps FortiOS log field names to CEF field names.

FortiOS Log Field Name CEF Field Name

hostname dhost

catdesc requestContext

IPS log support for CEF

The following is an example of an IPS log on the FortiGate disk:


date=2018-12-27 time=11:28:07 logid="0419016384" type="utm" subtype="ips"
eventtype="signature" level="alert" vd="vdom1" eventtime=1545938887 severity="info"
srcip=172.16.200.55 srccountry="Reserved" dstip=10.1.100.11 srcintf="port11"
srcintfrole="undefined" dstintf="port12" dstintfrole="undefined" sessionid=901
action="reset" proto=6 service="HTTP" policyid=1 attack="Eicar.Virus.Test.File"
srcport=80 dstport=44362 hostname="172.16.200.55" url="/virus/eicar.com"
direction="incoming" attackid=29844 profile="test-ips"
ref="http://www.fortinet.com/ids/VID29844" user="bob" incidentserialno=877326946
msg="file_transfer: Eicar.Virus.Test.File,"

The following is an example of an IPS sent in CEF format to a syslog server:


Dec 27 11:28:07 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|16384|utm:ips signature
reset|7|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0419016384 cat=utm:ips
FTNTFGTsubtype=ips FTNTFGTeventtype=signature FTNTFGTlevel=alert FTNTFGTvd=vdom1
FTNTFGTeventtime=1545938887 FTNTFGTseverity=info src=172.16.200.55
FTNTFGTsrccountry=Reserved dst=10.1.100.11 deviceInboundInterface=port11
FTNTFGTsrcintfrole=undefined deviceOutboundInterface=port12
FTNTFGTdstintfrole=undefined externalId=901 act=reset proto=6 app=HTTP
FTNTFGTpolicyid=1 FTNTFGTattack=Eicar.Virus.Test.File spt=80 dpt=44362
dhost=172.16.200.55 request=/virus/eicar.com deviceDirection=0 FTNTFGTattackid=29844
FTNTFGTprofile=test-ips FTNTFGTref=http://www.fortinet.com/ids/VID29844 duser=bob
FTNTFGTincidentserialno=877326946 msg=file_transfer: Eicar.Virus.Test.File,

Email Spamfilter log support for CEF

The following is an example of an email spamfilter log on the FortiGate disk:


date=2018-12-27 time=11:36:58 logid="0508020503" type="utm" subtype="emailfilter"
eventtype="smtp" level="information" vd="vdom1" eventtime=1545939418 policyid=1
sessionid=1135 user="bob" srcip=10.1.100.11 srcport=35969 srcintf="port12"
srcintfrole="undefined" dstip=172.18.62.158 dstport=25 dstintf="port11"
dstintfrole="undefined" proto=6 service="SMTP" profile="test-spam" action="log-only"
from="[email protected]" to="[email protected]"
sender="[email protected]" recipient="[email protected]"
direction="outgoing" msg="general email log" subject="hello_world2" size="216"
attachment="no"

The following is an example of an email spamfilter log sent in CEF format to a syslog server:
Dec 27 11:36:58 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|20503|utm:emailfilter smtp
log-only|2|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0508020503
cat=utm:emailfilter FTNTFGTsubtype=emailfilter FTNTFGTeventtype=smtp
FTNTFGTlevel=information FTNTFGTvd=vdom1 FTNTFGTeventtime=1545939418

FortiOS 7.2.1 Log Reference 63


Fortinet Inc.
CEF support

FTNTFGTpolicyid=1 externalId=1135 duser=bob src=10.1.100.11 spt=35969


deviceInboundInterface=port12 FTNTFGTsrcintfrole=undefined dst=172.18.62.158 dpt=25
deviceOutboundInterface=port11 FTNTFGTdstintfrole=undefined proto=6 app=SMTP
FTNTFGTprofile=test-spam act=log-only [email protected]
[email protected] [email protected]
[email protected] deviceDirection=1 msg=general email
log FTNTFGTsubject=hello_world2 FTNTFGTsize=216 FTNTFGTattachment=no

The following table maps FortiOS log field names to CEF field names.

FortiOS Log Field Name CEF Field Name

from suser

to duser

Anomaly log support for CEF

The following is an example of an anomaly log on the FortiGate disk:


date=2018-12-27 time=11:40:04 logid="0720018433" type="utm" subtype="anomaly"
eventtype="anomaly" level="alert" vd="vdom1" eventtime=1545939604
severity="critical" srcip=10.1.100.11 srccountry="Reserved" dstip=172.16.200.55
srcintf="port12" srcintfrole="undefined" sessionid=0 action="clear_session" proto=1
service="PING" count=1 attack="icmp_flood" icmpid="0x3053" icmptype="0x08"
icmpcode="0x00" attackid=16777316 policyid=1 policytype="DoS-policy"
ref="http://www.fortinet.com/ids/VID16777316" msg="anomaly: icmp_flood, 51 >
threshold 50" crscore=50 crlevel="critical"

The following is an example of an anomaly log sent in CEF format to a syslog server:
Dec 27 11:40:04 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|18433|utm:anomaly anomaly
clear_session|7|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0720018433
cat=utm:anomaly FTNTFGTsubtype=anomaly FTNTFGTeventtype=anomaly FTNTFGTlevel=alert
FTNTFGTvd=vdom1 FTNTFGTeventtime=1545939604 FTNTFGTseverity=critical src=10.1.100.11
FTNTFGTsrccountry=Reserved dst=172.16.200.55 deviceInboundInterface=port12
FTNTFGTsrcintfrole=undefined externalId=0 act=clear_session proto=1 app=PING cnt=1
FTNTFGTattack=icmp_flood FTNTFGTicmpid=0x3053 FTNTFGTicmptype=0x08
FTNTFGTicmpcode=0x00 FTNTFGTattackid=16777316 FTNTFGTpolicyid=1
FTNTFGTpolicytype=DoS-policy FTNTFGTref=http://www.fortinet.com/ids/VID16777316
msg=anomaly: icmp_flood, 51 > threshold 50 FTNTFGTcrscore=50 FTNTFGTcrlevel=critical

The following table maps FortiOS log field names to CEF field names.

FortiOS Log Field Name CEF Field Name

count cnt

VoIP log support for CEF

The following is an example of an VoIP log on the FortiGate disk:


date=2018-12-27 time=16:47:09 logid="0814044032" type="utm" subtype="voip"
eventtype="voip" level="information" vd="vdom1" eventtime=1545958028 session_
id=18975 epoch=0 event_id=6857 srcip=10.1.100.11 src_port=5060 dstip=172.16.200.55
dst_port=5060 proto=17 src_int="port12" dst_int="port11" policy_id=1
profile="default" voip_proto="sip" kind="call" action="permit" status="start"

FortiOS 7.2.1 Log Reference 64


Fortinet Inc.
CEF support

duration=0 dir="session_origin" call_id="[email protected]"


from="sip:[email protected]:5060" to="sip:[email protected]:5060"

The following is an example of an VoIP sent in CEF format to a syslog server:


Dec 27 16:47:08 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|44032|utm:voip voip permit
start|2|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0814044032 cat=utm:voip
FTNTFGTsubtype=voip FTNTFGTeventtype=voip FTNTFGTlevel=information FTNTFGTvd=vdom1
FTNTFGTeventtime=1545958028 externalId=18975 FTNTFGTepoch=0 FTNTFGTevent_id=6857
src=10.1.100.11 spt=5060 dst=172.16.200.55 dpt=5060 proto=17
deviceInboundInterface=port12 deviceOutboundInterface=port11 FTNTFGTpolicy_id=1
FTNTFGTprofile=default FTNTFGTvoip_proto=sip FTNTFGTkind=call act=permit
outcome=start FTNTFGTduration=0 FTNTFGTdir=session_origin FTNTFGTcall_id=3444-
[email protected] suser=sip:[email protected]:5060 duser=sip:[email protected]:5060

The following table maps FortiOS log field names to CEF field names.

FortiOS Log Field Name CEF Field Name

status outcome

from suser

to duser

DLP log support for CEF

The following is an example of a DLP log on the FortiGate disk:


date=2018-12-27 time=14:29:36 logid="0954024576" type="utm" subtype="dlp" eventtype="dlp"
level="warning" vd="vdom1" eventtime=1545949776 filteridx=1 dlpextra="test-dlp3"
filtertype="file-type" filtercat="file" severity="medium" policyid=1 sessionid=12680
epoch=418303178 eventid=0 user="bob" srcip=10.1.100.11 srcport=33638
srcintf="port12" srcintfrole="undefined" dstip=172.18.62.158 dstport=80
dstintf="port11" dstintfrole="undefined" proto=6 service="HTTP" filetype="gif"
direction="incoming" action="block" hostname="172.18.62.158" url="/dlp/flower.gif"
agent="curl/7.47.0" filename="flower.gif" filesize=1209 profile="test-dlp"

The following is an example of a DLP log sent in CEF format to a syslog server:
Dec 27 14:29:36 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|24576|utm:dlp dlp
block|4|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0954024576 cat=utm:dlp
FTNTFGTsubtype=dlp FTNTFGTeventtype=dlp FTNTFGTlevel=warning FTNTFGTvd=vdom1
FTNTFGTeventtime=1545949776 FTNTFGTfilteridx=1 FTNTFGTdlpextra=test-dlp3
FTNTFGTfiltertype=file-type FTNTFGTfiltercat=file FTNTFGTseverity=medium
FTNTFGTpolicyid=1 externalId=12680 FTNTFGTepoch=418303178 FTNTFGTeventid=0 duser=bob
src=10.1.100.11 spt=33638 deviceInboundInterface=port12 FTNTFGTsrcintfrole=undefined
dst=172.18.62.158 dpt=80 deviceOutboundInterface=port11 FTNTFGTdstintfrole=undefined
proto=6 app=HTTP FTNTFGTfiletype=gif deviceDirection=0 act=block dhost=172.18.62.158
request=/dlp/flower.gif requestClientApplication=curl/7.47.0 fname=flower.gif
fsize=1209 FTNTFGTprofile=test-dlp

The following table maps FortiOS log field names to CEF field names.

FortiOS Log Field Name CEF Field Name

filename fname

FortiOS 7.2.1 Log Reference 65


Fortinet Inc.
CEF support

Application log support for CEF

The following is an example of an application log on the FortiGate disk:


date=2018-12-27 time=14:28:08 logid="1059028704" type="utm" subtype="app-ctrl"
eventtype="app-ctrl-all" level="information" vd="vdom1" eventtime=1545949688
appid=34050 srcip=10.1.100.11 dstip=104.80.89.24 srcport=56826 dstport=80
srcintf="port12" srcintfrole="undefined" dstintf="port11" dstintfrole="undefined"
proto=6 service="HTTP" direction="outgoing" policyid=1 sessionid=12567 applist="g-
default" appcat="Web.Client" app="HTTP.BROWSER_Firefox" action="pass"
hostname="detectportal.firefox.com" incidentserialno=1702350499 url="/success.txt"
msg="Web.Client: HTTP.BROWSER_Firefox," apprisk="elevated"

The following is an example of an application sent in CEF format to a syslog server:


Dec 27 14:28:08 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|28704|utm:app-ctrl app-ctrl-
all pass|2|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=1059028704 cat=utm:app-
ctrl FTNTFGTsubtype=app-ctrl FTNTFGTeventtype=app-ctrl-all FTNTFGTlevel=information
FTNTFGTvd=vdom1 FTNTFGTeventtime=1545949688 FTNTFGTappid=34050 src=10.1.100.11
dst=104.80.89.24 spt=56826 dpt=80 deviceInboundInterface=port12
FTNTFGTsrcintfrole=undefined deviceOutboundInterface=port11
FTNTFGTdstintfrole=undefined proto=6 app=HTTP deviceDirection=1 FTNTFGTpolicyid=1
externalId=12567 FTNTFGTapplist=g-default FTNTFGTappcat=Web.Client
FTNTFGTapp=HTTP.BROWSER_Firefox act=pass dhost=detectportal.firefox.com
FTNTFGTincidentserialno=1702350499 request=/success.txt msg=Web.Client:
HTTP.BROWSER_Firefox, FTNTFGTapprisk=elevated

WAF log support for CEF

The following is an example of an WAF log on the FortiGate disk:


date=2018-12-27 time=14:55:20 logid="1203030258" type="utm" subtype="waf" eventtype="waf-
http-constraint" level="warning" vd="vdom1" eventtime=1545951320 policyid=1
sessionid=13614 user="bob" profile="waf_test" srcip=10.1.100.11 srcport=57304
dstip=172.16.200.55 dstport=80 srcintf="port12" srcintfrole="lan" dstintf="port11"
dstintfrole="wan" proto=6 service="HTTP"
url="http://172.16.200.55/index.html?a=0123456789&b=0123456789&c=0123456789"
severity="medium" action="passthrough" direction="request" agent="curl/7.47.0"
constraint="url-param-num" rawdata="Method=GET|User-Agent=curl/7.47.0"

The following is an example of an WAF sent in CEF format to a syslog server:


Dec 27 14:55:20 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|30258|utm:waf waf-http-
constraint passthrough|4|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=1203030258
cat=utm:waf FTNTFGTsubtype=waf FTNTFGTeventtype=waf-http-constraint
FTNTFGTlevel=warning FTNTFGTvd=vdom1 FTNTFGTeventtime=1545951320 FTNTFGTpolicyid=1
externalId=13614 duser=bob FTNTFGTprofile=waf_test src=10.1.100.11 spt=57304
dst=172.16.200.55 dpt=80 deviceInboundInterface=port12 FTNTFGTsrcintfrole=lan
deviceOutboundInterface=port11 FTNTFGTdstintfrole=wan proto=6 app=HTTP
request=http://172.16.200.55/index.html?a\=0123456789&b\=0123456789&c\=0123456789
FTNTFGTseverity=medium act=passthrough deviceDirection=0
requestClientApplication=curl/7.47.0 FTNTFGTconstraint=url-param-num
FTNTFGTrawdata=Method\=GET|User-Agent\=curl/7.47.0

DNS log support for CEF

The following is an example of an DNS log on the FortiGate disk:

FortiOS 7.2.1 Log Reference 66


Fortinet Inc.
CEF support

date=2018-12-27 time=14:45:26 logid="1501054802" type="dns" subtype="dns-response"


level="notice" vd="vdom1" eventtime=1545950726 policyid=1 sessionid=13355 user="bob"
srcip=10.1.100.11 srcport=54621 srcintf="port12" srcintfrole="lan"
dstip=172.16.200.55 dstport=53 dstintf="port11" dstintfrole="wan" proto=17
profile="default" srcmac="a2:e9:00:ec:40:01" xid=5137
qname="detectportal.firefox.com" qtype="A" qtypeval=1 qclass="IN"
ipaddr="104.80.89.26, 104.80.89.24" msg="Domain is monitored" action="pass" cat=52
catdesc="Information Technology"

The following is an example of an DNS sent in CEF format to a syslog server:


Dec 27 14:45:26 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|54802|dns:dns-response
pass|3|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=1501054802 cat=dns:dns-
response FTNTFGTsubtype=dns-response FTNTFGTlevel=notice FTNTFGTvd=vdom1
FTNTFGTeventtime=1545950726 FTNTFGTpolicyid=1 externalId=13355 duser=bob
src=10.1.100.11 spt=54621 deviceInboundInterface=port12 FTNTFGTsrcintfrole=lan
dst=172.16.200.55 dpt=53 deviceOutboundInterface=port11 FTNTFGTdstintfrole=wan
proto=17 FTNTFGTprofile=default FTNTFGTsrcmac=a2:e9:00:ec:40:01 FTNTFGTxid=5137
FTNTFGTqname=detectportal.firefox.com FTNTFGTqtype=A FTNTFGTqtypeval=1
FTNTFGTqclass=IN FTNTFGTipaddr=104.80.89.26, 104.80.89.24 msg=Domain is monitored
act=pass FTNTFGTcat=52 FTNTFGTcatdesc=Information Technology

SSH log support for CEF

The following is an example of an SSH log on the FortiGate disk:


date=2018-12-27 time=14:36:15 logid="1600061002" type="utm" subtype="ssh" eventtype="ssh-
command" level="notice" vd="vdom1" eventtime=1545950175 policyid=1 sessionid=12921
user="bob" profile="test-ssh" srcip=10.1.100.11 srcport=56698 dstip=172.16.200.55
dstport=22 srcintf="port12" srcintfrole="lan" dstintf="port11" dstintfrole="wan"
proto=6 action="passthrough" direction="outgoing" login="root" command="ls"
severity="low"

The following is an example of an SSH sent in CEF format to a syslog server:


Dec 27 14:36:15 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|61002|utm:ssh ssh-command
passthrough|3|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=1600061002 cat=utm:ssh
FTNTFGTsubtype=ssh FTNTFGTeventtype=ssh-command FTNTFGTlevel=notice FTNTFGTvd=vdom1
FTNTFGTeventtime=1545950175 FTNTFGTpolicyid=1 externalId=12921 duser=bob
FTNTFGTprofile=test-ssh src=10.1.100.11 spt=56698 dst=172.16.200.55 dpt=22
deviceInboundInterface=port12 FTNTFGTsrcintfrole=lan deviceOutboundInterface=port11
FTNTFGTdstintfrole=wan proto=6 act=passthrough FTNTFGTlogin=root FTNTFGTcommand=ls
FTNTFGTseverity=low

FortiOS 7.2.1 Log Reference 67


Fortinet Inc.
UTM extended logging

FortiOS 6.0.0 and later supports extended logging for UTM log types to reliable Syslog servers over TCP. Extended
logging adds HTTP header information to the rawdata field in UTM log types. You must enable extended logging before
you can use the feature.
When extended logging is enabled, the following HTTP header information can be added to the rawdata field in
UTM logs:
l Method
l X-Forwarded-For
l Request-Content-Type | Response-Content-Type
l Referer
l User-Agent
The full rawdata field of 20KB is only sent to reliable Syslog servers. Other logging devices, such as disk, FortiAnalyzer,
and UDP Syslog servers, receive the information, but only keep a maximum of 2KB total log length, including the
rawdata field, and discard the rest of the extended log information.

Enabling extended logging

You can enable extended logging for the following UTM profiles:
l antivirus
l application
l dlp
l ips
l waf
l webfilter
When you enable the extended-log option for UTM profiles, all HTTP header information for HTTP-deny traffic is
logged.
When you enable the web-extended-all-action-log-enable option for webfilter profile, all HTTP header
information for HTTP-allow traffic is logged.

Extended logging option in UTM profiles

The extended-log option has been added to all UTM profiles, for example:
config webfilter profile
edit "test-webfilter"
set extended-log enable
set web-extended-all-action-log enable
next
end

FortiOS 7.2.1 Log Reference 68


Fortinet Inc.
UTM extended logging

config antivirus profile


edit "av-proxy-test"
set extended-log enable
next
end
config waf profile
edit "test-waf"
set extended-log enable
next
end

Syslog server mode

The Syslog server mode changed to udp, reliable, and legacy-reliable. You must set the mode to reliable to
support extended logging, for example:
config log syslogd setting
set status enable
set server "<ip address>"
set mode reliable
set facility local6
end

Example of an extended log

Following is an example extended log for a utm log type with a webfilter subtype for a reliable Syslog server. The
rawdata field contains the extended log data.
2: date=2022-03-07 time=14:15:27 eventtime=1646691327786322587 tz="-0800" logid="0316013056"
type="utm" subtype="webfilter" eventtype="ftgd_blk" level="warning" vd="vdom1" policyid=1
poluuid="fe85f37c-9dd9-51ec-904d-5af91079efbb" policytype="policy" sessionid=7284
srcip=10.1.100.18 srcport=50856 srccountry="Reserved" srcintf="port2"
srcintfrole="undefined" srcuuid="69dc4a54-9d99-51ec-16ee-395d60cceac6" dstip=142.250.69.196
dstport=443 dstcountry="United States" dstintf="port1" dstintfrole="undefined"
dstuuid="69dc4a54-9d99-51ec-16ee-395d60cceac6" proto=6 httpmethod="GET" service="HTTPS"
hostname="http://www.google.com" forwardedfor="192.168.0.99" agent="curl/7.56.0"
profile="webfilter" action="blocked" reqtype="referral" url="https://www.google.com/"
referralurl="https://example.com/referer.html" sentbyte=869 rcvdbyte=4313
direction="outgoing" msg="URL belongs to a denied category in policy" ratemethod="domain"
cat=41 catdesc="Search Engines and Portals" rawdata="x-forwarded-for=192.168.0.99"

FortiOS 7.2.1 Log Reference 69


Fortinet Inc.
Log Messages

The following sections list the FortiOS 7.2.1 log messages by log ID number.

FortiOS 7.2.1 Log Reference 70


Fortinet Inc.
Anomaly

18432 - LOGID_ATTCK_ANOMALY_TCP_UDP

Message ID: 18432


Message Description: LOGID_ATTCK_ANOMALY_TCP_UDP
Message Meaning: Attack detected by UCP/TCP anomaly
Type: Anomaly
Category: ANOMALY
Severity: Alert

Log Field Name Description Data Type Length

action Action string 16

attack Attack string 256

attackid Attack ID uint32 10

count Count uint32 10

craction Client Reputation Action uint32 10

crlevel Client Reputation Level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Deivce ID string 16

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

eventtime Time when detection occured uint64 20

eventtype Event Type string 32

fctuid FortiClient UID string 32

group User Group Name string 512

level Log Level string 11

logid Log ID string 10

FortiOS 7.2.1 Log Reference 71


Fortinet Inc.
Log Field Name Description Data Type Length

msg Log Message string 518

policyid Policy ID uint32 10

policytype Policy type string 24

proto Protocol uint8 3

ref Reference string 4096

service Name of Service string 80

sessionid Session ID uint32 10

severity Severity string 8

srccountry Country name for Source IP string 64

srcdomain string 255

srcintf Source Interface string 64

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

subtype Log Subtype string 20

time Time string 8

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

user User string 256

vd Virtual Domain Name string 32

vrf Virtual router forwarding uint8 3

18433 - LOGID_ATTCK_ANOMALY_ICMP

Message ID: 18433


Message Description: LOGID_ATTCK_ANOMALY_ICMP
Message Meaning: Attack detected by ICMP anomaly
Type: Anomaly
Category: ANOMALY
Severity: Alert

FortiOS 7.2.1 Log Reference 72


Fortinet Inc.
Log Field Name Description Data Type Length

action Action string 16

attack Attack string 256

attackid Attack ID uint32 10

count Count uint32 10

craction Client Reputation Action uint32 10

crlevel Client Reputation Level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Deivce ID string 16

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

eventtime Time when detection occured uint64 20

eventtype Event Type string 32

fctuid FortiClient UID string 32

group User Group Name string 512

level Log Level string 11

logid Log ID string 10

msg Log Message string 518

policyid Policy ID uint32 10

policytype Policy type string 24

proto Protocol uint8 3

ref Reference string 4096

service Name of Service string 80

sessionid Session ID uint32 10

severity Severity string 8

srccountry Country name for Source IP string 64

srcdomain string 255

srcintf Source Interface string 64

FortiOS 7.2.1 Log Reference 73


Fortinet Inc.
Log Field Name Description Data Type Length

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

subtype Log Subtype string 20

time Time string 8

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

user User string 256

vd Virtual Domain Name string 32

vrf Virtual router forwarding uint8 3

icmpcode ICMP code string 6

icmpid ICMP ID string 8

icmptype ICMP Type string 6

18434 - LOGID_ATTCK_ANOMALY_OTHERS

Message ID: 18434


Message Description: LOGID_ATTCK_ANOMALY_OTHERS
Message Meaning: Attack detected by other anomaly
Type: Anomaly
Category: ANOMALY
Severity: Alert

Log Field Name Description Data Type Length

action Action string 16

attack Attack string 256

attackid Attack ID uint32 10

count Count uint32 10

craction Client Reputation Action uint32 10

crlevel Client Reputation Level string 10

crscore Client Reputation Score uint32 10

FortiOS 7.2.1 Log Reference 74


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

devid Deivce ID string 16

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

eventtime Time when detection occured uint64 20

eventtype Event Type string 32

fctuid FortiClient UID string 32

group User Group Name string 512

level Log Level string 11

logid Log ID string 10

msg Log Message string 518

policyid Policy ID uint32 10

policytype Policy type string 24

proto Protocol uint8 3

ref Reference string 4096

service Name of Service string 80

sessionid Session ID uint32 10

severity Severity string 8

srccountry Country name for Source IP string 64

srcdomain string 255

srcintf Source Interface string 64

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

subtype Log Subtype string 20

time Time string 8

type Log Type string 16

FortiOS 7.2.1 Log Reference 75


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

user User string 256

vd Virtual Domain Name string 32

vrf Virtual router forwarding uint8 3

FortiOS 7.2.1 Log Reference 76


Fortinet Inc.
App

28672 - LOGID_APP_CTRL_IM_BASIC

Message ID: 28672


Message Description: LOGID_APP_CTRL_IM_BASIC
Message Meaning: Application control IM-basic
Type: App
Category: SIGNATURE
Severity: Information

Log Field Name Description Data Type Length

action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking

app Application name string 96

appcat Application category name string 64

applist Application Control profile name string 64

authserver Authentication server for the user string 64

date Date string 10

devid Deivce ID string 16

direction Direction of the packets string 8

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

eventtime Event Time uint64 20

eventtype App Control Event Type string 32

fctuid FortiClient User ID string 32

group User group name string 512

level Log level string 11

FortiOS 7.2.1 Log Reference 77


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

policyid Policy ID uint32 10

profile string 36

profiletype Profile Type string 36

proto Protocol number uint8 3

service Service name string 80

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 64

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

subtype Log subtype string 20

time Time string 8

type Log type string 16

tz string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

user User name string 256

vd Virtual domain name string 32

vrf Virtual Routing Forwarding uint8 3

28673 - LOGID_APP_CTRL_IM_BASIC_WITH_STATUS

Message ID: 28673


Message Description: LOGID_APP_CTRL_IM_BASIC_WITH_STATUS
Message Meaning: Application control IM
Type: App
Category: SIGNATURE
Severity: Information

FortiOS 7.2.1 Log Reference 78


Fortinet Inc.
Log Field Name Description Data Type Length

action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking

app Application name string 96

appcat Application category name string 64

applist Application Control profile name string 64

authserver Authentication server for the user string 64

date Date string 10

devid Deivce ID string 16

direction Direction of the packets string 8

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

eventtime Event Time uint64 20

eventtype App Control Event Type string 32

fctuid FortiClient User ID string 32

group User group name string 512

level Log level string 11

logid Log ID string 10

policyid Policy ID uint32 10

profile string 36

profiletype Profile Type string 36

proto Protocol number uint8 3

service Service name string 80

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 64

FortiOS 7.2.1 Log Reference 79


Fortinet Inc.
Log Field Name Description Data Type Length

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

subtype Log subtype string 20

time Time string 8

type Log type string 16

tz string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

user User name string 256

vd Virtual domain name string 32

vrf Virtual Routing Forwarding uint8 3

28674 - LOGID_APP_CTRL_IM_BASIC_WITH_COUNT

Message ID: 28674


Message Description: LOGID_APP_CTRL_IM_BASIC_WITH_COUNT
Message Meaning: Application control IM (chat message count)
Type: App
Category: SIGNATURE
Severity: Information

Log Field Name Description Data Type Length

action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking

app Application name string 96

appcat Application category name string 64

applist Application Control profile name string 64

authserver Authentication server for the user string 64

date Date string 10

devid Deivce ID string 16

FortiOS 7.2.1 Log Reference 80


Fortinet Inc.
Log Field Name Description Data Type Length

direction Direction of the packets string 8

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

eventtime Event Time uint64 20

eventtype App Control Event Type string 32

fctuid FortiClient User ID string 32

group User group name string 512

level Log level string 11

logid Log ID string 10

policyid Policy ID uint32 10

profile string 36

profiletype Profile Type string 36

proto Protocol number uint8 3

service Service name string 80

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 64

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

subtype Log subtype string 20

time Time string 8

type Log type string 16

tz string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

FortiOS 7.2.1 Log Reference 81


Fortinet Inc.
Log Field Name Description Data Type Length

user User name string 256

vd Virtual domain name string 32

vrf Virtual Routing Forwarding uint8 3

28675 - LOGID_APP_CTRL_IM_FILE

Message ID: 28675


Message Description: LOGID_APP_CTRL_IM_FILE
Message Meaning: Application control IM (file)
Type: App
Category: SIGNATURE
Severity: Information

Log Field Name Description Data Type Length

action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking

app Application name string 96

appcat Application category name string 64

applist Application Control profile name string 64

authserver Authentication server for the user string 64

date Date string 10

devid Deivce ID string 16

direction Direction of the packets string 8

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

eventtime Event Time uint64 20

eventtype App Control Event Type string 32

fctuid FortiClient User ID string 32

FortiOS 7.2.1 Log Reference 82


Fortinet Inc.
Log Field Name Description Data Type Length

group User group name string 512

level Log level string 11

logid Log ID string 10

policyid Policy ID uint32 10

profile string 36

profiletype Profile Type string 36

proto Protocol number uint8 3

service Service name string 80

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 64

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

subtype Log subtype string 20

time Time string 8

type Log type string 16

tz string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

user User name string 256

vd Virtual domain name string 32

vrf Virtual Routing Forwarding uint8 3

28676 - LOGID_APP_CTRL_IM_CHAT

Message ID: 28676


Message Description: LOGID_APP_CTRL_IM_CHAT
Message Meaning: Application control IM (chat)
Type: App
Category: SIGNATURE
Severity: Information

FortiOS 7.2.1 Log Reference 83


Fortinet Inc.
Log Field Name Description Data Type Length

action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking

app Application name string 96

appcat Application category name string 64

applist Application Control profile name string 64

authserver Authentication server for the user string 64

date Date string 10

devid Deivce ID string 16

direction Direction of the packets string 8

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

eventtime Event Time uint64 20

eventtype App Control Event Type string 32

fctuid FortiClient User ID string 32

group User group name string 512

level Log level string 11

logid Log ID string 10

policyid Policy ID uint32 10

profile string 36

profiletype Profile Type string 36

proto Protocol number uint8 3

service Service name string 80

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 64

FortiOS 7.2.1 Log Reference 84


Fortinet Inc.
Log Field Name Description Data Type Length

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

subtype Log subtype string 20

time Time string 8

type Log type string 16

tz string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

user User name string 256

vd Virtual domain name string 32

vrf Virtual Routing Forwarding uint8 3

28677 - LOGID_APP_CTRL_IM_CHAT_BLOCK

Message ID: 28677


Message Description: LOGID_APP_CTRL_IM_CHAT_BLOCK
Message Meaning: Application control IM (chat blocked)
Type: App
Category: SIGNATURE
Severity: Information

Log Field Name Description Data Type Length

action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking

app Application name string 96

appcat Application category name string 64

applist Application Control profile name string 64

authserver Authentication server for the user string 64

date Date string 10

devid Deivce ID string 16

FortiOS 7.2.1 Log Reference 85


Fortinet Inc.
Log Field Name Description Data Type Length

direction Direction of the packets string 8

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

eventtime Event Time uint64 20

eventtype App Control Event Type string 32

fctuid FortiClient User ID string 32

group User group name string 512

level Log level string 11

logid Log ID string 10

policyid Policy ID uint32 10

profile string 36

profiletype Profile Type string 36

proto Protocol number uint8 3

service Service name string 80

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 64

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

subtype Log subtype string 20

time Time string 8

type Log type string 16

tz string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

FortiOS 7.2.1 Log Reference 86


Fortinet Inc.
Log Field Name Description Data Type Length

user User name string 256

vd Virtual domain name string 32

vrf Virtual Routing Forwarding uint8 3

28678 - LOGID_APP_CTRL_IM_BLOCK

Message ID: 28678


Message Description: LOGID_APP_CTRL_IM_BLOCK
Message Meaning: Application control IM (blocked)
Type: App
Category: SIGNATURE
Severity: Information

Log Field Name Description Data Type Length

action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking

app Application name string 96

appcat Application category name string 64

applist Application Control profile name string 64

authserver Authentication server for the user string 64

date Date string 10

devid Deivce ID string 16

direction Direction of the packets string 8

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

eventtime Event Time uint64 20

eventtype App Control Event Type string 32

fctuid FortiClient User ID string 32

FortiOS 7.2.1 Log Reference 87


Fortinet Inc.
Log Field Name Description Data Type Length

group User group name string 512

level Log level string 11

logid Log ID string 10

policyid Policy ID uint32 10

profile string 36

profiletype Profile Type string 36

proto Protocol number uint8 3

service Service name string 80

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 64

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

subtype Log subtype string 20

time Time string 8

type Log type string 16

tz string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

user User name string 256

vd Virtual domain name string 32

vrf Virtual Routing Forwarding uint8 3

28704 - LOGID_APP_CTRL_IPS_PASS

Message ID: 28704


Message Description: LOGID_APP_CTRL_IPS_PASS
Message Meaning: Application control (IPS) (pass)
Type: App
Category: SIGNATURE
Severity: Information

FortiOS 7.2.1 Log Reference 88


Fortinet Inc.
Log Field Name Description Data Type Length

action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking

app Application name string 96

appcat Application category name string 64

applist Application Control profile name string 64

authserver Authentication server for the user string 64

date Date string 10

devid Deivce ID string 16

direction Direction of the packets string 8

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

eventtime Event Time uint64 20

eventtype App Control Event Type string 32

fctuid FortiClient User ID string 32

group User group name string 512

level Log level string 11

logid Log ID string 10

policyid Policy ID uint32 10

profile string 36

profiletype Profile Type string 36

proto Protocol number uint8 3

service Service name string 80

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 64

FortiOS 7.2.1 Log Reference 89


Fortinet Inc.
Log Field Name Description Data Type Length

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

subtype Log subtype string 20

time Time string 8

type Log type string 16

tz string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

user User name string 256

vd Virtual domain name string 32

vrf Virtual Routing Forwarding uint8 3

agent string 1024

appid Application ID uint32 10

apprisk Application risk level string 16

ccertissuer string 64

cloudaction Action performed by cloud application string 32

clouddevice string 256

clouduser User login ID detected by the Deep Application Control feature string 256

craction Client Reputation Action uint32 10

crlevel Client Reputation Level string 10

crscore Client Reputation Score uint32 10

dstauthserver string 64

dstuser string 256

filename File name string 256

filesize File size in bytes uint64 10

forwardedfor Forwarded For string 128

hostname The host name of a URL string 256

httpmethod string 20

incidentserialno Incident serial number uint32 10

FortiOS 7.2.1 Log Reference 90


Fortinet Inc.
Log Field Name Description Data Type Length

msg Log message string 512

parameters string 512

pdstport uint16 5

policymode string 8

policytype string 24

poluuid string 37

psrcport uint16 5

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rawdataid string 10

referralurl string 512

scertcname server certificate name string 64

scertissuer server certificate issuer string 64

trueclntip True-Client-IP ip 39

url The URL address string 512

28705 - LOGID_APP_CTRL_IPS_BLOCK

Message ID: 28705


Message Description: LOGID_APP_CTRL_IPS_BLOCK
Message Meaning: Application control (IPS) (block)
Type: App
Category: SIGNATURE
Severity: Warning

Log Field Name Description Data Type Length

action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking

app Application name string 96

appcat Application category name string 64

applist Application Control profile name string 64

FortiOS 7.2.1 Log Reference 91


Fortinet Inc.
Log Field Name Description Data Type Length

authserver Authentication server for the user string 64

date Date string 10

devid Deivce ID string 16

direction Direction of the packets string 8

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

eventtime Event Time uint64 20

eventtype App Control Event Type string 32

fctuid FortiClient User ID string 32

group User group name string 512

level Log level string 11

logid Log ID string 10

policyid Policy ID uint32 10

profile string 36

profiletype Profile Type string 36

proto Protocol number uint8 3

service Service name string 80

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 64

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

subtype Log subtype string 20

time Time string 8

type Log type string 16

FortiOS 7.2.1 Log Reference 92


Fortinet Inc.
Log Field Name Description Data Type Length

tz string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

user User name string 256

vd Virtual domain name string 32

vrf Virtual Routing Forwarding uint8 3

agent string 1024

appid Application ID uint32 10

apprisk Application risk level string 16

ccertissuer string 64

cloudaction Action performed by cloud application string 32

clouddevice string 256

clouduser User login ID detected by the Deep Application Control feature string 256

craction Client Reputation Action uint32 10

crlevel Client Reputation Level string 10

crscore Client Reputation Score uint32 10

dstauthserver string 64

dstuser string 256

filename File name string 256

filesize File size in bytes uint64 10

forwardedfor Forwarded For string 128

hostname The host name of a URL string 256

httpmethod string 20

incidentserialno Incident serial number uint32 10

msg Log message string 512

parameters string 512

pdstport uint16 5

policymode string 8

policytype string 24

poluuid string 37

FortiOS 7.2.1 Log Reference 93


Fortinet Inc.
Log Field Name Description Data Type Length

psrcport uint16 5

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rawdataid string 10

referralurl string 512

scertcname server certificate name string 64

scertissuer server certificate issuer string 64

trueclntip True-Client-IP ip 39

url The URL address string 512

28706 - LOGID_APP_CTRL_IPS_RESET

Message ID: 28706


Message Description: LOGID_APP_CTRL_IPS_RESET
Message Meaning: Application control (IPS) (reset)
Type: App
Category: SIGNATURE
Severity: Warning

Log Field Name Description Data Type Length

action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking

app Application name string 96

appcat Application category name string 64

applist Application Control profile name string 64

authserver Authentication server for the user string 64

date Date string 10

devid Deivce ID string 16

direction Direction of the packets string 8

dstcountry string 64

dstintf Destination Interface string 64

FortiOS 7.2.1 Log Reference 94


Fortinet Inc.
Log Field Name Description Data Type Length

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

eventtime Event Time uint64 20

eventtype App Control Event Type string 32

fctuid FortiClient User ID string 32

group User group name string 512

level Log level string 11

logid Log ID string 10

policyid Policy ID uint32 10

profile string 36

profiletype Profile Type string 36

proto Protocol number uint8 3

service Service name string 80

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 64

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

subtype Log subtype string 20

time Time string 8

type Log type string 16

tz string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

user User name string 256

vd Virtual domain name string 32

vrf Virtual Routing Forwarding uint8 3

FortiOS 7.2.1 Log Reference 95


Fortinet Inc.
Log Field Name Description Data Type Length

agent string 1024

appid Application ID uint32 10

apprisk Application risk level string 16

ccertissuer string 64

cloudaction Action performed by cloud application string 32

clouddevice string 256

clouduser User login ID detected by the Deep Application Control feature string 256

craction Client Reputation Action uint32 10

crlevel Client Reputation Level string 10

crscore Client Reputation Score uint32 10

dstauthserver string 64

dstuser string 256

filename File name string 256

filesize File size in bytes uint64 10

forwardedfor Forwarded For string 128

hostname The host name of a URL string 256

httpmethod string 20

incidentserialno Incident serial number uint32 10

msg Log message string 512

parameters string 512

pdstport uint16 5

policymode string 8

policytype string 24

poluuid string 37

psrcport uint16 5

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rawdataid string 10

referralurl string 512

scertcname server certificate name string 64

FortiOS 7.2.1 Log Reference 96


Fortinet Inc.
Log Field Name Description Data Type Length

scertissuer server certificate issuer string 64

trueclntip True-Client-IP ip 39

url The URL address string 512

28720 - LOGID_APP_CTRL_SSH_PASS

Message ID: 28720


Message Description: LOGID_APP_CTRL_SSH_PASS
Message Meaning: Application control IM (SSH) (pass)
Type: App
Category: SIGNATURE
Severity: Information

Log Field Name Description Data Type Length

action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking

app Application name string 96

appcat Application category name string 64

applist Application Control profile name string 64

authserver Authentication server for the user string 64

date Date string 10

devid Deivce ID string 16

direction Direction of the packets string 8

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

eventtime Event Time uint64 20

eventtype App Control Event Type string 32

fctuid FortiClient User ID string 32

FortiOS 7.2.1 Log Reference 97


Fortinet Inc.
Log Field Name Description Data Type Length

group User group name string 512

level Log level string 11

logid Log ID string 10

policyid Policy ID uint32 10

profile string 36

profiletype Profile Type string 36

proto Protocol number uint8 3

service Service name string 80

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 64

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

subtype Log subtype string 20

time Time string 8

type Log type string 16

tz string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

user User name string 256

vd Virtual domain name string 32

vrf Virtual Routing Forwarding uint8 3

28721 - LOGID_APP_CTRL_SSH_BLOCK

Message ID: 28721


Message Description: LOGID_APP_CTRL_SSH_BLOCK
Message Meaning: Application control IM (SSH) (block)
Type: App
Category: SIGNATURE
Severity: Warning

FortiOS 7.2.1 Log Reference 98


Fortinet Inc.
Log Field Name Description Data Type Length

action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking

app Application name string 96

appcat Application category name string 64

applist Application Control profile name string 64

authserver Authentication server for the user string 64

date Date string 10

devid Deivce ID string 16

direction Direction of the packets string 8

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

eventtime Event Time uint64 20

eventtype App Control Event Type string 32

fctuid FortiClient User ID string 32

group User group name string 512

level Log level string 11

logid Log ID string 10

policyid Policy ID uint32 10

profile string 36

profiletype Profile Type string 36

proto Protocol number uint8 3

service Service name string 80

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 64

FortiOS 7.2.1 Log Reference 99


Fortinet Inc.
Log Field Name Description Data Type Length

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

subtype Log subtype string 20

time Time string 8

type Log type string 16

tz string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

user User name string 256

vd Virtual domain name string 32

vrf Virtual Routing Forwarding uint8 3

28736 - LOGID_APP_CTRL_PORT_ENF

Message ID: 28736


Message Description: LOGID_APP_CTRL_PORT_ENF
Message Meaning: Application control port enforcement
Type: App
Category: PORT-VIOLATION
Severity: Warning

Log Field Name Description Data Type Length

action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking

agent string 1024

app Application name string 96

appcat Application category name string 64

appid Application ID uint32 10

applist Application Control profile name string 64

apprisk Application risk level string 16

FortiOS 7.2.1 Log Reference 100


Fortinet Inc.
Log Field Name Description Data Type Length

authserver Authentication server for the user string 64

ccertissuer string 64

cloudaction Action performed by cloud application string 32

clouddevice string 256

clouduser User login ID detected by the Deep Application Control feature string 256

craction Client Reputation Action uint32 10

crlevel Client Reputation Level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Deivce ID string 16

direction Direction of the packets string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

eventtime Event Time uint64 20

eventtype App Control Event Type string 32

fctuid FortiClient User ID string 32

filename File name string 256

filesize File size in bytes uint64 10

forwardedfor Forwarded For string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

incidentserialno Incident serial number uint32 10

level Log level string 11

logid Log ID string 10

FortiOS 7.2.1 Log Reference 101


Fortinet Inc.
Log Field Name Description Data Type Length

msg Log message string 512

parameters string 512

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile string 36

profiletype Profile Type string 36

proto Protocol number uint8 3

psrcport uint16 5

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rawdataid string 10

referralurl string 512

scertcname server certificate name string 64

scertissuer server certificate issuer string 64

service Service name string 80

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 64

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP ip 39

type Log type string 16

tz string 5

FortiOS 7.2.1 Log Reference 102


Fortinet Inc.
Log Field Name Description Data Type Length

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual Routing Forwarding uint8 3

28737 - LOGID_APP_CTRL_PROTO_ENF

Message ID: 28737


Message Description: LOGID_APP_CTRL_PROTO_ENF
Message Meaning: Application control protocol enforcement
Type: App
Category: PROTOCOL-VIOLATION
Severity: Warning

Log Field Name Description Data Type Length

action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking

agent string 1024

app Application name string 96

appcat Application category name string 64

appid Application ID uint32 10

applist Application Control profile name string 64

apprisk Application risk level string 16

authserver Authentication server for the user string 64

ccertissuer string 64

cloudaction Action performed by cloud application string 32

clouddevice string 256

clouduser User login ID detected by the Deep Application Control feature string 256

craction Client Reputation Action uint32 10

FortiOS 7.2.1 Log Reference 103


Fortinet Inc.
Log Field Name Description Data Type Length

crlevel Client Reputation Level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Deivce ID string 16

direction Direction of the packets string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

eventtime Event Time uint64 20

eventtype App Control Event Type string 32

fctuid FortiClient User ID string 32

filename File name string 256

filesize File size in bytes uint64 10

forwardedfor Forwarded For string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

incidentserialno Incident serial number uint32 10

level Log level string 11

logid Log ID string 10

msg Log message string 512

parameters string 512

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

FortiOS 7.2.1 Log Reference 104


Fortinet Inc.
Log Field Name Description Data Type Length

poluuid string 37

profile string 36

profiletype Profile Type string 36

proto Protocol number uint8 3

psrcport uint16 5

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rawdataid string 10

referralurl string 512

scertcname server certificate name string 64

scertissuer server certificate issuer string 64

service Service name string 80

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 64

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP ip 39

type Log type string 16

tz string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual Routing Forwarding uint8 3

FortiOS 7.2.1 Log Reference 105


Fortinet Inc.
AV

8192 - MESGID_INFECT_WARNING

Message ID: 8192


Message Description: MESGID_INFECT_WARNING
Message Meaning: Infected file detected by the FortiGate unit and blocked
Type: AV
Category: INFECTED
Severity: Warning

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

FortiOS 7.2.1 Log Reference 106


Fortinet Inc.
Log Field Name Description Data Type Length

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

FortiOS 7.2.1 Log Reference 107


Fortinet Inc.
Log Field Name Description Data Type Length

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

FortiOS 7.2.1 Log Reference 108


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8193 - MESGID_INFECT_NOTIF

Message ID: 8193


Message Description: MESGID_INFECT_NOTIF
Message Meaning: Infected file detected by the FortiGate unit and it passed
Type: AV
Category: INFECTED
Severity: Notice

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

FortiOS 7.2.1 Log Reference 109


Fortinet Inc.
Log Field Name Description Data Type Length

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

FortiOS 7.2.1 Log Reference 110


Fortinet Inc.
Log Field Name Description Data Type Length

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

FortiOS 7.2.1 Log Reference 111


Fortinet Inc.
Log Field Name Description Data Type Length

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

FortiOS 7.2.1 Log Reference 112


Fortinet Inc.
8194 - MESGID_INFECT_MIME_WARNING

Message ID: 8194


Message Description: MESGID_INFECT_MIME_WARNING
Message Meaning: MIME header detected to have a virus and blocked
Type: AV
Category: INFECTED
Severity: Warning

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

FortiOS 7.2.1 Log Reference 113


Fortinet Inc.
Log Field Name Description Data Type Length

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

FortiOS 7.2.1 Log Reference 114


Fortinet Inc.
Log Field Name Description Data Type Length

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

FortiOS 7.2.1 Log Reference 115


Fortinet Inc.
Log Field Name Description Data Type Length

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8195 - MESGID_INFECT_MIME_NOTIF

Message ID: 8195


Message Description: MESGID_INFECT_MIME_NOTIF
Message Meaning: MIME header infected and passed
Type: AV
Category: INFECTED
Severity: Notice

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

FortiOS 7.2.1 Log Reference 116


Fortinet Inc.
Log Field Name Description Data Type Length

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

FortiOS 7.2.1 Log Reference 117


Fortinet Inc.
Log Field Name Description Data Type Length

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

FortiOS 7.2.1 Log Reference 118


Fortinet Inc.
Log Field Name Description Data Type Length

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8200 - MESGID_MIME_FILETYPE_EXE_WARNING

Message ID: 8200


Message Description: MESGID_MIME_FILETYPE_EXE_WARNING
Message Meaning: File is an executable (warning)

FortiOS 7.2.1 Log Reference 119


Fortinet Inc.
Type: AV
Category: FILETYPE-EXECUTABLE
Severity: Warning

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

checksum The checksum of the scanned file string 16

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

FortiOS 7.2.1 Log Reference 120


Fortinet Inc.
Log Field Name Description Data Type Length

filename File name string 256

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

recipient Email addresses from the SMTP envelope string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

FortiOS 7.2.1 Log Reference 121


Fortinet Inc.
Log Field Name Description Data Type Length

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

user Username (authentication) string 256

vd VDOM name string 32

vrf uint8 3

8201 - MESGID_MIME_FILETYPE_EXE_NOTIF

Message ID: 8201


Message Description: MESGID_MIME_FILETYPE_EXE_NOTIF
Message Meaning: File is an executable (notice)
Type: AV
Category: FILETYPE-EXECUTABLE
Severity: Notice

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

FortiOS 7.2.1 Log Reference 122


Fortinet Inc.
Log Field Name Description Data Type Length

checksum The checksum of the scanned file string 16

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filename File name string 256

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

FortiOS 7.2.1 Log Reference 123


Fortinet Inc.
Log Field Name Description Data Type Length

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

recipient Email addresses from the SMTP envelope string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

user Username (authentication) string 256

vd VDOM name string 32

vrf uint8 3

FortiOS 7.2.1 Log Reference 124


Fortinet Inc.
8202 - MESGID_AVQUERY_WARNING

Message ID: 8202


Message Description: MESGID_AVQUERY_WARNING
Message Meaning: File reported infected by Outbreak Prevention (warning)
Type: AV
Category: OUTBREAK-PREVENTION
Severity: Warning

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

FortiOS 7.2.1 Log Reference 125


Fortinet Inc.
Log Field Name Description Data Type Length

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

FortiOS 7.2.1 Log Reference 126


Fortinet Inc.
Log Field Name Description Data Type Length

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

FortiOS 7.2.1 Log Reference 127


Fortinet Inc.
Log Field Name Description Data Type Length

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8203 - MESGID_AVQUERY_NOTIF

Message ID: 8203


Message Description: MESGID_AVQUERY_NOTIF
Message Meaning: File reported infected by Outbreak Prevention (notice)
Type: AV
Category: OUTBREAK-PREVENTION
Severity: Notice

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

FortiOS 7.2.1 Log Reference 128


Fortinet Inc.
Log Field Name Description Data Type Length

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

FortiOS 7.2.1 Log Reference 129


Fortinet Inc.
Log Field Name Description Data Type Length

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

FortiOS 7.2.1 Log Reference 130


Fortinet Inc.
Log Field Name Description Data Type Length

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8204 - MESGID_MIME_AVQUERY_WARNING

Message ID: 8204


Message Description: MESGID_MIME_AVQUERY_WARNING
Message Meaning: MIME data reported infected by Outbreak Prevention (warning)

FortiOS 7.2.1 Log Reference 131


Fortinet Inc.
Type: AV
Category: OUTBREAK-PREVENTION
Severity: Warning

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

FortiOS 7.2.1 Log Reference 132


Fortinet Inc.
Log Field Name Description Data Type Length

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

FortiOS 7.2.1 Log Reference 133


Fortinet Inc.
Log Field Name Description Data Type Length

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

FortiOS 7.2.1 Log Reference 134


Fortinet Inc.
Log Field Name Description Data Type Length

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8205 - MESGID_MIME_AVQUERY_NOTIF

Message ID: 8205


Message Description: MESGID_MIME_AVQUERY_NOTIF
Message Meaning: MIME data reported infected by Outbreak Prevention (notice)
Type: AV
Category: OUTBREAK-PREVENTION
Severity: Notice

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

FortiOS 7.2.1 Log Reference 135


Fortinet Inc.
Log Field Name Description Data Type Length

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

FortiOS 7.2.1 Log Reference 136


Fortinet Inc.
Log Field Name Description Data Type Length

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

FortiOS 7.2.1 Log Reference 137


Fortinet Inc.
Log Field Name Description Data Type Length

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8212 - MESGID_MALWARE_LIST_WARNING

Message ID: 8212


Message Description: MESGID_MALWARE_LIST_WARNING
Message Meaning: File reported infected by external malware list (warning)
Type: AV
Category: MALWARE-LIST
Severity: Warning

FortiOS 7.2.1 Log Reference 138


Fortinet Inc.
Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

FortiOS 7.2.1 Log Reference 139


Fortinet Inc.
Log Field Name Description Data Type Length

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

FortiOS 7.2.1 Log Reference 140


Fortinet Inc.
Log Field Name Description Data Type Length

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

FortiOS 7.2.1 Log Reference 141


Fortinet Inc.
Log Field Name Description Data Type Length

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8213 - MESGID_MALWARE_LIST_NOTIF

Message ID: 8213


Message Description: MESGID_MALWARE_LIST_NOTIF
Message Meaning: File reported infected by external malware list (notice)
Type: AV
Category: MALWARE-LIST
Severity: Notice

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

FortiOS 7.2.1 Log Reference 142


Fortinet Inc.
Log Field Name Description Data Type Length

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

FortiOS 7.2.1 Log Reference 143


Fortinet Inc.
Log Field Name Description Data Type Length

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

FortiOS 7.2.1 Log Reference 144


Fortinet Inc.
Log Field Name Description Data Type Length

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8214 - MESGID_MIME_MALWARE_LIST_WARNING

Message ID: 8214


Message Description: MESGID_MIME_MALWARE_LIST_WARNING
Message Meaning: MIME data reported infected by external malware list (warning)
Type: AV
Category: MALWARE-LIST
Severity: Warning

FortiOS 7.2.1 Log Reference 145


Fortinet Inc.
Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

FortiOS 7.2.1 Log Reference 146


Fortinet Inc.
Log Field Name Description Data Type Length

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

FortiOS 7.2.1 Log Reference 147


Fortinet Inc.
Log Field Name Description Data Type Length

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

FortiOS 7.2.1 Log Reference 148


Fortinet Inc.
Log Field Name Description Data Type Length

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8215 - MESGID_MIME_MALWARE_LIST_NOTIF

Message ID: 8215


Message Description: MESGID_MIME_MALWARE_LIST_NOTIF
Message Meaning: MIME data reported infected by external malware list (notice)
Type: AV
Category: MALWARE-LIST
Severity: Notice

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

FortiOS 7.2.1 Log Reference 149


Fortinet Inc.
Log Field Name Description Data Type Length

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

FortiOS 7.2.1 Log Reference 150


Fortinet Inc.
Log Field Name Description Data Type Length

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

FortiOS 7.2.1 Log Reference 151


Fortinet Inc.
Log Field Name Description Data Type Length

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8216 - MESGID_FILE_HASH_EMS_WARNING

Message ID: 8216


Message Description: MESGID_FILE_HASH_EMS_WARNING
Message Meaning: File reported infected by EMS threat feed (warning)
Type: AV
Category: EMS-THREAT-FEED
Severity: Warning

Log Field Name Description Data Type Length

action string 18

agent string 1024

FortiOS 7.2.1 Log Reference 152


Fortinet Inc.
Log Field Name Description Data Type Length

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

filetype string 16

FortiOS 7.2.1 Log Reference 153


Fortinet Inc.
Log Field Name Description Data Type Length

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

recipient string 512

FortiOS 7.2.1 Log Reference 154


Fortinet Inc.
Log Field Name Description Data Type Length

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

FortiOS 7.2.1 Log Reference 155


Fortinet Inc.
8217 - MESGID_FILE_HASH_EMS_NOTIF

Message ID: 8217


Message Description: MESGID_FILE_HASH_EMS_NOTIF
Message Meaning: File reported infected by EMS threat feed (notice)
Type: AV
Category: EMS-THREAT-FEED
Severity: Notice

Log Field Name Description Data Type Length

action string 18

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

FortiOS 7.2.1 Log Reference 156


Fortinet Inc.
Log Field Name Description Data Type Length

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

FortiOS 7.2.1 Log Reference 157


Fortinet Inc.
Log Field Name Description Data Type Length

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

FortiOS 7.2.1 Log Reference 158


Fortinet Inc.
Log Field Name Description Data Type Length

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

8218 - MESGID_MIME_FILE_HASH_EMS_WARNING

Message ID: 8218


Message Description: MESGID_MIME_FILE_HASH_EMS_WARNING
Message Meaning: MIME data reported infected by EMS threat feed (warning)
Type: AV
Category: EMS-THREAT-FEED
Severity: Warning

Log Field Name Description Data Type Length

action string 18

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

FortiOS 7.2.1 Log Reference 159


Fortinet Inc.
Log Field Name Description Data Type Length

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

FortiOS 7.2.1 Log Reference 160


Fortinet Inc.
Log Field Name Description Data Type Length

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

FortiOS 7.2.1 Log Reference 161


Fortinet Inc.
Log Field Name Description Data Type Length

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

8219 - MESGID_MIME_FILE_HASH_EMS_NOTIF

Message ID: 8219


Message Description: MESGID_MIME_FILE_HASH_EMS_NOTIF
Message Meaning: MIME data reported infected by EMS threat feed (notice)
Type: AV
Category: EMS-THREAT-FEED
Severity: Notice

Log Field Name Description Data Type Length

action string 18

FortiOS 7.2.1 Log Reference 162


Fortinet Inc.
Log Field Name Description Data Type Length

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

FortiOS 7.2.1 Log Reference 163


Fortinet Inc.
Log Field Name Description Data Type Length

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

FortiOS 7.2.1 Log Reference 164


Fortinet Inc.
Log Field Name Description Data Type Length

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

FortiOS 7.2.1 Log Reference 165


Fortinet Inc.
8220 - MESGID_ICB_FAI_WARNING

Message ID: 8220


Message Description: MESGID_ICB_FAI_WARNING
Message Meaning: File reported infected by FortiNDR (warning)
Type: AV
Category: FORTINDR
Severity: Warning

Log Field Name Description Data Type Length

action string 18

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

FortiOS 7.2.1 Log Reference 166


Fortinet Inc.
Log Field Name Description Data Type Length

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

FortiOS 7.2.1 Log Reference 167


Fortinet Inc.
Log Field Name Description Data Type Length

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

FortiOS 7.2.1 Log Reference 168


Fortinet Inc.
Log Field Name Description Data Type Length

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

8221 - MESGID_ICB_FAI_NOTIF

Message ID: 8221


Message Description: MESGID_ICB_FAI_NOTIF
Message Meaning: File reported infected by FortiNDR (notice)
Type: AV
Category: FORTINDR
Severity: Notice

Log Field Name Description Data Type Length

action string 18

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

FortiOS 7.2.1 Log Reference 169


Fortinet Inc.
Log Field Name Description Data Type Length

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

FortiOS 7.2.1 Log Reference 170


Fortinet Inc.
Log Field Name Description Data Type Length

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

FortiOS 7.2.1 Log Reference 171


Fortinet Inc.
Log Field Name Description Data Type Length

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

8222 - MESGID_MIME_ICB_FAI_WARNING

Message ID: 8222


Message Description: MESGID_MIME_ICB_FAI_WARNING
Message Meaning: MIME data reported infected by FortiNDR (warning)
Type: AV
Category: FORTINDR
Severity: Warning

Log Field Name Description Data Type Length

action string 18

FortiOS 7.2.1 Log Reference 172


Fortinet Inc.
Log Field Name Description Data Type Length

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

FortiOS 7.2.1 Log Reference 173


Fortinet Inc.
Log Field Name Description Data Type Length

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

FortiOS 7.2.1 Log Reference 174


Fortinet Inc.
Log Field Name Description Data Type Length

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

FortiOS 7.2.1 Log Reference 175


Fortinet Inc.
8223 - MESGID_MIME_ICB_FAI_NOTIF

Message ID: 8223


Message Description: MESGID_MIME_ICB_FAI_NOTIF
Message Meaning: MIME data reported infected by FortiNDR (notice)
Type: AV
Category: FORTINDR
Severity: Notice

Log Field Name Description Data Type Length

action string 18

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

FortiOS 7.2.1 Log Reference 176


Fortinet Inc.
Log Field Name Description Data Type Length

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

FortiOS 7.2.1 Log Reference 177


Fortinet Inc.
Log Field Name Description Data Type Length

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

FortiOS 7.2.1 Log Reference 178


Fortinet Inc.
Log Field Name Description Data Type Length

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

8224 - MESGID_ICB_FAI_TIMEOUT_WARNING

Message ID: 8224


Message Description: MESGID_ICB_FAI_TIMEOUT_WARNING
Message Meaning: FortiNDR scan timeout (warning)
Type: AV
Category: FORTINDR
Severity: Warning

Log Field Name Description Data Type Length

action string 18

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

FortiOS 7.2.1 Log Reference 179


Fortinet Inc.
Log Field Name Description Data Type Length

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

FortiOS 7.2.1 Log Reference 180


Fortinet Inc.
Log Field Name Description Data Type Length

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

FortiOS 7.2.1 Log Reference 181


Fortinet Inc.
Log Field Name Description Data Type Length

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

8225 - MESGID_ICB_FAI_TIMEOUT_NOTIF

Message ID: 8225


Message Description: MESGID_ICB_FAI_TIMEOUT_NOTIF
Message Meaning: FortiNDR scan timeout (notice)
Type: AV
Category: FORTINDR
Severity: Notice

Log Field Name Description Data Type Length

action string 18

FortiOS 7.2.1 Log Reference 182


Fortinet Inc.
Log Field Name Description Data Type Length

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

FortiOS 7.2.1 Log Reference 183


Fortinet Inc.
Log Field Name Description Data Type Length

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

FortiOS 7.2.1 Log Reference 184


Fortinet Inc.
Log Field Name Description Data Type Length

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

FortiOS 7.2.1 Log Reference 185


Fortinet Inc.
8226 - MESGID_MIME_ICB_FAI_TIMEOUT_WARNING

Message ID: 8226


Message Description: MESGID_MIME_ICB_FAI_TIMEOUT_WARNING
Message Meaning: MIME data reported FortiNDR scan timeout (warning)
Type: AV
Category: FORTINDR
Severity: Warning

Log Field Name Description Data Type Length

action string 18

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

FortiOS 7.2.1 Log Reference 186


Fortinet Inc.
Log Field Name Description Data Type Length

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

FortiOS 7.2.1 Log Reference 187


Fortinet Inc.
Log Field Name Description Data Type Length

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

FortiOS 7.2.1 Log Reference 188


Fortinet Inc.
Log Field Name Description Data Type Length

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

8227 - MESGID_MIME_ICB_FAI_TIMEOUT_NOTIF

Message ID: 8227


Message Description: MESGID_MIME_ICB_FAI_TIMEOUT_NOTIF
Message Meaning: MIME data reported FortiNDR scan timeout (notice)
Type: AV
Category: FORTINDR
Severity: Notice

Log Field Name Description Data Type Length

action string 18

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

FortiOS 7.2.1 Log Reference 189


Fortinet Inc.
Log Field Name Description Data Type Length

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

FortiOS 7.2.1 Log Reference 190


Fortinet Inc.
Log Field Name Description Data Type Length

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

FortiOS 7.2.1 Log Reference 191


Fortinet Inc.
Log Field Name Description Data Type Length

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

8228 - MESGID_ICB_FAI_ERROR_WARNING

Message ID: 8228


Message Description: MESGID_ICB_FAI_ERROR_WARNING
Message Meaning: FortiNDR scan error (warning)
Type: AV
Category: FORTINDR
Severity: Warning

Log Field Name Description Data Type Length

action string 18

FortiOS 7.2.1 Log Reference 192


Fortinet Inc.
Log Field Name Description Data Type Length

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

FortiOS 7.2.1 Log Reference 193


Fortinet Inc.
Log Field Name Description Data Type Length

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

FortiOS 7.2.1 Log Reference 194


Fortinet Inc.
Log Field Name Description Data Type Length

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

FortiOS 7.2.1 Log Reference 195


Fortinet Inc.
8229 - MESGID_ICB_FAI_ERROR_NOTIF

Message ID: 8229


Message Description: MESGID_ICB_FAI_ERROR_NOTIF
Message Meaning: FortiNDR scan error (notice)
Type: AV
Category: FORTINDR
Severity: Notice

Log Field Name Description Data Type Length

action string 18

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

FortiOS 7.2.1 Log Reference 196


Fortinet Inc.
Log Field Name Description Data Type Length

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

FortiOS 7.2.1 Log Reference 197


Fortinet Inc.
Log Field Name Description Data Type Length

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

FortiOS 7.2.1 Log Reference 198


Fortinet Inc.
Log Field Name Description Data Type Length

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

8230 - MESGID_MIME_ICB_FAI_ERROR_WARNING

Message ID: 8230


Message Description: MESGID_MIME_ICB_FAI_ERROR_WARNING
Message Meaning: MIME data reported FortiNDR scan error (warning)
Type: AV
Category: FORTINDR
Severity: Warning

Log Field Name Description Data Type Length

action string 18

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

FortiOS 7.2.1 Log Reference 199


Fortinet Inc.
Log Field Name Description Data Type Length

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

FortiOS 7.2.1 Log Reference 200


Fortinet Inc.
Log Field Name Description Data Type Length

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

FortiOS 7.2.1 Log Reference 201


Fortinet Inc.
Log Field Name Description Data Type Length

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

8231 - MESGID_MIME_ICB_FAI_ERROR_NOTIF

Message ID: 8231


Message Description: MESGID_MIME_ICB_FAI_ERROR_NOTIF
Message Meaning: MIME data reported FortiNDR scan error (notice)
Type: AV
Category: FORTINDR
Severity: Notice

Log Field Name Description Data Type Length

action string 18

FortiOS 7.2.1 Log Reference 202


Fortinet Inc.
Log Field Name Description Data Type Length

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

FortiOS 7.2.1 Log Reference 203


Fortinet Inc.
Log Field Name Description Data Type Length

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

FortiOS 7.2.1 Log Reference 204


Fortinet Inc.
Log Field Name Description Data Type Length

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

FortiOS 7.2.1 Log Reference 205


Fortinet Inc.
8232 - MESGID_ICB_FSA_WARNING

Message ID: 8232


Message Description: MESGID_ICB_FSA_WARNING
Message Meaning: File reported infected by FortiSandbox (warning)
Type: AV
Category: FORTISANDBOX
Severity: Warning

Log Field Name Description Data Type Length

action string 18

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

FortiOS 7.2.1 Log Reference 206


Fortinet Inc.
Log Field Name Description Data Type Length

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

FortiOS 7.2.1 Log Reference 207


Fortinet Inc.
Log Field Name Description Data Type Length

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

FortiOS 7.2.1 Log Reference 208


Fortinet Inc.
Log Field Name Description Data Type Length

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

8233 - MESGID_ICB_FSA_NOTIF

Message ID: 8233


Message Description: MESGID_ICB_FSA_NOTIF
Message Meaning: File reported infected by FortiSandbox (notice)
Type: AV
Category: FORTISANDBOX
Severity: Notice

Log Field Name Description Data Type Length

action string 18

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

FortiOS 7.2.1 Log Reference 209


Fortinet Inc.
Log Field Name Description Data Type Length

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

FortiOS 7.2.1 Log Reference 210


Fortinet Inc.
Log Field Name Description Data Type Length

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

FortiOS 7.2.1 Log Reference 211


Fortinet Inc.
Log Field Name Description Data Type Length

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

8234 - MESGID_MIME_ICB_FSA_WARNING

Message ID: 8234


Message Description: MESGID_MIME_ICB_FSA_WARNING
Message Meaning: MIME data reported infected by FortiSandbox (warning)
Type: AV
Category: FORTISANDBOX
Severity: Warning

Log Field Name Description Data Type Length

action string 18

FortiOS 7.2.1 Log Reference 212


Fortinet Inc.
Log Field Name Description Data Type Length

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

FortiOS 7.2.1 Log Reference 213


Fortinet Inc.
Log Field Name Description Data Type Length

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

FortiOS 7.2.1 Log Reference 214


Fortinet Inc.
Log Field Name Description Data Type Length

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

FortiOS 7.2.1 Log Reference 215


Fortinet Inc.
8235 - MESGID_MIME_ICB_FSA_NOTIF

Message ID: 8235


Message Description: MESGID_MIME_ICB_FSA_NOTIF
Message Meaning: MIME data reported infected by FortiSandbox (notice)
Type: AV
Category: FORTISANDBOX
Severity: Notice

Log Field Name Description Data Type Length

action string 18

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

FortiOS 7.2.1 Log Reference 216


Fortinet Inc.
Log Field Name Description Data Type Length

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

FortiOS 7.2.1 Log Reference 217


Fortinet Inc.
Log Field Name Description Data Type Length

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

FortiOS 7.2.1 Log Reference 218


Fortinet Inc.
Log Field Name Description Data Type Length

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

8236 - MESGID_ICB_FSA_TIMEOUT_WARNING

Message ID: 8236


Message Description: MESGID_ICB_FSA_TIMEOUT_WARNING
Message Meaning: FortiSandbox scan timeout (warning)
Type: AV
Category: FORTISANDBOX
Severity: Warning

Log Field Name Description Data Type Length

action string 18

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

FortiOS 7.2.1 Log Reference 219


Fortinet Inc.
Log Field Name Description Data Type Length

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

FortiOS 7.2.1 Log Reference 220


Fortinet Inc.
Log Field Name Description Data Type Length

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

FortiOS 7.2.1 Log Reference 221


Fortinet Inc.
Log Field Name Description Data Type Length

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

8237 - MESGID_ICB_FSA_TIMEOUT_NOTIF

Message ID: 8237


Message Description: MESGID_ICB_FSA_TIMEOUT_NOTIF
Message Meaning: FortiSandbox scan timeout (notice)
Type: AV
Category: FORTISANDBOX
Severity: Notice

Log Field Name Description Data Type Length

action string 18

FortiOS 7.2.1 Log Reference 222


Fortinet Inc.
Log Field Name Description Data Type Length

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

FortiOS 7.2.1 Log Reference 223


Fortinet Inc.
Log Field Name Description Data Type Length

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

FortiOS 7.2.1 Log Reference 224


Fortinet Inc.
Log Field Name Description Data Type Length

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

FortiOS 7.2.1 Log Reference 225


Fortinet Inc.
8238 - MESGID_MIME_ICB_FSA_TIMEOUT_WARNING

Message ID: 8238


Message Description: MESGID_MIME_ICB_FSA_TIMEOUT_WARNING
Message Meaning: MIME data reported FortiSandbox scan timeout (warning)
Type: AV
Category: FORTISANDBOX
Severity: Warning

Log Field Name Description Data Type Length

action string 18

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

FortiOS 7.2.1 Log Reference 226


Fortinet Inc.
Log Field Name Description Data Type Length

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

FortiOS 7.2.1 Log Reference 227


Fortinet Inc.
Log Field Name Description Data Type Length

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

FortiOS 7.2.1 Log Reference 228


Fortinet Inc.
Log Field Name Description Data Type Length

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

8239 - MESGID_MIME_ICB_FSA_TIMEOUT_NOTIF

Message ID: 8239


Message Description: MESGID_MIME_ICB_FSA_TIMEOUT_NOTIF
Message Meaning: MIME data reported FortiSandbox scan timeout (notice)
Type: AV
Category: FORTISANDBOX
Severity: Notice

Log Field Name Description Data Type Length

action string 18

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

FortiOS 7.2.1 Log Reference 229


Fortinet Inc.
Log Field Name Description Data Type Length

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

FortiOS 7.2.1 Log Reference 230


Fortinet Inc.
Log Field Name Description Data Type Length

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

FortiOS 7.2.1 Log Reference 231


Fortinet Inc.
Log Field Name Description Data Type Length

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

8240 - MESGID_ICB_FSA_ERROR_WARNING

Message ID: 8240


Message Description: MESGID_ICB_FSA_ERROR_WARNING
Message Meaning: FortiSandbox scan error (warning)
Type: AV
Category: FORTISANDBOX
Severity: Warning

Log Field Name Description Data Type Length

action string 18

FortiOS 7.2.1 Log Reference 232


Fortinet Inc.
Log Field Name Description Data Type Length

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

FortiOS 7.2.1 Log Reference 233


Fortinet Inc.
Log Field Name Description Data Type Length

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

FortiOS 7.2.1 Log Reference 234


Fortinet Inc.
Log Field Name Description Data Type Length

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

FortiOS 7.2.1 Log Reference 235


Fortinet Inc.
8241 - MESGID_ICB_FSA_ERROR_NOTIF

Message ID: 8241


Message Description: MESGID_ICB_FSA_ERROR_NOTIF
Message Meaning: FortiSandbox scan error (notice)
Type: AV
Category: FORTISANDBOX
Severity: Notice

Log Field Name Description Data Type Length

action string 18

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

FortiOS 7.2.1 Log Reference 236


Fortinet Inc.
Log Field Name Description Data Type Length

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

FortiOS 7.2.1 Log Reference 237


Fortinet Inc.
Log Field Name Description Data Type Length

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

FortiOS 7.2.1 Log Reference 238


Fortinet Inc.
Log Field Name Description Data Type Length

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

8242 - MESGID_MIME_ICB_FSA_ERROR_WARNING

Message ID: 8242


Message Description: MESGID_MIME_ICB_FSA_ERROR_WARNING
Message Meaning: MIME data reported FortiSandbox scan error (warning)
Type: AV
Category: FORTISANDBOX
Severity: Warning

Log Field Name Description Data Type Length

action string 18

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

FortiOS 7.2.1 Log Reference 239


Fortinet Inc.
Log Field Name Description Data Type Length

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

FortiOS 7.2.1 Log Reference 240


Fortinet Inc.
Log Field Name Description Data Type Length

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

FortiOS 7.2.1 Log Reference 241


Fortinet Inc.
Log Field Name Description Data Type Length

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

8243 - MESGID_MIME_ICB_FSA_ERROR_NOTIF

Message ID: 8243


Message Description: MESGID_MIME_ICB_FSA_ERROR_NOTIF
Message Meaning: MIME data reported FortiSandbox scan error (notice)
Type: AV
Category: FORTISANDBOX
Severity: Notice

Log Field Name Description Data Type Length

action string 18

FortiOS 7.2.1 Log Reference 242


Fortinet Inc.
Log Field Name Description Data Type Length

agent string 1024

analyticscksum string 64

analyticssubmit string 10

attachment string 3

authserver string 64

cc string 512

cdrcontent string 256

checksum string 16

contentdisarmed string 13

craction uint32 10

crlevel string 10

crscore uint32 10

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

dtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

filehash string 64

filehashsrc string 32

filename string 256

FortiOS 7.2.1 Log Reference 243


Fortinet Inc.
Log Field Name Description Data Type Length

filetype string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group string 512

httpmethod string 20

level string 11

logid string 10

msg string 4096

pathname string 256

pdstport uint16 5

policyid uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

psrcport uint16 5

quarskip string 46

rawdata string 1024

FortiOS 7.2.1 Log Reference 244


Fortinet Inc.
Log Field Name Description Data Type Length

recipient string 512

ref string 512

referralurl string 512

sender string 128

service string 5

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

virus string 128

viruscat string 32

virusid uint32 10

vrf uint8 3

FortiOS 7.2.1 Log Reference 245


Fortinet Inc.
8448 - MESGID_BLOCK_WARNING

Message ID: 8448


Message Description: MESGID_BLOCK_WARNING
Message Meaning: FortiGate unit blocked a file because it contains a virus
Type: AV
Category: FILENAME
Severity: Warning

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

checksum The checksum of the scanned file string 16

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Time when detection occured uint64 20

FortiOS 7.2.1 Log Reference 246


Fortinet Inc.
Log Field Name Description Data Type Length

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filefilter The filter used to identify the affected file string 12

filename File name string 256

filetype File type string 16

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pdstport uint16 5

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

recipient Email addresses from the SMTP envelope string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

FortiOS 7.2.1 Log Reference 247


Fortinet Inc.
Log Field Name Description Data Type Length

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

vrf uint8 3

8450 - MESGID_BLOCK_MIME_WARNING

Message ID: 8450


Message Description: MESGID_BLOCK_MIME_WARNING
Message Meaning: FortiGate unit blocked a file because it contains a virus (MIME)
Type: AV
Category: MIMEFRAGMENTED
Severity: Warning

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

FortiOS 7.2.1 Log Reference 248


Fortinet Inc.
Log Field Name Description Data Type Length

checksum The checksum of the scanned file string 16

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filefilter The filter used to identify the affected file string 12

filename File name string 256

filetype File type string 16

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pdstport uint16 5

policyid Policy ID uint32 10

policytype string 24

FortiOS 7.2.1 Log Reference 249


Fortinet Inc.
Log Field Name Description Data Type Length

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

recipient Email addresses from the SMTP envelope string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

vrf uint8 3

FortiOS 7.2.1 Log Reference 250


Fortinet Inc.
8451 - MESGID_BLOCK_MIME_NOTIF

Message ID: 8451


Message Description: MESGID_BLOCK_MIME_NOTIF
Message Meaning: FortiGate unit blocked a file because it contains a virus (MIME)
Type: AV
Category: MIMEFRAGMENTED
Severity: Notice

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

checksum The checksum of the scanned file string 16

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Time when detection occured uint64 20

FortiOS 7.2.1 Log Reference 251


Fortinet Inc.
Log Field Name Description Data Type Length

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filefilter The filter used to identify the affected file string 12

filename File name string 256

filetype File type string 16

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pdstport uint16 5

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

recipient Email addresses from the SMTP envelope string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

FortiOS 7.2.1 Log Reference 252


Fortinet Inc.
Log Field Name Description Data Type Length

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

vrf uint8 3

8452 - MESGID_BLOCK_COMMAND

Message ID: 8452


Message Description: MESGID_BLOCK_COMMAND
Message Meaning: FortiGate unit blocked a virus command
Type: AV
Category: COMMAND-BLOCKED
Severity: Warning

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Server used to authenticate the involved user string 64

command string 16

craction Threat Weight action uint32 10

FortiOS 7.2.1 Log Reference 253


Fortinet Inc.
Log Field Name Description Data Type Length

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pdstport uint16 5

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

referralurl string 512

service Proxy service which scanned this traffic string 5

FortiOS 7.2.1 Log Reference 254


Fortinet Inc.
Log Field Name Description Data Type Length

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

vrf uint8 3

8704 - MESGID_OVERSIZE_WARNING

Message ID: 8704


Message Description: MESGID_OVERSIZE_WARNING
Message Meaning: Defined file size limit was exceeded
Type: AV
Category: OVERSIZE
Severity: Warning

FortiOS 7.2.1 Log Reference 255


Fortinet Inc.
Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Server used to authenticate the involved user string 64

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filename File name string 256

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

FortiOS 7.2.1 Log Reference 256


Fortinet Inc.
Log Field Name Description Data Type Length

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

recipient Email addresses from the SMTP envelope string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

FortiOS 7.2.1 Log Reference 257


Fortinet Inc.
Log Field Name Description Data Type Length

user Username (authentication) string 256

vd VDOM name string 32

vrf uint8 3

8705 - MESGID_OVERSIZE_NOTIF

Message ID: 8705


Message Description: MESGID_OVERSIZE_NOTIF
Message Meaning: File size limit was exceeded
Type: AV
Category: OVERSIZE
Severity: Notice

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Server used to authenticate the involved user string 64

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

FortiOS 7.2.1 Log Reference 258


Fortinet Inc.
Log Field Name Description Data Type Length

dstuuid string 37

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filename File name string 256

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

recipient Email addresses from the SMTP envelope string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

FortiOS 7.2.1 Log Reference 259


Fortinet Inc.
Log Field Name Description Data Type Length

srcport Source Port uint16 5

srcuuid string 37

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

vrf uint8 3

8708 - MESGID_OVERSIZE_STREAM_UNCOMP_WARNING

Message ID: 8708


Message Description: MESGID_OVERSIZE_STREAM_UNCOMP_WARNING
Message Meaning: Stream-based uncompression reached size limit.
Type: AV
Category: OVERSIZE
Severity: Warning

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Server used to authenticate the involved user string 64

craction Threat Weight action uint32 10

FortiOS 7.2.1 Log Reference 260


Fortinet Inc.
Log Field Name Description Data Type Length

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filename File name string 256

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

FortiOS 7.2.1 Log Reference 261


Fortinet Inc.
Log Field Name Description Data Type Length

proto Protocol number uint8 3

psrcport uint16 5

recipient Email addresses from the SMTP envelope string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

vrf uint8 3

8709 - MESGID_OVERSIZE_STREAM_UNCOMP_NOTIF

Message ID: 8709


Message Description: MESGID_OVERSIZE_STREAM_UNCOMP_NOTIF

FortiOS 7.2.1 Log Reference 262


Fortinet Inc.
Message Meaning: Stream-based uncompression reached size limit.
Type: AV
Category: OVERSIZE
Severity: Notice

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Server used to authenticate the involved user string 64

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filename File name string 256

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

group Group name (authentication) string 512

httpmethod string 20

FortiOS 7.2.1 Log Reference 263


Fortinet Inc.
Log Field Name Description Data Type Length

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

recipient Email addresses from the SMTP envelope string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

FortiOS 7.2.1 Log Reference 264


Fortinet Inc.
Log Field Name Description Data Type Length

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

vrf uint8 3

8720 - MESGID_SWITCH_PROTO_WARNING

Message ID: 8720


Message Description: MESGID_SWITCH_PROTO_WARNING
Message Meaning: Switching protocols request (warning)
Type: AV
Category: SWITCHPROTO
Severity: Warning

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Server used to authenticate the involved user string 64

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

FortiOS 7.2.1 Log Reference 265


Fortinet Inc.
Log Field Name Description Data Type Length

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pdstport uint16 5

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

referralurl string 512

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

FortiOS 7.2.1 Log Reference 266


Fortinet Inc.
Log Field Name Description Data Type Length

subservice string 16

subtype Subtype of the virus log string 20

switchproto Protocol used on the switch string 128

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

vrf uint8 3

8721 - MESGID_SWITCH_PROTO_NOTIF

Message ID: 8721


Message Description: MESGID_SWITCH_PROTO_NOTIF
Message Meaning: Switching protocols request (notice)
Type: AV
Category: SWITCHPROTO
Severity: Notice

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Server used to authenticate the involved user string 64

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

FortiOS 7.2.1 Log Reference 267


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pdstport uint16 5

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

referralurl string 512

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

FortiOS 7.2.1 Log Reference 268


Fortinet Inc.
Log Field Name Description Data Type Length

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subservice string 16

subtype Subtype of the virus log string 20

switchproto Protocol used on the switch string 128

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

vrf uint8 3

8960 - MESGID_SCAN_UNCOMPSIZELIMIT_WARNING

Message ID: 8960


Message Description: MESGID_SCAN_UNCOMPSIZELIMIT_WARNING
Message Meaning: File reached the uncompressed nested limit
Type: AV
Category: SCANERROR
Severity: Warning

FortiOS 7.2.1 Log Reference 269


Fortinet Inc.
Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

FortiOS 7.2.1 Log Reference 270


Fortinet Inc.
Log Field Name Description Data Type Length

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

FortiOS 7.2.1 Log Reference 271


Fortinet Inc.
Log Field Name Description Data Type Length

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

FortiOS 7.2.1 Log Reference 272


Fortinet Inc.
Log Field Name Description Data Type Length

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8961 - MESGID_SCAN_UNCOMPSIZELIMIT_NOTIF

Message ID: 8961


Message Description: MESGID_SCAN_UNCOMPSIZELIMIT_NOTIF
Message Meaning: File reached the uncompressed size limit
Type: AV
Category: SCANERROR
Severity: Notice

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

FortiOS 7.2.1 Log Reference 273


Fortinet Inc.
Log Field Name Description Data Type Length

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

FortiOS 7.2.1 Log Reference 274


Fortinet Inc.
Log Field Name Description Data Type Length

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

FortiOS 7.2.1 Log Reference 275


Fortinet Inc.
Log Field Name Description Data Type Length

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8962 - MESGID_SCAN_ARCHIVE_ENCRYPTED_WARNING

Message ID: 8962


Message Description: MESGID_SCAN_ARCHIVE_ENCRYPTED_WARNING
Message Meaning: Archived file is corrupted
Type: AV
Category: SCANERROR
Severity: Warning

FortiOS 7.2.1 Log Reference 276


Fortinet Inc.
Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

FortiOS 7.2.1 Log Reference 277


Fortinet Inc.
Log Field Name Description Data Type Length

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

FortiOS 7.2.1 Log Reference 278


Fortinet Inc.
Log Field Name Description Data Type Length

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

FortiOS 7.2.1 Log Reference 279


Fortinet Inc.
Log Field Name Description Data Type Length

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8963 - MESGID_SCAN_ARCHIVE_ENCRYPTED_NOTIF

Message ID: 8963


Message Description: MESGID_SCAN_ARCHIVE_ENCRYPTED_NOTIF
Message Meaning: Archived file is encrypted
Type: AV
Category: SCANERROR
Severity: Notice

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

FortiOS 7.2.1 Log Reference 280


Fortinet Inc.
Log Field Name Description Data Type Length

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

FortiOS 7.2.1 Log Reference 281


Fortinet Inc.
Log Field Name Description Data Type Length

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

FortiOS 7.2.1 Log Reference 282


Fortinet Inc.
Log Field Name Description Data Type Length

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8964 - MESGID_SCAN_ARCHIVE_CORRUPTED_WARNING

Message ID: 8964


Message Description: MESGID_SCAN_ARCHIVE_CORRUPTED_WARNING
Message Meaning: Corrupted archive (warning)
Type: AV
Category: SCANERROR
Severity: Warning

FortiOS 7.2.1 Log Reference 283


Fortinet Inc.
Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

FortiOS 7.2.1 Log Reference 284


Fortinet Inc.
Log Field Name Description Data Type Length

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

FortiOS 7.2.1 Log Reference 285


Fortinet Inc.
Log Field Name Description Data Type Length

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

FortiOS 7.2.1 Log Reference 286


Fortinet Inc.
Log Field Name Description Data Type Length

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8965 - MESGID_SCAN_ARCHIVE_CORRUPTED_NOTIF

Message ID: 8965


Message Description: MESGID_SCAN_ARCHIVE_CORRUPTED_NOTIF
Message Meaning: Corrupted archive (notice)
Type: AV
Category: SCANERROR
Severity: Notice

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

FortiOS 7.2.1 Log Reference 287


Fortinet Inc.
Log Field Name Description Data Type Length

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

FortiOS 7.2.1 Log Reference 288


Fortinet Inc.
Log Field Name Description Data Type Length

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

FortiOS 7.2.1 Log Reference 289


Fortinet Inc.
Log Field Name Description Data Type Length

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8966 - MESGID_SCAN_ARCHIVE_MULTIPART_WARNING

Message ID: 8966


Message Description: MESGID_SCAN_ARCHIVE_MULTIPART_WARNING
Message Meaning: File is a multipart archive or contains multiple files within the archive
Type: AV
Category: SCANERROR
Severity: Warning

FortiOS 7.2.1 Log Reference 290


Fortinet Inc.
Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

FortiOS 7.2.1 Log Reference 291


Fortinet Inc.
Log Field Name Description Data Type Length

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

FortiOS 7.2.1 Log Reference 292


Fortinet Inc.
Log Field Name Description Data Type Length

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

FortiOS 7.2.1 Log Reference 293


Fortinet Inc.
Log Field Name Description Data Type Length

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8967 - MESGID_SCAN_ARCHIVE_MULTIPART_NOTIF

Message ID: 8967


Message Description: MESGID_SCAN_ARCHIVE_MULTIPART_NOTIF
Message Meaning: File is a multipart archive or contains multiple files within the archive
Type: AV
Category: SCANERROR
Severity: Notice

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

FortiOS 7.2.1 Log Reference 294


Fortinet Inc.
Log Field Name Description Data Type Length

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

FortiOS 7.2.1 Log Reference 295


Fortinet Inc.
Log Field Name Description Data Type Length

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

FortiOS 7.2.1 Log Reference 296


Fortinet Inc.
Log Field Name Description Data Type Length

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8968 - MESGID_SCAN_ARCHIVE_NESTED_WARNING

Message ID: 8968


Message Description: MESGID_SCAN_ARCHIVE_NESTED_WARNING
Message Meaning: File is a nested archived file
Type: AV
Category: SCANERROR
Severity: Warning

FortiOS 7.2.1 Log Reference 297


Fortinet Inc.
Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

FortiOS 7.2.1 Log Reference 298


Fortinet Inc.
Log Field Name Description Data Type Length

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

FortiOS 7.2.1 Log Reference 299


Fortinet Inc.
Log Field Name Description Data Type Length

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

FortiOS 7.2.1 Log Reference 300


Fortinet Inc.
Log Field Name Description Data Type Length

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8969 - MESGID_SCAN_ARCHIVE_NESTED_NOTIF

Message ID: 8969


Message Description: MESGID_SCAN_ARCHIVE_NESTED_NOTIF
Message Meaning: File is an archived type unhandled
Type: AV
Category: SCANERROR
Severity: Notice

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

FortiOS 7.2.1 Log Reference 301


Fortinet Inc.
Log Field Name Description Data Type Length

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

FortiOS 7.2.1 Log Reference 302


Fortinet Inc.
Log Field Name Description Data Type Length

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

FortiOS 7.2.1 Log Reference 303


Fortinet Inc.
Log Field Name Description Data Type Length

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8970 - MESGID_SCAN_ARCHIVE_OVERSIZE_WARNING

Message ID: 8970


Message Description: MESGID_SCAN_ARCHIVE_OVERSIZE_WARNING
Message Meaning: Archived file is oversized
Type: AV
Category: SCANERROR
Severity: Warning

FortiOS 7.2.1 Log Reference 304


Fortinet Inc.
Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

FortiOS 7.2.1 Log Reference 305


Fortinet Inc.
Log Field Name Description Data Type Length

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

FortiOS 7.2.1 Log Reference 306


Fortinet Inc.
Log Field Name Description Data Type Length

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

FortiOS 7.2.1 Log Reference 307


Fortinet Inc.
Log Field Name Description Data Type Length

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8971 - MESGID_SCAN_ARCHIVE_OVERSIZE_NOTIF

Message ID: 8971


Message Description: MESGID_SCAN_ARCHIVE_OVERSIZE_NOTIF
Message Meaning: Archived file is oversized
Type: AV
Category: SCANERROR
Severity: Notice

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

FortiOS 7.2.1 Log Reference 308


Fortinet Inc.
Log Field Name Description Data Type Length

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

FortiOS 7.2.1 Log Reference 309


Fortinet Inc.
Log Field Name Description Data Type Length

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

FortiOS 7.2.1 Log Reference 310


Fortinet Inc.
Log Field Name Description Data Type Length

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8972 - MESGID_SCAN_ARCHIVE_UNHANDLED_WARNING

Message ID: 8972


Message Description: MESGID_SCAN_ARCHIVE_UNHANDLED_WARNING
Message Meaning: Unhandled archive (warning)
Type: AV
Category: SCANERROR
Severity: Warning

FortiOS 7.2.1 Log Reference 311


Fortinet Inc.
Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

FortiOS 7.2.1 Log Reference 312


Fortinet Inc.
Log Field Name Description Data Type Length

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

FortiOS 7.2.1 Log Reference 313


Fortinet Inc.
Log Field Name Description Data Type Length

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

FortiOS 7.2.1 Log Reference 314


Fortinet Inc.
Log Field Name Description Data Type Length

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8973 - MESGID_SCAN_ARCHIVE_UNHANDLED_NOTIF

Message ID: 8973


Message Description: MESGID_SCAN_ARCHIVE_UNHANDLED_NOTIF
Message Meaning: Unhandled archive (notice)
Type: AV
Category: SCANERROR
Severity: Notice

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

FortiOS 7.2.1 Log Reference 315


Fortinet Inc.
Log Field Name Description Data Type Length

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

FortiOS 7.2.1 Log Reference 316


Fortinet Inc.
Log Field Name Description Data Type Length

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

FortiOS 7.2.1 Log Reference 317


Fortinet Inc.
Log Field Name Description Data Type Length

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8974 - MESGID_SCAN_AV_ENGINE_LOAD_FAILED_ERROR

Message ID: 8974


Message Description: MESGID_SCAN_AV_ENGINE_LOAD_FAILED_ERROR
Message Meaning: AV Engine load failed
Type: AV
Category: SCANERROR
Severity: Error

FortiOS 7.2.1 Log Reference 318


Fortinet Inc.
Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

FortiOS 7.2.1 Log Reference 319


Fortinet Inc.
Log Field Name Description Data Type Length

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

FortiOS 7.2.1 Log Reference 320


Fortinet Inc.
Log Field Name Description Data Type Length

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

FortiOS 7.2.1 Log Reference 321


Fortinet Inc.
Log Field Name Description Data Type Length

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8975 - MESGID_SCAN_ARCHIVE_PARTIALLYCORRUPTED_WARNING

Message ID: 8975


Message Description: MESGID_SCAN_ARCHIVE_PARTIALLYCORRUPTED_WARNING
Message Meaning: Partially corrupted archive (warning)
Type: AV
Category: SCANERROR
Severity: Warning

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

FortiOS 7.2.1 Log Reference 322


Fortinet Inc.
Log Field Name Description Data Type Length

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

FortiOS 7.2.1 Log Reference 323


Fortinet Inc.
Log Field Name Description Data Type Length

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

FortiOS 7.2.1 Log Reference 324


Fortinet Inc.
Log Field Name Description Data Type Length

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8976 - MESGID_SCAN_ARCHIVE_PARTIALLYCORRUPTED_NOTIF

Message ID: 8976


Message Description: MESGID_SCAN_ARCHIVE_PARTIALLYCORRUPTED_NOTIF
Message Meaning: Partially corrupted archive (notice)
Type: AV
Category: SCANERROR
Severity: Notice

FortiOS 7.2.1 Log Reference 325


Fortinet Inc.
Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

FortiOS 7.2.1 Log Reference 326


Fortinet Inc.
Log Field Name Description Data Type Length

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

FortiOS 7.2.1 Log Reference 327


Fortinet Inc.
Log Field Name Description Data Type Length

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

FortiOS 7.2.1 Log Reference 328


Fortinet Inc.
Log Field Name Description Data Type Length

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8979 - MESGID_SCAN_ARCHIVE_TIMEOUT_WARNING

Message ID: 8979


Message Description: MESGID_SCAN_ARCHIVE_TIMEOUT_WARNING
Message Meaning: Archive scan timeout (warning)
Type: AV
Category: SCANERROR
Severity: Warning

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

FortiOS 7.2.1 Log Reference 329


Fortinet Inc.
Log Field Name Description Data Type Length

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

FortiOS 7.2.1 Log Reference 330


Fortinet Inc.
Log Field Name Description Data Type Length

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

FortiOS 7.2.1 Log Reference 331


Fortinet Inc.
Log Field Name Description Data Type Length

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8980 - MESGID_SCAN_ARCHIVE_TIMEOUT_NOTIF

Message ID: 8980


Message Description: MESGID_SCAN_ARCHIVE_TIMEOUT_NOTIF
Message Meaning: Archive scan timeout (notice)
Type: AV
Category: SCANERROR
Severity: Notice

FortiOS 7.2.1 Log Reference 332


Fortinet Inc.
Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

FortiOS 7.2.1 Log Reference 333


Fortinet Inc.
Log Field Name Description Data Type Length

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

FortiOS 7.2.1 Log Reference 334


Fortinet Inc.
Log Field Name Description Data Type Length

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

FortiOS 7.2.1 Log Reference 335


Fortinet Inc.
Log Field Name Description Data Type Length

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

8981 - MESGID_SCAN_AV_CDR_INTERNAL_ERROR

Message ID: 8981


Message Description: MESGID_SCAN_AV_CDR_INTERNAL_ERROR
Message Meaning: AV CDR engine internal error
Type: AV
Category: SCANERROR
Severity: Error

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

FortiOS 7.2.1 Log Reference 336


Fortinet Inc.
Log Field Name Description Data Type Length

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

FortiOS 7.2.1 Log Reference 337


Fortinet Inc.
Log Field Name Description Data Type Length

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

FortiOS 7.2.1 Log Reference 338


Fortinet Inc.
Log Field Name Description Data Type Length

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

9233 - MESGID_ANALYTICS_SUBMITTED

Message ID: 9233


Message Description: MESGID_ANALYTICS_SUBMITTED
Message Meaning: File submitted to Sandbox
Type: AV
Category: ANALYTICS
Severity: Information

FortiOS 7.2.1 Log Reference 339


Fortinet Inc.
Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

FortiOS 7.2.1 Log Reference 340


Fortinet Inc.
Log Field Name Description Data Type Length

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict FortiSandbox Verdict returned to FortiGate after analysis string 32


(clean, low risk, med risk, high risk, malicious)

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

FortiOS 7.2.1 Log Reference 341


Fortinet Inc.
Log Field Name Description Data Type Length

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

FortiOS 7.2.1 Log Reference 342


Fortinet Inc.
Log Field Name Description Data Type Length

user Username (authentication) string 256

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

9234 - MESGID_ANALYTICS_INFECT_WARNING

Message ID: 9234


Message Description: MESGID_ANALYTICS_INFECT_WARNING
Message Meaning: File reported infected by FortiSandbox (warning)
Type: AV
Category: INFECTED
Severity: Warning

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

FortiOS 7.2.1 Log Reference 343


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

FortiOS 7.2.1 Log Reference 344


Fortinet Inc.
Log Field Name Description Data Type Length

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

FortiOS 7.2.1 Log Reference 345


Fortinet Inc.
Log Field Name Description Data Type Length

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

9235 - MESGID_ANALYTICS_INFECT_NOTIF

Message ID: 9235


Message Description: MESGID_ANALYTICS_INFECT_NOTIF
Message Meaning: File reported infected by FortiSandbox (notice)
Type: AV
Category: INFECTED
Severity: Notice

FortiOS 7.2.1 Log Reference 346


Fortinet Inc.
Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

FortiOS 7.2.1 Log Reference 347


Fortinet Inc.
Log Field Name Description Data Type Length

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

FortiOS 7.2.1 Log Reference 348


Fortinet Inc.
Log Field Name Description Data Type Length

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

FortiOS 7.2.1 Log Reference 349


Fortinet Inc.
Log Field Name Description Data Type Length

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

9236 - MESGID_ANALYTICS_INFECT_MIME_WARNING

Message ID: 9236


Message Description: MESGID_ANALYTICS_INFECT_MIME_WARNING
Message Meaning: File reported infected by FortiSandbox (warning)
Type: AV
Category: INFECTED
Severity: Warning

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

FortiOS 7.2.1 Log Reference 350


Fortinet Inc.
Log Field Name Description Data Type Length

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

FortiOS 7.2.1 Log Reference 351


Fortinet Inc.
Log Field Name Description Data Type Length

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

FortiOS 7.2.1 Log Reference 352


Fortinet Inc.
Log Field Name Description Data Type Length

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

9237 - MESGID_ANALYTICS_INFECT_MIME_NOTIF

Message ID: 9237


Message Description: MESGID_ANALYTICS_INFECT_MIME_NOTIF
Message Meaning: File reported infected by FortiSandbox (notice)
Type: AV
Category: INFECTED
Severity: Notice

FortiOS 7.2.1 Log Reference 353


Fortinet Inc.
Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

agent User agent - eg. agent="Mozilla/5.0" string 1024

analyticscksum The checksum of the file submitted for analytics string 64

analyticssubmit The flag for analytics submission string 10

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

FortiOS 7.2.1 Log Reference 354


Fortinet Inc.
Log Field Name Description Data Type Length

filehash Used by Outbreak Prevention External Hash: the hash string 64


signature used in the detection

filehashsrc Used by Outbreak Prevention External Hash: external source string 32


that provided the hash signature

filename File name string 256

filetype File type string 16

fndraction string 7

fndrconfidence string 6

fndrfileid uint64 20

fndrfiletype string 10

fndrseverity string 8

fndrverdict string 5

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

fsaaction string 7

fsafileid uint64 20

fsafiletype string 10

fsaseverity string 11

fsaverdict string 32

group Group name (authentication) string 512

httpmethod string 20

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pathname string 256

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

FortiOS 7.2.1 Log Reference 355


Fortinet Inc.
Log Field Name Description Data Type Length

proto Protocol number uint8 3

psrcport uint16 5

quarskip Quarantine skip explanation string 46

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

ref The URL of the FortiGuard IPS database entry for the attack string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

FortiOS 7.2.1 Log Reference 356


Fortinet Inc.
Log Field Name Description Data Type Length

vd VDOM name string 32

virus Virus Name string 128

viruscat string 32

virusid Virus ID (unique virus identifier) uint32 10

vrf uint8 3

9238 - MESGID_ANALYTICS_FSA_RESULT

Message ID: 9238


Message Description: MESGID_ANALYTICS_FSA_RESULT
Message Meaning: File verdict returned from FortiSandbox
Type: AV
Category: ANALYTICS
Severity: Notice

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

analyticscksum The checksum of the file submitted for analytics string 64

date Date string 10

devid string 16

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dtype Data type for virus category string 32

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filename File name string 256

fsaverdict FortiSandbox Verdict returned to FortiGate after analysis string 32


(clean, low risk, med risk, high risk, malicious)

level Log level string 11

logid Log ID string 10

FortiOS 7.2.1 Log Reference 357


Fortinet Inc.
Log Field Name Description Data Type Length

service Proxy service which scanned this traffic string 5

srcdomain string 255

srcip Source IP Address ip 39

srcport Source Port uint16 5

subtype Subtype of the virus log string 20

time Time string 8

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

vd VDOM name string 32

9239 - MESGID_CONTENT_DISARM_NOTIF

Message ID: 9239


Message Description: MESGID_CONTENT_DISARM_NOTIF
Message Meaning: Active content detected by Content Disarm engine
Type: AV
Category: CONTENT-DISARM
Severity: Notice

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

analyticscksum The checksum of the file submitted for analytics string 64

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

FortiOS 7.2.1 Log Reference 358


Fortinet Inc.
Log Field Name Description Data Type Length

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

epoch uint32 10

eventid uint32 10

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filename File name string 256

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

group Group name (authentication) string 512

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pdstport uint16 5

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

FortiOS 7.2.1 Log Reference 359


Fortinet Inc.
Log Field Name Description Data Type Length

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

vrf uint8 3

FortiOS 7.2.1 Log Reference 360


Fortinet Inc.
9240 - MESGID_CONTENT_DISARM_WARNING

Message ID: 9240


Message Description: MESGID_CONTENT_DISARM_WARNING
Message Meaning: File was disarmed by Content Disarm engine
Type: AV
Category: CONTENT-DISARM
Severity: Warning

Log Field Name Description Data Type Length

action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis

analyticscksum The checksum of the file submitted for analytics string 64

attachment string 3

authserver Server used to authenticate the involved user string 64

cc string 512

cdrcontent string 256

checksum The checksum of the scanned file string 16

contentdisarmed Content Disarm action- eg. disarmed, detected string 13

craction Threat Weight action uint32 10

crlevel Threat Weight Level string 10

crscore Threat Weight Score uint32 10

date Date string 10

devid string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

FortiOS 7.2.1 Log Reference 361


Fortinet Inc.
Log Field Name Description Data Type Length

dstuuid string 37

epoch uint32 10

eventid uint32 10

eventtime Time when detection occured uint64 20

eventtype Event type of AV string 32

fctuid Forticlient user ID string 32

filename File name string 256

forwardedfor string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

group Group name (authentication) string 512

level Log level string 11

logid Log ID string 10

msg Log message string 4096

pdstport uint16 5

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile The name of the profile that was used to detect and take action string 64

proto Protocol number uint8 3

psrcport uint16 5

rawdata string 1024

recipient Email addresses from the SMTP envelope string 512

sender Email address from the SMTP envelope string 128

service Proxy service which scanned this traffic string 5

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

FortiOS 7.2.1 Log Reference 362


Fortinet Inc.
Log Field Name Description Data Type Length

srcport Source Port uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype Subtype of the virus log string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip ip 39

type Log type string 16

tz Time Zone string 5

unauthuser string 66

unauthusersource string 66

url The URL address string 512

user Username (authentication) string 256

vd VDOM name string 32

vrf uint8 3

FortiOS 7.2.1 Log Reference 363


Fortinet Inc.
DLP

24576 - LOG_ID_DLP_WARN

Message ID: 24576


Message Description: LOG_ID_DLP_WARN
Message Meaning: Data leak detected by specified DLP sensor rule
Type: DLP
Category: DLP
Severity: Warning

Log Field Name Description Data Type Length

action The status of the session: log-only - DLP event is detected , string 20
but NOT blocked (similar to monitor action) block - Blocked
exempt - Allowed ban - blocked (Not in used since FortiOS
5.0, replaced by blocked) ban-sender - blocks all data being
sent by an ip or user (Not in used since FortiOS 5.0, replaced
by quarantine) quarantine-ip - Blocked and band the source ip
(Not in used since FortiOS 5.0) quarantine-interface - Blocked
and band the source interface (Not in used since FortiOS 5.0)

agent User agent - eg. agent="Mozilla/5.0" string 1024

attachment string 3

authserver Authentication Server string 64

cc string 512

date Date string 10

devid Device ID string 16

direction Direction of packets string 8

dlpextra DLP extra information string 256

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

FortiOS 7.2.1 Log Reference 364


Fortinet Inc.
Log Field Name Description Data Type Length

dstuser string 256

dstuuid string 37

epoch Epoch used for locating file uint32 10

eventid The serial number of the dlparchive file in the same epoch uint32 10

eventtime Event Time, time when DLP event detected. uint64 20

eventtype DLP event type string 32

fctuid FortiClient User ID string 32

filename File name string 256

filesize File size in bytes uint64 10

filetype File type string 23

filtercat DLP filter category string 8

filteridx DLP filter ID uint32 10

filtername DLP rule name string 128

filtertype DLP filter type string 23

forwardedfor Forwarded For string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

infectedfilelevel Infected File Level (Critical,Warning etc) uint32 10

infectedfilename Infected File Name string 256

infectedfilesize Infected File Size uint64 10

infectedfiletype Infected File Type string 23

level Log Level string 11

logid Log ID string 10

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

FortiOS 7.2.1 Log Reference 365


Fortinet Inc.
Log Field Name Description Data Type Length

profile DLP profile name string 64

proto Protocol number uint8 3

psrcport uint16 5

rawdata Raw Data string 1024

recipient Email addresses from the SMTP envelope string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Service name string 36

sessionid Session ID uint32 10

severity Severity level of a DLP rule string 8

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subject The subject title of the email message string 256

subservice string 16

subtype Log subtype string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip True client's IP ip 39

type Log type string 16

tz string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual Routing Forwarding uint8 3

FortiOS 7.2.1 Log Reference 366


Fortinet Inc.
24577 - LOG_ID_DLP_NOTIF

Message ID: 24577


Message Description: LOG_ID_DLP_NOTIF
Message Meaning: Data leak detected by specified DLP sensor rule
Type: DLP
Category: DLP
Severity: Notice

Log Field Name Description Data Type Length

action The status of the session: log-only - DLP event is detected , string 20
but NOT blocked (similar to monitor action) block - Blocked
exempt - Allowed ban - blocked (Not in used since FortiOS
5.0, replaced by blocked) ban-sender - blocks all data being
sent by an ip or user (Not in used since FortiOS 5.0, replaced
by quarantine) quarantine-ip - Blocked and band the source ip
(Not in used since FortiOS 5.0) quarantine-interface - Blocked
and band the source interface (Not in used since FortiOS 5.0)

agent User agent - eg. agent="Mozilla/5.0" string 1024

attachment string 3

authserver Authentication Server string 64

cc string 512

date Date string 10

devid Device ID string 16

direction Direction of packets string 8

dlpextra DLP extra information string 256

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

epoch Epoch used for locating file uint32 10

eventid The serial number of the dlparchive file in the same epoch uint32 10

FortiOS 7.2.1 Log Reference 367


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event Time, time when DLP event detected. uint64 20

eventtype DLP event type string 32

fctuid FortiClient User ID string 32

filename File name string 256

filesize File size in bytes uint64 10

filetype File type string 23

filtercat DLP filter category string 8

filteridx DLP filter ID uint32 10

filtername DLP rule name string 128

filtertype DLP filter type string 23

forwardedfor Forwarded For string 128

from Email address from the Email Headers (IMAP/POP3/SMTP) string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

infectedfilelevel Infected File Level (Critical,Warning etc) uint32 10

infectedfilename Infected File Name string 256

infectedfilesize Infected File Size uint64 10

infectedfiletype Infected File Type string 23

level Log Level string 11

logid Log ID string 10

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile DLP profile name string 64

proto Protocol number uint8 3

psrcport uint16 5

rawdata Raw Data string 1024

FortiOS 7.2.1 Log Reference 368


Fortinet Inc.
Log Field Name Description Data Type Length

recipient Email addresses from the SMTP envelope string 512

referralurl string 512

sender Email address from the SMTP envelope string 128

service Service name string 36

sessionid Session ID uint32 10

severity Severity level of a DLP rule string 8

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subject The subject title of the email message string 256

subservice string 16

subtype Log subtype string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

trueclntip True client's IP ip 39

type Log type string 16

tz string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual Routing Forwarding uint8 3

FortiOS 7.2.1 Log Reference 369


Fortinet Inc.
DNS

54000 - LOG_ID_DNS_QUERY

Message ID: 54000


Message Description: LOG_ID_DNS_QUERY
Message Meaning: DNS query message
Type: DNS
Category: DNS-QUERY
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

devid Device ID string 16

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface Role string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

eventtime Event Timestamp uint64 20

eventtype DNS Type (DNS query/DNS response) string 32

fctuid FortiClient ID string 32

group User group name string 512

level Log Level string 11

logid Log ID string 10

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile Profile name for DNS filter string 64

proto Protocol number uint8 3

qclass Query class string 32

FortiOS 7.2.1 Log Reference 370


Fortinet Inc.
Log Field Name Description Data Type Length

qname Query domain name string 256

qtype Query type description string 32

qtypeval Query Type Value uint16 5

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface Role string 10

srcip Source IP ip 39

srcmac MAC address associated with the Source IP string 17

srcport Source Port uint16 5

subtype Log Subtype string 20

time Time string 8

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated User string 66

unauthusersource Unauthenticated User Source string 66

user User name string 256

vd Virtual Domain Name string 32

xid Transaction ID uint16 5

54200 - LOG_ID_DNS_RESOLV_ERROR

Message ID: 54200


Message Description: LOG_ID_DNS_RESOLV_ERROR
Message Meaning: DNS resolution error message
Type: DNS
Category: DNS-RESPONSE
Severity: Error

Log Field Name Description Data Type Length

action Security action performed by DNS filter string 16

FortiOS 7.2.1 Log Reference 371


Fortinet Inc.
Log Field Name Description Data Type Length

botnetdomain Botnet domain name string 256

botnetip Botnet IP address ip 39

cat DNS category ID uint8 3

catdesc DNS category description string 64

date Date string 10

devid Device ID string 16

domainfilteridx Domain Filter Index uint8 3

domainfilterlist Domain Filter List string 512

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface Role string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

error DNS filter service error message string 256

eventtime Event Timestamp uint64 20

eventtype DNS Type (DNS query/DNS response) string 32

exchange Mail Exchanges from DNS response answer section string 256

fctuid FortiClient ID string 32

group User group name string 512

ipaddr IP addresses from DNS response answer section string 512

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile Profile name for DNS filter string 64

proto Protocol number uint8 3

qclass Query class string 32

FortiOS 7.2.1 Log Reference 372


Fortinet Inc.
Log Field Name Description Data Type Length

qname Query domain name string 256

qtype Query type description string 32

qtypeval Query Type Value uint16 5

rcode uint8 3

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface Role string 10

srcip Source IP ip 39

srcmac MAC address associated with the Source IP string 17

srcport Source Port uint16 5

sscname Safe Search CNAME string 256

subtype Log Subtype string 20

time Time string 8

translationid uint32 10

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated User string 66

unauthusersource Unauthenticated User Source string 66

user User name string 256

vd Virtual Domain Name string 32

xid Transaction ID uint16 5

54400 - LOG_ID_DNS_URL_FILTER_BLOCK

Message ID: 54400


Message Description: LOG_ID_DNS_URL_FILTER_BLOCK
Message Meaning: Domain blocked because it is in the domain-filter list
Type: DNS
Category: DNS-RESPONSE
Severity: Warning

FortiOS 7.2.1 Log Reference 373


Fortinet Inc.
Log Field Name Description Data Type Length

action Security action performed by DNS filter string 16

botnetdomain Botnet domain name string 256

botnetip Botnet IP address ip 39

cat DNS category ID uint8 3

catdesc DNS category description string 64

date Date string 10

devid Device ID string 16

domainfilteridx Domain Filter Index uint8 3

domainfilterlist Domain Filter List string 512

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface Role string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

error DNS filter service error message string 256

eventtime Event Timestamp uint64 20

eventtype DNS Type (DNS query/DNS response) string 32

exchange Mail Exchanges from DNS response answer section string 256

fctuid FortiClient ID string 32

group User group name string 512

ipaddr IP addresses from DNS response answer section string 512

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile Profile name for DNS filter string 64

proto Protocol number uint8 3

FortiOS 7.2.1 Log Reference 374


Fortinet Inc.
Log Field Name Description Data Type Length

qclass Query class string 32

qname Query domain name string 256

qtype Query type description string 32

qtypeval Query Type Value uint16 5

rcode uint8 3

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface Role string 10

srcip Source IP ip 39

srcmac MAC address associated with the Source IP string 17

srcport Source Port uint16 5

sscname Safe Search CNAME string 256

subtype Log Subtype string 20

time Time string 8

translationid uint32 10

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated User string 66

unauthusersource Unauthenticated User Source string 66

user User name string 256

vd Virtual Domain Name string 32

xid Transaction ID uint16 5

54401 - LOG_ID_DNS_URL_FILTER_ALLOW

Message ID: 54401


Message Description: LOG_ID_DNS_URL_FILTER_ALLOW
Message Meaning: Domain allowed because it is in the domain-filter list
Type: DNS
Category: DNS-RESPONSE
Severity: Information

FortiOS 7.2.1 Log Reference 375


Fortinet Inc.
Log Field Name Description Data Type Length

action Security action performed by DNS filter string 16

botnetdomain Botnet domain name string 256

botnetip Botnet IP address ip 39

cat DNS category ID uint8 3

catdesc DNS category description string 64

date Date string 10

devid Device ID string 16

domainfilteridx Domain Filter Index uint8 3

domainfilterlist Domain Filter List string 512

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface Role string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

error DNS filter service error message string 256

eventtime Event Timestamp uint64 20

eventtype DNS Type (DNS query/DNS response) string 32

exchange Mail Exchanges from DNS response answer section string 256

fctuid FortiClient ID string 32

group User group name string 512

ipaddr IP addresses from DNS response answer section string 512

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile Profile name for DNS filter string 64

proto Protocol number uint8 3

FortiOS 7.2.1 Log Reference 376


Fortinet Inc.
Log Field Name Description Data Type Length

qclass Query class string 32

qname Query domain name string 256

qtype Query type description string 32

qtypeval Query Type Value uint16 5

rcode uint8 3

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface Role string 10

srcip Source IP ip 39

srcmac MAC address associated with the Source IP string 17

srcport Source Port uint16 5

sscname Safe Search CNAME string 256

subtype Log Subtype string 20

time Time string 8

translationid uint32 10

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated User string 66

unauthusersource Unauthenticated User Source string 66

user User name string 256

vd Virtual Domain Name string 32

xid Transaction ID uint16 5

54600 - LOG_ID_DNS_BOTNET_IP

Message ID: 54600


Message Description: LOG_ID_DNS_BOTNET_IP
Message Meaning: Domain blocked by DNS botnet C&amp;C (IP)
Type: DNS
Category: DNS-RESPONSE
Severity: Warning

FortiOS 7.2.1 Log Reference 377


Fortinet Inc.
Log Field Name Description Data Type Length

action Security action performed by DNS filter string 16

botnetdomain Botnet domain name string 256

botnetip Botnet IP address ip 39

cat DNS category ID uint8 3

catdesc DNS category description string 64

date Date string 10

devid Device ID string 16

domainfilteridx Domain Filter Index uint8 3

domainfilterlist Domain Filter List string 512

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface Role string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

error DNS filter service error message string 256

eventtime Event Timestamp uint64 20

eventtype DNS Type (DNS query/DNS response) string 32

exchange Mail Exchanges from DNS response answer section string 256

fctuid FortiClient ID string 32

group User group name string 512

ipaddr IP addresses from DNS response answer section string 512

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile Profile name for DNS filter string 64

proto Protocol number uint8 3

FortiOS 7.2.1 Log Reference 378


Fortinet Inc.
Log Field Name Description Data Type Length

qclass Query class string 32

qname Query domain name string 256

qtype Query type description string 32

qtypeval Query Type Value uint16 5

rcode uint8 3

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface Role string 10

srcip Source IP ip 39

srcmac MAC address associated with the Source IP string 17

srcport Source Port uint16 5

sscname Safe Search CNAME string 256

subtype Log Subtype string 20

time Time string 8

translationid uint32 10

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated User string 66

unauthusersource Unauthenticated User Source string 66

user User name string 256

vd Virtual Domain Name string 32

xid Transaction ID uint16 5

54601 - LOG_ID_DNS_BOTNET_DOMAIN

Message ID: 54601


Message Description: LOG_ID_DNS_BOTNET_DOMAIN
Message Meaning: Domain blocked by DNS botnet C&amp;C (Domain)
Type: DNS
Category: DNS-RESPONSE
Severity: Warning

FortiOS 7.2.1 Log Reference 379


Fortinet Inc.
Log Field Name Description Data Type Length

action Security action performed by DNS filter string 16

botnetdomain Botnet domain name string 256

botnetip Botnet IP address ip 39

cat DNS category ID uint8 3

catdesc DNS category description string 64

date Date string 10

devid Device ID string 16

domainfilteridx Domain Filter Index uint8 3

domainfilterlist Domain Filter List string 512

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface Role string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

error DNS filter service error message string 256

eventtime Event Timestamp uint64 20

eventtype DNS Type (DNS query/DNS response) string 32

exchange Mail Exchanges from DNS response answer section string 256

fctuid FortiClient ID string 32

group User group name string 512

ipaddr IP addresses from DNS response answer section string 512

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile Profile name for DNS filter string 64

proto Protocol number uint8 3

FortiOS 7.2.1 Log Reference 380


Fortinet Inc.
Log Field Name Description Data Type Length

qclass Query class string 32

qname Query domain name string 256

qtype Query type description string 32

qtypeval Query Type Value uint16 5

rcode uint8 3

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface Role string 10

srcip Source IP ip 39

srcmac MAC address associated with the Source IP string 17

srcport Source Port uint16 5

sscname Safe Search CNAME string 256

subtype Log Subtype string 20

time Time string 8

translationid uint32 10

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated User string 66

unauthusersource Unauthenticated User Source string 66

user User name string 256

vd Virtual Domain Name string 32

xid Transaction ID uint16 5

54800 - LOG_ID_DNS_FTGD_WARNING

Message ID: 54800


Message Description: LOG_ID_DNS_FTGD_WARNING
Message Meaning: FortiGuard rating error warning
Type: DNS
Category: DNS-RESPONSE
Severity: Warning

FortiOS 7.2.1 Log Reference 381


Fortinet Inc.
Log Field Name Description Data Type Length

action Security action performed by DNS filter string 16

botnetdomain Botnet domain name string 256

botnetip Botnet IP address ip 39

cat DNS category ID uint8 3

catdesc DNS category description string 64

date Date string 10

devid Device ID string 16

domainfilteridx Domain Filter Index uint8 3

domainfilterlist Domain Filter List string 512

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface Role string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

error DNS filter service error message string 256

eventtime Event Timestamp uint64 20

eventtype DNS Type (DNS query/DNS response) string 32

exchange Mail Exchanges from DNS response answer section string 256

fctuid FortiClient ID string 32

group User group name string 512

ipaddr IP addresses from DNS response answer section string 512

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile Profile name for DNS filter string 64

proto Protocol number uint8 3

FortiOS 7.2.1 Log Reference 382


Fortinet Inc.
Log Field Name Description Data Type Length

qclass Query class string 32

qname Query domain name string 256

qtype Query type description string 32

qtypeval Query Type Value uint16 5

rcode uint8 3

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface Role string 10

srcip Source IP ip 39

srcmac MAC address associated with the Source IP string 17

srcport Source Port uint16 5

sscname Safe Search CNAME string 256

subtype Log Subtype string 20

time Time string 8

translationid uint32 10

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated User string 66

unauthusersource Unauthenticated User Source string 66

user User name string 256

vd Virtual Domain Name string 32

xid Transaction ID uint16 5

54801 - LOG_ID_DNS_FTGD_ERROR

Message ID: 54801


Message Description: LOG_ID_DNS_FTGD_ERROR
Message Meaning: FortiGuard rating error occurred
Type: DNS
Category: DNS-RESPONSE
Severity: Error

FortiOS 7.2.1 Log Reference 383


Fortinet Inc.
Log Field Name Description Data Type Length

action Security action performed by DNS filter string 16

botnetdomain Botnet domain name string 256

botnetip Botnet IP address ip 39

cat DNS category ID uint8 3

catdesc DNS category description string 64

date Date string 10

devid Device ID string 16

domainfilteridx Domain Filter Index uint8 3

domainfilterlist Domain Filter List string 512

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface Role string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

error DNS filter service error message string 256

eventtime Event Timestamp uint64 20

eventtype DNS Type (DNS query/DNS response) string 32

exchange Mail Exchanges from DNS response answer section string 256

fctuid FortiClient ID string 32

group User group name string 512

ipaddr IP addresses from DNS response answer section string 512

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile Profile name for DNS filter string 64

proto Protocol number uint8 3

FortiOS 7.2.1 Log Reference 384


Fortinet Inc.
Log Field Name Description Data Type Length

qclass Query class string 32

qname Query domain name string 256

qtype Query type description string 32

qtypeval Query Type Value uint16 5

rcode uint8 3

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface Role string 10

srcip Source IP ip 39

srcmac MAC address associated with the Source IP string 17

srcport Source Port uint16 5

sscname Safe Search CNAME string 256

subtype Log Subtype string 20

time Time string 8

translationid uint32 10

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated User string 66

unauthusersource Unauthenticated User Source string 66

user User name string 256

vd Virtual Domain Name string 32

xid Transaction ID uint16 5

54802 - LOG_ID_DNS_FTGD_CAT_ALLOW

Message ID: 54802


Message Description: LOG_ID_DNS_FTGD_CAT_ALLOW
Message Meaning: Domain is monitored
Type: DNS
Category: DNS-RESPONSE
Severity: Notice

FortiOS 7.2.1 Log Reference 385


Fortinet Inc.
Log Field Name Description Data Type Length

action Security action performed by DNS filter string 16

botnetdomain Botnet domain name string 256

botnetip Botnet IP address ip 39

cat DNS category ID uint8 3

catdesc DNS category description string 64

date Date string 10

devid Device ID string 16

domainfilteridx Domain Filter Index uint8 3

domainfilterlist Domain Filter List string 512

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface Role string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

error DNS filter service error message string 256

eventtime Event Timestamp uint64 20

eventtype DNS Type (DNS query/DNS response) string 32

exchange Mail Exchanges from DNS response answer section string 256

fctuid FortiClient ID string 32

group User group name string 512

ipaddr IP addresses from DNS response answer section string 512

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile Profile name for DNS filter string 64

proto Protocol number uint8 3

FortiOS 7.2.1 Log Reference 386


Fortinet Inc.
Log Field Name Description Data Type Length

qclass Query class string 32

qname Query domain name string 256

qtype Query type description string 32

qtypeval Query Type Value uint16 5

rcode uint8 3

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface Role string 10

srcip Source IP ip 39

srcmac MAC address associated with the Source IP string 17

srcport Source Port uint16 5

sscname Safe Search CNAME string 256

subtype Log Subtype string 20

time Time string 8

translationid uint32 10

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated User string 66

unauthusersource Unauthenticated User Source string 66

user User name string 256

vd Virtual Domain Name string 32

xid Transaction ID uint16 5

54803 - LOG_ID_DNS_FTGD_CAT_BLOCK

Message ID: 54803


Message Description: LOG_ID_DNS_FTGD_CAT_BLOCK
Message Meaning: Domain belongs to a denied category in policy
Type: DNS
Category: DNS-RESPONSE
Severity: Warning

FortiOS 7.2.1 Log Reference 387


Fortinet Inc.
Log Field Name Description Data Type Length

action Security action performed by DNS filter string 16

botnetdomain Botnet domain name string 256

botnetip Botnet IP address ip 39

cat DNS category ID uint8 3

catdesc DNS category description string 64

date Date string 10

devid Device ID string 16

domainfilteridx Domain Filter Index uint8 3

domainfilterlist Domain Filter List string 512

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface Role string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

error DNS filter service error message string 256

eventtime Event Timestamp uint64 20

eventtype DNS Type (DNS query/DNS response) string 32

exchange Mail Exchanges from DNS response answer section string 256

fctuid FortiClient ID string 32

group User group name string 512

ipaddr IP addresses from DNS response answer section string 512

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile Profile name for DNS filter string 64

proto Protocol number uint8 3

FortiOS 7.2.1 Log Reference 388


Fortinet Inc.
Log Field Name Description Data Type Length

qclass Query class string 32

qname Query domain name string 256

qtype Query type description string 32

qtypeval Query Type Value uint16 5

rcode uint8 3

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface Role string 10

srcip Source IP ip 39

srcmac MAC address associated with the Source IP string 17

srcport Source Port uint16 5

sscname Safe Search CNAME string 256

subtype Log Subtype string 20

time Time string 8

translationid uint32 10

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated User string 66

unauthusersource Unauthenticated User Source string 66

user User name string 256

vd Virtual Domain Name string 32

xid Transaction ID uint16 5

54804 - LOG_ID_DNS_SAFE_SEARCH

Message ID: 54804


Message Description: LOG_ID_DNS_SAFE_SEARCH
Message Meaning: DNS Safe Search enforced
Type: DNS
Category: DNS-RESPONSE
Severity: Notice

FortiOS 7.2.1 Log Reference 389


Fortinet Inc.
Log Field Name Description Data Type Length

action Security action performed by DNS filter string 16

botnetdomain Botnet domain name string 256

botnetip Botnet IP address ip 39

cat DNS category ID uint8 3

catdesc DNS category description string 64

date Date string 10

devid Device ID string 16

domainfilteridx Domain Filter Index uint8 3

domainfilterlist Domain Filter List string 512

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface Role string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

error DNS filter service error message string 256

eventtime Event Timestamp uint64 20

eventtype DNS Type (DNS query/DNS response) string 32

exchange Mail Exchanges from DNS response answer section string 256

fctuid FortiClient ID string 32

group User group name string 512

ipaddr IP addresses from DNS response answer section string 512

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile Profile name for DNS filter string 64

proto Protocol number uint8 3

FortiOS 7.2.1 Log Reference 390


Fortinet Inc.
Log Field Name Description Data Type Length

qclass Query class string 32

qname Query domain name string 256

qtype Query type description string 32

qtypeval Query Type Value uint16 5

rcode uint8 3

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface Role string 10

srcip Source IP ip 39

srcmac MAC address associated with the Source IP string 17

srcport Source Port uint16 5

sscname Safe Search CNAME string 256

subtype Log Subtype string 20

time Time string 8

translationid uint32 10

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated User string 66

unauthusersource Unauthenticated User Source string 66

user User name string 256

vd Virtual Domain Name string 32

xid Transaction ID uint16 5

54805 - LOG_ID_DNS_LOCAL

Message ID: 54805


Message Description: LOG_ID_DNS_LOCAL
Message Meaning: DNS local query
Type: DNS
Category: DNS-RESPONSE
Severity: Information

FortiOS 7.2.1 Log Reference 391


Fortinet Inc.
Log Field Name Description Data Type Length

action Security action performed by DNS filter string 16

botnetdomain Botnet domain name string 256

botnetip Botnet IP address ip 39

cat DNS category ID uint8 3

catdesc DNS category description string 64

date Date string 10

devid Device ID string 16

domainfilteridx Domain Filter Index uint8 3

domainfilterlist Domain Filter List string 512

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface Role string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

error DNS filter service error message string 256

eventtime Event Timestamp uint64 20

eventtype DNS Type (DNS query/DNS response) string 32

exchange Mail Exchanges from DNS response answer section string 256

fctuid FortiClient ID string 32

group User group name string 512

ipaddr IP addresses from DNS response answer section string 512

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile Profile name for DNS filter string 64

proto Protocol number uint8 3

FortiOS 7.2.1 Log Reference 392


Fortinet Inc.
Log Field Name Description Data Type Length

qclass Query class string 32

qname Query domain name string 256

qtype Query type description string 32

qtypeval Query Type Value uint16 5

rcode uint8 3

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface Role string 10

srcip Source IP ip 39

srcmac MAC address associated with the Source IP string 17

srcport Source Port uint16 5

sscname Safe Search CNAME string 256

subtype Log Subtype string 20

time Time string 8

translationid uint32 10

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated User string 66

unauthusersource Unauthenticated User Source string 66

user User name string 256

vd Virtual Domain Name string 32

xid Transaction ID uint16 5

FortiOS 7.2.1 Log Reference 393


Fortinet Inc.
Email

20480 - LOGID_ANTISPAM_EMAIL_NOTIF

Message ID: 20480


Message Description: LOGID_ANTISPAM_EMAIL_NOTIF
Message Meaning: SPAM notification
Type: Email
Category: SPAM
Severity: Notice

Log Field Name Description Data Type Length

action Security action of the email filter. Eg. blocked, tagged, allow string 8

agent string 1024

attachment Possible values: yes , no string 3

authserver string 64

banword Banned word string 128

cc Email address(es) from the Email Headers string 4096


(IMAP/POP3/SMTP)

date Date string 10

devid Device ID string 16

direction Direction of packets string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination interface Role, ex: LAN, WAN, etc string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime the time of the event uint64 20

eventtype Email Filter event type string 32

FortiOS 7.2.1 Log Reference 394


Fortinet Inc.
Log Field Name Description Data Type Length

fctuid FortiClient ID string 32

fortiguardresp string 512

from Email address(es) from the Email Headers string 128


(IMAP/POP3/SMTP)

group User group name string 512

level Log Level string 11

logid Log ID string 10

msg Log Message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Email Filter profile name string 64

proto Protocol number uint8 3

recipient Email addresses from the SMTP envelope string 512

sender Email addresses from the SMTP envelope string 128

service SMTP, POP3, IMAP, etc. string 36

sessionid Session ID uint32 10

size Email size in Bytes? string 16

srccountry string 64

srcdomain string 255

srcintf Source Interface string 64

srcintfrole Source interface Role, ex: LAN, WAN, etc string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subject The subject title of the email message string 256

subtype Log subtype string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

FortiOS 7.2.1 Log Reference 395


Fortinet Inc.
Log Field Name Description Data Type Length

type Log type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

user User name string 256

vd Virtual Domain string 32

vrf Virtual router forwarding uint8 3

webmailprovider string 32

20481 - LOGID_EMAIL_GENERAL_NOTIF

Message ID: 20481


Message Description: LOGID_EMAIL_GENERAL_NOTIF
Message Meaning: Email message
Type: Email
Category: EMAIL
Severity: Information

Log Field Name Description Data Type Length

action Security action of the email filter. Eg. blocked, tagged, allow string 8

agent string 1024

attachment Possible values: yes , no string 3

authserver string 64

banword Banned word string 128

cc Email address(es) from the Email Headers string 4096


(IMAP/POP3/SMTP)

date Date string 10

devid Device ID string 16

direction Direction of packets string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination interface Role, ex: LAN, WAN, etc string 10

FortiOS 7.2.1 Log Reference 396


Fortinet Inc.
Log Field Name Description Data Type Length

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime the time of the event uint64 20

eventtype Email Filter event type string 32

fctuid FortiClient ID string 32

fortiguardresp string 512

from Email address(es) from the Email Headers string 128


(IMAP/POP3/SMTP)

group User group name string 512

level Log Level string 11

logid Log ID string 10

msg Log Message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Email Filter profile name string 64

proto Protocol number uint8 3

recipient Email addresses from the SMTP envelope string 512

sender Email addresses from the SMTP envelope string 128

service SMTP, POP3, IMAP, etc. string 36

sessionid Session ID uint32 10

size Email size in Bytes? string 16

srccountry string 64

srcdomain string 255

srcintf Source Interface string 64

srcintfrole Source interface Role, ex: LAN, WAN, etc string 10

srcip Source IP ip 39

srcport Source Port uint16 5

FortiOS 7.2.1 Log Reference 397


Fortinet Inc.
Log Field Name Description Data Type Length

srcuuid string 37

subject The subject title of the email message string 256

subtype Log subtype string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

type Log type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

user User name string 256

vd Virtual Domain string 32

vrf Virtual router forwarding uint8 3

webmailprovider string 32

20482 - LOGID_ANTISPAM_EMAIL_BWORD_NOTIF

Message ID: 20482


Message Description: LOGID_ANTISPAM_EMAIL_BWORD_NOTIF
Message Meaning: Banned word notification
Type: Email
Category: BANNEDWORD
Severity: Notice

Log Field Name Description Data Type Length

action Security action of the email filter. Eg. blocked, tagged, allow string 8

agent string 1024

attachment Possible values: yes , no string 3

authserver string 64

banword Banned word string 128

cc Email address(es) from the Email Headers string 4096


(IMAP/POP3/SMTP)

date Date string 10

FortiOS 7.2.1 Log Reference 398


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

direction Direction of packets string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination interface Role, ex: LAN, WAN, etc string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime the time of the event uint64 20

eventtype Email Filter event type string 32

fctuid FortiClient ID string 32

fortiguardresp string 512

from Email address(es) from the Email Headers string 128


(IMAP/POP3/SMTP)

group User group name string 512

level Log Level string 11

logid Log ID string 10

msg Log Message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Email Filter profile name string 64

proto Protocol number uint8 3

recipient Email addresses from the SMTP envelope string 512

sender Email addresses from the SMTP envelope string 128

service SMTP, POP3, IMAP, etc. string 36

sessionid Session ID uint32 10

size Email size in Bytes? string 16

FortiOS 7.2.1 Log Reference 399


Fortinet Inc.
Log Field Name Description Data Type Length

srccountry string 64

srcdomain string 255

srcintf Source Interface string 64

srcintfrole Source interface Role, ex: LAN, WAN, etc string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subject The subject title of the email message string 256

subtype Log subtype string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

type Log type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

user User name string 256

vd Virtual Domain string 32

vrf Virtual router forwarding uint8 3

webmailprovider string 32

20509 - LOGID_ANTISPAM_FTGD_ERR

Message ID: 20509


Message Description: LOGID_ANTISPAM_FTGD_ERR
Message Meaning: FortiGuard error message
Type: Email
Category: FTGD_ERR
Severity: Notice

Log Field Name Description Data Type Length

action Security action of the email filter. Eg. blocked, tagged, allow string 8

agent string 1024

FortiOS 7.2.1 Log Reference 400


Fortinet Inc.
Log Field Name Description Data Type Length

attachment Possible values: yes , no string 3

authserver string 64

banword Banned word string 128

cc Email address(es) from the Email Headers string 4096


(IMAP/POP3/SMTP)

date Date string 10

devid Device ID string 16

direction Direction of packets string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination interface Role, ex: LAN, WAN, etc string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime the time of the event uint64 20

eventtype Email Filter event type string 32

fctuid FortiClient ID string 32

fortiguardresp string 512

from Email address(es) from the Email Headers string 128


(IMAP/POP3/SMTP)

group User group name string 512

level Log Level string 11

logid Log ID string 10

msg Log Message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Email Filter profile name string 64

FortiOS 7.2.1 Log Reference 401


Fortinet Inc.
Log Field Name Description Data Type Length

proto Protocol number uint8 3

recipient Email addresses from the SMTP envelope string 512

sender Email addresses from the SMTP envelope string 128

service SMTP, POP3, IMAP, etc. string 36

sessionid Session ID uint32 10

size Email size in Bytes? string 16

srccountry string 64

srcdomain string 255

srcintf Source Interface string 64

srcintfrole Source interface Role, ex: LAN, WAN, etc string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subject The subject title of the email message string 256

subtype Log subtype string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

type Log type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

user User name string 256

vd Virtual Domain string 32

vrf Virtual router forwarding uint8 3

webmailprovider string 32

20510 - LOGID_ANTISPAM_EMAIL_WEBMAIL_NOTIF

Message ID: 20510


Message Description: LOGID_ANTISPAM_EMAIL_WEBMAIL_NOTIF
Message Meaning: Webmail message
Type: Email

FortiOS 7.2.1 Log Reference 402


Fortinet Inc.
Category: WEBMAIL
Severity: Information

Log Field Name Description Data Type Length

action Security action of the email filter. Eg. blocked, tagged, allow string 8

agent string 1024

attachment Possible values: yes , no string 3

authserver string 64

banword Banned word string 128

cc Email address(es) from the Email Headers string 4096


(IMAP/POP3/SMTP)

date Date string 10

devid Device ID string 16

direction Direction of packets string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination interface Role, ex: LAN, WAN, etc string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime the time of the event uint64 20

eventtype Email Filter event type string 32

fctuid FortiClient ID string 32

fortiguardresp string 512

from Email address(es) from the Email Headers string 128


(IMAP/POP3/SMTP)

group User group name string 512

level Log Level string 11

logid Log ID string 10

msg Log Message string 512

policyid Policy ID uint32 10

FortiOS 7.2.1 Log Reference 403


Fortinet Inc.
Log Field Name Description Data Type Length

policymode string 8

policytype string 24

poluuid string 37

profile Email Filter profile name string 64

proto Protocol number uint8 3

recipient Email addresses from the SMTP envelope string 512

sender Email addresses from the SMTP envelope string 128

service SMTP, POP3, IMAP, etc. string 36

sessionid Session ID uint32 10

size Email size in Bytes? string 16

srccountry string 64

srcdomain string 255

srcintf Source Interface string 64

srcintfrole Source interface Role, ex: LAN, WAN, etc string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subject The subject title of the email message string 256

subtype Log subtype string 20

time Time string 8

to Email address(es) from the Email Headers string 512


(IMAP/POP3/SMTP)

type Log type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

user User name string 256

vd Virtual Domain string 32

vrf Virtual router forwarding uint8 3

webmailprovider string 32

FortiOS 7.2.1 Log Reference 404


Fortinet Inc.
Event

20002 - LOG_ID_DOMAIN_UNRESOLVABLE

Message ID: 20002


Message Description: LOG_ID_DOMAIN_UNRESOLVABLE
Message Meaning: Domain name of alert email sender unresolvable
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

20003 - LOG_ID_MAIL_SENT_FAIL

Message ID: 20003


Message Description: LOG_ID_MAIL_SENT_FAIL

FortiOS 7.2.1 Log Reference 405


Fortinet Inc.
Message Meaning: Alert email send status failed
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

count Count uint32 10

20004 - LOG_ID_POLICY_TOO_BIG

Message ID: 20004


Message Description: LOG_ID_POLICY_TOO_BIG
Message Meaning: Policy too big for installation
Type: Event
Category: SYSTEM
Severity: Critical

FortiOS 7.2.1 Log Reference 406


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

status Status string 23

msg Log Message string 4096

20005 - LOG_ID_PPP_LINK_UP

Message ID: 20005


Message Description: LOG_ID_PPP_LINK_UP
Message Meaning: Modem PPP link up
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 407


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20006 - LOG_ID_PPP_LINK_DOWN

Message ID: 20006


Message Description: LOG_ID_PPP_LINK_DOWN
Message Meaning: Modem PPP link down
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20007 - LOG_ID_SOCKET_EXHAUSTED

Message ID: 20007


Message Description: LOG_ID_SOCKET_EXHAUSTED

FortiOS 7.2.1 Log Reference 408


Fortinet Inc.
Message Meaning: Socket is exhausted
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

service Name of Service string 64

proto Protocol Number uint8 3

vrf uint8 3

srcip Source IP ip 39

srcport Source port uint16 5

nat NAT IP Address ip 39

dstip Destination IP ip 39

dstport Destination Protocol Port uint16 5

20008 - LOG_ID_POLICY6_TOO_BIG

Message ID: 20008


Message Description: LOG_ID_POLICY6_TOO_BIG
Message Meaning: IPv6 policy too big for installation
Type: Event
Category: SYSTEM

FortiOS 7.2.1 Log Reference 409


Fortinet Inc.
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

status Status string 23

msg Log Message string 4096

20010 - LOG_ID_KERNEL_ERROR

Message ID: 20010


Message Description: LOG_ID_KERNEL_ERROR
Message Meaning: Kernel error
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 410


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20016 - LOG_ID_MODEM_EXCEED_REDIAL_COUNT

Message ID: 20016


Message Description: LOG_ID_MODEM_EXCEED_REDIAL_COUNT
Message Meaning: Modem exceeded redial limit
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20017 - LOG_ID_MODEM_FAIL_TO_OPEN

Message ID: 20017

FortiOS 7.2.1 Log Reference 411


Fortinet Inc.
Message Description: LOG_ID_MODEM_FAIL_TO_OPEN
Message Meaning: Modem failed to open
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20020 - LOG_ID_MODEM_USB_DETECTED

Message ID: 20020


Message Description: LOG_ID_MODEM_USB_DETECTED
Message Meaning: USB modem detected
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 412


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20021 - LOG_ID_MAIL_RESENT

Message ID: 20021


Message Description: LOG_ID_MAIL_RESENT
Message Meaning: Alert email resent
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

FortiOS 7.2.1 Log Reference 413


Fortinet Inc.
Log Field Name Description Data Type Length

action Policy Action string 65

status Status string 23

msg Log Message string 4096

count Count uint32 10

20022 - LOG_ID_MODEM_USB_REMOVED

Message ID: 20022


Message Description: LOG_ID_MODEM_USB_REMOVED
Message Meaning: USB modem removed
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20023 - LOG_ID_MODEM_USBLTE_DETECTED

Message ID: 20023


Message Description: LOG_ID_MODEM_USBLTE_DETECTED
Message Meaning: USB LTE modem detected
Type: Event

FortiOS 7.2.1 Log Reference 414


Fortinet Inc.
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20024 - LOG_ID_MODEM_USBLTE_REMOVED

Message ID: 20024


Message Description: LOG_ID_MODEM_USBLTE_REMOVED
Message Meaning: USB LTE modem removed
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 415


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20025 - LOG_ID_REPORTD_REPORT_SUCCESS

Message ID: 20025


Message Description: LOG_ID_REPORTD_REPORT_SUCCESS
Message Meaning: Report generated successfully
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

file Report file full path string 256

filesize Report File Size in Bytes uint32 10

datarange Data range for reports string 50

reporttype Report Type string 20

processtime Process time for reports uint32 10

FortiOS 7.2.1 Log Reference 416


Fortinet Inc.
20026 - LOG_ID_REPORTD_REPORT_FAILURE

Message ID: 20026


Message Description: LOG_ID_REPORTD_REPORT_FAILURE
Message Meaning: Report generation failed
Type: Event
Category: SYSTEM
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20028 - LOG_ID_REPORT_RECREATE_DB

Message ID: 20028


Message Description: LOG_ID_REPORT_RECREATE_DB
Message Meaning: Report database recreated
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 417


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20031 - LOG_ID_RAD_OUT_OF_MEM

Message ID: 20031


Message Description: LOG_ID_RAD_OUT_OF_MEM
Message Meaning: RADVD out of memory
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 418


Fortinet Inc.
20032 - LOG_ID_RAD_NOT_FOUND

Message ID: 20032


Message Description: LOG_ID_RAD_NOT_FOUND
Message Meaning: RADVD interface not found
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20033 - LOG_ID_RAD_MOBILE_IPV6

Message ID: 20033


Message Description: LOG_ID_RAD_MOBILE_IPV6
Message Meaning: RADVD mobile IPv6 extensions used
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 419


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20034 - LOG_ID_RAD_IPV6_OUT_OF_RANGE

Message ID: 20034


Message Description: LOG_ID_RAD_IPV6_OUT_OF_RANGE
Message Meaning: RADVD mobile IPv6 MinRtrAdvInterval out of range
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 420


Fortinet Inc.
20035 - LOG_ID_RAD_MIN_OUT_OF_RANGE

Message ID: 20035


Message Description: LOG_ID_RAD_MIN_OUT_OF_RANGE
Message Meaning: RADVD MinRtrAdvInterval out of range
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20036 - LOG_ID_RAD_MAX_OUT_OF_RANGE

Message ID: 20036


Message Description: LOG_ID_RAD_MAX_OUT_OF_RANGE
Message Meaning: RADVD mobile IPv6 MaxRtrAdvInterval out of range
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 421


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20037 - LOG_ID_RAD_MAX_ADV_OUT_OF_RANGE

Message ID: 20037


Message Description: LOG_ID_RAD_MAX_ADV_OUT_OF_RANGE
Message Meaning: RADVD MaxRtrAdvInterval out of range
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 422


Fortinet Inc.
20039 - LOG_ID_RAD_MTU_TOO_SMALL

Message ID: 20039


Message Description: LOG_ID_RAD_MTU_TOO_SMALL
Message Meaning: RADVD AdvLinkMTU too small
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20040 - LOG_ID_RAD_TIME_TOO_SMALL

Message ID: 20040


Message Description: LOG_ID_RAD_TIME_TOO_SMALL
Message Meaning: RADVD AdvReachableTime too small
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 423


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20041 - LOG_ID_RAD_HOP_OUT_OF_RANGE

Message ID: 20041


Message Description: LOG_ID_RAD_HOP_OUT_OF_RANGE
Message Meaning: RADVD AdvCurHopLimit too big
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 424


Fortinet Inc.
20042 - LOG_ID_RAD_DFT_HOP_OUT_OF_RANGE

Message ID: 20042


Message Description: LOG_ID_RAD_DFT_HOP_OUT_OF_RANGE
Message Meaning: RADVD AdvCurHopLimit out of range
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20043 - LOG_ID_RAD_AGENT_OUT_OF_RANGE

Message ID: 20043


Message Description: LOG_ID_RAD_AGENT_OUT_OF_RANGE
Message Meaning: RADVD HomeAgentLifetime out of range
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 425


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20044 - LOG_ID_RAD_AGENT_FLAG_NOT_SET

Message ID: 20044


Message Description: LOG_ID_RAD_AGENT_FLAG_NOT_SET
Message Meaning: RADVD AdvHomeAgentFlag not set
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 426


Fortinet Inc.
20045 - LOG_ID_RAD_PREFIX_TOO_LONG

Message ID: 20045


Message Description: LOG_ID_RAD_PREFIX_TOO_LONG
Message Meaning: RADVD invalid prefix length
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20046 - LOG_ID_RAD_PREF_TIME_TOO_SMALL

Message ID: 20046


Message Description: LOG_ID_RAD_PREF_TIME_TOO_SMALL
Message Meaning: RADVD AdvValidLifetime less than AdvPreferredLifetime
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 427


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20061 - LOG_ID_RAD_INV_ICMPV6_TYPE

Message ID: 20061


Message Description: LOG_ID_RAD_INV_ICMPV6_TYPE
Message Meaning: RADVD received unwanted ICMPv6 packet
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 428


Fortinet Inc.
20062 - LOG_ID_RAD_INV_ICMPV6_RA_LEN

Message ID: 20062


Message Description: LOG_ID_RAD_INV_ICMPV6_RA_LEN
Message Meaning: RADVD received ICMPv6 RA packet with invalid length
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20063 - LOG_ID_RAD_ICMPV6_NO_SRC_ADDR

Message ID: 20063


Message Description: LOG_ID_RAD_ICMPV6_NO_SRC_ADDR
Message Meaning: RADVD received ICMPv6 RA packet with non-link local source address
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 429


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20064 - LOG_ID_RAD_INV_ICMPV6_RS_LEN

Message ID: 20064


Message Description: LOG_ID_RAD_INV_ICMPV6_RS_LEN
Message Meaning: RADVD received ICMPv6 RS packet with invalid length
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 430


Fortinet Inc.
20065 - LOG_ID_RAD_INV_ICMPV6_CODE

Message ID: 20065


Message Description: LOG_ID_RAD_INV_ICMPV6_CODE
Message Meaning: RADVD received ICMPv6 RS/RA packet with invalid code
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20066 - LOG_ID_RAD_INV_ICMPV6_HOP

Message ID: 20066


Message Description: LOG_ID_RAD_INV_ICMPV6_HOP
Message Meaning: RADVD received ICMPv6 RS/RA packet with invalid hop limit
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 431


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20067 - LOG_ID_RAD_MISMATCH_HOP

Message ID: 20067


Message Description: LOG_ID_RAD_MISMATCH_HOP
Message Meaning: RADVD local AdvCurHopLimit disagrees with remote site
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 432


Fortinet Inc.
20068 - LOG_ID_RAD_MISMATCH_MGR_FLAG

Message ID: 20068


Message Description: LOG_ID_RAD_MISMATCH_MGR_FLAG
Message Meaning: RADVD local AdvManagedFlag disagrees with remote site
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20069 - LOG_ID_RAD_MISMATCH_OTH_FLAG

Message ID: 20069


Message Description: LOG_ID_RAD_MISMATCH_OTH_FLAG
Message Meaning: RADVD local AdvOtherConfigFlag disagrees with remote site
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 433


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20070 - LOG_ID_RAD_MISMATCH_TIME

Message ID: 20070


Message Description: LOG_ID_RAD_MISMATCH_TIME
Message Meaning: RADVD local AdvReachableTime disagrees with remote site
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 434


Fortinet Inc.
20071 - LOG_ID_RAD_MISMATCH_TIMER

Message ID: 20071


Message Description: LOG_ID_RAD_MISMATCH_TIMER
Message Meaning: RADVD local AdvRetransTimer disagrees with remote site
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20072 - LOG_ID_RAD_EXTRA_DATA

Message ID: 20072


Message Description: LOG_ID_RAD_EXTRA_DATA
Message Meaning: RADVD extra data in RA packet found
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 435


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20073 - LOG_ID_RAD_NO_OPT_DATA

Message ID: 20073


Message Description: LOG_ID_RAD_NO_OPT_DATA
Message Meaning: RADVD RA packet option length zero
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 436


Fortinet Inc.
20074 - LOG_ID_RAD_INV_OPT_LEN

Message ID: 20074


Message Description: LOG_ID_RAD_INV_OPT_LEN
Message Meaning: RADVD RA packet option length greater than total length
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20075 - LOG_ID_RAD_MISMATCH_MTU

Message ID: 20075


Message Description: LOG_ID_RAD_MISMATCH_MTU
Message Meaning: RADVD local AdvLinkMTU disagrees with remote site
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 437


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20077 - LOG_ID_RAD_MISMATCH_PREF_TIME

Message ID: 20077


Message Description: LOG_ID_RAD_MISMATCH_PREF_TIME
Message Meaning: Interface AdvPreferredLifetime on our interface does not agree with a remote site
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 438


Fortinet Inc.
20078 - LOG_ID_RAD_INV_OPT

Message ID: 20078


Message Description: LOG_ID_RAD_INV_OPT
Message Meaning: RADVD found invalid option in RA packet from remote site
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20080 - LOG_ID_RAD_FAIL_TO_RCV

Message ID: 20080


Message Description: LOG_ID_RAD_FAIL_TO_RCV
Message Meaning: RADVD receive message failed
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 439


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20081 - LOG_ID_RAD_INV_HOP

Message ID: 20081


Message Description: LOG_ID_RAD_INV_HOP
Message Meaning: RADVD received invalid IPv6 hop limit
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 440


Fortinet Inc.
20082 - LOG_ID_RAD_INV_PKTINFO

Message ID: 20082


Message Description: LOG_ID_RAD_INV_PKTINFO
Message Meaning: RADVD received invalid IPv6 packet info
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20083 - LOG_ID_RAD_FAIL_TO_CHECK

Message ID: 20083


Message Description: LOG_ID_RAD_FAIL_TO_CHECK
Message Meaning: RADVD all-routers membership check failed
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 441


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20084 - LOG_ID_RAD_FAIL_TO_SEND

Message ID: 20084


Message Description: LOG_ID_RAD_FAIL_TO_SEND
Message Meaning: RADVD send message failed
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 442


Fortinet Inc.
20085 - LOG_ID_SESSION_CLASH

Message ID: 20085


Message Description: LOG_ID_SESSION_CLASH
Message Meaning: Session clashed
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

proto Protocol Number uint8 3

trace_id string 32

20090 - LOG_ID_INTF_LINK_STA_CHG

Message ID: 20090


Message Description: LOG_ID_INTF_LINK_STA_CHG
Message Meaning: Interface link status changed
Type: Event
Category: SYSTEM
Severity: Notice

FortiOS 7.2.1 Log Reference 443


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

intf Interface string 16

20099 - LOG_ID_INTF_STA_CHG

Message ID: 20099


Message Description: LOG_ID_INTF_STA_CHG
Message Meaning: Interface status changed
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 444


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

20100 - LOG_ID_WEB_CAT_UPDATED

Message ID: 20100


Message Description: LOG_ID_WEB_CAT_UPDATED
Message Meaning: FortiGuard web filter category list updated
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20101 - LOG_ID_WEB_LIC_EXPIRE

Message ID: 20101

FortiOS 7.2.1 Log Reference 445


Fortinet Inc.
Message Description: LOG_ID_WEB_LIC_EXPIRE
Message Meaning: FortiGuard web filter license expiring
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20102 - LOG_ID_SPAM_LIC_EXPIRE

Message ID: 20102


Message Description: LOG_ID_SPAM_LIC_EXPIRE
Message Meaning: FortiGuard antispam license expiring
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 446


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20103 - LOG_ID_AV_LIC_EXPIRE

Message ID: 20103


Message Description: LOG_ID_AV_LIC_EXPIRE
Message Meaning: FortiGuard antivirus license expiring
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 447


Fortinet Inc.
20104 - LOG_ID_IPS_LIC_EXPIRE

Message ID: 20104


Message Description: LOG_ID_IPS_LIC_EXPIRE
Message Meaning: FortiGuard IPS license expiring
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20107 - LOG_ID_LOG_UPLOAD_ERR

Message ID: 20107


Message Description: LOG_ID_LOG_UPLOAD_ERR
Message Meaning: Log upload error
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 448


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

error Error Reason for Log Upload to Forticloud string 256

server Server IP Address string 64

port Port Number uint16 5

20108 - LOG_ID_LOG_UPLOAD_DONE

Message ID: 20108


Message Description: LOG_ID_LOG_UPLOAD_DONE
Message Meaning: Log upload completed
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 449


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

status Status string 23

msg Log Message string 4096

server Server IP Address string 64

port Port Number uint16 5

20109 - LOG_ID_WEB_LIC_EXPIRED

Message ID: 20109


Message Description: LOG_ID_WEB_LIC_EXPIRED
Message Meaning: FortiGuard web filter license expired
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

FortiOS 7.2.1 Log Reference 450


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc Log Description string 4096

msg Log Message string 4096

20113 - LOG_ID_IPSA_DOWNLOAD_FAIL

Message ID: 20113


Message Description: LOG_ID_IPSA_DOWNLOAD_FAIL
Message Meaning: IPSA database download failed
Type: Event
Category: SYSTEM
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20114 - LOG_ID_IPSA_SELFTEST_FAIL

Message ID: 20114


Message Description: LOG_ID_IPSA_SELFTEST_FAIL
Message Meaning: IPSA disabled: self test failed
Type: Event
Category: SYSTEM
Severity: Error

FortiOS 7.2.1 Log Reference 451


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20115 - LOG_ID_IPSA_STATUSUPD_FAIL

Message ID: 20115


Message Description: LOG_ID_IPSA_STATUSUPD_FAIL
Message Meaning: IPSA driver update failed
Type: Event
Category: SYSTEM
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 452


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20116 - LOG_ID_SPAM_LIC_EXPIRED

Message ID: 20116


Message Description: LOG_ID_SPAM_LIC_EXPIRED
Message Meaning: FortiGuard antispam license expired
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20117 - LOG_ID_AV_LIC_EXPIRED

Message ID: 20117


Message Description: LOG_ID_AV_LIC_EXPIRED
Message Meaning: FortiGuard antivirus license expired
Type: Event
Category: SYSTEM

FortiOS 7.2.1 Log Reference 453


Fortinet Inc.
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20118 - LOG_ID_WEBF_STATUS_REACH

Message ID: 20118


Message Description: LOG_ID_WEBF_STATUS_REACH
Message Meaning: FortiGuard webfilter reachable
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 454


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20119 - LOG_ID_WEBF_STATUS_UNREACH

Message ID: 20119


Message Description: LOG_ID_WEBF_STATUS_UNREACH
Message Meaning: FortiGuard webfilter unreachable
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20120 - LOG_ID_FMGC_LIC_EXPIRE

Message ID: 20120


Message Description: LOG_ID_FMGC_LIC_EXPIRE
Message Meaning: FortiManager Cloud license expiring
Type: Event

FortiOS 7.2.1 Log Reference 455


Fortinet Inc.
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20121 - LOG_ID_FAZC_LIC_EXPIRE

Message ID: 20121


Message Description: LOG_ID_FAZC_LIC_EXPIRE
Message Meaning: FortiAnalyzer Cloud license expiring
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 456


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20122 - LOG_ID_SWNO_LIC_EXPIRE

Message ID: 20122


Message Description: LOG_ID_SWNO_LIC_EXPIRE
Message Meaning: SD-WAN Overlay Controller license expiring
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20123 - LOG_ID_SWNM_LIC_EXPIRE

Message ID: 20123


Message Description: LOG_ID_SWNM_LIC_EXPIRE
Message Meaning: SD-WAN Monitoring license expiring
Type: Event

FortiOS 7.2.1 Log Reference 457


Fortinet Inc.
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20124 - LOG_ID_VMLS_LIC_EXPIRE

Message ID: 20124


Message Description: LOG_ID_VMLS_LIC_EXPIRE
Message Meaning: VM-S license expiring
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 458


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20125 - LOG_ID_SFAS_LIC_EXPIRE

Message ID: 20125


Message Description: LOG_ID_SFAS_LIC_EXPIRE
Message Meaning: Security Rating license expiring
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20126 - LOG_ID_IPMC_LIC_EXPIRE

Message ID: 20126


Message Description: LOG_ID_IPMC_LIC_EXPIRE
Message Meaning: IPAM Controller license expiring
Type: Event

FortiOS 7.2.1 Log Reference 459


Fortinet Inc.
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20127 - LOG_ID_IOTH_LIC_EXPIRE

Message ID: 20127


Message Description: LOG_ID_IOTH_LIC_EXPIRE
Message Meaning: IoT device identification license expiring
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 460


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20128 - LOG_ID_FSAC_LIC_EXPIRE

Message ID: 20128


Message Description: LOG_ID_FSAC_LIC_EXPIRE
Message Meaning: FortiSandbox Cloud license expiring
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20129 - LOG_ID_AFAC_LIC_EXPIRE

Message ID: 20129


Message Description: LOG_ID_AFAC_LIC_EXPIRE
Message Meaning: FortiAnalyzer Cloud premium license expiring
Type: Event

FortiOS 7.2.1 Log Reference 461


Fortinet Inc.
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20130 - LOG_ID_EMSC_ACC_LIC_EXPIRE

Message ID: 20130


Message Description: LOG_ID_EMSC_ACC_LIC_EXPIRE
Message Meaning: FortiClient EMS Cloud license expiring
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 462


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20131 - LOG_ID_FMGC_ACC_LIC_EXPIRE

Message ID: 20131


Message Description: LOG_ID_FMGC_ACC_LIC_EXPIRE
Message Meaning: FortiManager Cloud Account Level license expiring
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20132 - LOG_ID_FSAP_ACC_LIC_EXPIRE

Message ID: 20132


Message Description: LOG_ID_FSAP_ACC_LIC_EXPIRE
Message Meaning: FortiSandbox Cloud Account Level license expiring
Type: Event

FortiOS 7.2.1 Log Reference 463


Fortinet Inc.
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20133 - LOG_ID_FIREWALL_POLICY_EXPIRE

Message ID: 20133


Message Description: LOG_ID_FIREWALL_POLICY_EXPIRE
Message Meaning: Firewall policy expiring
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 464


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20134 - LOG_ID_FIREWALL_POLICY_EXPIRED

Message ID: 20134


Message Description: LOG_ID_FIREWALL_POLICY_EXPIRED
Message Meaning: Firewall policy expired
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20135 - LOG_ID_FAIS_LIC_EXPIRE

Message ID: 20135


Message Description: LOG_ID_FAIS_LIC_EXPIRE
Message Meaning: FortiGuard AI-Based Sandbox Service license expiring
Type: Event

FortiOS 7.2.1 Log Reference 465


Fortinet Inc.
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20200 - LOG_ID_FIPS_SELF_TEST

Message ID: 20200


Message Description: LOG_ID_FIPS_SELF_TEST
Message Meaning: FIPS CC self-test initiated
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 466


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

20201 - LOG_ID_FIPS_SELF_ALL_TEST

Message ID: 20201


Message Description: LOG_ID_FIPS_SELF_ALL_TEST
Message Meaning: FIPS ALL CC self-tests initiated
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 467


Fortinet Inc.
20202 - LOG_ID_DISK_FORMAT_ERROR

Message ID: 20202


Message Description: LOG_ID_DISK_FORMAT_ERROR
Message Meaning: Disk partitioning or formatting Error
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20203 - LOG_ID_DAEMON_SHUTDOWN

Message ID: 20203


Message Description: LOG_ID_DAEMON_SHUTDOWN
Message Meaning: Daemon shutdown
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 468


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

daemon Daemon Name string 32

pid Process ID uint32 10

20204 - LOG_ID_DAEMON_START

Message ID: 20204


Message Description: LOG_ID_DAEMON_START
Message Meaning: Daemon started
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 469


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

daemon Daemon Name string 32

pid Process ID uint32 10

20205 - LOG_ID_DISK_FORMAT_REQ

Message ID: 20205


Message Description: LOG_ID_DISK_FORMAT_REQ
Message Meaning: Format disk requested
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 470


Fortinet Inc.
20206 - LOG_ID_DISK_SCAN_REQ

Message ID: 20206


Message Description: LOG_ID_DISK_SCAN_REQ
Message Meaning: Scan disk requested
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

20207 - LOG_ID_RAD_MISMATCH_VALID_TIME

Message ID: 20207


Message Description: LOG_ID_RAD_MISMATCH_VALID_TIME
Message Meaning: RADVD local AdvValidLifetime disagrees with remote site
Type: Event
Category: SYSTEM
Severity: Warning

FortiOS 7.2.1 Log Reference 471


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20208 - LOG_ID_ZOMBIE_DAEMON_CLEANUP

Message ID: 20208


Message Description: LOG_ID_ZOMBIE_DAEMON_CLEANUP
Message Meaning: Zombie daemon cleanup
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 472


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

daemon Daemon Name string 32

pid Process ID uint32 10

20209 - LOG_ID_DISK_UNAVAIL

Message ID: 20209


Message Description: LOG_ID_DISK_UNAVAIL
Message Meaning: Disk unavailable
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20210 - LOG_ID_DISK_TRIM_START

Message ID: 20210


Message Description: LOG_ID_DISK_TRIM_START

FortiOS 7.2.1 Log Reference 473


Fortinet Inc.
Message Meaning: SSD TRIM started
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

20211 - LOG_ID_DISK_TRIM_END

Message ID: 20211


Message Description: LOG_ID_DISK_TRIM_END
Message Meaning: SSD TRIM finished
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 474


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

20212 - LOG_ID_DISK_SCAN_NEEDED

Message ID: 20212


Message Description: LOG_ID_DISK_SCAN_NEEDED
Message Meaning: Disk scan is needed
Type: Event
Category: SYSTEM
Severity: Alert

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 475


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20213 - LOG_ID_DISK_LOG_CORRUPTED

Message ID: 20213


Message Description: LOG_ID_DISK_LOG_CORRUPTED
Message Meaning: Log file on disk is corrupted
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20214 - LOG_ID_LOCAL_OUT_IOC

Message ID: 20214


Message Description: LOG_ID_LOCAL_OUT_IOC
Message Meaning: Locally generated traffic goes to IoC location
Type: Event

FortiOS 7.2.1 Log Reference 476


Fortinet Inc.
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

proto Protocol Number uint8 3

srcip Source IP ip 39

srcport Source port uint16 5

dstip Destination IP ip 39

dstport Destination Protocol Port uint16 5

session_id Session ID uint32 10

20220 - LOGID_EVENT_SHAPER_OUTBOUND_MAXED_OUT

Message ID: 20220


Message Description: LOGID_EVENT_SHAPER_OUTBOUND_MAXED_OUT
Message Meaning: Outbound bandwidth rate exceeded
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 477


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

intf Interface string 16

limit Virtual Domain Resource Limit uint32 10

20221 - LOGID_EVENT_SHAPER_INBOUND_MAXED_OUT

Message ID: 20221


Message Description: LOGID_EVENT_SHAPER_INBOUND_MAXED_OUT
Message Meaning: Inbound bandwidth rate exceeded
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

FortiOS 7.2.1 Log Reference 478


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc Log Description string 4096

msg Log Message string 4096

intf Interface string 16

limit Virtual Domain Resource Limit uint32 10

20300 - LOG_ID_BGP_NB_STAT_CHG

Message ID: 20300


Message Description: LOG_ID_BGP_NB_STAT_CHG
Message Meaning: BGP neighbor status changed
Type: Event
Category: ROUTER
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20301 - LOG_ID_VZ_LOG_INFO

Message ID: 20301


Message Description: LOG_ID_VZ_LOG_INFO
Message Meaning: Routing log information
Type: Event

FortiOS 7.2.1 Log Reference 479


Fortinet Inc.
Category: ROUTER
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20302 - LOG_ID_OSPF_NB_STAT_CHG

Message ID: 20302


Message Description: LOG_ID_OSPF_NB_STAT_CHG
Message Meaning: OSPF neighbor status changed
Type: Event
Category: ROUTER
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 480


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20303 - LOG_ID_OSPF6_NB_STAT_CHG

Message ID: 20303


Message Description: LOG_ID_OSPF6_NB_STAT_CHG
Message Meaning: OSPF6 neighbor status changed
Type: Event
Category: ROUTER
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20304 - LOG_ID_VZ_LOG_WARNING

Message ID: 20304


Message Description: LOG_ID_VZ_LOG_WARNING
Message Meaning: Routing log warning
Type: Event

FortiOS 7.2.1 Log Reference 481


Fortinet Inc.
Category: ROUTER
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20305 - LOG_ID_VZ_LOG_CRITICAL

Message ID: 20305


Message Description: LOG_ID_VZ_LOG_CRITICAL
Message Meaning: Routing log critical event
Type: Event
Category: ROUTER
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 482


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20306 - LOG_ID_VZ_LOG_ERROR

Message ID: 20306


Message Description: LOG_ID_VZ_LOG_ERROR
Message Meaning: Routing log error
Type: Event
Category: ROUTER
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

20401 - LOG_ID_ROUTER_CLEAR

Message ID: 20401


Message Description: LOG_ID_ROUTER_CLEAR
Message Meaning: Router cleared
Type: Event

FortiOS 7.2.1 Log Reference 483


Fortinet Inc.
Category: ROUTER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

22000 - LOG_ID_INV_PKT_LEN

Message ID: 22000


Message Description: LOG_ID_INV_PKT_LEN
Message Meaning: Packet length mismatch
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 484


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

22001 - LOG_ID_UNSUPPORTED_PROT_VER

Message ID: 22001


Message Description: LOG_ID_UNSUPPORTED_PROT_VER
Message Meaning: Protocol version unsupported
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

22002 - LOG_ID_INV_REQ_TYPE

Message ID: 22002

FortiOS 7.2.1 Log Reference 485


Fortinet Inc.
Message Description: LOG_ID_INV_REQ_TYPE
Message Meaning: Request type not supported
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

22003 - LOG_ID_FAIL_SET_SIG_HANDLER

Message ID: 22003


Message Description: LOG_ID_FAIL_SET_SIG_HANDLER
Message Meaning: Signal handler setup failed
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 486


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

22004 - LOG_ID_FAIL_CREATE_SOCKET

Message ID: 22004


Message Description: LOG_ID_FAIL_CREATE_SOCKET
Message Meaning: Socket creation failed
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

22005 - LOG_ID_FAIL_CREATE_SOCKET_RETRY

Message ID: 22005

FortiOS 7.2.1 Log Reference 487


Fortinet Inc.
Message Description: LOG_ID_FAIL_CREATE_SOCKET_RETRY
Message Meaning: Socket creation retry failed
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

22006 - LOG_ID_FAIL_REG_CMDB_EVENT

Message ID: 22006


Message Description: LOG_ID_FAIL_REG_CMDB_EVENT
Message Meaning: Registration for CMDB events failed
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 488


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

22009 - LOG_ID_FAIL_FIND_AV_PROFILE

Message ID: 22009


Message Description: LOG_ID_FAIL_FIND_AV_PROFILE
Message Meaning: AntiVirus profile not found
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

name Display Name of the Connection string 128

FortiOS 7.2.1 Log Reference 489


Fortinet Inc.
22010 - LOG_ID_SENDTO_FAIL

Message ID: 22010


Message Description: LOG_ID_SENDTO_FAIL
Message Meaning: URL filter packet send failure
Type: Event
Category: SYSTEM
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

process Process string 4096

reason Reason string 256

22011 - LOG_ID_ENTER_MEM_CONSERVE_MODE

Message ID: 22011


Message Description: LOG_ID_ENTER_MEM_CONSERVE_MODE
Message Meaning: Memory conserve mode entered
Type: Event
Category: SYSTEM
Severity: Critical

FortiOS 7.2.1 Log Reference 490


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

service Name of Service string 64

conserve Flag for Conserve Mode string 32

total Total uint32 10

used Number of Used IPs uint32 10

red string 32

green Green threshold for conserve mode string 32

22012 - LOG_ID_LEAVE_MEM_CONSERVE_MODE

Message ID: 22012


Message Description: LOG_ID_LEAVE_MEM_CONSERVE_MODE
Message Meaning: Memory conserve mode exited
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 491


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

service Name of Service string 64

conserve Flag for Conserve Mode string 32

total Total uint32 10

used Number of Used IPs uint32 10

red string 32

green Green threshold for conserve mode string 32

22013 - LOG_ID_IPPOOLPBA_BLOCK_EXHAUSTED

Message ID: 22013


Message Description: LOG_ID_IPPOOLPBA_BLOCK_EXHAUSTED
Message Meaning: IP pool PBA block exhausted
Type: Event
Category: SYSTEM
Severity: Alert

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 492


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

saddr Source Address IP string 80

poolname IP Pool Name string 36

22014 - LOG_ID_IPPOOLPBA_NATIP_EXHAUSTED

Message ID: 22014


Message Description: LOG_ID_IPPOOLPBA_NATIP_EXHAUSTED
Message Meaning: IP pool PBA NAT IP exhausted
Type: Event
Category: SYSTEM
Severity: Alert

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

FortiOS 7.2.1 Log Reference 493


Fortinet Inc.
Log Field Name Description Data Type Length

msg Log Message string 4096

saddr Source Address IP string 80

poolname IP Pool Name string 36

22015 - LOG_ID_IPPOOLPBA_CREATE

Message ID: 22015


Message Description: LOG_ID_IPPOOLPBA_CREATE
Message Meaning: IP pool PBA created
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

nat NAT IP Address ip 39

saddr Source Address IP string 80

poolname IP Pool Name string 36

portbegin Port Number to Begin uint16 5

portend Port Number to End uint16 5

FortiOS 7.2.1 Log Reference 494


Fortinet Inc.
22016 - LOG_ID_IPPOOLPBA_DEALLOCATE

Message ID: 22016


Message Description: LOG_ID_IPPOOLPBA_DEALLOCATE
Message Meaning: Deallocate IP pool PBA
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

nat NAT IP Address ip 39

saddr Source Address IP string 80

poolname IP Pool Name string 36

portbegin Port Number to Begin uint16 5

portend Port Number to End uint16 5

duration Duration uint32 10

22017 - LOG_ID_EXCEED_GLOB_RES_LIMIT

Message ID: 22017


Message Description: LOG_ID_EXCEED_GLOB_RES_LIMIT
Message Meaning: Global resource limit exceeded

FortiOS 7.2.1 Log Reference 495


Fortinet Inc.
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

service Name of Service string 64

22018 - LOG_ID_EXCEED_VD_RES_LIMIT

Message ID: 22018


Message Description: LOG_ID_EXCEED_VD_RES_LIMIT
Message Meaning: VDOM resource limit exceeded
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 496


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

service Name of Service string 64

22019 - LOG_ID_LOGRATE_OVER_LIMIT

Message ID: 22019


Message Description: LOG_ID_LOGRATE_OVER_LIMIT
Message Meaning: Log rate limit exceeded
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 497


Fortinet Inc.
22020 - LOG_ID_FAIL_CREATE_HA_SOCKET

Message ID: 22020


Message Description: LOG_ID_FAIL_CREATE_HA_SOCKET
Message Meaning: HA socket creation failed
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

22021 - LOG_ID_FAIL_CREATE_HA_SOCKET_RETRY

Message ID: 22021


Message Description: LOG_ID_FAIL_CREATE_HA_SOCKET_RETRY
Message Meaning: UDP socket creation to relay URL request failed
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 498


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

22031 - LOG_ID_SUCCESS_CSF_LOG_SYNC_CONFIG_CHANGED

Message ID: 22031


Message Description: LOG_ID_SUCCESS_CSF_LOG_SYNC_CONFIG_CHANGED
Message Meaning: Settings modified by Security Fabric service
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 499


Fortinet Inc.
Log Field Name Description Data Type Length

action Policy Action string 65

status Status string 23

msg Log Message string 4096

sn Serial Number string 64

22032 - LOG_ID_CSF_LOOP_FOUND

Message ID: 22032


Message Description: LOG_ID_CSF_LOOP_FOUND
Message Meaning: Looped configuration in Security Fabric service
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

reason Reason string 256

sn Serial Number string 64

path string 512

FortiOS 7.2.1 Log Reference 500


Fortinet Inc.
22035 - LOG_ID_CSF_UPSTREAM_SN_CHANGED

Message ID: 22035


Message Description: LOG_ID_CSF_UPSTREAM_SN_CHANGED
Message Meaning: Serial number of upstream is changed
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

sn Serial Number string 64

ip ip 39

oldsn Security fabric upstream FGT old serial number string 64

22036 - LOG_ID_CSF_FGT_CONNECTED

Message ID: 22036


Message Description: LOG_ID_CSF_FGT_CONNECTED
Message Meaning: Connection with Security Fabric member established and authorized.
Type: Event
Category: SYSTEM
Severity: Information

FortiOS 7.2.1 Log Reference 501


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

sn Serial Number string 64

ip ip 39

direction string 16

22037 - LOG_ID_CSF_FGT_DISCONNECTED

Message ID: 22037


Message Description: LOG_ID_CSF_FGT_DISCONNECTED
Message Meaning: Connection with authorized Security Fabric member terminated.
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 502


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

reason Reason string 256

sn Serial Number string 64

ip ip 39

direction string 16

22038 - LOG_ID_CSF_GLOBAL_SYNC_FAILED

Message ID: 22038


Message Description: LOG_ID_CSF_GLOBAL_SYNC_FAILED
Message Meaning: Synchronization of global object failed.
Type: Event
Category: SYSTEM
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 503


Fortinet Inc.
Log Field Name Description Data Type Length

status Status string 23

msg Log Message string 4096

reason Reason string 256

sn Serial Number string 64

path string 512

22039 - LOG_ID_CSF_GLOBAL_SYNC_REPORT

Message ID: 22039


Message Description: LOG_ID_CSF_GLOBAL_SYNC_REPORT
Message Meaning: Synchronization of global object report.
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

reason Reason string 256

sn Serial Number string 64

path string 512

FortiOS 7.2.1 Log Reference 504


Fortinet Inc.
22040 - LOG_ID_CSF_DEVICE_JOIN

Message ID: 22040


Message Description: LOG_ID_CSF_DEVICE_JOIN
Message Meaning: Device joined the Security Fabric.
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

sn Serial Number string 64

scope string 16

22041 - LOG_ID_CSF_DEVICE_LEAVE

Message ID: 22041


Message Description: LOG_ID_CSF_DEVICE_LEAVE
Message Meaning: Device left the Security Fabric.
Type: Event
Category: SYSTEM
Severity: Notice

FortiOS 7.2.1 Log Reference 505


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

sn Serial Number string 64

scope string 16

22042 - LOG_ID_CSF_DEVICE_UPDATE

Message ID: 22042


Message Description: LOG_ID_CSF_DEVICE_UPDATE
Message Meaning: Device in the Security Fabric was updated.
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 506


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

sn Serial Number string 64

scope string 16

22043 - LOG_ID_CSF_NEW_AUTH_REQ

Message ID: 22043


Message Description: LOG_ID_CSF_NEW_AUTH_REQ
Message Meaning: An authorization request was added.
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

sn Serial Number string 64

FortiOS 7.2.1 Log Reference 507


Fortinet Inc.
22044 - LOG_ID_CSF_UPDATE_AUTH_REQ

Message ID: 22044


Message Description: LOG_ID_CSF_UPDATE_AUTH_REQ
Message Meaning: An authorization request was updated.
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

sn Serial Number string 64

22045 - LOG_ID_CSF_REMOVE_AUTH_REQ

Message ID: 22045


Message Description: LOG_ID_CSF_REMOVE_AUTH_REQ
Message Meaning: An authorization request was removed.
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

FortiOS 7.2.1 Log Reference 508


Fortinet Inc.
Log Field Name Description Data Type Length

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

sn Serial Number string 64

22046 - LOG_ID_CSF_ROLE_CHANGE

Message ID: 22046


Message Description: LOG_ID_CSF_ROLE_CHANGE
Message Meaning: Device's authorization privilege changed.
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 509


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

sn Serial Number string 64

desc Description string 128

22050 - LOG_ID_IPAMD_ADDRESS_ALLOCATED

Message ID: 22050


Message Description: LOG_ID_IPAMD_ADDRESS_ALLOCATED
Message Meaning: Address allocated by FortiIPAM and applied to an interface
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

ip ip 39

interface Interface string 32

22051 - LOG_ID_IPAMD_ADDRESS_SET_FAILED

Message ID: 22051

FortiOS 7.2.1 Log Reference 510


Fortinet Inc.
Message Description: LOG_ID_IPAMD_ADDRESS_SET_FAILED
Message Meaning: Address received from FortiIPAM could not be applied to the interface
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

ip ip 39

interface Interface string 32

22052 - LOG_ID_IPAMD_ADDRESS_INVALIDATED

Message ID: 22052


Message Description: LOG_ID_IPAMD_ADDRESS_INVALIDATED
Message Meaning: FortiIPAM indicated that the address was no longer allocated to the interface
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 511


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

interface Interface string 32

22053 - LOG_ID_IPAMD_VALIDATION_COMPLETE

Message ID: 22053


Message Description: LOG_ID_IPAMD_VALIDATION_COMPLETE
Message Meaning: Startup validation of IPAM addresses was completed
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

FortiOS 7.2.1 Log Reference 512


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc Log Description string 4096

msg Log Message string 4096

22060 - LOG_ID_IPAMSD_ADD_ENTRY

Message ID: 22060


Message Description: LOG_ID_IPAMSD_ADD_ENTRY
Message Meaning: Add new entry to IPAM
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

sn Serial Number string 64

interface Interface string 32

22061 - LOG_ID_IPAMSD_DELETE_ENTRY

Message ID: 22061


Message Description: LOG_ID_IPAMSD_DELETE_ENTRY
Message Meaning: Delete entry from IPAM
Type: Event

FortiOS 7.2.1 Log Reference 513


Fortinet Inc.
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

sn Serial Number string 64

interface Interface string 32

22062 - LOG_ID_IPAMSD_FLAG_CONFLICT

Message ID: 22062


Message Description: LOG_ID_IPAMSD_FLAG_CONFLICT
Message Meaning: Flag IPAM entry as conflict
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 514


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

sn Serial Number string 64

interface Interface string 32

22063 - LOG_ID_IPAMSD_UNFLAG_CONFLICT

Message ID: 22063


Message Description: LOG_ID_IPAMSD_UNFLAG_CONFLICT
Message Meaning: Unflag IPAM entry as conflict
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

sn Serial Number string 64

interface Interface string 32

FortiOS 7.2.1 Log Reference 515


Fortinet Inc.
22080 - LOG_ID_PROVISION_LATEST_SUCCEEDED

Message ID: 22080


Message Description: LOG_ID_PROVISION_LATEST_SUCCEEDED
Message Meaning: Provisioning of latest firmware was completed
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

version Version string 64

upgradedevice string 80

22081 - LOG_ID_PROVISION_LATEST_FAILED

Message ID: 22081


Message Description: LOG_ID_PROVISION_LATEST_FAILED
Message Meaning: Provisioning of latest firmware failed
Type: Event
Category: SYSTEM
Severity: Warning

FortiOS 7.2.1 Log Reference 516


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

reason Reason string 256

version Version string 64

upgradedevice string 80

22090 - LOG_ID_FEDERATED_UPGRADE_CANCELLED

Message ID: 22090


Message Description: LOG_ID_FEDERATED_UPGRADE_CANCELLED
Message Meaning: A federated upgrade was cancelled due to the CSF tree not being ready
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 517


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

reason Reason string 256

version Version string 64

localdevcount uint32 5

failuredev string 80

22091 - LOG_ID_FEDERATED_UPGRADE_SUCCEEDED

Message ID: 22091


Message Description: LOG_ID_FEDERATED_UPGRADE_SUCCEEDED
Message Meaning: A federated upgrade was completed
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 518


Fortinet Inc.
Log Field Name Description Data Type Length

msg Log Message string 4096

version Version string 64

localdevcount uint32 5

22092 - LOG_ID_FEDERATED_UPGRADE_FAILED

Message ID: 22092


Message Description: LOG_ID_FEDERATED_UPGRADE_FAILED
Message Meaning: A federated upgrade failed
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

reason Reason string 256

version Version string 64

localdevcount uint32 5

failuredev string 80

22093 - LOG_ID_FEDERATED_UPGRADE_STEP_COMPLETE

Message ID: 22093

FortiOS 7.2.1 Log Reference 519


Fortinet Inc.
Message Description: LOG_ID_FEDERATED_UPGRADE_STEP_COMPLETE
Message Meaning: A step in a multi-step federated upgrade was completed
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

version Version string 64

22100 - LOG_ID_QUAR_DROP_TRAN_JOB

Message ID: 22100


Message Description: LOG_ID_QUAR_DROP_TRAN_JOB
Message Meaning: Files dropped by quarantine daemon
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 520


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

count Count uint32 10

limit Virtual Domain Resource Limit uint32 10

reason Reason string 256

used Number of Used IPs uint32 10

duration Duration uint32 10

fams_pause Fortinet Analysis and Management Service Pause uint32 10

22101 - LOG_ID_QUAR_DROP_TLL_JOB

Message ID: 22101


Message Description: LOG_ID_QUAR_DROP_TLL_JOB
Message Meaning: Files dropped due to poor network connection
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 521


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

count Count uint32 10

reason Reason string 256

22102 - LOG_ID_LOG_DISK_FAILURE

Message ID: 22102


Message Description: LOG_ID_LOG_DISK_FAILURE
Message Meaning: Log disk failure imminent
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 522


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

22103 - LOG_ID_QUAR_LIMIT_REACHED

Message ID: 22103


Message Description: LOG_ID_QUAR_LIMIT_REACHED
Message Meaning: Sandbox limit reached
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

count Count uint32 10

limit Virtual Domain Resource Limit uint32 10

22104 - LOG_ID_POWER_RESTORE

Message ID: 22104


Message Description: LOG_ID_POWER_RESTORE

FortiOS 7.2.1 Log Reference 523


Fortinet Inc.
Message Meaning: Power supply restored
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

unit Unit uint32 10

22105 - LOG_ID_POWER_FAILURE

Message ID: 22105


Message Description: LOG_ID_POWER_FAILURE
Message Meaning: Power supply failed
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 524


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

unit Unit uint32 10

22106 - LOG_ID_POWER_OPTIONAL_NOT_DETECTED

Message ID: 22106


Message Description: LOG_ID_POWER_OPTIONAL_NOT_DETECTED
Message Meaning: Optional power supply not detected
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 525


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

22107 - LOG_ID_VOLT_ANOM

Message ID: 22107


Message Description: LOG_ID_VOLT_ANOM
Message Meaning: Voltage anomaly
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 526


Fortinet Inc.
22108 - LOG_ID_FAN_ANOM

Message ID: 22108


Message Description: LOG_ID_FAN_ANOM
Message Meaning: Fan anomaly
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

22109 - LOG_ID_TEMP_TOO_HIGH

Message ID: 22109


Message Description: LOG_ID_TEMP_TOO_HIGH
Message Meaning: Temperature too high
Type: Event
Category: SYSTEM
Severity: Warning

FortiOS 7.2.1 Log Reference 527


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

22110 - LOG_ID_SPARE_BLOCK_LOW

Message ID: 22110


Message Description: LOG_ID_SPARE_BLOCK_LOW
Message Meaning: Spare blocks availability low
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 528


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

22113 - LOG_ID_FNBAM_FAILURE

Message ID: 22113


Message Description: LOG_ID_FNBAM_FAILURE
Message Meaning: Authentication error
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

service Name of Service string 64

22114 - LOG_ID_POWER_FAILURE_WARNING

Message ID: 22114


Message Description: LOG_ID_POWER_FAILURE_WARNING

FortiOS 7.2.1 Log Reference 529


Fortinet Inc.
Message Meaning: Power supply failed warning
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

22115 - LOG_ID_POWER_RESTORE_NOTIF

Message ID: 22115


Message Description: LOG_ID_POWER_RESTORE_NOTIF
Message Meaning: Power supply restored notification
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 530


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

22116 - LOG_ID_POWER_REDUNDANCY_DEGRADE

Message ID: 22116


Message Description: LOG_ID_POWER_REDUNDANCY_DEGRADE
Message Meaning: Power Supply Redundancy Degrade
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

FortiOS 7.2.1 Log Reference 531


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

22117 - LOG_ID_POWER_REDUNDANCY_FAILURE

Message ID: 22117


Message Description: LOG_ID_POWER_REDUNDANCY_FAILURE
Message Meaning: Power Supply Redundancy Lost
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

22150 - LOG_ID_VOLT_NOM

Message ID: 22150


Message Description: LOG_ID_VOLT_NOM

FortiOS 7.2.1 Log Reference 532


Fortinet Inc.
Message Meaning: Voltage normal
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

22151 - LOG_ID_FAN_NOM

Message ID: 22151


Message Description: LOG_ID_FAN_NOM
Message Meaning: Fan normal
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 533


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

22152 - LOG_ID_TEMP_TOO_LOW

Message ID: 22152


Message Description: LOG_ID_TEMP_TOO_LOW
Message Meaning: Temperature too low
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

FortiOS 7.2.1 Log Reference 534


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

22153 - LOG_ID_TEMP_NORM

Message ID: 22153


Message Description: LOG_ID_TEMP_NORM
Message Meaning: Temperature normal
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

22200 - LOG_ID_AUTO_UPT_CERT

Message ID: 22200


Message Description: LOG_ID_AUTO_UPT_CERT

FortiOS 7.2.1 Log Reference 535


Fortinet Inc.
Message Meaning: Certificate will be auto-updated
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

status Status string 23

msg Log Message string 4096

cert Certificate string 36

22201 - LOG_ID_AUTO_GEN_CERT

Message ID: 22201


Message Description: LOG_ID_AUTO_GEN_CERT
Message Meaning: Certificate will be auto-regenerated
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

FortiOS 7.2.1 Log Reference 536


Fortinet Inc.
Log Field Name Description Data Type Length

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

status Status string 23

msg Log Message string 4096

cert Certificate string 36

22203 - LOG_ID_AUTO_GEN_CERT_FAIL

Message ID: 22203


Message Description: LOG_ID_AUTO_GEN_CERT_FAIL
Message Meaning: Certificate failed to auto-generate
Type: Event
Category: SYSTEM
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 537


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

status Status string 23

msg Log Message string 4096

name Display Name of the Connection string 128

22204 - LOG_ID_AUTO_GEN_CERT_PENDING

Message ID: 22204


Message Description: LOG_ID_AUTO_GEN_CERT_PENDING
Message Meaning: Certificate pending to auto-generate
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 538


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

action Policy Action string 65

status Status string 23

msg Log Message string 4096

name Display Name of the Connection string 128

22205 - LOG_ID_AUTO_GEN_CERT_SUCC

Message ID: 22205


Message Description: LOG_ID_AUTO_GEN_CERT_SUCC
Message Meaning: Certificate succeed to auto-generate
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

status Status string 23

msg Log Message string 4096

name Display Name of the Connection string 128

FortiOS 7.2.1 Log Reference 539


Fortinet Inc.
22206 - LOG_ID_CRL_EXPIRED

Message ID: 22206


Message Description: LOG_ID_CRL_EXPIRED
Message Meaning: CRL is expired
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

status Status string 23

msg Log Message string 4096

22207 - LOG_ID_CERT_EXPIRE_WARNING

Message ID: 22207


Message Description: LOG_ID_CERT_EXPIRE_WARNING
Message Meaning: Certificate will expire soon
Type: Event
Category: SYSTEM
Severity: Warning

FortiOS 7.2.1 Log Reference 540


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

status Status string 23

msg Log Message string 4096

cert Certificate string 36

22220 - LOG_ID_EXT_RESOURCE

Message ID: 22220


Message Description: LOG_ID_EXT_RESOURCE
Message Meaning: Threat feed updated
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 541


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

desc Description string 128

22221 - LOG_ID_EXT_RESOURCE_FAIL

Message ID: 22221


Message Description: LOG_ID_EXT_RESOURCE_FAIL
Message Meaning: Threat feed update failed
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

FortiOS 7.2.1 Log Reference 542


Fortinet Inc.
Log Field Name Description Data Type Length

msg Log Message string 4096

reason Reason string 256

desc Description string 128

22222 - LOG_ID_EXT_RESOURCE_LOAD

Message ID: 22222


Message Description: LOG_ID_EXT_RESOURCE_LOAD
Message Meaning: Threat feed loaded
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

reason Reason string 256

desc Description string 128

informationsource Information Source string 4096

new_status New Status string 512

FortiOS 7.2.1 Log Reference 543


Fortinet Inc.
22223 - LOG_ID_EXT_RESOURCE_DEBUG

Message ID: 22223


Message Description: LOG_ID_EXT_RESOURCE_DEBUG
Message Meaning: Threat feed debug
Type: Event
Category: SYSTEM
Severity: Debug

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

dstport Destination Protocol Port uint16 5

path string 512

desc Description string 128

informationsource Information Source string 4096

profile Profile Name string 64

hostname Hostname string 128

host string 256

old_status Original Status string 512

22700 - LOG_ID_IPS_FAIL_OPEN

Message ID: 22700

FortiOS 7.2.1 Log Reference 544


Fortinet Inc.
Message Description: LOG_ID_IPS_FAIL_OPEN
Message Meaning: IPS session scan paused
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

22701 - LOG_ID_IPS_FAIL_OPEN_END

Message ID: 22701


Message Description: LOG_ID_IPS_FAIL_OPEN_END
Message Meaning: IPS session scan resumed
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 545


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

22800 - LOG_ID_SCAN_SERV_FAIL

Message ID: 22800


Message Description: LOG_ID_SCAN_SERV_FAIL
Message Meaning: Scan services session failed
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 546


Fortinet Inc.
Log Field Name Description Data Type Length

service Name of Service string 64

mode Mode string 12

22802 - LOG_ID_ENTER_FD_CONSERVE_MODE

Message ID: 22802


Message Description: LOG_ID_ENTER_FD_CONSERVE_MODE
Message Meaning: File descriptor conserve mode entered
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

daemon Daemon Name string 32

conserve Flag for Conserve Mode string 32

total Total uint32 10

used Number of Used IPs uint32 10

red string 32

green Green threshold for conserve mode string 32

FortiOS 7.2.1 Log Reference 547


Fortinet Inc.
22803 - LOG_ID_LEAVE_FD_CONSERVE_MODE

Message ID: 22803


Message Description: LOG_ID_LEAVE_FD_CONSERVE_MODE
Message Meaning: File descriptor conserve mode exited
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

daemon Daemon Name string 32

conserve Flag for Conserve Mode string 32

total Total uint32 10

used Number of Used IPs uint32 10

red string 32

green Green threshold for conserve mode string 32

22804 - LOG_ID_LIC_STATUS_CHG

Message ID: 22804


Message Description: LOG_ID_LIC_STATUS_CHG
Message Meaning: License status changed
Type: Event

FortiOS 7.2.1 Log Reference 548


Fortinet Inc.
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

service Name of Service string 64

sn Serial Number string 64

22805 - LOG_ID_FAIL_TO_VALIDATE_LIC

Message ID: 22805


Message Description: LOG_ID_FAIL_TO_VALIDATE_LIC
Message Meaning: License validation failure
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 549


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

service Name of Service string 64

sn Serial Number string 64

22806 - LOG_ID_DUP_LIC

Message ID: 22806


Message Description: LOG_ID_DUP_LIC
Message Meaning: Duplicate license detected
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 550


Fortinet Inc.
Log Field Name Description Data Type Length

status Status string 23

msg Log Message string 4096

service Name of Service string 64

sn Serial Number string 64

22807 - LOG_ID_VDOM_LIC

Message ID: 22807


Message Description: LOG_ID_VDOM_LIC
Message Meaning: VDOM license status changed
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

service Name of Service string 64

sn Serial Number string 64

22808 - LOG_ID_LIC_EXPIRE

Message ID: 22808

FortiOS 7.2.1 Log Reference 551


Fortinet Inc.
Message Description: LOG_ID_LIC_EXPIRE
Message Meaning: VM license expired
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

service Name of Service string 64

sn Serial Number string 64

22809 - LOG_ID_LIC_WILL_EXPIRE

Message ID: 22809


Message Description: LOG_ID_LIC_WILL_EXPIRE
Message Meaning: VM license expiring
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

FortiOS 7.2.1 Log Reference 552


Fortinet Inc.
Log Field Name Description Data Type Length

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

service Name of Service string 64

sn Serial Number string 64

22810 - LOG_ID_SCANUNIT_ERROR_BLOCK

Message ID: 22810


Message Description: LOG_ID_SCANUNIT_ERROR_BLOCK
Message Meaning: Scan error - traffic blocked
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 553


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

service Name of Service string 64

proto Protocol Number uint8 3

srcip Source IP ip 39

srcport Source port uint16 5

dstip Destination IP ip 39

dstport Destination Protocol Port uint16 5

file Report file full path string 256

session_id Session ID uint32 10

src_int Source Interface string 64

dst_int Destination Interface string 64

dir Direction string 8

22811 - LOG_ID_SCANUNIT_ERROR_PASS

Message ID: 22811


Message Description: LOG_ID_SCANUNIT_ERROR_PASS
Message Meaning: Scan error - traffic passed
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 554


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

service Name of Service string 64

proto Protocol Number uint8 3

srcip Source IP ip 39

srcport Source port uint16 5

dstip Destination IP ip 39

dstport Destination Protocol Port uint16 5

file Report file full path string 256

session_id Session ID uint32 10

src_int Source Interface string 64

dst_int Destination Interface string 64

dir Direction string 8

22812 - LOG_ID_SCANUNIT_AVENG_RELOAD

Message ID: 22812


Message Description: LOG_ID_SCANUNIT_AVENG_RELOAD
Message Meaning: Scanunit is reloading AV engine
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 555


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

22813 - LOG_ID_SCANUNIT_AVDB_RELOAD

Message ID: 22813


Message Description: LOG_ID_SCANUNIT_AVDB_RELOAD
Message Meaning: Scanunit reloaded AV Database
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 556


Fortinet Inc.
Log Field Name Description Data Type Length

action Policy Action string 65

msg Log Message string 4096

22814 - LOG_ID_SCANUNIT_AVDB_RELOAD_ERROR

Message ID: 22814


Message Description: LOG_ID_SCANUNIT_AVDB_RELOAD_ERROR
Message Meaning: Scanunit AV Database reload error
Type: Event
Category: SYSTEM
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

22815 - LOG_ID_SCANUNIT_AVDB_LOAD

Message ID: 22815


Message Description: LOG_ID_SCANUNIT_AVDB_LOAD
Message Meaning: Scanunit loaded AV Database
Type: Event
Category: SYSTEM

FortiOS 7.2.1 Log Reference 557


Fortinet Inc.
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

22816 - LOG_ID_SCANUNIT_AVDB_LOAD_ERROR

Message ID: 22816


Message Description: LOG_ID_SCANUNIT_AVDB_LOAD_ERROR
Message Meaning: Scanunit AV Database load error
Type: Event
Category: SYSTEM
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 558


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

22850 - LOG_ID_USER_QUARANTINE_MAC_ADD

Message ID: 22850


Message Description: LOG_ID_USER_QUARANTINE_MAC_ADD
Message Meaning: User quarantine MAC added
Type: Event
Category: SWITCH-CONTROLLER
Severity: Notice

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

action string 65

msg string 4096

FortiOS 7.2.1 Log Reference 559


Fortinet Inc.
22851 - LOG_ID_USER_QUARANTINE_MAC_DELETE

Message ID: 22851


Message Description: LOG_ID_USER_QUARANTINE_MAC_DELETE
Message Meaning: User quarantine MAC deleted
Type: Event
Category: SWITCH-CONTROLLER
Severity: Notice

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

action string 65

msg string 4096

22852 - LOG_ID_USER_QUARANTINE_MAC_BOUNCE_PORT_HIT

Message ID: 22852


Message Description: LOG_ID_USER_QUARANTINE_MAC_BOUNCE_PORT_HIT
Message Meaning: User quarantine MAC bounce port hit
Type: Event
Category: SWITCH-CONTROLLER
Severity: Notice

FortiOS 7.2.1 Log Reference 560


Fortinet Inc.
Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

action string 65

msg string 4096

sn string 64

name string 128

22853 - LOG_ID_USER_QUARANTINE_MAC_BOUNCE_PORT_MISS

Message ID: 22853


Message Description: LOG_ID_USER_QUARANTINE_MAC_BOUNCE_PORT_MISS
Message Meaning: User quarantine MAC bounce port miss
Type: Event
Category: SWITCH-CONTROLLER
Severity: Warning

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

FortiOS 7.2.1 Log Reference 561


Fortinet Inc.
Log Field Name Description Data Type Length

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

action string 65

msg string 4096

sn string 64

name string 128

22861 - LOG_ID_FLPOLD_NAC_ADD

Message ID: 22861


Message Description: LOG_ID_FLPOLD_NAC_ADD
Message Meaning: NAC device addition
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

FortiOS 7.2.1 Log Reference 562


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

action string 65

msg string 4096

sn string 64

name string 128

22862 - LOG_ID_FLPOLD_NAC_DELETE

Message ID: 22862


Message Description: LOG_ID_FLPOLD_NAC_DELETE
Message Meaning: NAC device deletion
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

FortiOS 7.2.1 Log Reference 563


Fortinet Inc.
Log Field Name Description Data Type Length

ui string 64

action string 65

msg string 4096

sn string 64

name string 128

22863 - LOG_ID_FLPOLD_NAC_MODIFY

Message ID: 22863


Message Description: LOG_ID_FLPOLD_NAC_MODIFY
Message Meaning: NAC device modify
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

action string 65

msg string 4096

sn string 64

name string 128

FortiOS 7.2.1 Log Reference 564


Fortinet Inc.
22864 - LOG_ID_FLPOLD_DPP_ADD

Message ID: 22864


Message Description: LOG_ID_FLPOLD_DPP_ADD
Message Meaning: DPP device addition
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

action string 65

msg string 4096

sn string 64

name string 128

22865 - LOG_ID_FLPOLD_DPP_DELETE

Message ID: 22865


Message Description: LOG_ID_FLPOLD_DPP_DELETE
Message Meaning: DPP device deletion
Type: Event
Category: SWITCH-CONTROLLER

FortiOS 7.2.1 Log Reference 565


Fortinet Inc.
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

action string 65

msg string 4096

sn string 64

name string 128

22866 - LOG_ID_FLPOLD_DPP_MODIFY

Message ID: 22866


Message Description: LOG_ID_FLPOLD_DPP_MODIFY
Message Meaning: DPP device modify
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

FortiOS 7.2.1 Log Reference 566


Fortinet Inc.
Log Field Name Description Data Type Length

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

action string 65

msg string 4096

sn string 64

name string 128

22867 - LOG_ID_FLPOLD_DPP_INTF_TAGS_ADD

Message ID: 22867


Message Description: LOG_ID_FLPOLD_DPP_INTF_TAGS_ADD
Message Meaning: DPP interface tags add
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

FortiOS 7.2.1 Log Reference 567


Fortinet Inc.
Log Field Name Description Data Type Length

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

action string 65

msg string 4096

sn string 64

name string 128

22868 - LOG_ID_FLPOLD_DPP_INTF_TAGS_DELETE

Message ID: 22868


Message Description: LOG_ID_FLPOLD_DPP_INTF_TAGS_DELETE
Message Meaning: DPP interface tags delete
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

FortiOS 7.2.1 Log Reference 568


Fortinet Inc.
Log Field Name Description Data Type Length

user string 256

ui string 64

action string 65

msg string 4096

sn string 64

name string 128

22869 - LOG_ID_FLPOLD_NAC_DYNAMIC_ADDRESS_ADD

Message ID: 22869


Message Description: LOG_ID_FLPOLD_NAC_DYNAMIC_ADDRESS_ADD
Message Meaning: NAC device dynamic address addition
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

action string 65

msg string 4096

FortiOS 7.2.1 Log Reference 569


Fortinet Inc.
Log Field Name Description Data Type Length

sn string 64

name string 128

22870 - LOG_ID_FLPOLD_NAC_DYNAMIC_ADDRESS_DELETE

Message ID: 22870


Message Description: LOG_ID_FLPOLD_NAC_DYNAMIC_ADDRESS_DELETE
Message Meaning: NAC device dynamic address deletion
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

action string 65

msg string 4096

sn string 64

name string 128

22871 - LOG_ID_FLPOLD_NAC_MAC_CACHE_SYNC

Message ID: 22871

FortiOS 7.2.1 Log Reference 570


Fortinet Inc.
Message Description: LOG_ID_FLPOLD_NAC_MAC_CACHE_SYNC
Message Meaning: NAC MAC cache sync
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

action string 65

msg string 4096

sn string 64

name string 128

22890 - LOG_ID_FORTILINKD

Message ID: 22890


Message Description: LOG_ID_FORTILINKD
Message Meaning: Switch-Controller Daemon Log (Notification)
Type: Event
Category: SWITCH-CONTROLLER
Severity: Notice

FortiOS 7.2.1 Log Reference 571


Fortinet Inc.
Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

22891 - LOG_ID_FLCFGD_SYNC_ERROR

Message ID: 22891


Message Description: LOG_ID_FLCFGD_SYNC_ERROR
Message Meaning: Switch-Controller Switch Sync Error
Type: Event
Category: SWITCH-CONTROLLER
Severity: Error

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

FortiOS 7.2.1 Log Reference 572


Fortinet Inc.
Log Field Name Description Data Type Length

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

22892 - LOG_ID_FLCFGD_SYNC_COMPLETE

Message ID: 22892


Message Description: LOG_ID_FLCFGD_SYNC_COMPLETE
Message Meaning: Switch-Controller Switch Sync Complete
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

FortiOS 7.2.1 Log Reference 573


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

22893 - LOG_ID_FLCFGD_SYNC_STATE

Message ID: 22893


Message Description: LOG_ID_FLCFGD_SYNC_STATE
Message Meaning: Switch-Controller Switch Sync State
Type: Event
Category: SWITCH-CONTROLLER
Severity: Debug

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

FortiOS 7.2.1 Log Reference 574


Fortinet Inc.
22894 - LOG_ID_FLCFGD_UPGRADE_ERROR

Message ID: 22894


Message Description: LOG_ID_FLCFGD_UPGRADE_ERROR
Message Meaning: Switch-Controller Switch Upgrade Error
Type: Event
Category: SWITCH-CONTROLLER
Severity: Error

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

22895 - LOG_ID_FLCFGD_UPGRADE_STATUS

Message ID: 22895


Message Description: LOG_ID_FLCFGD_UPGRADE_STATUS
Message Meaning: Switch-Controller Switch Upgrade Status
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

FortiOS 7.2.1 Log Reference 575


Fortinet Inc.
Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

22896 - LOG_ID_FORTILINKD_CRITICAL

Message ID: 22896


Message Description: LOG_ID_FORTILINKD_CRITICAL
Message Meaning: Switch-Controller Daemon Log (Critical)
Type: Event
Category: SWITCH-CONTROLLER
Severity: Critical

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

FortiOS 7.2.1 Log Reference 576


Fortinet Inc.
Log Field Name Description Data Type Length

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

22897 - LOG_ID_FORTILINKD_SPLIT_PORT_INFO

Message ID: 22897


Message Description: LOG_ID_FORTILINKD_SPLIT_PORT_INFO
Message Meaning: Switch-controller split-port related configuration change detected
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

FortiOS 7.2.1 Log Reference 577


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

22900 - LOG_ID_CAPUTP_SESSION

Message ID: 22900


Message Description: LOG_ID_CAPUTP_SESSION
Message Meaning: CAPUTP session status
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

msg string 4096

22901 - LOG_ID_FAZ_CON

Message ID: 22901


Message Description: LOG_ID_FAZ_CON

FortiOS 7.2.1 Log Reference 578


Fortinet Inc.
Message Meaning: FortiAnalyzer connection up
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

22902 - LOG_ID_FAZ_DISCON

Message ID: 22902


Message Description: LOG_ID_FAZ_DISCON
Message Meaning: FortiAnalyzer connection down
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 579


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

reason Reason string 256

22903 - LOG_ID_FAZ_CON_ERR

Message ID: 22903


Message Description: LOG_ID_FAZ_CON_ERR
Message Meaning: FortiAnalyzer connection failed
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 580


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

reason Reason string 256

22904 - LOG_ID_CAPUTP_SESSION_NOTIF

Message ID: 22904


Message Description: LOG_ID_CAPUTP_SESSION_NOTIF
Message Meaning: CAPUTP session status notification
Type: Event
Category: SWITCH-CONTROLLER
Severity: Notice

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

action string 65

msg string 4096

FortiOS 7.2.1 Log Reference 581


Fortinet Inc.
Log Field Name Description Data Type Length

sn string 64

name string 128

srcip ip 39

22912 - LOG_ID_FDS_SRV_ERRCON

Message ID: 22912


Message Description: LOG_ID_FDS_SRV_ERRCON
Message Meaning: FortiCloud server connection failed
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

server Server IP Address string 64

reason Reason string 256

22913 - LOG_ID_FDS_SRV_DISCON

Message ID: 22913


Message Description: LOG_ID_FDS_SRV_DISCON

FortiOS 7.2.1 Log Reference 582


Fortinet Inc.
Message Meaning: FortiCloud server disconnected
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

server Server IP Address string 64

reason Reason string 256

22915 - LOG_ID_FDS_SRV_CON

Message ID: 22915


Message Description: LOG_ID_FDS_SRV_CON
Message Meaning: FortiCloud server connected
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 583


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

server Server IP Address string 64

22916 - LOG_ID_FDS_STATUS

Message ID: 22916


Message Description: LOG_ID_FDS_STATUS
Message Meaning: FortiGuard Message Service status
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 584


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

22917 - LOG_ID_FDS_SMS_QUOTA

Message ID: 22917


Message Description: LOG_ID_FDS_SMS_QUOTA
Message Meaning: SMS quota reached
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

msg Log Message string 4096

22918 - LOG_ID_FDS_CTRL_STATUS

Message ID: 22918


Message Description: LOG_ID_FDS_CTRL_STATUS
Message Meaning: FortiGuard Message Service controller status

FortiOS 7.2.1 Log Reference 585


Fortinet Inc.
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

22919 - LOG_ID_SVR_LOG_STATUS_CHANGED

Message ID: 22919


Message Description: LOG_ID_SVR_LOG_STATUS_CHANGED
Message Meaning: Server logging status changed
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 586


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

22921 - LOG_ID_EVENT_ROUTE_INFO_CHANGED

Message ID: 22921


Message Description: LOG_ID_EVENT_ROUTE_INFO_CHANGED
Message Meaning: Routing information changed
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

name Display Name of the Connection string 128

interface Interface string 32

FortiOS 7.2.1 Log Reference 587


Fortinet Inc.
22922 - LOG_ID_EVENT_LINK_MONITOR_STATUS

Message ID: 22922


Message Description: LOG_ID_EVENT_LINK_MONITOR_STATUS
Message Meaning: Link monitor status
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

name Display Name of the Connection string 128

interface Interface string 32

probeproto Link Monitor Probe Protocol string 16

22923 - LOG_ID_EVENT_VWL_LQTY_STATUS

Message ID: 22923


Message Description: LOG_ID_EVENT_VWL_LQTY_STATUS
Message Meaning: SDWAN status
Type: Event
Category: SDWAN
Severity: Notice

FortiOS 7.2.1 Log Reference 588


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

eventtype string 32

healthcheck string 64

slatargetid uint32 10

oldvalue string 32

newvalue string 32

interface Interface string 32

member string 512

serviceid uint32 10

service Name of Service string 64

numpassmember uint32 10

msg Log Message string 4096

22924 - LOG_ID_EVENT_VWL_VOLUME_STATUS

Message ID: 22924


Message Description: LOG_ID_EVENT_VWL_VOLUME_STATUS
Message Meaning: SDWAN volume status
Type: Event
Category: SDWAN
Severity: Notice

FortiOS 7.2.1 Log Reference 589


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

eventtype string 32

interface Interface string 32

member string 512

msg Log Message string 4096

22925 - LOG_ID_EVENT_VWL_SLA_INFO

Message ID: 22925


Message Description: LOG_ID_EVENT_VWL_SLA_INFO
Message Meaning: SDWAN SLA information
Type: Event
Category: SDWAN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 590


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

eventtype string 32

healthcheck string 64

slatargetid uint32 10

interface Interface string 32

msg Log Message string 4096

status Status string 23

latency string 24

jitter string 24

packetloss string 24

moscodec string 24

mosvalue string 24

inbandwidthavailable string 24

outbandwidthavailable string 24

bibandwidthavailable string 24

inbandwidthused string 24

outbandwidthused string 24

bibandwidthused string 24

slamap string 24

22926 - LOG_ID_EVENT_VWL_NEIGHBOR_STATUS

Message ID: 22926


Message Description: LOG_ID_EVENT_VWL_NEIGHBOR_STATUS
Message Meaning: SDWAN Neighbor status
Type: Event
Category: SDWAN
Severity: Notice

FortiOS 7.2.1 Log Reference 591


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

eventtype string 32

msg Log Message string 4096

neighbor string 46

22927 - LOG_ID_EVENT_VWL_NEIGHBOR_STANDALONE

Message ID: 22927


Message Description: LOG_ID_EVENT_VWL_NEIGHBOR_STANDALONE
Message Meaning: SDWAN Neighbor standalone
Type: Event
Category: SDWAN
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 592


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

eventtype string 32

oldvalue string 32

newvalue string 32

msg Log Message string 4096

22928 - LOG_ID_EVENT_VWL_NEIGHBOR_PRIMARY

Message ID: 22928


Message Description: LOG_ID_EVENT_VWL_NEIGHBOR_PRIMARY
Message Meaning: SDWAN Neighbor primary
Type: Event
Category: SDWAN
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

eventtype string 32

oldvalue string 32

FortiOS 7.2.1 Log Reference 593


Fortinet Inc.
Log Field Name Description Data Type Length

newvalue string 32

msg Log Message string 4096

22929 - LOG_ID_EVENT_VWL_NEIGHBOR_SECONDARY

Message ID: 22929


Message Description: LOG_ID_EVENT_VWL_NEIGHBOR_SECONDARY
Message Meaning: SDWAN Neighbor secondary
Type: Event
Category: SDWAN
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

eventtype string 32

oldvalue string 32

newvalue string 32

msg Log Message string 4096

22930 - LOG_ID_EVENT_VWL_LQTY_STATUS_WARNING

Message ID: 22930


Message Description: LOG_ID_EVENT_VWL_LQTY_STATUS_WARNING
Message Meaning: SDWAN status warning

FortiOS 7.2.1 Log Reference 594


Fortinet Inc.
Type: Event
Category: SDWAN
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

eventtype string 32

serviceid uint32 10

service Name of Service string 64

msg Log Message string 4096

22931 - LOG_ID_EVENT_VWL_SLA_INFO_WARNING

Message ID: 22931


Message Description: LOG_ID_EVENT_VWL_SLA_INFO_WARNING
Message Meaning: SDWAN SLA information warning
Type: Event
Category: SDWAN
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 595


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

eventtype string 32

healthcheck string 64

oldvalue string 32

newvalue string 32

interface Interface string 32

msg Log Message string 4096

probeproto Link Monitor Probe Protocol string 16

22932 - LOG_ID_EVENT_LINK_MONITOR_STATUS_WARNING

Message ID: 22932


Message Description: LOG_ID_EVENT_LINK_MONITOR_STATUS_WARNING
Message Meaning: Link monitor status warning
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 596


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

name Display Name of the Connection string 128

interface Interface string 32

probeproto Link Monitor Probe Protocol string 16

22933 - LOG_ID_EVENT_VWL_SLA_INFO_NOTIF

Message ID: 22933


Message Description: LOG_ID_EVENT_VWL_SLA_INFO_NOTIF
Message Meaning: SDWAN SLA notification
Type: Event
Category: SDWAN
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

eventtype string 32

FortiOS 7.2.1 Log Reference 597


Fortinet Inc.
Log Field Name Description Data Type Length

healthcheck string 64

slatargetid uint32 10

oldvalue string 32

newvalue string 32

interface Interface string 32

msg Log Message string 4096

status Status string 23

latency string 24

jitter string 24

packetloss string 24

moscodec string 24

mosvalue string 24

inbandwidthavailable string 24

outbandwidthavailable string 24

bibandwidthavailable string 24

inbandwidthused string 24

outbandwidthused string 24

bibandwidthused string 24

slamap string 24

probeproto Link Monitor Probe Protocol string 16

22934 - LOG_ID_EVENT_VWL_LQTY_STATUS_INFO

Message ID: 22934


Message Description: LOG_ID_EVENT_VWL_LQTY_STATUS_INFO
Message Meaning: SDWAN status information
Type: Event
Category: SDWAN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

FortiOS 7.2.1 Log Reference 598


Fortinet Inc.
Log Field Name Description Data Type Length

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

eventtype string 32

healthcheck string 64

slatargetid uint32 10

member string 512

msg Log Message string 4096

22935 - LOG_ID_EVENT_VWL_LQTY_STATUS_DEBUG

Message ID: 22935


Message Description: LOG_ID_EVENT_VWL_LQTY_STATUS_DEBUG
Message Meaning: SDWAN status debug
Type: Event
Category: SDWAN
Severity: Debug

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 599


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

eventtype string 32

interface Interface string 32

member string 512

serviceid uint32 10

service Name of Service string 64

msg Log Message string 4096

22936 - LOG_ID_EVENT_VWL_INET_SVC_PQTY_STATUS_INFO

Message ID: 22936


Message Description: LOG_ID_EVENT_VWL_INET_SVC_PQTY_STATUS_INFO
Message Meaning: Virtual WAN Link internet service passive quality information
Type: Event
Category: SDWAN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

FortiOS 7.2.1 Log Reference 600


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc Log Description string 4096

eventtype string 32

interface Interface string 32

serviceid uint32 10

service Name of Service string 64

msg Log Message string 4096

latency string 24

jitter string 24

packetloss string 24

inbandwidthused string 24

outbandwidthused string 24

bibandwidthused string 24

22949 - LOG_ID_FDS_JOIN

Message ID: 22949


Message Description: LOG_ID_FDS_JOIN
Message Meaning: FortiCloud auto-join attempted
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 601


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

22950 - LOG_ID_FDS_LOGIN_SUCC

Message ID: 22950


Message Description: LOG_ID_FDS_LOGIN_SUCC
Message Meaning: FortiCloud activation successful
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

22951 - LOG_ID_FDS_LOGOUT

Message ID: 22951

FortiOS 7.2.1 Log Reference 602


Fortinet Inc.
Message Description: LOG_ID_FDS_LOGOUT
Message Meaning: FortiCloud logout
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

22952 - LOG_ID_FDS_LOGIN_FAIL

Message ID: 22952


Message Description: LOG_ID_FDS_LOGIN_FAIL
Message Meaning: FortiCloud activation failed
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 603


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

22954 - LOG_ID_INET_SVC_OBSOLETE

Message ID: 22954


Message Description: LOG_ID_INET_SVC_OBSOLETE
Message Meaning: Internet Service obsolete
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 604


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

22955 - LOG_ID_INET_SVC_NAME_FAILURE

Message ID: 22955


Message Description: LOG_ID_INET_SVC_NAME_FAILURE
Message Meaning: Internet Service name update failed
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

22956 - LOG_ID_INET_SVC_NAME_UPDATE

Message ID: 22956


Message Description: LOG_ID_INET_SVC_NAME_UPDATE
Message Meaning: Internet Service name update
Type: Event
Category: SYSTEM

FortiOS 7.2.1 Log Reference 605


Fortinet Inc.
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

23101 - LOG_ID_IPSEC_TUNNEL_UP

Message ID: 23101


Message Description: LOG_ID_IPSEC_TUNNEL_UP
Message Meaning: IPsec VPN tunnel up
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 606


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

tunnelip IPsec VPN tunnel IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

23102 - LOG_ID_IPSEC_TUNNEL_DOWN

Message ID: 23102


Message Description: LOG_ID_IPSEC_TUNNEL_DOWN
Message Meaning: IPsec VPN tunnel down
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

FortiOS 7.2.1 Log Reference 607


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

tunnelip IPsec VPN tunnel IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

23103 - LOG_ID_IPSEC_TUNNEL_STAT

Message ID: 23103


Message Description: LOG_ID_IPSEC_TUNNEL_STAT
Message Meaning: IPsec VPN tunnel statistics
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

FortiOS 7.2.1 Log Reference 608


Fortinet Inc.
Log Field Name Description Data Type Length

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

tunnelip IPsec VPN tunnel IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

26001 - LOG_ID_DHCP_ACK

Message ID: 26001


Message Description: LOG_ID_DHCP_ACK
Message Meaning: DHCP Ack log
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

ip ip 39

interface Interface string 32

FortiOS 7.2.1 Log Reference 609


Fortinet Inc.
Log Field Name Description Data Type Length

hostname Hostname string 128

dhcp_msg DHCP Message string 4096

mac MAC Address string 17

lease DHCP lease time uint32 10

26002 - LOG_ID_DHCP_RELEASE

Message ID: 26002


Message Description: LOG_ID_DHCP_RELEASE
Message Meaning: DHCP Release log
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

ip ip 39

interface Interface string 32

hostname Hostname string 128

dhcp_msg DHCP Message string 4096

mac MAC Address string 17

FortiOS 7.2.1 Log Reference 610


Fortinet Inc.
26003 - LOG_ID_DHCP_STAT

Message ID: 26003


Message Description: LOG_ID_DHCP_STAT
Message Meaning: DHCP statistics
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

total Total uint32 10

used Number of Used IPs uint32 10

interface Interface string 32

26004 - LOG_ID_DHCP_CLIENT_LEASE

Message ID: 26004


Message Description: LOG_ID_DHCP_CLIENT_LEASE
Message Meaning: DHCP client lease granted
Type: Event
Category: SYSTEM
Severity: Information

FortiOS 7.2.1 Log Reference 611


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

26005 - LOG_ID_DHCP_LEASE_USAGE_HIGH

Message ID: 26005


Message Description: LOG_ID_DHCP_LEASE_USAGE_HIGH
Message Meaning: DHCP lease usage high
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 612


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

interface Interface string 32

26006 - LOG_ID_DHCP_LEASE_USAGE_FULL

Message ID: 26006


Message Description: LOG_ID_DHCP_LEASE_USAGE_FULL
Message Meaning: DHCP lease usage full
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

interface Interface string 32

26007 - LOG_ID_DHCP_BLOCKED_MAC

Message ID: 26007


Message Description: LOG_ID_DHCP_BLOCKED_MAC
Message Meaning: DHCP client blocked log

FortiOS 7.2.1 Log Reference 613


Fortinet Inc.
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

interface Interface string 32

mac MAC Address string 17

26008 - LOG_ID_DHCP_DDNS_ADD

Message ID: 26008


Message Description: LOG_ID_DHCP_DDNS_ADD
Message Meaning: DHCP DDNS add query
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 614


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

ip ip 39

dhcp_msg DHCP Message string 4096

ddnsserver DDNS Server ip 39

fqdn Fully Qualified Domain Name string 256

26009 - LOG_ID_DHCP_DDNS_DELETE

Message ID: 26009


Message Description: LOG_ID_DHCP_DDNS_DELETE
Message Meaning: DHCP DDNS delete query
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 615


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

ip ip 39

dhcp_msg DHCP Message string 4096

ddnsserver DDNS Server ip 39

fqdn Fully Qualified Domain Name string 256

26010 - LOG_ID_DHCP_DDNS_COMPLETED

Message ID: 26010


Message Description: LOG_ID_DHCP_DDNS_COMPLETED
Message Meaning: DHCP DDNS query completed
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

ip ip 39

dhcp_msg DHCP Message string 4096

FortiOS 7.2.1 Log Reference 616


Fortinet Inc.
Log Field Name Description Data Type Length

ddnsserver DDNS Server ip 39

fqdn Fully Qualified Domain Name string 256

26011 - LOG_ID_DHCPV6_REPLY

Message ID: 26011


Message Description: LOG_ID_DHCPV6_REPLY
Message Meaning: DHCPv6 Ack log
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

ip ip 39

interface Interface string 32

dhcp_msg DHCP Message string 4096

lease DHCP lease time uint32 10

duid DHCPv6 unique identifier string 128

iaid DHCPv6 Identity Association Identifier uint32 10

FortiOS 7.2.1 Log Reference 617


Fortinet Inc.
26012 - LOG_ID_DHCPV6_RELEASE

Message ID: 26012


Message Description: LOG_ID_DHCPV6_RELEASE
Message Meaning: DHCPv6 Release log
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

ip ip 39

interface Interface string 32

dhcp_msg DHCP Message string 4096

lease DHCP lease time uint32 10

duid DHCPv6 unique identifier string 128

iaid DHCPv6 Identity Association Identifier uint32 10

27001 - LOG_ID_VRRP_STATE_CHG

Message ID: 27001


Message Description: LOG_ID_VRRP_STATE_CHG
Message Meaning: VRRP state changed
Type: Event

FortiOS 7.2.1 Log Reference 618


Fortinet Inc.
Category: ROUTER
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

interface Interface string 32

29001 - LOG_ID_PPPD_MSG

Message ID: 29001


Message Description: LOG_ID_PPPD_MSG
Message Meaning: PPP status
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 619


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

status Status string 23

msg Log Message string 4096

local Local IP for a PPPD Connection ip 39

remote IP Address of the PPP Remote end ip 39

assigned Assigned IP Address through PPPoE ip 39

29002 - LOG_ID_PPPD_AUTH_SUC

Message ID: 29002


Message Description: LOG_ID_PPPD_AUTH_SUC
Message Meaning: PPP authentication successful
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 620


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

local Local IP for a PPPD Connection ip 39

remote IP Address of the PPP Remote end ip 39

assigned Assigned IP Address through PPPoE ip 39

29003 - LOG_ID_PPPD_AUTH_FAIL

Message ID: 29003


Message Description: LOG_ID_PPPD_AUTH_FAIL
Message Meaning: PPP authentication failed
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

local Local IP for a PPPD Connection ip 39

remote IP Address of the PPP Remote end ip 39

assigned Assigned IP Address through PPPoE ip 39

FortiOS 7.2.1 Log Reference 621


Fortinet Inc.
29004 - LOG_ID_PPPD_MSG_ERROR

Message ID: 29004


Message Description: LOG_ID_PPPD_MSG_ERROR
Message Meaning: PPP status error message
Type: Event
Category: SYSTEM
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

status Status string 23

msg Log Message string 4096

local Local IP for a PPPD Connection ip 39

remote IP Address of the PPP Remote end ip 39

assigned Assigned IP Address through PPPoE ip 39

29005 - LOG_ID_PPPD_MSG_DEBUG

Message ID: 29005


Message Description: LOG_ID_PPPD_MSG_DEBUG
Message Meaning: PPP status debug message
Type: Event
Category: SYSTEM

FortiOS 7.2.1 Log Reference 622


Fortinet Inc.
Severity: Debug

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

status Status string 23

msg Log Message string 4096

local Local IP for a PPPD Connection ip 39

remote IP Address of the PPP Remote end ip 39

assigned Assigned IP Address through PPPoE ip 39

29010 - LOG_ID_PPPOE_STATUS_REPORT_NOTIF

Message ID: 29010


Message Description: LOG_ID_PPPOE_STATUS_REPORT_NOTIF
Message Meaning: PPPoE status report
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 623


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

assigned Assigned IP Address through PPPoE ip 39

gateway Gateway ip address for PPPoE status report ip 39

mtu Max Transmission Unit Value uint32 10

29011 - LOG_ID_PPPD_FAIL_TO_EXEC

Message ID: 29011


Message Description: LOG_ID_PPPD_FAIL_TO_EXEC
Message Meaning: PPP execution failed
Type: Event
Category: SYSTEM
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 624


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

29013 - LOG_ID_PPPD_START

Message ID: 29013


Message Description: LOG_ID_PPPD_START
Message Meaning: PPP daemon started
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

29014 - LOG_ID_PPPD_EXIT

Message ID: 29014


Message Description: LOG_ID_PPPD_EXIT
Message Meaning: PPP daemon exited
Type: Event
Category: SYSTEM

FortiOS 7.2.1 Log Reference 625


Fortinet Inc.
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

29015 - LOG_ID_PPP_RCV_BAD_PEER_IP

Message ID: 29015


Message Description: LOG_ID_PPP_RCV_BAD_PEER_IP
Message Meaning: PPP received invalid peer IP
Type: Event
Category: SYSTEM
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 626


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

29016 - LOG_ID_PPP_RCV_BAD_LOCAL_IP

Message ID: 29016


Message Description: LOG_ID_PPP_RCV_BAD_LOCAL_IP
Message Meaning: PPP received invalid local IP
Type: Event
Category: SYSTEM
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

29021 - LOG_ID_EVENT_AUTH_SNMP_QUERY_FAILED

Message ID: 29021


Message Description: LOG_ID_EVENT_AUTH_SNMP_QUERY_FAILED
Message Meaning: SNMP query failed
Type: Event

FortiOS 7.2.1 Log Reference 627


Fortinet Inc.
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

msg Log Message string 4096

srcip Source IP ip 39

srcport Source port uint16 5

dstip Destination IP ip 39

dstport Destination Protocol Port uint16 5

version Version string 64

community Community string 36

29022 - LOG_ID_DDNS_UPDATE_FAIL

Message ID: 29022


Message Description: LOG_ID_DDNS_UPDATE_FAIL
Message Meaning: DDNS update failed
Type: Event
Category: SYSTEM
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

FortiOS 7.2.1 Log Reference 628


Fortinet Inc.
Log Field Name Description Data Type Length

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

32001 - LOG_ID_ADMIN_LOGIN_SUCC

Message ID: 32001


Message Description: LOG_ID_ADMIN_LOGIN_SUCC
Message Meaning: Admin login successful
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

FortiOS 7.2.1 Log Reference 629


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

dstip Destination IP ip 39

name Display Name of the Connection string 128

reason Reason string 256

sn Serial number for login or logout events. Used to correlate string 64


login and logout events.

profile Profile Name string 64

method Method string 64

32002 - LOG_ID_ADMIN_LOGIN_FAIL

Message ID: 32002


Message Description: LOG_ID_ADMIN_LOGIN_FAIL
Message Meaning: Admin login failed
Type: Event
Category: SYSTEM
Severity: Alert

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 630


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

dstip Destination IP ip 39

name Display Name of the Connection string 128

reason Reason string 256

sn Serial number for login or logout events. Used to correlate string 64


login and logout events.

method Method string 64

32003 - LOG_ID_ADMIN_LOGOUT

Message ID: 32003


Message Description: LOG_ID_ADMIN_LOGOUT
Message Meaning: Admin logout successful
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 631


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

dstip Destination IP ip 39

name Display Name of the Connection string 128

reason Reason string 256

duration Duration uint32 10

sn Serial number for login or logout events. Used to correlate string 64


login and logout events.

method Method string 64

state State string 64

32005 - LOG_ID_ADMIN_OVERIDE_VDOM

Message ID: 32005


Message Description: LOG_ID_ADMIN_OVERIDE_VDOM
Message Meaning: Admin overrode VDOM
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 632


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

status Status string 23

msg Log Message string 4096

reason Reason string 256

32006 - LOG_ID_ADMIN_ENTER_VDOM

Message ID: 32006


Message Description: LOG_ID_ADMIN_ENTER_VDOM
Message Meaning: Super admin entered VDOM
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 633


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

reason Reason string 256

32007 - LOG_ID_ADMIN_LEFT_VDOM

Message ID: 32007


Message Description: LOG_ID_ADMIN_LEFT_VDOM
Message Meaning: Super admin left VDOM
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

FortiOS 7.2.1 Log Reference 634


Fortinet Inc.
Log Field Name Description Data Type Length

msg Log Message string 4096

reason Reason string 256

32008 - LOG_ID_VIEW_DISK_LOG_FAIL

Message ID: 32008


Message Description: LOG_ID_VIEW_DISK_LOG_FAIL
Message Meaning: Disk log access failed
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

32009 - LOG_ID_SYSTEM_START

Message ID: 32009


Message Description: LOG_ID_SYSTEM_START
Message Meaning: FortiGate started
Type: Event

FortiOS 7.2.1 Log Reference 635


Fortinet Inc.
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

32010 - LOG_ID_DISK_LOG_FULL

Message ID: 32010


Message Description: LOG_ID_DISK_LOG_FULL
Message Meaning: Disk full
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 636


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

32011 - LOG_ID_LOG_ROLL

Message ID: 32011


Message Description: LOG_ID_LOG_ROLL
Message Meaning: Disk log rolled
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

reason Reason string 256

log Log Name for Log Rotation string 32

32014 - LOG_ID_CS_LIC_EXPIRE

Message ID: 32014

FortiOS 7.2.1 Log Reference 637


Fortinet Inc.
Message Description: LOG_ID_CS_LIC_EXPIRE
Message Meaning: Support license expiring
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

32015 - LOG_ID_DISK_LOG_USAGE

Message ID: 32015


Message Description: LOG_ID_DISK_LOG_USAGE
Message Meaning: Log disk full
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 638


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

32017 - LOG_ID_FDS_DAILY_QUOTA_FULL

Message ID: 32017


Message Description: LOG_ID_FDS_DAILY_QUOTA_FULL
Message Meaning: FortiCloud daily quota full
Type: Event
Category: SYSTEM
Severity: Alert

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 639


Fortinet Inc.
32018 - LOG_ID_FIPS_ENTER_ERR_MOD

Message ID: 32018


Message Description: LOG_ID_FIPS_ENTER_ERR_MOD
Message Meaning: FIPS CC entered error mode
Type: Event
Category: SYSTEM
Severity: Emergency

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

reason Reason string 256

32019 - LOG_ID_CC_ENTER_ERR_MOD

Message ID: 32019


Message Description: LOG_ID_CC_ENTER_ERR_MOD
Message Meaning: CC entered error mode
Type: Event
Category: SYSTEM
Severity: Emergency

FortiOS 7.2.1 Log Reference 640


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

32020 - LOG_ID_SSH_CORRPUT_MAC

Message ID: 32020


Message Description: LOG_ID_SSH_CORRPUT_MAC
Message Meaning: Message Authentication Code corrupted
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 641


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

ui User Interface string 64

msg Log Message string 4096

32021 - LOG_ID_ADMIN_LOGIN_DISABLE

Message ID: 32021


Message Description: LOG_ID_ADMIN_LOGIN_DISABLE
Message Meaning: Admin login disabled
Type: Event
Category: SYSTEM
Severity: Alert

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

reason Reason string 256

FortiOS 7.2.1 Log Reference 642


Fortinet Inc.
32022 - LOG_ID_VDOM_ENABLED

Message ID: 32022


Message Description: LOG_ID_VDOM_ENABLED
Message Meaning: VDOM enabled
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

32023 - LOG_ID_MEM_LOG_FIRST_FULL

Message ID: 32023


Message Description: LOG_ID_MEM_LOG_FIRST_FULL
Message Meaning: Memory log full over first warning level
Type: Event
Category: SYSTEM
Severity: Information

FortiOS 7.2.1 Log Reference 643


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

32024 - LOG_ID_ADMIN_PASSWD_EXPIRE

Message ID: 32024


Message Description: LOG_ID_ADMIN_PASSWD_EXPIRE
Message Meaning: Admin password expired
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 644


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

status Status string 23

msg Log Message string 4096

32025 - LOG_ID_SSH_REKEY

Message ID: 32025


Message Description: LOG_ID_SSH_REKEY
Message Meaning: SSH server re-key
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

ui User Interface string 64

msg Log Message string 4096

32026 - LOG_ID_SSH_BAD_PACKET_LENGTH

Message ID: 32026

FortiOS 7.2.1 Log Reference 645


Fortinet Inc.
Message Description: LOG_ID_SSH_BAD_PACKET_LENGTH
Message Meaning: SSH server received bad length packet
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

ui User Interface string 64

msg Log Message string 4096

32027 - LOG_ID_VIEW_DISK_LOG_SUCC

Message ID: 32027


Message Description: LOG_ID_VIEW_DISK_LOG_SUCC
Message Meaning: Disk logs viewed successfully
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 646


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

32028 - LOG_ID_LOG_DEL_DIR

Message ID: 32028


Message Description: LOG_ID_LOG_DEL_DIR
Message Meaning: Disk log directory deleted
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

FortiOS 7.2.1 Log Reference 647


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc Log Description string 4096

msg Log Message string 4096

32029 - LOG_ID_LOG_DEL_FILE

Message ID: 32029


Message Description: LOG_ID_LOG_DEL_FILE
Message Meaning: Disk log file deleted
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

filesize Report File Size in Bytes uint32 10

32030 - LOG_ID_SEND_FDS_STAT

Message ID: 32030


Message Description: LOG_ID_SEND_FDS_STAT
Message Meaning: FDS statistics sent
Type: Event

FortiOS 7.2.1 Log Reference 648


Fortinet Inc.
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32031 - LOG_ID_VIEW_MEM_LOG_FAIL

Message ID: 32031


Message Description: LOG_ID_VIEW_MEM_LOG_FAIL
Message Meaning: Memory log access failed
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 649


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

32032 - LOG_ID_DISK_DLP_ARCH_FULL

Message ID: 32032


Message Description: LOG_ID_DISK_DLP_ARCH_FULL
Message Meaning: DLP archive full
Type: Event
Category: SYSTEM
Severity: Emergency

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 650


Fortinet Inc.
32033 - LOG_ID_DISK_QUAR_FULL

Message ID: 32033


Message Description: LOG_ID_DISK_QUAR_FULL
Message Meaning: Quarantine full
Type: Event
Category: SYSTEM
Severity: Emergency

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

32034 - LOG_ID_DISK_REPORT_FULL

Message ID: 32034


Message Description: LOG_ID_DISK_REPORT_FULL
Message Meaning: Report db data full
Type: Event
Category: SYSTEM
Severity: Emergency

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 651


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

32035 - LOG_ID_VDOM_DISABLED

Message ID: 32035


Message Description: LOG_ID_VDOM_DISABLED
Message Meaning: VDOM disabled
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 652


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

32036 - LOG_ID_DISK_IPS_ARCH_FULL

Message ID: 32036


Message Description: LOG_ID_DISK_IPS_ARCH_FULL
Message Meaning: IPS archive full
Type: Event
Category: SYSTEM
Severity: Emergency

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

32037 - LOG_ID_DISK_LOG_FIRST_FULL

Message ID: 32037


Message Description: LOG_ID_DISK_LOG_FIRST_FULL
Message Meaning: Disk log full over first warning
Type: Event
Category: SYSTEM

FortiOS 7.2.1 Log Reference 653


Fortinet Inc.
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

32038 - LOG_ID_LOG_ROLL_FORTICRON

Message ID: 32038


Message Description: LOG_ID_LOG_ROLL_FORTICRON
Message Meaning: Log rotation requested by FortiCron
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 654


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

reason Reason string 256

log Log Name for Log Rotation string 32

32039 - LOG_ID_VIEW_MEM_LOG_SUCC

Message ID: 32039


Message Description: LOG_ID_VIEW_MEM_LOG_SUCC
Message Meaning: Memory logs viewed successfully
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

log Log Name for Log Rotation string 32

FortiOS 7.2.1 Log Reference 655


Fortinet Inc.
32040 - LOG_ID_REPORT_DELETED

Message ID: 32040


Message Description: LOG_ID_REPORT_DELETED
Message Meaning: Report deleted
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

32041 - LOG_ID_REPORT_DELETED_GUI

Message ID: 32041


Message Description: LOG_ID_REPORT_DELETED_GUI
Message Meaning: Report deleted from GUI
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

FortiOS 7.2.1 Log Reference 656


Fortinet Inc.
Log Field Name Description Data Type Length

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

32042 - LOG_ID_MEM_LOG_SECOND_FULL

Message ID: 32042


Message Description: LOG_ID_MEM_LOG_SECOND_FULL
Message Meaning: Memory log full over second warning level
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 657


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

32043 - LOG_ID_MEM_LOG_FINAL_FULL

Message ID: 32043


Message Description: LOG_ID_MEM_LOG_FINAL_FULL
Message Meaning: Memory log full over final warning level
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

32044 - LOG_ID_LOG_DELETE

Message ID: 32044


Message Description: LOG_ID_LOG_DELETE
Message Meaning: Log deleted by user
Type: Event
Category: SYSTEM

FortiOS 7.2.1 Log Reference 658


Fortinet Inc.
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

log Log Name for Log Rotation string 32

32045 - LOG_ID_MGR_LIC_EXPIRE

Message ID: 32045


Message Description: LOG_ID_MGR_LIC_EXPIRE
Message Meaning: FortiGuard management service license expiring
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 659


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

32048 - LOG_ID_SCHEDULE_EXPIRE

Message ID: 32048


Message Description: LOG_ID_SCHEDULE_EXPIRE
Message Meaning: One time schedule expiring
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 660


Fortinet Inc.
32049 - LOG_ID_FC_EXPIRE

Message ID: 32049


Message Description: LOG_ID_FC_EXPIRE
Message Meaning: FortiCloud license expiring
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

32050 - LOG_ID_POL_PKT_CAPTURE_FULL

Message ID: 32050


Message Description: LOG_ID_POL_PKT_CAPTURE_FULL
Message Meaning: Policy packet capture full
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 661


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

32051 - LOG_ID_LOG_UPLOAD

Message ID: 32051


Message Description: LOG_ID_LOG_UPLOAD
Message Meaning: Disk logs upload started
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 662


Fortinet Inc.
Log Field Name Description Data Type Length

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

32052 - LOG_ID_UPLOAD_RUN_SCRIPT

Message ID: 32052


Message Description: LOG_ID_UPLOAD_RUN_SCRIPT
Message Meaning: Upload and run a script
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

32053 - LOG_ID_ADMIN_MTNER_LOGIN_SUCC

Message ID: 32053


Message Description: LOG_ID_ADMIN_MTNER_LOGIN_SUCC

FortiOS 7.2.1 Log Reference 663


Fortinet Inc.
Message Meaning: Admin monitor login successful
Type: Event
Category: SYSTEM
Severity: Alert

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

dstip Destination IP ip 39

reason Reason string 256

sn Serial Number string 64

profile Profile Name string 64

method Method string 64

32054 - LOG_ID_ADMIN_MTNER_LOGOUT

Message ID: 32054


Message Description: LOG_ID_ADMIN_MTNER_LOGOUT
Message Meaning: Admin monitor logout successful
Type: Event

FortiOS 7.2.1 Log Reference 664


Fortinet Inc.
Category: SYSTEM
Severity: Alert

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

dstip Destination IP ip 39

reason Reason string 256

duration Duration uint32 10

sn Serial Number string 64

method Method string 64

state State string 64

32057 - LOG_ID_VIEW_FAZ_LOG_FAIL

Message ID: 32057


Message Description: LOG_ID_VIEW_FAZ_LOG_FAIL
Message Meaning: FortiAnalyzer log access failed
Type: Event

FortiOS 7.2.1 Log Reference 665


Fortinet Inc.
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

32058 - LOG_ID_VIEW_FAZ_LOG_SUCC

Message ID: 32058


Message Description: LOG_ID_VIEW_FAZ_LOG_SUCC
Message Meaning: FortiAnalyzer logs viewed successfully
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 666


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

32095 - LOG_ID_GUI_CHG_SUB_MODULE

Message ID: 32095


Message Description: LOG_ID_GUI_CHG_SUB_MODULE
Message Meaning: Admin performed an action from GUI
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

FortiOS 7.2.1 Log Reference 667


Fortinet Inc.
Log Field Name Description Data Type Length

action Policy Action string 65

status Status string 23

msg Log Message string 4096

32096 - LOG_ID_GUI_DOWNLOAD_LOG

Message ID: 32096


Message Description: LOG_ID_GUI_DOWNLOAD_LOG
Message Meaning: Log file downloaded from GUI
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

32097 - LOG_ID_DELETE_CAPTURE_PKT

Message ID: 32097


Message Description: LOG_ID_DELETE_CAPTURE_PKT
Message Meaning: Policy packet capture file deleted

FortiOS 7.2.1 Log Reference 668


Fortinet Inc.
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

32099 - LOG_ID_CHG_CONFIG_INFO

Message ID: 32099


Message Description: LOG_ID_CHG_CONFIG_INFO
Message Meaning: Configuration changed information
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 669


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

module Configuration Module Name string 32

submodule Sub-module name. For example autoupdate is sub-module in string 32


log of "config system autoupdate schedule"

32100 - LOG_ID_FORTI_TOKEN_SYNC

Message ID: 32100


Message Description: LOG_ID_FORTI_TOKEN_SYNC
Message Meaning: FortiToken synchronized
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 670


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

32102 - LOG_ID_CHG_CONFIG

Message ID: 32102


Message Description: LOG_ID_CHG_CONFIG
Message Meaning: Configuration changed
Type: Event
Category: SYSTEM
Severity: Alert

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 671


Fortinet Inc.
32103 - LOG_ID_NEW_FIRMWARE

Message ID: 32103


Message Description: LOG_ID_NEW_FIRMWARE
Message Meaning: New firmware available on FortiGuard
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

status Status string 23

msg Log Message string 4096

32104 - LOG_ID_CHG_CONFIG_GUI

Message ID: 32104


Message Description: LOG_ID_CHG_CONFIG_GUI
Message Meaning: Configuration changed via GUI
Type: Event
Category: SYSTEM
Severity: Information

FortiOS 7.2.1 Log Reference 672


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

module Configuration Module Name string 32

submodule Sub-module name. For example autoupdate is sub-module in string 32


log of "config system autoupdate schedule"

32105 - LOG_ID_NTP_SVR_STAUS_CHG_REACHABLE

Message ID: 32105


Message Description: LOG_ID_NTP_SVR_STAUS_CHG_REACHABLE
Message Meaning: NTP server status changes to reachable
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 673


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

field NTP date-time field string 32

32106 - LOG_ID_NTP_SVR_STAUS_CHG_RESOLVABLE

Message ID: 32106


Message Description: LOG_ID_NTP_SVR_STAUS_CHG_RESOLVABLE
Message Meaning: NTP server status changes to resolvable
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 674


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

field NTP date-time field string 32

32107 - LOG_ID_NTP_SVR_STAUS_CHG_UNRESOLVABLE

Message ID: 32107


Message Description: LOG_ID_NTP_SVR_STAUS_CHG_UNRESOLVABLE
Message Meaning: NTP server status changes to unresolvable
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

field NTP date-time field string 32

32108 - LOG_ID_NTP_SVR_STAUS_CHG_UNREACHABLE

Message ID: 32108

FortiOS 7.2.1 Log Reference 675


Fortinet Inc.
Message Description: LOG_ID_NTP_SVR_STAUS_CHG_UNREACHABLE
Message Meaning: NTP server status changes to unreachable
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

field NTP date-time field string 32

32109 - LOG_ID_UPD_SIGN_AV_DB

Message ID: 32109


Message Description: LOG_ID_UPD_SIGN_AV_DB
Message Meaning: Updating virus database
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

FortiOS 7.2.1 Log Reference 676


Fortinet Inc.
Log Field Name Description Data Type Length

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32110 - LOG_ID_UPD_SIGN_IPS_DB

Message ID: 32110


Message Description: LOG_ID_UPD_SIGN_IPS_DB
Message Meaning: IPS database updated
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 677


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32111 - LOG_ID_UPD_SIGN_AVIPS_DB

Message ID: 32111


Message Description: LOG_ID_UPD_SIGN_AVIPS_DB
Message Meaning: AV, IPS, GeoIP, SRC-VIS, FortiFlow, URL White-list, Certificate databases updated
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

FortiOS 7.2.1 Log Reference 678


Fortinet Inc.
Log Field Name Description Data Type Length

action Policy Action string 65

msg Log Message string 4096

32113 - LOG_ID_UPD_SIGN_SRCVIS_DB

Message ID: 32113


Message Description: LOG_ID_UPD_SIGN_SRCVIS_DB
Message Meaning: SRC-VIS object updated
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32114 - LOG_ID_UPD_SIGN_GEOIP_DB

Message ID: 32114


Message Description: LOG_ID_UPD_SIGN_GEOIP_DB
Message Meaning: GeoIP object updated

FortiOS 7.2.1 Log Reference 679


Fortinet Inc.
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32116 - LOG_ID_UPD_SIGN_AVPKG_FAILURE

Message ID: 32116


Message Description: LOG_ID_UPD_SIGN_AVPKG_FAILURE
Message Meaning: AV package update by SCP failed
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 680


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32117 - LOG_ID_UPD_SIGN_AVPKG_SUCCESS

Message ID: 32117


Message Description: LOG_ID_UPD_SIGN_AVPKG_SUCCESS
Message Meaning: AV package update by SCP successful
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 681


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32118 - LOG_ID_UPD_ADMIN_AV_DB

Message ID: 32118


Message Description: LOG_ID_UPD_ADMIN_AV_DB
Message Meaning: AV updated by admin
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

32119 - LOG_ID_UPD_SCANUNIT_AV_DB

Message ID: 32119

FortiOS 7.2.1 Log Reference 682


Fortinet Inc.
Message Description: LOG_ID_UPD_SCANUNIT_AV_DB
Message Meaning: AV database updated by scanunit
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32129 - LOG_ID_ADD_GUEST

Message ID: 32129


Message Description: LOG_ID_ADD_GUEST
Message Meaning: Guest user added
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

FortiOS 7.2.1 Log Reference 683


Fortinet Inc.
Log Field Name Description Data Type Length

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

status Status string 23

msg Log Message string 4096

name Display Name of the Connection string 128

32130 - LOG_ID_CHG_USER

Message ID: 32130


Message Description: LOG_ID_CHG_USER
Message Meaning: User changed
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 684


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

name Display Name of the Connection string 128

new_status New Status string 512

old_status Original Status string 512

passwd Password string 20

32131 - LOG_ID_DEL_GUEST

Message ID: 32131


Message Description: LOG_ID_DEL_GUEST
Message Meaning: Guest user deleted
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 685


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

status Status string 23

msg Log Message string 4096

name Display Name of the Connection string 128

32132 - LOG_ID_ADD_USER

Message ID: 32132


Message Description: LOG_ID_ADD_USER
Message Meaning: Local user added
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

status Status string 23

FortiOS 7.2.1 Log Reference 686


Fortinet Inc.
Log Field Name Description Data Type Length

msg Log Message string 4096

name Display Name of the Connection string 128

32138 - LOG_ID_REBOOT

Message ID: 32138


Message Description: LOG_ID_REBOOT
Message Meaning: Device rebooted
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32139 - LOG_ID_WAKE_ON_LAN

Message ID: 32139


Message Description: LOG_ID_WAKE_ON_LAN
Message Meaning: Wake on LAN device

FortiOS 7.2.1 Log Reference 687


Fortinet Inc.
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32140 - LOG_ID_TIME_USER_SETTING_CHG

Message ID: 32140


Message Description: LOG_ID_TIME_USER_SETTING_CHG
Message Meaning: Global time setting changed by user
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 688


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

srcip Source IP ip 39

field NTP date-time field string 32

32141 - LOG_ID_TIME_NTP_SETTING_CHG

Message ID: 32141


Message Description: LOG_ID_TIME_NTP_SETTING_CHG
Message Meaning: Global time setting changed by NTP
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 689


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

field NTP date-time field string 32

32142 - LOG_ID_BACKUP_CONF

Message ID: 32142


Message Description: LOG_ID_BACKUP_CONF
Message Meaning: System configuration backed up
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

FortiOS 7.2.1 Log Reference 690


Fortinet Inc.
Log Field Name Description Data Type Length

action Policy Action string 65

status Status string 23

msg Log Message string 4096

32143 - LOG_ID_BACKUP_CONF_BY_SCP

Message ID: 32143


Message Description: LOG_ID_BACKUP_CONF_BY_SCP
Message Meaning: System configuration backed up by SCP
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32144 - LOG_ID_BACKUP_CONF_ERROR

Message ID: 32144


Message Description: LOG_ID_BACKUP_CONF_ERROR

FortiOS 7.2.1 Log Reference 691


Fortinet Inc.
Message Meaning: System configuration backed up error
Type: Event
Category: SYSTEM
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

32145 - LOG_ID_BACKUP_CONF_ALERT

Message ID: 32145


Message Description: LOG_ID_BACKUP_CONF_ALERT
Message Meaning: System configuration backed up alert
Type: Event
Category: SYSTEM
Severity: Alert

Log Field Name Description Data Type Length

date Date string 10

FortiOS 7.2.1 Log Reference 692


Fortinet Inc.
Log Field Name Description Data Type Length

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

32146 - LOG_ID_TIME_PTP_SETTING_CHG

Message ID: 32146


Message Description: LOG_ID_TIME_PTP_SETTING_CHG
Message Meaning: Global time setting changed by PTP
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 693


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

field NTP date-time field string 32

32148 - LOG_ID_GET_CRL

Message ID: 32148


Message Description: LOG_ID_GET_CRL
Message Meaning: CRL update requested
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

crl Certificate revocation lists string 4096

FortiOS 7.2.1 Log Reference 694


Fortinet Inc.
32149 - LOG_ID_COMMAND_FAIL

Message ID: 32149


Message Description: LOG_ID_COMMAND_FAIL
Message Meaning: Command failed
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

32151 - LOG_ID_ADD_IP6_LOCAL_POL

Message ID: 32151


Message Description: LOG_ID_ADD_IP6_LOCAL_POL
Message Meaning: IPv6 firewall local in policy added
Type: Event
Category: SYSTEM
Severity: Notice

FortiOS 7.2.1 Log Reference 695


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

status Status string 23

msg Log Message string 4096

saddr Source Address IP string 80

seq string 512

dintf Destination interface string 36

daddr Destination address string 80

act Action string 16

iptype IP type string 16

32152 - LOG_ID_CHG_IP6_LOCAL_POL

Message ID: 32152


Message Description: LOG_ID_CHG_IP6_LOCAL_POL
Message Meaning: IPv6 firewall local in policy setting changed
Type: Event
Category: SYSTEM
Severity: Notice

FortiOS 7.2.1 Log Reference 696


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

status Status string 23

msg Log Message string 4096

saddr Source Address IP string 80

seq string 512

dintf Destination interface string 36

daddr Destination address string 80

act Action string 16

iptype IP type string 16

32153 - LOG_ID_DEL_IP6_LOCAL_POL

Message ID: 32153


Message Description: LOG_ID_DEL_IP6_LOCAL_POL
Message Meaning: IPv6 firewall local in policy deleted
Type: Event
Category: SYSTEM
Severity: Notice

FortiOS 7.2.1 Log Reference 697


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

status Status string 23

msg Log Message string 4096

saddr Source Address IP string 80

seq string 512

dintf Destination interface string 36

daddr Destination address string 80

act Action string 16

iptype IP type string 16

32155 - LOG_ID_ACT_FTOKEN_REQ

Message ID: 32155


Message Description: LOG_ID_ACT_FTOKEN_REQ
Message Meaning: FortiToken activation requested
Type: Event
Category: SYSTEM
Severity: Notice

FortiOS 7.2.1 Log Reference 698


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

serialno Serial Number string 16

32156 - LOG_ID_ACT_FTOKEN_SUCC

Message ID: 32156


Message Description: LOG_ID_ACT_FTOKEN_SUCC
Message Meaning: FortiToken activation successful
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 699


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

serialno Serial Number string 16

32157 - LOG_ID_SYNC_FTOKEN_SUCC

Message ID: 32157


Message Description: LOG_ID_SYNC_FTOKEN_SUCC
Message Meaning: FortiToken re-synchronized
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 700


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

serialno Serial Number string 16

32158 - LOG_ID_SYNC_FTOKEN_FAIL

Message ID: 32158


Message Description: LOG_ID_SYNC_FTOKEN_FAIL
Message Meaning: FortiToken re-synchronization failed
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

FortiOS 7.2.1 Log Reference 701


Fortinet Inc.
Log Field Name Description Data Type Length

msg Log Message string 4096

serialno Serial Number string 16

32159 - LOG_ID_ACT_FTOKEN_FAIL

Message ID: 32159


Message Description: LOG_ID_ACT_FTOKEN_FAIL
Message Meaning: FortiToken activation failed
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

serialno Serial Number string 16

32160 - LOG_ID_FTM_PUSH_SUCC

Message ID: 32160


Message Description: LOG_ID_FTM_PUSH_SUCC
Message Meaning: FortiToken mobile push message succeeded

FortiOS 7.2.1 Log Reference 702


Fortinet Inc.
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

32161 - LOG_ID_FTM_PUSH_FAIL

Message ID: 32161


Message Description: LOG_ID_FTM_PUSH_FAIL
Message Meaning: FortiToken mobile push message failed
Type: Event
Category: SYSTEM
Severity: Alert

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 703


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

32168 - LOG_ID_REACH_VDOM_LIMIT

Message ID: 32168


Message Description: LOG_ID_REACH_VDOM_LIMIT
Message Meaning: VDOM limit reached
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 704


Fortinet Inc.
32169 - LOG_ID_ALARM_DLP_DB

Message ID: 32169


Message Description: LOG_ID_ALARM_DLP_DB
Message Meaning: DLP database space alarm
Type: Event
Category: SYSTEM
Severity: Alert

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

32170 - LOG_ID_ALARM_MSG

Message ID: 32170


Message Description: LOG_ID_ALARM_MSG
Message Meaning: Alarm created
Type: Event
Category: SYSTEM
Severity: Alert

Log Field Name Description Data Type Length

date Date string 10

FortiOS 7.2.1 Log Reference 705


Fortinet Inc.
Log Field Name Description Data Type Length

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

alarmid Alarm ID uint32 10

groupid User Group ID uint32 10

32171 - LOG_ID_ALARM_ACK

Message ID: 32171


Message Description: LOG_ID_ALARM_ACK
Message Meaning: Alarm acknowledged
Type: Event
Category: SYSTEM
Severity: Alert

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 706


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

alarmid Alarm ID uint32 10

acktime Alarm Acknowledge Time string 24

32172 - LOG_ID_ADD_IP4_LOCAL_POL

Message ID: 32172


Message Description: LOG_ID_ADD_IP4_LOCAL_POL
Message Meaning: IPv4 firewall local in policy added
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 707


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

ui User Interface string 64

status Status string 23

msg Log Message string 4096

saddr Source Address IP string 80

seq string 512

dintf Destination interface string 36

daddr Destination address string 80

act Action string 16

iptype IP type string 16

32173 - LOG_ID_CHG_IP4_LOCAL_POL

Message ID: 32173


Message Description: LOG_ID_CHG_IP4_LOCAL_POL
Message Meaning: IPv4 firewall local in policy's setting changed
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 708


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

ui User Interface string 64

status Status string 23

msg Log Message string 4096

saddr Source Address IP string 80

seq string 512

dintf Destination interface string 36

daddr Destination address string 80

act Action string 16

iptype IP type string 16

32174 - LOG_ID_DEL_IP4_LOCAL_POL

Message ID: 32174


Message Description: LOG_ID_DEL_IP4_LOCAL_POL
Message Meaning: IPv4 firewall local in policy deleted
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 709


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

ui User Interface string 64

status Status string 23

msg Log Message string 4096

saddr Source Address IP string 80

seq string 512

dintf Destination interface string 36

daddr Destination address string 80

act Action string 16

iptype IP type string 16

32180 - LOG_ID_GEOIP_DB_INIT_FAIL

Message ID: 32180


Message Description: LOG_ID_GEOIP_DB_INIT_FAIL
Message Meaning: IP Geography DB initialization failed
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 710


Fortinet Inc.
32190 - LOG_ID_UPT_INVALID_IMG

Message ID: 32190


Message Description: LOG_ID_UPT_INVALID_IMG
Message Meaning: Invalid image loaded
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32191 - LOG_ID_UPT_INVALID_IMG_CC

Message ID: 32191


Message Description: LOG_ID_UPT_INVALID_IMG_CC
Message Meaning: Image with invalid CC signature loaded
Type: Event
Category: SYSTEM
Severity: Critical

FortiOS 7.2.1 Log Reference 711


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32192 - LOG_ID_UPT_INVALID_IMG_RSA

Message ID: 32192


Message Description: LOG_ID_UPT_INVALID_IMG_RSA
Message Meaning: Image with invalid RSA signature loaded
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 712


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32193 - LOG_ID_UPT_IMG_RSA

Message ID: 32193


Message Description: LOG_ID_UPT_IMG_RSA
Message Meaning: Image with valid RSA signature loaded
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

FortiOS 7.2.1 Log Reference 713


Fortinet Inc.
Log Field Name Description Data Type Length

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32194 - LOG_ID_UPT_IMG_FAIL

Message ID: 32194


Message Description: LOG_ID_UPT_IMG_FAIL
Message Meaning: System upgrade failed due to file operation failure
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32200 - LOG_ID_SHUTDOWN

Message ID: 32200


Message Description: LOG_ID_SHUTDOWN

FortiOS 7.2.1 Log Reference 714


Fortinet Inc.
Message Meaning: Device shutdown
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32201 - LOG_ID_LOAD_IMG_SUCC

Message ID: 32201


Message Description: LOG_ID_LOAD_IMG_SUCC
Message Meaning: Image loaded successfully
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 715


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

32202 - LOG_ID_RESTORE_IMG

Message ID: 32202


Message Description: LOG_ID_RESTORE_IMG
Message Meaning: Image restored
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 716


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

32203 - LOG_ID_RESTORE_CONF

Message ID: 32203


Message Description: LOG_ID_RESTORE_CONF
Message Meaning: Configuration restored
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

FortiOS 7.2.1 Log Reference 717


Fortinet Inc.
Log Field Name Description Data Type Length

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32204 - LOG_ID_RESTORE_FGD_SVR

Message ID: 32204


Message Description: LOG_ID_RESTORE_FGD_SVR
Message Meaning: FortiGuard service restored
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32205 - LOG_ID_RESTORE_VDOM_LIC

Message ID: 32205


Message Description: LOG_ID_RESTORE_VDOM_LIC

FortiOS 7.2.1 Log Reference 718


Fortinet Inc.
Message Meaning: VM license restored
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32206 - LOG_ID_RESTORE_SCRIPT

Message ID: 32206


Message Description: LOG_ID_RESTORE_SCRIPT
Message Meaning: Script restored from management station
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 719


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32207 - LOG_ID_RETRIEVE_CONF_LIST

Message ID: 32207


Message Description: LOG_ID_RETRIEVE_CONF_LIST
Message Meaning: Configuration list retrieval failed
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 720


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32208 - LOG_ID_IMP_PKCS12_CERT

Message ID: 32208


Message Description: LOG_ID_IMP_PKCS12_CERT
Message Meaning: PKCS12 certificate imported
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 721


Fortinet Inc.
32209 - LOG_ID_RESTORE_USR_DEF_IPS

Message ID: 32209


Message Description: LOG_ID_RESTORE_USR_DEF_IPS
Message Meaning: IPS custom signatures restored
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

32210 - LOG_ID_BACKUP_IMG_SUCC

Message ID: 32210


Message Description: LOG_ID_BACKUP_IMG_SUCC
Message Meaning: Firmware image backed up successfully
Type: Event
Category: SYSTEM
Severity: Notice

FortiOS 7.2.1 Log Reference 722


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

32211 - LOG_ID_UPLOAD_REVISION

Message ID: 32211


Message Description: LOG_ID_UPLOAD_REVISION
Message Meaning: Revision uploaded to flash disk
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 723


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

32212 - LOG_ID_DEL_REVISION

Message ID: 32212


Message Description: LOG_ID_DEL_REVISION
Message Meaning: Revision deleted
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

FortiOS 7.2.1 Log Reference 724


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

32213 - LOG_ID_RESTORE_TEMPLATE

Message ID: 32213


Message Description: LOG_ID_RESTORE_TEMPLATE
Message Meaning: Template restored
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 725


Fortinet Inc.
32214 - LOG_ID_RESTORE_FILE

Message ID: 32214


Message Description: LOG_ID_RESTORE_FILE
Message Meaning: File restore failed
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

32215 - LOG_ID_UPT_IMG

Message ID: 32215


Message Description: LOG_ID_UPT_IMG
Message Meaning: Image updated
Type: Event
Category: SYSTEM
Severity: Critical

FortiOS 7.2.1 Log Reference 726


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32217 - LOG_ID_UPD_IPS

Message ID: 32217


Message Description: LOG_ID_UPD_IPS
Message Meaning: IPS package - Admin update successful
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 727


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

32218 - LOG_ID_UPD_DLP

Message ID: 32218


Message Description: LOG_ID_UPD_DLP
Message Meaning: DLP fingerprint database update via SCP failed
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 728


Fortinet Inc.
32219 - LOG_ID_BACKUP_OUTPUT

Message ID: 32219


Message Description: LOG_ID_BACKUP_OUTPUT
Message Meaning: Error output backup via SCP successful
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32220 - LOG_ID_BACKUP_COMMAND

Message ID: 32220


Message Description: LOG_ID_BACKUP_COMMAND
Message Meaning: Batch mode command output backup via SCP successful
Type: Event
Category: SYSTEM
Severity: Warning

FortiOS 7.2.1 Log Reference 729


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32221 - LOG_ID_UPD_VDOM_LIC

Message ID: 32221


Message Description: LOG_ID_UPD_VDOM_LIC
Message Meaning: VM license installed via SCP
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 730


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32222 - LOG_ID_GLB_SETTING_CHG

Message ID: 32222


Message Description: LOG_ID_GLB_SETTING_CHG
Message Meaning: Global setting changed
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

FortiOS 7.2.1 Log Reference 731


Fortinet Inc.
Log Field Name Description Data Type Length

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

field NTP date-time field string 32

old_value Original Virtual Domain name string 128

new_value New Virtual Domain Name string 128

32223 - LOG_ID_BACKUP_USER_DEF_IPS

Message ID: 32223


Message Description: LOG_ID_BACKUP_USER_DEF_IPS
Message Meaning: IPS custom signatures backup success
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 732


Fortinet Inc.
32224 - LOG_ID_BACKUP_DISK_LOG

Message ID: 32224


Message Description: LOG_ID_BACKUP_DISK_LOG
Message Meaning: Disk logs backed up
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

file Report file full path string 256

hash Hash Value of Downloaded File string 32

32225 - LOG_ID_DEL_ALL_REVISION

Message ID: 32225


Message Description: LOG_ID_DEL_ALL_REVISION
Message Meaning: Revision database reset due to data corruption
Type: Event
Category: SYSTEM

FortiOS 7.2.1 Log Reference 733


Fortinet Inc.
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

32226 - LOG_ID_LOAD_IMG_FAIL

Message ID: 32226


Message Description: LOG_ID_LOAD_IMG_FAIL
Message Meaning: Image failed to load
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 734


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

32227 - LOG_ID_UPD_DLP_FAIL

Message ID: 32227


Message Description: LOG_ID_UPD_DLP_FAIL
Message Meaning: DLP fingerprint database failed to update by SCP
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 735


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32228 - LOG_ID_LOAD_IMG_FAIL_WRONG_IMG

Message ID: 32228


Message Description: LOG_ID_LOAD_IMG_FAIL_WRONG_IMG
Message Meaning: Firmware image loaded incorrect
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

32229 - LOG_ID_LOAD_IMG_FAIL_NO_RSA

Message ID: 32229


Message Description: LOG_ID_LOAD_IMG_FAIL_NO_RSA

FortiOS 7.2.1 Log Reference 736


Fortinet Inc.
Message Meaning: Firmware image without valid RSA signature loaded
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

32230 - LOG_ID_LOAD_IMG_FAIL_INVALID_RSA

Message ID: 32230


Message Description: LOG_ID_LOAD_IMG_FAIL_INVALID_RSA
Message Meaning: Firmware image with invalid RSA signature loaded
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 737


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

32231 - LOG_ID_RESTORE_FGD_SVR_FAIL

Message ID: 32231


Message Description: LOG_ID_RESTORE_FGD_SVR_FAIL
Message Meaning: FortiGuard service failed to restore
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

FortiOS 7.2.1 Log Reference 738


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32232 - LOG_ID_RESTORE_VDOM_LIC_FAIL

Message ID: 32232


Message Description: LOG_ID_RESTORE_VDOM_LIC_FAIL
Message Meaning: VM license failed to restore
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 739


Fortinet Inc.
32233 - LOG_ID_BACKUP_IMG_FAIL

Message ID: 32233


Message Description: LOG_ID_BACKUP_IMG_FAIL
Message Meaning: Firmware image backup failed
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

32234 - LOG_ID_RESTORE_IMG_INVALID_CC

Message ID: 32234


Message Description: LOG_ID_RESTORE_IMG_INVALID_CC
Message Meaning: Image with invalid CC signature restored
Type: Event
Category: SYSTEM
Severity: Critical

FortiOS 7.2.1 Log Reference 740


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

32235 - LOG_ID_RESTORE_IMG_FORTIGUARD

Message ID: 32235


Message Description: LOG_ID_RESTORE_IMG_FORTIGUARD
Message Meaning: Image restored from FortiGuard Management
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 741


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

32236 - LOG_ID_BACKUP_MEM_LOG

Message ID: 32236


Message Description: LOG_ID_BACKUP_MEM_LOG
Message Meaning: Memory logs backed up
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 742


Fortinet Inc.
32237 - LOG_ID_BACKUP_MEM_LOG_FAIL

Message ID: 32237


Message Description: LOG_ID_BACKUP_MEM_LOG_FAIL
Message Meaning: Memory logs failed to back up
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32238 - LOG_ID_BACKUP_DISK_LOG_FAIL

Message ID: 32238


Message Description: LOG_ID_BACKUP_DISK_LOG_FAIL
Message Meaning: Disk logs failed to back up
Type: Event
Category: SYSTEM
Severity: Notice

FortiOS 7.2.1 Log Reference 743


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32239 - LOG_ID_BACKUP_DISK_LOG_USB

Message ID: 32239


Message Description: LOG_ID_BACKUP_DISK_LOG_USB
Message Meaning: Disk logs backed up to USB
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 744


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32240 - LOG_ID_SYS_USB_MODE

Message ID: 32240


Message Description: LOG_ID_SYS_USB_MODE
Message Meaning: System operating in USB mode
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

FortiOS 7.2.1 Log Reference 745


Fortinet Inc.
Log Field Name Description Data Type Length

status Status string 23

msg Log Message string 4096

32241 - LOG_ID_BACKUP_DISK_LOG_USB_FAIL

Message ID: 32241


Message Description: LOG_ID_BACKUP_DISK_LOG_USB_FAIL
Message Meaning: Disk logs failed to back up to USB
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32242 - LOG_ID_UPD_VDOM_LIC_FAIL

Message ID: 32242


Message Description: LOG_ID_UPD_VDOM_LIC_FAIL
Message Meaning: VM license failed to install via SCP

FortiOS 7.2.1 Log Reference 746


Fortinet Inc.
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32243 - LOG_ID_UPD_IPS_SCP

Message ID: 32243


Message Description: LOG_ID_UPD_IPS_SCP
Message Meaning: IPS package updated via SCP
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 747


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32244 - LOG_ID_UPD_IPS_SCP_FAIL

Message ID: 32244


Message Description: LOG_ID_UPD_IPS_SCP_FAIL
Message Meaning: IPS package failed to update via SCP
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 748


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32245 - LOG_ID_BACKUP_USER_DEF_IPS_FAIL

Message ID: 32245


Message Description: LOG_ID_BACKUP_USER_DEF_IPS_FAIL
Message Meaning: IPS custom signatures backup failed
Type: Event
Category: SYSTEM
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 749


Fortinet Inc.
32246 - LOG_ID_RESTORE_USR_DEF_IPS_CRITICAL

Message ID: 32246


Message Description: LOG_ID_RESTORE_USR_DEF_IPS_CRITICAL
Message Meaning: IPS custom signatures restored critical
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

32247 - LOG_ID_SSH_NEGOTIATION_FAILURE

Message ID: 32247


Message Description: LOG_ID_SSH_NEGOTIATION_FAILURE
Message Meaning: SSH protocol cannot be negotiated
Type: Event
Category: SYSTEM
Severity: Error

FortiOS 7.2.1 Log Reference 750


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

port Port Number uint16 5

addr IP Address string 80

32252 - LOG_ID_FACTORY_RESET

Message ID: 32252


Message Description: LOG_ID_FACTORY_RESET
Message Meaning: Factory settings reset
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 751


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32253 - LOG_ID_FORMAT_RAID

Message ID: 32253


Message Description: LOG_ID_FORMAT_RAID
Message Meaning: RAID disk formatted
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

FortiOS 7.2.1 Log Reference 752


Fortinet Inc.
Log Field Name Description Data Type Length

action Policy Action string 65

msg Log Message string 4096

32254 - LOG_ID_ENABLE_RAID

Message ID: 32254


Message Description: LOG_ID_ENABLE_RAID
Message Meaning: RAID enabled
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32255 - LOG_ID_DISABLE_RAID

Message ID: 32255


Message Description: LOG_ID_DISABLE_RAID
Message Meaning: RAID disabled

FortiOS 7.2.1 Log Reference 753


Fortinet Inc.
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32260 - LOG_ID_RESTORE_IMG_FORTIGUARD_NOTIF

Message ID: 32260


Message Description: LOG_ID_RESTORE_IMG_FORTIGUARD_NOTIF
Message Meaning: Image restored from FortiGuard Management notification
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 754


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

msg Log Message string 4096

32261 - LOG_ID_RESTORE_SCRIPT_NOTIF

Message ID: 32261


Message Description: LOG_ID_RESTORE_SCRIPT_NOTIF
Message Meaning: Script restored by user
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 755


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32262 - LOG_ID_RESTORE_IMG_CONFIRM

Message ID: 32262


Message Description: LOG_ID_RESTORE_IMG_CONFIRM
Message Meaning: Image restore confirmed by user
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 756


Fortinet Inc.
32263 - LOG_ID_AUTO_IMG_UPD_SCHEDULED

Message ID: 32263


Message Description: LOG_ID_AUTO_IMG_UPD_SCHEDULED
Message Meaning: Automatic firmware upgrade schedule changed
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

msg Log Message string 4096

32300 - LOG_ID_UPLOAD_RPT_IMG

Message ID: 32300


Message Description: LOG_ID_UPLOAD_RPT_IMG
Message Meaning: Report image file uploaded
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

FortiOS 7.2.1 Log Reference 757


Fortinet Inc.
Log Field Name Description Data Type Length

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

reason Reason string 256

32301 - LOG_ID_ADD_VDOM

Message ID: 32301


Message Description: LOG_ID_ADD_VDOM
Message Meaning: VDOM added
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 758


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32302 - LOG_ID_DEL_VDOM

Message ID: 32302


Message Description: LOG_ID_DEL_VDOM
Message Meaning: VDOM deleted
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 759


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32545 - LOG_ID_SYS_RESTART

Message ID: 32545


Message Description: LOG_ID_SYS_RESTART
Message Meaning: Scheduled daily reboot started
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32546 - LOG_ID_APPLICATION_CRASH

Message ID: 32546

FortiOS 7.2.1 Log Reference 760


Fortinet Inc.
Message Description: LOG_ID_APPLICATION_CRASH
Message Meaning: Application crashed
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

32547 - LOG_ID_AUTOSCRIPT_START

Message ID: 32547


Message Description: LOG_ID_AUTOSCRIPT_START
Message Meaning: Autoscript start
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 761


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32548 - LOG_ID_AUTOSCRIPT_STOP

Message ID: 32548


Message Description: LOG_ID_AUTOSCRIPT_STOP
Message Meaning: Autoscript stop
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 762


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32549 - LOG_ID_AUTOSCRIPT_STOP_AUTO

Message ID: 32549


Message Description: LOG_ID_AUTOSCRIPT_STOP_AUTO
Message Meaning: Autoscript stop automatically
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

32550 - LOG_ID_AUTOSCRIPT_DELETE_RSLT

Message ID: 32550


Message Description: LOG_ID_AUTOSCRIPT_DELETE_RSLT

FortiOS 7.2.1 Log Reference 763


Fortinet Inc.
Message Meaning: Autoscript delete result
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32551 - LOG_ID_AUTOSCRIPT_BACKUP_RSLT

Message ID: 32551


Message Description: LOG_ID_AUTOSCRIPT_BACKUP_RSLT
Message Meaning: Autoscript backup result
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 764


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32552 - LOG_ID_AUTOSCRIPT_CHECK_STATUS

Message ID: 32552


Message Description: LOG_ID_AUTOSCRIPT_CHECK_STATUS
Message Meaning: Autoscript check status
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 765


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32553 - LOG_ID_AUTOSCRIPT_STOP_REACH_LIMIT

Message ID: 32553


Message Description: LOG_ID_AUTOSCRIPT_STOP_REACH_LIMIT
Message Meaning: Autoscript stop due to limit reached
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

32554 - LOG_ID_UPD_ADMIN_DB

Message ID: 32554

FortiOS 7.2.1 Log Reference 766


Fortinet Inc.
Message Description: LOG_ID_UPD_ADMIN_DB
Message Meaning: Database updated by admin
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

32561 - LOG_ID_ADMIN_LOGOUT_DISCONNECT

Message ID: 32561


Message Description: LOG_ID_ADMIN_LOGOUT_DISCONNECT
Message Meaning: Admin disconnected
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 767


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

dstip Destination IP ip 39

reason Reason string 256

duration Duration uint32 10

sn Serial Number string 64

method Method string 64

state State string 64

32562 - LOG_ID_STORE_CONF_FAIL_SPACE

Message ID: 32562


Message Description: LOG_ID_STORE_CONF_FAIL_SPACE
Message Meaning: Store config failed - not enough flash space
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

FortiOS 7.2.1 Log Reference 768


Fortinet Inc.
Log Field Name Description Data Type Length

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

32564 - LOG_ID_RESTORE_CONF_FAIL

Message ID: 32564


Message Description: LOG_ID_RESTORE_CONF_FAIL
Message Meaning: Configuration failed to restore
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

FortiOS 7.2.1 Log Reference 769


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32565 - LOG_ID_RESTORE_CONF_BY_MGMT

Message ID: 32565


Message Description: LOG_ID_RESTORE_CONF_BY_MGMT
Message Meaning: Configuration restored from management station
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 770


Fortinet Inc.
32566 - LOG_ID_RESTORE_CONF_BY_SCP

Message ID: 32566


Message Description: LOG_ID_RESTORE_CONF_BY_SCP
Message Meaning: Configuration restored by SCP
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32568 - LOG_ID_DEL_REVISION_DB

Message ID: 32568


Message Description: LOG_ID_DEL_REVISION_DB
Message Meaning: Revision Database deletion
Type: Event
Category: SYSTEM
Severity: Notice

FortiOS 7.2.1 Log Reference 771


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

32569 - LOG_ID_FSW_SWITCH_LOG_EVENT

Message ID: 32569


Message Description: LOG_ID_FSW_SWITCH_LOG_EVENT
Message Meaning: Switch-Controller
Type: Event
Category: SWITCH-CONTROLLER
Severity: Critical

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

FortiOS 7.2.1 Log Reference 772


Fortinet Inc.
Log Field Name Description Data Type Length

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

cfgtid uint32 10

cfgpath string 128

cfgobj string 256

cfgattr string 4096

32570 - LOG_ID_ADMIN_MTNER_LOGOUT_DISCONNECT

Message ID: 32570


Message Description: LOG_ID_ADMIN_MTNER_LOGOUT_DISCONNECT
Message Meaning: Admin monitor disconnected
Type: Event
Category: SYSTEM
Severity: Alert

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 773


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

dstip Destination IP ip 39

reason Reason string 256

duration Duration uint32 10

sn Serial Number string 64

method Method string 64

state State string 64

32571 - LOG_ID_RESTORE_CONF_FAIL_WARNING

Message ID: 32571


Message Description: LOG_ID_RESTORE_CONF_FAIL_WARNING
Message Meaning: Configuration failed to restore warning
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 774


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

32601 - LOG_ID_FGT_SWITCH_LOG_DISCOVER

Message ID: 32601


Message Description: LOG_ID_FGT_SWITCH_LOG_DISCOVER
Message Meaning: Switch-Controller discovered
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

FortiOS 7.2.1 Log Reference 775


Fortinet Inc.
Log Field Name Description Data Type Length

ui string 64

msg string 4096

sn string 64

name string 128

32602 - LOG_ID_FGT_SWITCH_LOG_AUTH

Message ID: 32602


Message Description: LOG_ID_FGT_SWITCH_LOG_AUTH
Message Meaning: Switch-Controller authorized
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

FortiOS 7.2.1 Log Reference 776


Fortinet Inc.
32603 - LOG_ID_FGT_SWITCH_LOG_DEAUTH

Message ID: 32603


Message Description: LOG_ID_FGT_SWITCH_LOG_DEAUTH
Message Meaning: Switch-Controller deauthorized
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

32604 - LOG_ID_FGT_SWITCH_LOG_DELETE

Message ID: 32604


Message Description: LOG_ID_FGT_SWITCH_LOG_DELETE
Message Meaning: Switch-Controller deleted
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

FortiOS 7.2.1 Log Reference 777


Fortinet Inc.
Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

32605 - LOG_ID_FGT_SWITCH_LOG_TUNNEL_UP

Message ID: 32605


Message Description: LOG_ID_FGT_SWITCH_LOG_TUNNEL_UP
Message Meaning: Switch-Controller Tunnel Up
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

FortiOS 7.2.1 Log Reference 778


Fortinet Inc.
Log Field Name Description Data Type Length

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

32606 - LOG_ID_FGT_SWITCH_LOG_TUNNEL_DOWN

Message ID: 32606


Message Description: LOG_ID_FGT_SWITCH_LOG_TUNNEL_DOWN
Message Meaning: Switch-Controller Tunnel Down
Type: Event
Category: SWITCH-CONTROLLER
Severity: Warning

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

FortiOS 7.2.1 Log Reference 779


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

32607 - LOG_ID_FGT_SWITCH_PUSH_IMAGE

Message ID: 32607


Message Description: LOG_ID_FGT_SWITCH_PUSH_IMAGE
Message Meaning: Image push to FortiSwitch
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

FortiOS 7.2.1 Log Reference 780


Fortinet Inc.
32608 - LOG_ID_FGT_SWITCH_STAGE_IMAGE

Message ID: 32608


Message Description: LOG_ID_FGT_SWITCH_STAGE_IMAGE
Message Meaning: Image stage to FortiSwitch
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

32609 - LOG_ID_FGT_SWITCH_DISABLE_DISCOVERY

Message ID: 32609


Message Description: LOG_ID_FGT_SWITCH_DISABLE_DISCOVERY
Message Meaning: Disable FortiSwitch Discovery
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

FortiOS 7.2.1 Log Reference 781


Fortinet Inc.
Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

32610 - LOG_ID_FGT_SWITCH_LOG_WARNING

Message ID: 32610


Message Description: LOG_ID_FGT_SWITCH_LOG_WARNING
Message Meaning: Switch-Controller warning
Type: Event
Category: SWITCH-CONTROLLER
Severity: Warning

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

FortiOS 7.2.1 Log Reference 782


Fortinet Inc.
Log Field Name Description Data Type Length

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

32611 - LOG_ID_FGT_SWITCH_EXPORT_POOL

Message ID: 32611


Message Description: LOG_ID_FGT_SWITCH_EXPORT_POOL
Message Meaning: Export port to pool
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

FortiOS 7.2.1 Log Reference 783


Fortinet Inc.
Log Field Name Description Data Type Length

sn string 64

name string 128

32612 - LOG_ID_FGT_SWITCH_EXPORT_VDOM

Message ID: 32612


Message Description: LOG_ID_FGT_SWITCH_EXPORT_VDOM
Message Meaning: Export port to vdom
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

32613 - LOG_ID_FGT_SWITCH_REQUEST_PORT

Message ID: 32613


Message Description: LOG_ID_FGT_SWITCH_REQUEST_PORT

FortiOS 7.2.1 Log Reference 784


Fortinet Inc.
Message Meaning: Request port from pool
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

32614 - LOG_ID_FGT_SWITCH_RETURN_PORT

Message ID: 32614


Message Description: LOG_ID_FGT_SWITCH_RETURN_PORT
Message Meaning: Return port to pool
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

FortiOS 7.2.1 Log Reference 785


Fortinet Inc.
Log Field Name Description Data Type Length

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

32615 - LOG_ID_FGT_SWITCH_MAC_ADD

Message ID: 32615


Message Description: LOG_ID_FGT_SWITCH_MAC_ADD
Message Meaning: FortiSwitch MAC add
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

FortiOS 7.2.1 Log Reference 786


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

32616 - LOG_ID_FGT_SWITCH_MAC_DEL

Message ID: 32616


Message Description: LOG_ID_FGT_SWITCH_MAC_DEL
Message Meaning: FortiSwitch MAC delete
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

FortiOS 7.2.1 Log Reference 787


Fortinet Inc.
32617 - LOG_ID_FGT_SWITCH_MAC_MOVE

Message ID: 32617


Message Description: LOG_ID_FGT_SWITCH_MAC_MOVE
Message Meaning: FortiSwitch MAC move
Type: Event
Category: SWITCH-CONTROLLER
Severity: Information

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

32693 - LOG_ID_FGT_SWITCH_GROUP_SWC

Message ID: 32693


Message Description: LOG_ID_FGT_SWITCH_GROUP_SWC
Message Meaning: FortiSwitch switch controller
Type: Event
Category: SWITCH-CONTROLLER
Severity: Critical

FortiOS 7.2.1 Log Reference 788


Fortinet Inc.
Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

cfgtid uint32 10

cfgpath string 128

cfgobj string 256

cfgattr string 4096

32694 - LOG_ID_FGT_SWITCH_GROUP_POE

Message ID: 32694


Message Description: LOG_ID_FGT_SWITCH_GROUP_POE
Message Meaning: FortiSwitch PoE
Type: Event
Category: SWITCH-CONTROLLER
Severity: Critical

Log Field Name Description Data Type Length

date string 10

FortiOS 7.2.1 Log Reference 789


Fortinet Inc.
Log Field Name Description Data Type Length

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

cfgtid uint32 10

cfgpath string 128

cfgobj string 256

cfgattr string 4096

32695 - LOG_ID_FGT_SWITCH_GROUP_LINK

Message ID: 32695


Message Description: LOG_ID_FGT_SWITCH_GROUP_LINK
Message Meaning: FortiSwitch link
Type: Event
Category: SWITCH-CONTROLLER
Severity: Critical

Log Field Name Description Data Type Length

date string 10

time string 8

FortiOS 7.2.1 Log Reference 790


Fortinet Inc.
Log Field Name Description Data Type Length

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

cfgtid uint32 10

cfgpath string 128

cfgobj string 256

cfgattr string 4096

32696 - LOG_ID_FGT_SWITCH_GROUP_STP

Message ID: 32696


Message Description: LOG_ID_FGT_SWITCH_GROUP_STP
Message Meaning: FortiSwitch spanning Tree
Type: Event
Category: SWITCH-CONTROLLER
Severity: Critical

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

FortiOS 7.2.1 Log Reference 791


Fortinet Inc.
Log Field Name Description Data Type Length

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

cfgtid uint32 10

cfgpath string 128

cfgobj string 256

cfgattr string 4096

32697 - LOG_ID_FGT_SWITCH_GROUP_SWITCH

Message ID: 32697


Message Description: LOG_ID_FGT_SWITCH_GROUP_SWITCH
Message Meaning: FortiSwitch switch
Type: Event
Category: SWITCH-CONTROLLER
Severity: Critical

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

FortiOS 7.2.1 Log Reference 792


Fortinet Inc.
Log Field Name Description Data Type Length

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

cfgtid uint32 10

cfgpath string 128

cfgobj string 256

cfgattr string 4096

32698 - LOG_ID_FGT_SWITCH_GROUP_ROUTER

Message ID: 32698


Message Description: LOG_ID_FGT_SWITCH_GROUP_ROUTER
Message Meaning: FortiSwitch router
Type: Event
Category: SWITCH-CONTROLLER
Severity: Critical

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

FortiOS 7.2.1 Log Reference 793


Fortinet Inc.
Log Field Name Description Data Type Length

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

cfgtid uint32 10

cfgpath string 128

cfgobj string 256

cfgattr string 4096

32699 - LOG_ID_FGT_SWITCH_GROUP_SYSTEM

Message ID: 32699


Message Description: LOG_ID_FGT_SWITCH_GROUP_SYSTEM
Message Meaning: FortiSwitch system
Type: Event
Category: SWITCH-CONTROLLER
Severity: Critical

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

FortiOS 7.2.1 Log Reference 794


Fortinet Inc.
Log Field Name Description Data Type Length

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

user string 256

ui string 64

msg string 4096

sn string 64

name string 128

cfgtid uint32 10

cfgpath string 128

cfgobj string 256

cfgattr string 4096

34415 - LOG_ID_NP6_IPSEC_ENGINE_BUSY

Message ID: 34415


Message Description: LOG_ID_NP6_IPSEC_ENGINE_BUSY
Message Meaning: NP6 IPsec engine is busy
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 795


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

34416 - LOG_ID_NP6_IPSEC_ENGINE_POSSIBLY_LOCKUP

Message ID: 34416


Message Description: LOG_ID_NP6_IPSEC_ENGINE_POSSIBLY_LOCKUP
Message Meaning: NP6 IPsec engine is possibly locked up
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

34417 - LOG_ID_NP6_IPSEC_ENGINE_LOCKUP

Message ID: 34417


Message Description: LOG_ID_NP6_IPSEC_ENGINE_LOCKUP
Message Meaning: NP6 IPsec engine is locked up

FortiOS 7.2.1 Log Reference 796


Fortinet Inc.
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

34418 - LOG_ID_NP6_HPE_PACKET_DROP

Message ID: 34418


Message Description: LOG_ID_NP6_HPE_PACKET_DROP
Message Meaning: NPU HPE is dropping packets
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 797


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

34419 - LOG_ID_NP6_HPE_PACKET_FLOOD

Message ID: 34419


Message Description: LOG_ID_NP6_HPE_PACKET_FLOOD
Message Meaning: NP6 HPE under a packets flood
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

34428 - LOG_ID_NP7_HPE_PACKET_DROP

Message ID: 34428


Message Description: LOG_ID_NP7_HPE_PACKET_DROP

FortiOS 7.2.1 Log Reference 798


Fortinet Inc.
Message Meaning: NPU HPE is dropping packets
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

34430 - LOG_ID_NP7_HPE_PACKET_FLOOD

Message ID: 34430


Message Description: LOG_ID_NP7_HPE_PACKET_FLOOD
Message Meaning: NPU HPE under packet flood
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 799


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

35001 - LOG_ID_HA_SYNC_VIRDB

Message ID: 35001


Message Description: LOG_ID_HA_SYNC_VIRDB
Message Meaning: HA secondary synchronized Virus database
Type: Event
Category: HA
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

35002 - LOG_ID_HA_SYNC_ETDB

Message ID: 35002

FortiOS 7.2.1 Log Reference 800


Fortinet Inc.
Message Description: LOG_ID_HA_SYNC_ETDB
Message Meaning: HA secondary synchronized Extended database
Type: Event
Category: HA
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

35003 - LOG_ID_HA_SYNC_EXDB

Message ID: 35003


Message Description: LOG_ID_HA_SYNC_EXDB
Message Meaning: HA secondary synchronized Extreme database
Type: Event
Category: HA
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 801


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

35004 - LOG_ID_HA_SYNC_FLDB

Message ID: 35004


Message Description: LOG_ID_HA_SYNC_FLDB
Message Meaning: HA secondary synchronized FLDB
Type: Event
Category: HA
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 802


Fortinet Inc.
35005 - LOG_ID_HA_SYNC_IPS

Message ID: 35005


Message Description: LOG_ID_HA_SYNC_IPS
Message Meaning: HA secondary synchronized IDS package
Type: Event
Category: HA
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

35007 - LOG_ID_HA_SYNC_AV

Message ID: 35007


Message Description: LOG_ID_HA_SYNC_AV
Message Meaning: HA secondary synchronized AntiVirus package
Type: Event
Category: HA
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 803


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

35009 - LOG_ID_HA_SYNC_CID

Message ID: 35009


Message Description: LOG_ID_HA_SYNC_CID
Message Meaning: HA secondary synchronized CID package
Type: Event
Category: HA
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 804


Fortinet Inc.
35011 - LOG_ID_HA_SYNC_FAIL

Message ID: 35011


Message Description: LOG_ID_HA_SYNC_FAIL
Message Meaning: HA secondary synchronization failed
Type: Event
Category: HA
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

35012 - LOG_ID_CONF_SYNC_FAIL

Message ID: 35012


Message Description: LOG_ID_CONF_SYNC_FAIL
Message Meaning: Secondary sync failed
Type: Event
Category: HA
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 805


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

35013 - LOG_ID_HA_FAILOVER_FAIL

Message ID: 35013


Message Description: LOG_ID_HA_FAILOVER_FAIL
Message Meaning: HA failover failed
Type: Event
Category: HA
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 806


Fortinet Inc.
35014 - LOG_ID_HA_RESET_UPTIME

Message ID: 35014


Message Description: LOG_ID_HA_RESET_UPTIME
Message Meaning: HA reset uptime
Type: Event
Category: HA
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

user User name of authenticated user string 256

ui User Interface string 64

35015 - LOG_ID_HA_CLEAR_HISTORY

Message ID: 35015


Message Description: LOG_ID_HA_CLEAR_HISTORY
Message Meaning: HA clear history
Type: Event
Category: HA
Severity: Information

FortiOS 7.2.1 Log Reference 807


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

user User name of authenticated user string 256

ui User Interface string 64

35016 - LOG_ID_HA_FAILOVER_SUCCESS

Message ID: 35016


Message Description: LOG_ID_HA_FAILOVER_SUCCESS
Message Meaning: HA failover success
Type: Event
Category: HA
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 808


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

36881 - LOG_ID_EVENT_SYSTEM_CFG_REVERT

Message ID: 36881


Message Description: LOG_ID_EVENT_SYSTEM_CFG_REVERT
Message Meaning: Configuration reverted due to timeout
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

36882 - LOG_ID_EVENT_SYSTEM_CFG_MANUALLY_SAVED

Message ID: 36882


Message Description: LOG_ID_EVENT_SYSTEM_CFG_MANUALLY_SAVED
Message Meaning: Configuration manually saved

FortiOS 7.2.1 Log Reference 809


Fortinet Inc.
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

36883 - LOG_ID_EVENT_SYSTEM_CLEAR_ACTIVE_SESSION

Message ID: 36883


Message Description: LOG_ID_EVENT_SYSTEM_CLEAR_ACTIVE_SESSION
Message Meaning: Clear active sessions
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 810


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

method Method string 64

37120 - MESGID_NEG_GENERIC_P1_NOTIF

Message ID: 37120


Message Description: MESGID_NEG_GENERIC_P1_NOTIF
Message Meaning: Negotiate IPsec phase 1
Type: Event
Category: VPN
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

FortiOS 7.2.1 Log Reference 811


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc Log Description string 4096

action Policy Action string 65

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

locip IPsec VPN local gateway IP address ip 39

remport Remote Port uint16 5

locport Local Port uint16 5

outintf IPsec VPN binding interface string 32

cookies Cookie string 64

useralt string 256

xauthuser IPsec VPN Xauth user name string 256

xauthgroup IPsec VPN Xauth user group name string 128

assignip IPsec VPN tunnel assigned IP address ip 39

vpntunnel IPsec VPN Tunnel Name string 128

status Status string 23

result IPsec VPN negotiation result string 31

peer_notif IPsec VPN Peer Notification string 25

advpnsc uint8 3

37121 - MESGID_NEG_GENERIC_P1_ERROR

Message ID: 37121


Message Description: MESGID_NEG_GENERIC_P1_ERROR
Message Meaning: Negotiate IPsec phase 1
Type: Event
Category: VPN
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

FortiOS 7.2.1 Log Reference 812


Fortinet Inc.
Log Field Name Description Data Type Length

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

locip IPsec VPN local gateway IP address ip 39

remport Remote Port uint16 5

locport Local Port uint16 5

outintf IPsec VPN binding interface string 32

cookies Cookie string 64

useralt string 256

xauthuser IPsec VPN Xauth user name string 256

xauthgroup IPsec VPN Xauth user group name string 128

assignip IPsec VPN tunnel assigned IP address ip 39

vpntunnel IPsec VPN Tunnel Name string 128

status Status string 23

result IPsec VPN negotiation result string 31

peer_notif IPsec VPN Peer Notification string 25

advpnsc uint8 3

FortiOS 7.2.1 Log Reference 813


Fortinet Inc.
37122 - MESGID_NEG_GENERIC_P2_NOTIF

Message ID: 37122


Message Description: MESGID_NEG_GENERIC_P2_NOTIF
Message Meaning: Negotiate IPsec phase 2
Type: Event
Category: VPN
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

locip IPsec VPN local gateway IP address ip 39

remport Remote Port uint16 5

locport Local Port uint16 5

outintf IPsec VPN binding interface string 32

cookies Cookie string 64

useralt string 256

xauthuser IPsec VPN Xauth user name string 256

FortiOS 7.2.1 Log Reference 814


Fortinet Inc.
Log Field Name Description Data Type Length

xauthgroup IPsec VPN Xauth user group name string 128

assignip IPsec VPN tunnel assigned IP address ip 39

vpntunnel IPsec VPN Tunnel Name string 128

status Status string 23

advpnsc uint8 3

role IPsec peer role, initator or responder string 9

esptransform IPsec Phase2 ESP encryption method string 21

espauth IPsec Phase2 ESP message authentication code string 17

37123 - MESGID_NEG_GENERIC_P2_ERROR

Message ID: 37123


Message Description: MESGID_NEG_GENERIC_P2_ERROR
Message Meaning: Negotiate IPsec phase 2
Type: Event
Category: VPN
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

remip IPsec VPN remote gateway IP address ip 39

FortiOS 7.2.1 Log Reference 815


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

locip IPsec VPN local gateway IP address ip 39

remport Remote Port uint16 5

locport Local Port uint16 5

outintf IPsec VPN binding interface string 32

cookies Cookie string 64

useralt string 256

xauthuser IPsec VPN Xauth user name string 256

xauthgroup IPsec VPN Xauth user group name string 128

assignip IPsec VPN tunnel assigned IP address ip 39

vpntunnel IPsec VPN Tunnel Name string 128

status Status string 23

advpnsc uint8 3

role IPsec peer role, initator or responder string 9

esptransform IPsec Phase2 ESP encryption method string 21

espauth IPsec Phase2 ESP message authentication code string 17

37124 - MESGID_NEG_I_P1_ERROR

Message ID: 37124


Message Description: MESGID_NEG_I_P1_ERROR
Message Meaning: IPsec phase 1 error
Type: Event
Category: VPN
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 816


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

locip IPsec VPN local gateway IP address ip 39

remport Remote Port uint16 5

locport Local Port uint16 5

outintf IPsec VPN binding interface string 32

cookies Cookie string 64

useralt string 256

xauthuser IPsec VPN Xauth user name string 256

xauthgroup IPsec VPN Xauth user group name string 128

assignip IPsec VPN tunnel assigned IP address ip 39

vpntunnel IPsec VPN Tunnel Name string 128

status Status string 23

peer_notif IPsec VPN Peer Notification string 25

advpnsc uint8 3

reason Reason string 256

37125 - MESGID_NEG_I_P2_ERROR

Message ID: 37125


Message Description: MESGID_NEG_I_P2_ERROR

FortiOS 7.2.1 Log Reference 817


Fortinet Inc.
Message Meaning: IPsec phase 2 error
Type: Event
Category: VPN
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

locip IPsec VPN local gateway IP address ip 39

remport Remote Port uint16 5

locport Local Port uint16 5

outintf IPsec VPN binding interface string 32

cookies Cookie string 64

useralt string 256

xauthuser IPsec VPN Xauth user name string 256

xauthgroup IPsec VPN Xauth user group name string 128

assignip IPsec VPN tunnel assigned IP address ip 39

vpntunnel IPsec VPN Tunnel Name string 128

status Status string 23

FortiOS 7.2.1 Log Reference 818


Fortinet Inc.
Log Field Name Description Data Type Length

advpnsc uint8 3

reason Reason string 256

37126 - MESGID_NEG_NO_STATE_ERROR

Message ID: 37126


Message Description: MESGID_NEG_NO_STATE_ERROR
Message Meaning: IPsec no state error
Type: Event
Category: VPN
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

locip IPsec VPN local gateway IP address ip 39

remport Remote Port uint16 5

locport Local Port uint16 5

FortiOS 7.2.1 Log Reference 819


Fortinet Inc.
Log Field Name Description Data Type Length

outintf IPsec VPN binding interface string 32

cookies Cookie string 64

useralt string 256

xauthuser IPsec VPN Xauth user name string 256

xauthgroup IPsec VPN Xauth user group name string 128

assignip IPsec VPN tunnel assigned IP address ip 39

vpntunnel IPsec VPN Tunnel Name string 128

status Status string 23

advpnsc uint8 3

reason Reason string 256

37127 - MESGID_NEG_PROGRESS_P1_NOTIF

Message ID: 37127


Message Description: MESGID_NEG_PROGRESS_P1_NOTIF
Message Meaning: Progress IPsec phase 1
Type: Event
Category: VPN
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 820


Fortinet Inc.
Log Field Name Description Data Type Length

action Policy Action string 65

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

locip IPsec VPN local gateway IP address ip 39

remport Remote Port uint16 5

locport Local Port uint16 5

outintf IPsec VPN binding interface string 32

cookies Cookie string 64

useralt string 256

xauthuser IPsec VPN Xauth user name string 256

xauthgroup IPsec VPN Xauth user group name string 128

assignip IPsec VPN tunnel assigned IP address ip 39

vpntunnel IPsec VPN Tunnel Name string 128

status Status string 23

result IPsec VPN negotiation result string 31

advpnsc uint8 3

role IPsec peer role, initator or responder string 9

init string 6

exch Type of IKE messages exchanged string 14

dir Direction string 8

version Version string 64

mode IPsec VPN ID protection mode string 12

stage uint8 3

37128 - MESGID_NEG_PROGRESS_P1_ERROR

Message ID: 37128


Message Description: MESGID_NEG_PROGRESS_P1_ERROR
Message Meaning: Progress IPsec phase 1
Type: Event
Category: VPN

FortiOS 7.2.1 Log Reference 821


Fortinet Inc.
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

locip IPsec VPN local gateway IP address ip 39

remport Remote Port uint16 5

locport Local Port uint16 5

outintf IPsec VPN binding interface string 32

cookies Cookie string 64

useralt string 256

xauthuser IPsec VPN Xauth user name string 256

xauthgroup IPsec VPN Xauth user group name string 128

assignip IPsec VPN tunnel assigned IP address ip 39

vpntunnel IPsec VPN Tunnel Name string 128

status Status string 23

result IPsec VPN negotiation result string 31

advpnsc uint8 3

role IPsec peer role, initator or responder string 9

FortiOS 7.2.1 Log Reference 822


Fortinet Inc.
Log Field Name Description Data Type Length

init string 6

exch Type of IKE messages exchanged string 14

dir Direction string 8

version Version string 64

mode IPsec VPN ID protection mode string 12

stage uint8 3

37129 - MESGID_NEG_PROGRESS_P2_NOTIF

Message ID: 37129


Message Description: MESGID_NEG_PROGRESS_P2_NOTIF
Message Meaning: Progress IPsec phase 2
Type: Event
Category: VPN
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

FortiOS 7.2.1 Log Reference 823


Fortinet Inc.
Log Field Name Description Data Type Length

msg Log Message string 4096

locip IPsec VPN local gateway IP address ip 39

remport Remote Port uint16 5

locport Local Port uint16 5

outintf IPsec VPN binding interface string 32

cookies Cookie string 64

useralt string 256

xauthuser IPsec VPN Xauth user name string 256

xauthgroup IPsec VPN Xauth user group name string 128

assignip IPsec VPN tunnel assigned IP address ip 39

vpntunnel IPsec VPN Tunnel Name string 128

status Status string 23

result IPsec VPN negotiation result string 31

advpnsc uint8 3

role IPsec peer role, initator or responder string 9

init string 6

exch Type of IKE messages exchanged string 14

dir Direction string 8

version Version string 64

mode IPsec VPN ID protection mode string 12

stage uint8 3

37130 - MESGID_NEG_PROGRESS_P2_ERROR

Message ID: 37130


Message Description: MESGID_NEG_PROGRESS_P2_ERROR
Message Meaning: Progress IPsec phase 2
Type: Event
Category: VPN
Severity: Error

FortiOS 7.2.1 Log Reference 824


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

locip IPsec VPN local gateway IP address ip 39

remport Remote Port uint16 5

locport Local Port uint16 5

outintf IPsec VPN binding interface string 32

cookies Cookie string 64

useralt string 256

xauthuser IPsec VPN Xauth user name string 256

xauthgroup IPsec VPN Xauth user group name string 128

assignip IPsec VPN tunnel assigned IP address ip 39

vpntunnel IPsec VPN Tunnel Name string 128

status Status string 23

result IPsec VPN negotiation result string 31

advpnsc uint8 3

role IPsec peer role, initator or responder string 9

FortiOS 7.2.1 Log Reference 825


Fortinet Inc.
Log Field Name Description Data Type Length

init string 6

exch Type of IKE messages exchanged string 14

dir Direction string 8

version Version string 64

mode IPsec VPN ID protection mode string 12

stage uint8 3

37131 - MESGID_ESP_ERROR

Message ID: 37131


Message Description: MESGID_ESP_ERROR
Message Meaning: IPsec ESP
Type: Event
Category: VPN
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

FortiOS 7.2.1 Log Reference 826


Fortinet Inc.
Log Field Name Description Data Type Length

msg Log Message string 4096

locip IPsec VPN local gateway IP address ip 39

remport Remote Port uint16 5

locport Local Port uint16 5

outintf IPsec VPN binding interface string 32

cookies Cookie string 64

useralt string 256

xauthuser IPsec VPN Xauth user name string 256

xauthgroup IPsec VPN Xauth user group name string 128

assignip IPsec VPN tunnel assigned IP address ip 39

vpntunnel IPsec VPN Tunnel Name string 128

status Status string 23

advpnsc uint8 3

error_num Error Number string 53

spi Security Parameter Index string 16

seq Sequence string 512

37132 - MESGID_ESP_CRITICAL

Message ID: 37132


Message Description: MESGID_ESP_CRITICAL
Message Meaning: IPsec ESP
Type: Event
Category: VPN
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 827


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

locip IPsec VPN local gateway IP address ip 39

remport Remote Port uint16 5

locport Local Port uint16 5

outintf IPsec VPN binding interface string 32

cookies Cookie string 64

useralt string 256

xauthuser IPsec VPN Xauth user name string 256

xauthgroup IPsec VPN Xauth user group name string 128

assignip IPsec VPN tunnel assigned IP address ip 39

vpntunnel IPsec VPN Tunnel Name string 128

status Status string 23

advpnsc uint8 3

error_num Error Number string 53

spi Security Parameter Index string 16

seq Sequence string 512

37133 - MESGID_INSTALL_SA

Message ID: 37133


Message Description: MESGID_INSTALL_SA
Message Meaning: IPsec SA installed

FortiOS 7.2.1 Log Reference 828


Fortinet Inc.
Type: Event
Category: VPN
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

locip IPsec VPN local gateway IP address ip 39

remport Remote Port uint16 5

locport Local Port uint16 5

outintf IPsec VPN binding interface string 32

cookies Cookie string 64

useralt string 256

xauthuser IPsec VPN Xauth user name string 256

xauthgroup IPsec VPN Xauth user group name string 128

assignip IPsec VPN tunnel assigned IP address ip 39

vpntunnel IPsec VPN Tunnel Name string 128

advpnsc uint8 3

role IPsec peer role, initator or responder string 9

FortiOS 7.2.1 Log Reference 829


Fortinet Inc.
Log Field Name Description Data Type Length

in_spi SPI for incoming traffic string 16

out_spi Out SPI string 16

37134 - MESGID_DELETE_P1_SA

Message ID: 37134


Message Description: MESGID_DELETE_P1_SA
Message Meaning: IPsec phase 1 SA deleted
Type: Event
Category: VPN
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

locip IPsec VPN local gateway IP address ip 39

remport Remote Port uint16 5

locport Local Port uint16 5

FortiOS 7.2.1 Log Reference 830


Fortinet Inc.
Log Field Name Description Data Type Length

outintf IPsec VPN binding interface string 32

cookies Cookie string 64

useralt string 256

xauthuser IPsec VPN Xauth user name string 256

xauthgroup IPsec VPN Xauth user group name string 128

assignip IPsec VPN tunnel assigned IP address ip 39

vpntunnel IPsec VPN Tunnel Name string 128

advpnsc uint8 3

37135 - MESGID_DELETE_P2_SA

Message ID: 37135


Message Description: MESGID_DELETE_P2_SA
Message Meaning: IPsec phase 2 SA deleted
Type: Event
Category: VPN
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

remip IPsec VPN remote gateway IP address ip 39

FortiOS 7.2.1 Log Reference 831


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

locip IPsec VPN local gateway IP address ip 39

remport Remote Port uint16 5

locport Local Port uint16 5

outintf IPsec VPN binding interface string 32

cookies Cookie string 64

useralt string 256

xauthuser IPsec VPN Xauth user name string 256

xauthgroup IPsec VPN Xauth user group name string 128

assignip IPsec VPN tunnel assigned IP address ip 39

vpntunnel IPsec VPN Tunnel Name string 128

advpnsc uint8 3

in_spi SPI for incoming traffic string 16

out_spi Out SPI string 16

37136 - MESGID_DPD_FAILURE

Message ID: 37136


Message Description: MESGID_DPD_FAILURE
Message Meaning: IPsec DPD failed
Type: Event
Category: VPN
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 832


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

locip IPsec VPN local gateway IP address ip 39

remport Remote Port uint16 5

locport Local Port uint16 5

outintf IPsec VPN binding interface string 32

cookies Cookie string 64

useralt string 256

xauthuser IPsec VPN Xauth user name string 256

xauthgroup IPsec VPN Xauth user group name string 128

assignip IPsec VPN tunnel assigned IP address ip 39

vpntunnel IPsec VPN Tunnel Name string 128

status Status string 23

advpnsc uint8 3

37137 - MESGID_CONN_FAILURE

Message ID: 37137


Message Description: MESGID_CONN_FAILURE
Message Meaning: IPsec connection failed
Type: Event
Category: VPN
Severity: Error

FortiOS 7.2.1 Log Reference 833


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

locip IPsec VPN local gateway IP address ip 39

remport Remote Port uint16 5

locport Local Port uint16 5

outintf IPsec VPN binding interface string 32

cookies Cookie string 64

useralt string 256

xauthuser IPsec VPN Xauth user name string 256

xauthgroup IPsec VPN Xauth user group name string 128

assignip IPsec VPN tunnel assigned IP address ip 39

vpntunnel IPsec VPN Tunnel Name string 128

status Status string 23

advpnsc uint8 3

37138 - MESGID_CONN_UPDOWN

Message ID: 37138

FortiOS 7.2.1 Log Reference 834


Fortinet Inc.
Message Description: MESGID_CONN_UPDOWN
Message Meaning: IPsec connection status changed
Type: Event
Category: VPN
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

tunnelip IPsec VPN tunnel IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

locip IPsec VPN local gateway IP address ip 39

remport Remote Port uint16 5

locport Local Port uint16 5

outintf IPsec VPN binding interface string 32

cookies Cookie string 64

useralt string 256

xauthuser IPsec VPN Xauth user name string 256

FortiOS 7.2.1 Log Reference 835


Fortinet Inc.
Log Field Name Description Data Type Length

xauthgroup IPsec VPN Xauth user group name string 128

assignip IPsec VPN tunnel assigned IP address ip 39

vpntunnel IPsec VPN Tunnel Name string 128

advpnsc uint8 3

duration Duration uint32 10

sentbyte Bytes Sent uint64 20

rcvdbyte Received Bytes uint64 20

nextstat Time interval in seconds for the next statistics uint32 10

37139 - MESGID_P2_UPDOWN

Message ID: 37139


Message Description: MESGID_P2_UPDOWN
Message Meaning: IPsec phase 2 status changed
Type: Event
Category: VPN
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

remip IPsec VPN remote gateway IP address ip 39

FortiOS 7.2.1 Log Reference 836


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

locip IPsec VPN local gateway IP address ip 39

remport Remote Port uint16 5

locport Local Port uint16 5

outintf IPsec VPN binding interface string 32

cookies Cookie string 64

useralt string 256

xauthuser IPsec VPN Xauth user name string 256

xauthgroup IPsec VPN Xauth user group name string 128

assignip IPsec VPN tunnel assigned IP address ip 39

vpntunnel IPsec VPN Tunnel Name string 128

advpnsc uint8 3

phase2_name Phase 2 Name string 128

37141 - MESGID_CONN_STATS

Message ID: 37141


Message Description: MESGID_CONN_STATS
Message Meaning: IPsec tunnel statistics
Type: Event
Category: VPN
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 837


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

tunnelip IPsec VPN tunnel IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

locip IPsec VPN local gateway IP address ip 39

remport Remote Port uint16 5

locport Local Port uint16 5

outintf IPsec VPN binding interface string 32

cookies Cookie string 64

useralt string 256

xauthuser IPsec VPN Xauth user name string 256

xauthgroup IPsec VPN Xauth user group name string 128

assignip IPsec VPN tunnel assigned IP address ip 39

vpntunnel IPsec VPN Tunnel Name string 128

advpnsc uint8 3

duration Duration uint32 10

sentbyte Bytes Sent uint64 20

rcvdbyte Received Bytes uint64 20

nextstat Time interval in seconds for the next statistics uint32 10

37889 - MESGID_VC_DELETE

Message ID: 37889

FortiOS 7.2.1 Log Reference 838


Fortinet Inc.
Message Description: MESGID_VC_DELETE
Message Meaning: Virtual cluster deleted
Type: Event
Category: HA
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

vcluster Virtual cluster uint32 10

37890 - MESGID_VC_MOVE_VDOM

Message ID: 37890


Message Description: MESGID_VC_MOVE_VDOM
Message Meaning: Virtual cluster VDOM moved
Type: Event
Category: HA
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 839


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

from_vcluster Source virtual cluster number uint32 10

to_vcluster Destination virtual cluster number uint32 10

vdname Virtual Domain Name string 32

37891 - MESGID_VC_ADD_VDOM

Message ID: 37891


Message Description: MESGID_VC_ADD_VDOM
Message Meaning: Virtual cluster VDOM added
Type: Event
Category: HA
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 840


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

to_vcluster Destination virtual cluster number uint32 10

vdname Virtual Domain Name string 32

37892 - MESGID_VC_MOVE_MEMB_STATE

Message ID: 37892


Message Description: MESGID_VC_MOVE_MEMB_STATE
Message Meaning: Virtual cluster member state moved
Type: Event
Category: HA
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

vcluster Virtual cluster uint32 10

ha_role The HA role in the cluster string 9

vcluster_state Virtual cluster member state string 7

vcluster_member Virtual cluster member uint32 10

FortiOS 7.2.1 Log Reference 841


Fortinet Inc.
Log Field Name Description Data Type Length

hostname string 128

sn Serial Number string 64

37893 - MESGID_VC_DETECT_MEMB_DEAD

Message ID: 37893


Message Description: MESGID_VC_DETECT_MEMB_DEAD
Message Meaning: Virtual cluster member dead
Type: Event
Category: HA
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

vcluster Virtual cluster uint32 10

sn Serial Number string 64

ha_group HA Group Number - can be 0 - 255 uint16 4

37894 - MESGID_VC_DETECT_MEMB_JOIN

Message ID: 37894


Message Description: MESGID_VC_DETECT_MEMB_JOIN
Message Meaning: Virtual cluster member joined

FortiOS 7.2.1 Log Reference 842


Fortinet Inc.
Type: Event
Category: HA
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

vcluster Virtual cluster uint32 10

sn Serial Number string 64

ha_group HA Group Number - can be 0 - 255 uint16 4

37895 - MESGID_VC_ADD_HADEV

Message ID: 37895


Message Description: MESGID_VC_ADD_HADEV
Message Meaning: Virtual cluster added HA device interface
Type: Event
Category: HA
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 843


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

vcluster Virtual cluster uint32 10

devintfname HA device interface name string 32

37896 - MESGID_VC_DEL_HADEV

Message ID: 37896


Message Description: MESGID_VC_DEL_HADEV
Message Meaning: Virtual cluster deleted HA device interface
Type: Event
Category: HA
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

FortiOS 7.2.1 Log Reference 844


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc Log Description string 4096

msg Log Message string 4096

vcluster Virtual cluster uint32 10

devintfname HA device interface name string 32

37897 - MESGID_HADEV_READY

Message ID: 37897


Message Description: MESGID_HADEV_READY
Message Meaning: HA device interface ready
Type: Event
Category: HA
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

ha_role The HA role in the cluster string 9

devintfname HA device interface name string 32

37898 - MESGID_HADEV_FAIL

Message ID: 37898


Message Description: MESGID_HADEV_FAIL

FortiOS 7.2.1 Log Reference 845


Fortinet Inc.
Message Meaning: HA device interface failed
Type: Event
Category: HA
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

ha_role The HA role in the cluster string 9

devintfname HA device interface name string 32

37899 - MESGID_HADEV_PEERINFO

Message ID: 37899


Message Description: MESGID_HADEV_PEERINFO
Message Meaning: HA device interface peer information
Type: Event
Category: HA
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 846


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

ha_role The HA role in the cluster string 9

devintfname HA device interface name string 32

37900 - MESGID_HBDEV_DELETE

Message ID: 37900


Message Description: MESGID_HBDEV_DELETE
Message Meaning: Heartbeat device interface deleted
Type: Event
Category: HA
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

FortiOS 7.2.1 Log Reference 847


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc Log Description string 4096

msg Log Message string 4096

devintfname HA device interface name string 32

37901 - MESGID_HBDEV_DOWN

Message ID: 37901


Message Description: MESGID_HBDEV_DOWN
Message Meaning: Heartbeat device interface down
Type: Event
Category: HA
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

ha_role The HA role in the cluster string 9

devintfname HA device interface name string 32

37902 - MESGID_HBDEV_UP

Message ID: 37902


Message Description: MESGID_HBDEV_UP
Message Meaning: Heartbeat device interface up

FortiOS 7.2.1 Log Reference 848


Fortinet Inc.
Type: Event
Category: HA
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

ha_role The HA role in the cluster string 9

devintfname HA device interface name string 32

37903 - MESGID_SYNC_STATUS

Message ID: 37903


Message Description: MESGID_SYNC_STATUS
Message Meaning: Synchronization status with primary
Type: Event
Category: HA
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 849


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

sync_type The sync type with the primary string 14

sync_status The sync status with the primary string 11

37904 - MESGID_HA_ACTIVITY

Message ID: 37904


Message Description: MESGID_HA_ACTIVITY
Message Meaning: Device set as HA primary
Type: Event
Category: HA
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 850


Fortinet Inc.
Log Field Name Description Data Type Length

msg Log Message string 4096

activity HA activity message string 128

37907 - MESGID_VLAN_HB_UP

Message ID: 37907


Message Description: MESGID_VLAN_HB_UP
Message Meaning: VLAN heartbeat started
Type: Event
Category: HA
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

37908 - MESGID_VLAN_HB_DOWN

Message ID: 37908


Message Description: MESGID_VLAN_HB_DOWN
Message Meaning: VLAN heartbeat lost
Type: Event
Category: HA
Severity: Error

FortiOS 7.2.1 Log Reference 851


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

37909 - MESGID_VLAN_HB_DOWN_SUM

Message ID: 37909


Message Description: MESGID_VLAN_HB_DOWN_SUM
Message Meaning: VLAN heartbeat lost summary
Type: Event
Category: HA
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 852


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

37910 - MESGID_HB_PACKET_LOST

Message ID: 37910


Message Description: MESGID_HB_PACKET_LOST
Message Meaning: Heartbeat packet lost
Type: Event
Category: HA
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

ha_role The HA role in the cluster string 9

devintfname HA device interface name string 32

37911 - MESGID_HA_ACTIVITY_INFO

Message ID: 37911


Message Description: MESGID_HA_ACTIVITY_INFO
Message Meaning: Device set as HA master information

FortiOS 7.2.1 Log Reference 853


Fortinet Inc.
Type: Event
Category: HA
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

activity HA activity message string 128

ip ip 39

ha-prio HA Priority uint8 3

37912 - MESGID_FGSP_MEMBER_JOIN

Message ID: 37912


Message Description: MESGID_FGSP_MEMBER_JOIN
Message Meaning: FGSP member joined
Type: Event
Category: HA
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 854


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

37913 - MESGID_FGSP_MEMBER_LEAVE

Message ID: 37913


Message Description: MESGID_FGSP_MEMBER_LEAVE
Message Meaning: FGSP member left
Type: Event
Category: HA
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 855


Fortinet Inc.
38010 - LOG_ID_FIPS_ENCRY_FAIL

Message ID: 38010


Message Description: LOG_ID_FIPS_ENCRY_FAIL
Message Meaning: FIPS CC encryption failed
Type: Event
Category: USER
Severity: Alert

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

authproto The protocol that initiated the authentication string 512

action Policy Action string 65

status Status string 23

msg Log Message string 4096

38011 - LOG_ID_FIPS_DECRY_FAIL

Message ID: 38011


Message Description: LOG_ID_FIPS_DECRY_FAIL
Message Meaning: FIPS CC decryption failed
Type: Event
Category: USER
Severity: Alert

FortiOS 7.2.1 Log Reference 856


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

status Status string 23

msg Log Message string 4096

ui User Interface string 64

38012 - LOG_ID_ENTROPY_TOKEN

Message ID: 38012


Message Description: LOG_ID_ENTROPY_TOKEN
Message Meaning: Seeding from entropy source
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 857


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

38031 - LOG_ID_FSSO_LOGON

Message ID: 38031


Message Description: LOG_ID_FSSO_LOGON
Message Meaning: FSSO logon successful
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

FortiOS 7.2.1 Log Reference 858


Fortinet Inc.
Log Field Name Description Data Type Length

action Policy Action string 65

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

server AD server FQDN or IP string 64

reason Reason string 256

38032 - LOG_ID_FSSO_LOGOFF

Message ID: 38032


Message Description: LOG_ID_FSSO_LOGOFF
Message Meaning: FSSO logout successful
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

status Status string 23

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 859


Fortinet Inc.
Log Field Name Description Data Type Length

srcip Source IP ip 39

server AD server FQDN or IP string 64

reason Reason string 256

38033 - LOG_ID_FSSO_SVR_STATUS

Message ID: 38033


Message Description: LOG_ID_FSSO_SVR_STATUS
Message Meaning: FSSO Active Directory server authentication status
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

server AD server FQDN or IP string 64

38403 - LOGID_EVENT_NOTIF_INSUFFICIENT_RESOURCE

Message ID: 38403


Message Description: LOGID_EVENT_NOTIF_INSUFFICIENT_RESOURCE

FortiOS 7.2.1 Log Reference 860


Fortinet Inc.
Message Meaning: Insufficient system resource notification
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

38404 - LOGID_EVENT_NOTIF_HOSTNAME_ERROR

Message ID: 38404


Message Description: LOGID_EVENT_NOTIF_HOSTNAME_ERROR
Message Meaning: FortiGuard hostname unresolvable
Type: Event
Category: SYSTEM
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 861


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

hostname Hostname string 128

38405 - LOGID_NOTIF_CODE_SENDTO_SMS_PHONE

Message ID: 38405


Message Description: LOGID_NOTIF_CODE_SENDTO_SMS_PHONE
Message Meaning: Guest user account login information sent to phone
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 862


Fortinet Inc.
38406 - LOGID_NOTIF_CODE_SENDTO_SMS_TO

Message ID: 38406


Message Description: LOGID_NOTIF_CODE_SENDTO_SMS_TO
Message Meaning: Guest user account login information sent as SMS
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

38407 - LOGID_NOTIF_CODE_SENDTO_EMAIL

Message ID: 38407


Message Description: LOGID_NOTIF_CODE_SENDTO_EMAIL
Message Meaning: Guest user account login information sent to email
Type: Event
Category: SYSTEM
Severity: Notice

FortiOS 7.2.1 Log Reference 863


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

38408 - LOGID_EVENT_OFTP_SSL_CONNECTED

Message ID: 38408


Message Description: LOGID_EVENT_OFTP_SSL_CONNECTED
Message Meaning: SSL connection established
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 864


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

dstip Destination IP ip 39

dstport Destination Protocol Port uint16 5

38409 - LOGID_EVENT_OFTP_SSL_DISCONNECTED

Message ID: 38409


Message Description: LOGID_EVENT_OFTP_SSL_DISCONNECTED
Message Meaning: SSL connection closed
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

FortiOS 7.2.1 Log Reference 865


Fortinet Inc.
Log Field Name Description Data Type Length

status Status string 23

msg Log Message string 4096

dstip Destination IP ip 39

dstport Destination Protocol Port uint16 5

38410 - LOGID_EVENT_OFTP_SSL_FAILED

Message ID: 38410


Message Description: LOGID_EVENT_OFTP_SSL_FAILED
Message Meaning: SSL connection failed
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

dstip Destination IP ip 39

dstport Destination Protocol Port uint16 5

reason Reason string 256

FortiOS 7.2.1 Log Reference 866


Fortinet Inc.
38411 - LOGID_EVENT_TWO_F_AUTH_CODE_SENDTO

Message ID: 38411


Message Description: LOGID_EVENT_TWO_F_AUTH_CODE_SENDTO
Message Meaning: Two-factor authentication code sent
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

38412 - LOGID_EVENT_TOKEN_CODE_SENDTO

Message ID: 38412


Message Description: LOGID_EVENT_TOKEN_CODE_SENDTO
Message Meaning: Token activation code sent
Type: Event
Category: SYSTEM
Severity: Notice

FortiOS 7.2.1 Log Reference 867


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

38656 - LOGID_EVENT_RAD_RPT_PROTO_ERROR

Message ID: 38656


Message Description: LOGID_EVENT_RAD_RPT_PROTO_ERROR
Message Meaning: RADIUS protocol error summary
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 868


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

count Number of Packets uint32 10

duration Duration uint32 10

38657 - LOGID_EVENT_RAD_RPT_PROF_NOT_FOUND

Message ID: 38657


Message Description: LOGID_EVENT_RAD_RPT_PROF_NOT_FOUND
Message Meaning: RADIUS profile not found summary
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

count Number of Packets uint32 10

duration Duration uint32 10

FortiOS 7.2.1 Log Reference 869


Fortinet Inc.
38658 - LOGID_EVENT_RAD_RPT_CTX_NOT_FOUND

Message ID: 38658


Message Description: LOGID_EVENT_RAD_RPT_CTX_NOT_FOUND
Message Meaning: RADIUS profile CTX not found summary
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

count Number of Packets uint32 10

duration Duration uint32 10

38659 - LOGID_EVENT_RAD_RPT_ACCT_STOP_MISSED

Message ID: 38659


Message Description: LOGID_EVENT_RAD_RPT_ACCT_STOP_MISSED
Message Meaning: RADIUS accounting stop message missing summary
Type: Event
Category: USER
Severity: Notice

FortiOS 7.2.1 Log Reference 870


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

count Number of Packets uint32 10

duration Duration uint32 10

38660 - LOGID_EVENT_RAD_RPT_ACCT_EVENT

Message ID: 38660


Message Description: LOGID_EVENT_RAD_RPT_ACCT_EVENT
Message Meaning: RADIUS accounting event summary
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 871


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

count Number of Packets uint32 10

duration Duration uint32 10

38661 - LOGID_EVENT_RAD_RPT_OTHER

Message ID: 38661


Message Description: LOGID_EVENT_RAD_RPT_OTHER
Message Meaning: RADIUS endpoint block event or other event summary
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

count Number of Packets uint32 10

duration Duration uint32 10

FortiOS 7.2.1 Log Reference 872


Fortinet Inc.
38662 - LOGID_EVENT_RAD_STAT_PROTO_ERROR

Message ID: 38662


Message Description: LOGID_EVENT_RAD_STAT_PROTO_ERROR
Message Meaning: RADIUS accounting protocol error
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

srcip Source IP ip 39

reason Reason string 256

carrier_ep The FortiOS Carrier end-point identification string 64

rsso_key RADIUS SSO attribute value string 64

acct_stat Accounting state (RADIUS) string 14

38663 - LOGID_EVENT_RAD_STAT_PROF_NOT_FOUND

Message ID: 38663


Message Description: LOGID_EVENT_RAD_STAT_PROF_NOT_FOUND
Message Meaning: RADIUS accounting profile not found
Type: Event
Category: USER

FortiOS 7.2.1 Log Reference 873


Fortinet Inc.
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

srcip Source IP ip 39

reason Reason string 256

carrier_ep The FortiOS Carrier end-point identification string 64

rsso_key RADIUS SSO attribute value string 64

acct_stat Accounting state (RADIUS) string 14

38665 - LOGID_EVENT_RAD_STAT_ACCT_STOP_MISSED

Message ID: 38665


Message Description: LOGID_EVENT_RAD_STAT_ACCT_STOP_MISSED
Message Meaning: RADIUS accounting stop message missing
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 874


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

srcip Source IP ip 39

reason Reason string 256

carrier_ep The FortiOS Carrier end-point identification string 64

rsso_key RADIUS SSO attribute value string 64

acct_stat Accounting state (RADIUS) string 14

38666 - LOGID_EVENT_RAD_STAT_ACCT_EVENT

Message ID: 38666


Message Description: LOGID_EVENT_RAD_STAT_ACCT_EVENT
Message Meaning: RADIUS accounting event
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 875


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

srcip Source IP ip 39

carrier_ep The FortiOS Carrier end-point identification string 64

rsso_key RADIUS SSO attribute value string 64

acct_stat Accounting state (RADIUS) string 14

38667 - LOGID_EVENT_RAD_STAT_OTHER

Message ID: 38667


Message Description: LOGID_EVENT_RAD_STAT_OTHER
Message Meaning: RADIUS other accounting event
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 876


Fortinet Inc.
Log Field Name Description Data Type Length

srcip Source IP ip 39

reason Reason string 256

count Number of Packets uint32 10

carrier_ep The FortiOS Carrier end-point identification string 64

rsso_key RADIUS SSO attribute value string 64

acct_stat Accounting state (RADIUS) string 14

38668 - LOGID_EVENT_RAD_STAT_EP_BLK

Message ID: 38668


Message Description: LOGID_EVENT_RAD_STAT_EP_BLK
Message Meaning: RADIUS endpoint block event
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

srcip Source IP ip 39

reason Reason string 256

carrier_ep The FortiOS Carrier end-point identification string 64

FortiOS 7.2.1 Log Reference 877


Fortinet Inc.
Log Field Name Description Data Type Length

rsso_key RADIUS SSO attribute value string 64

acct_stat Accounting state (RADIUS) string 14

39424 - LOG_ID_EVENT_SSL_VPN_USER_TUNNEL_UP

Message ID: 39424


Message Description: LOG_ID_EVENT_SSL_VPN_USER_TUNNEL_UP
Message Meaning: SSL VPN tunnel up
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

reason Reason string 256

dst_host Destination Host string 64

FortiOS 7.2.1 Log Reference 878


Fortinet Inc.
39425 - LOG_ID_EVENT_SSL_VPN_USER_TUNNEL_DOWN

Message ID: 39425


Message Description: LOG_ID_EVENT_SSL_VPN_USER_TUNNEL_DOWN
Message Meaning: SSL VPN tunnel down
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

reason Reason string 256

duration Duration uint32 10

sentbyte Bytes Sent uint64 20

rcvdbyte Received Bytes uint64 20

dst_host Destination Host string 64

FortiOS 7.2.1 Log Reference 879


Fortinet Inc.
39426 - LOG_ID_EVENT_SSL_VPN_USER_SSL_LOGIN_FAIL

Message ID: 39426


Message Description: LOG_ID_EVENT_SSL_VPN_USER_SSL_LOGIN_FAIL
Message Meaning: SSL VPN login fail
Type: Event
Category: VPN
Severity: Alert

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

reason Reason string 256

dst_host Destination Host string 64

39936 - LOG_ID_EVENT_SSL_VPN_SESSION_WEB_TUNNEL_STATS

Message ID: 39936


Message Description: LOG_ID_EVENT_SSL_VPN_SESSION_WEB_TUNNEL_STATS

FortiOS 7.2.1 Log Reference 880


Fortinet Inc.
Message Meaning: SSL VPN statistics
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

duration Duration uint32 10

sentbyte Bytes Sent uint64 20

rcvdbyte Received Bytes uint64 20

nextstat Time interval in seconds for the next statistics uint32 10

dst_host Destination Host string 64

39937 - LOG_ID_EVENT_SSL_VPN_SESSION_WEBAPP_DENY

Message ID: 39937


Message Description: LOG_ID_EVENT_SSL_VPN_SESSION_WEBAPP_DENY

FortiOS 7.2.1 Log Reference 881


Fortinet Inc.
Message Meaning: SSL VPN deny
Type: Event
Category: VPN
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

reason Reason string 256

dst_host Destination Host string 64

39938 - LOG_ID_EVENT_SSL_VPN_SESSION_WEBAPP_PASS

Message ID: 39938


Message Description: LOG_ID_EVENT_SSL_VPN_SESSION_WEBAPP_PASS
Message Meaning: SSL VPN pass
Type: Event
Category: VPN
Severity: Warning

FortiOS 7.2.1 Log Reference 882


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

reason Reason string 256

dst_host Destination Host string 64

39939 - LOG_ID_EVENT_SSL_VPN_SESSION_WEBAPP_TIMEOUT

Message ID: 39939


Message Description: LOG_ID_EVENT_SSL_VPN_SESSION_WEBAPP_TIMEOUT
Message Meaning: SSL VPN timeout
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

FortiOS 7.2.1 Log Reference 883


Fortinet Inc.
Log Field Name Description Data Type Length

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

reason Reason string 256

dst_host Destination Host string 64

39940 - LOG_ID_EVENT_SSL_VPN_SESSION_WEBAPP_CLOSE

Message ID: 39940


Message Description: LOG_ID_EVENT_SSL_VPN_SESSION_WEBAPP_CLOSE
Message Meaning: SSL VPN close
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 884


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

reason Reason string 256

dst_host Destination Host string 64

39941 - LOG_ID_EVENT_SSL_VPN_SESSION_SYS_BUSY

Message ID: 39941


Message Description: LOG_ID_EVENT_SSL_VPN_SESSION_SYS_BUSY
Message Meaning: SSL VPN system busy
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 885


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

reason Reason string 256

dst_host Destination Host string 64

39942 - LOG_ID_EVENT_SSL_VPN_SESSION_CERT_OK

Message ID: 39942


Message Description: LOG_ID_EVENT_SSL_VPN_SESSION_CERT_OK
Message Meaning: SSL VPN certificate OK
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 886


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

reason Reason string 256

dst_host Destination Host string 64

39943 - LOG_ID_EVENT_SSL_VPN_SESSION_NEW_CON

Message ID: 39943


Message Description: LOG_ID_EVENT_SSL_VPN_SESSION_NEW_CON
Message Meaning: SSL VPN new connection
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 887


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

reason Reason string 256

dst_host Destination Host string 64

39944 - LOG_ID_EVENT_SSL_VPN_SESSION_ALERT

Message ID: 39944


Message Description: LOG_ID_EVENT_SSL_VPN_SESSION_ALERT
Message Meaning: SSL VPN alert
Type: Event
Category: VPN
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 888


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

reason Reason string 256

dst_host Destination Host string 64

desc Description string 128

39945 - LOG_ID_EVENT_SSL_VPN_SESSION_EXIT_FAIL

Message ID: 39945


Message Description: LOG_ID_EVENT_SSL_VPN_SESSION_EXIT_FAIL
Message Meaning: SSL VPN exit fail
Type: Event
Category: VPN
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 889


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

reason Reason string 256

dst_host Destination Host string 64

39946 - LOG_ID_EVENT_SSL_VPN_SESSION_EXIT_ERR

Message ID: 39946


Message Description: LOG_ID_EVENT_SSL_VPN_SESSION_EXIT_ERR
Message Meaning: SSL VPN exit error
Type: Event
Category: VPN
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 890


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

reason Reason string 256

dst_host Destination Host string 64

39947 - LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_UP

Message ID: 39947


Message Description: LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_UP
Message Meaning: SSL VPN tunnel up
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 891


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

reason Reason string 256

dst_host Destination Host string 64

39948 - LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_DOWN

Message ID: 39948


Message Description: LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_DOWN
Message Meaning: SSL VPN tunnel down
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 892


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

reason Reason string 256

duration Duration uint32 10

sentbyte Bytes Sent uint64 20

rcvdbyte Received Bytes uint64 20

dst_host Destination Host string 64

39949 - LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_STATS

Message ID: 39949


Message Description: LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_STATS
Message Meaning: SSL VPN statistics
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 893


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

duration Duration uint32 10

sentbyte Bytes Sent uint64 20

rcvdbyte Received Bytes uint64 20

nextstat Time interval in seconds for the next statistics uint32 10

dst_host Destination Host string 64

39950 - LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_UNKNOWNTAG

Message ID: 39950


Message Description: LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_UNKNOWNTAG
Message Meaning: SSL VPN unknown tag
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 894


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

reason Reason string 256

dst_host Destination Host string 64

39951 - LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_ERROR

Message ID: 39951


Message Description: LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_ERROR
Message Meaning: SSL VPN tunnel error
Type: Event
Category: VPN
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 895


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

reason Reason string 256

dst_host Destination Host string 64

39952 - LOG_ID_EVENT_SSL_VPN_SESSION_ENTER_CONSERVE_MODE

Message ID: 39952


Message Description: LOG_ID_EVENT_SSL_VPN_SESSION_ENTER_CONSERVE_MODE
Message Meaning: SSL VPN enter conserve mode
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 896


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

reason Reason string 256

dst_host Destination Host string 64

39953 - LOG_ID_EVENT_SSL_VPN_SESSION_LEAVE_CONSERVE_MODE

Message ID: 39953


Message Description: LOG_ID_EVENT_SSL_VPN_SESSION_LEAVE_CONSERVE_MODE
Message Meaning: SSL VPN leave conserve mode
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 897


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

reason Reason string 256

dst_host Destination Host string 64

40001 - LOG_ID_PPTP_TUNNEL_UP

Message ID: 40001


Message Description: LOG_ID_PPTP_TUNNEL_UP
Message Meaning: PPTP tunnel up
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 898


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

tunnelip IPsec VPN tunnel IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

40002 - LOG_ID_PPTP_TUNNEL_DOWN

Message ID: 40002


Message Description: LOG_ID_PPTP_TUNNEL_DOWN
Message Meaning: PPTP tunnel down
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 899


Fortinet Inc.
Log Field Name Description Data Type Length

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

tunnelip IPsec VPN tunnel IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

40003 - LOG_ID_PPTP_TUNNEL_STAT

Message ID: 40003


Message Description: LOG_ID_PPTP_TUNNEL_STAT
Message Meaning: PPTP tunnel status
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

FortiOS 7.2.1 Log Reference 900


Fortinet Inc.
Log Field Name Description Data Type Length

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

tunnelip IPsec VPN tunnel IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

40014 - LOG_ID_PPTP_REACH_MAX_CON

Message ID: 40014


Message Description: LOG_ID_PPTP_REACH_MAX_CON
Message Meaning: PPTP client connection limit reached
Type: Event
Category: VPN
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

status Status string 23

FortiOS 7.2.1 Log Reference 901


Fortinet Inc.
40017 - LOG_ID_L2TPD_CLIENT_CON_FAIL

Message ID: 40017


Message Description: LOG_ID_L2TPD_CLIENT_CON_FAIL
Message Meaning: L2TP client connection failed
Type: Event
Category: VPN
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

status Status string 23

reason Reason string 256

40019 - LOG_ID_L2TPD_CLIENT_DISCON

Message ID: 40019


Message Description: LOG_ID_L2TPD_CLIENT_DISCON
Message Meaning: L2TP client disconnected
Type: Event
Category: VPN
Severity: Information

FortiOS 7.2.1 Log Reference 902


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

status Status string 23

40021 - LOG_ID_PPTP_NOT_CONIG

Message ID: 40021


Message Description: LOG_ID_PPTP_NOT_CONIG
Message Meaning: PPTP not configured in VDOM
Type: Event
Category: VPN
Severity: Debug

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 903


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

status Status string 23

40022 - LOG_ID_PPTP_NO_IP_AVAIL

Message ID: 40022


Message Description: LOG_ID_PPTP_NO_IP_AVAIL
Message Meaning: PPTP IP addresses unavailable
Type: Event
Category: VPN
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

status Status string 23

FortiOS 7.2.1 Log Reference 904


Fortinet Inc.
40024 - LOG_ID_PPTP_OUT_MEM

Message ID: 40024


Message Description: LOG_ID_PPTP_OUT_MEM
Message Meaning: PPTP config list insufficient memory
Type: Event
Category: VPN
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

status Status string 23

40034 - LOG_ID_PPTP_START

Message ID: 40034


Message Description: LOG_ID_PPTP_START
Message Meaning: PPTP daemon started
Type: Event
Category: VPN
Severity: Notice

FortiOS 7.2.1 Log Reference 905


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

status Status string 23

40035 - LOG_ID_PPTP_START_FAIL

Message ID: 40035


Message Description: LOG_ID_PPTP_START_FAIL
Message Meaning: PPTP daemon failed to start
Type: Event
Category: VPN
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 906


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

status Status string 23

reason Reason string 256

40036 - LOG_ID_PPTP_EXIT

Message ID: 40036


Message Description: LOG_ID_PPTP_EXIT
Message Meaning: PPTP daemon exited
Type: Event
Category: VPN
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

status Status string 23

FortiOS 7.2.1 Log Reference 907


Fortinet Inc.
40037 - LOG_ID_PPTPD_SVR_DISCON

Message ID: 40037


Message Description: LOG_ID_PPTPD_SVR_DISCON
Message Meaning: PPTP daemon disconnected
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

status Status string 23

reason Reason string 256

40038 - LOG_ID_PPTPD_CLIENT_CON

Message ID: 40038


Message Description: LOG_ID_PPTPD_CLIENT_CON
Message Meaning: PPTP client connected
Type: Event
Category: VPN
Severity: Information

FortiOS 7.2.1 Log Reference 908


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

status Status string 23

40039 - LOG_ID_PPTPD_CLIENT_DISCON

Message ID: 40039


Message Description: LOG_ID_PPTPD_CLIENT_DISCON
Message Meaning: PPTP client disconnected
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 909


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

status Status string 23

40101 - LOG_ID_L2TP_TUNNEL_UP

Message ID: 40101


Message Description: LOG_ID_L2TP_TUNNEL_UP
Message Meaning: L2TP tunnel up
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

FortiOS 7.2.1 Log Reference 910


Fortinet Inc.
Log Field Name Description Data Type Length

remip IPsec VPN remote gateway IP address ip 39

tunnelip IPsec VPN tunnel IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

40102 - LOG_ID_L2TP_TUNNEL_DOWN

Message ID: 40102


Message Description: LOG_ID_L2TP_TUNNEL_DOWN
Message Meaning: L2TP tunnel down
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

tunnelip IPsec VPN tunnel IP address ip 39

FortiOS 7.2.1 Log Reference 911


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

40103 - LOG_ID_L2TP_TUNNEL_STAT

Message ID: 40103


Message Description: LOG_ID_L2TP_TUNNEL_STAT
Message Meaning: L2TP tunnel status
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

remip IPsec VPN remote gateway IP address ip 39

tunnelip IPsec VPN tunnel IP address ip 39

user User name of authenticated user string 256

group User group Name string 512

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 912


Fortinet Inc.
40114 - LOG_ID_L2TPD_START

Message ID: 40114


Message Description: LOG_ID_L2TPD_START
Message Meaning: L2TP daemon started
Type: Event
Category: VPN
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

status Status string 23

40115 - LOG_ID_L2TPD_EXIT

Message ID: 40115


Message Description: LOG_ID_L2TPD_EXIT
Message Meaning: L2TP daemon exited
Type: Event
Category: VPN
Severity: Notice

FortiOS 7.2.1 Log Reference 913


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

status Status string 23

40118 - LOG_ID_L2TPD_CLIENT_CON

Message ID: 40118


Message Description: LOG_ID_L2TPD_CLIENT_CON
Message Meaning: L2TP client connected
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 914


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

status Status string 23

40704 - LOG_ID_EVENT_SYS_PERF

Message ID: 40704


Message Description: LOG_ID_EVENT_SYS_PERF
Message Meaning: System performance statistics
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 915


Fortinet Inc.
Log Field Name Description Data Type Length

name Display Name of the Connection string 128

sn Serial Number string 64

cpu CPU Usage uint8 3

mem Memory Usage uint8 3

totalsession Total Number of Sessions uint32 10

disk Disk Usage uint8 3

bandwidth Bandwidth string 42

setuprate Session Setup Rate uint64 20

disklograte Disk Log Rate uint64 20

fazlograte FortiAnalyzer Logging Rate uint64 20

freediskstorage uint32 10

sysuptime uint32 10

waninfo string 512

This log message is only sent to remote FortiAnalyzer and memory, but not to disk.

40705 - LOG_ID_EVENT_SYS_CPU_USAGE

Message ID: 40705


Message Description: LOG_ID_EVENT_SYS_CPU_USAGE
Message Meaning: CPU usage statistics
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 916


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

cpu CPU Usage uint8 3

40706 - LOG_ID_EVENT_SYS_BROKEN_SYMBOLIC_LINK

Message ID: 40706


Message Description: LOG_ID_EVENT_SYS_BROKEN_SYMBOLIC_LINK
Message Meaning: Delete broken symbolic link
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 917


Fortinet Inc.
40960 - LOGID_EVENT_WAD_WEBPROXY_FWD_SRV_ERROR

Message ID: 40960


Message Description: LOGID_EVENT_WAD_WEBPROXY_FWD_SRV_ERROR
Message Meaning: Web proxy forward server error
Type: Event
Category: WAD
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

fwserver_name WAD forward server name string 32

addr_type Address Type string 4

ip ip 39

fqdn Fully Qualified Domain Name string 256

port Port Number uint16 5

msg Log Message string 4096

41000 - LOG_ID_UPD_FGT_SUCC

Message ID: 41000


Message Description: LOG_ID_UPD_FGT_SUCC
Message Meaning: FortiGate update succeeded
Type: Event
Category: SYSTEM

FortiOS 7.2.1 Log Reference 918


Fortinet Inc.
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

41001 - LOG_ID_UPD_FGT_FAIL

Message ID: 41001


Message Description: LOG_ID_UPD_FGT_FAIL
Message Meaning: FortiGate update failed
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 919


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

41002 - LOG_ID_UPD_SRC_VIS

Message ID: 41002


Message Description: LOG_ID_UPD_SRC_VIS
Message Meaning: Source visibility signature package updated
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

41006 - LOG_ID_UPD_FSA_VIRDB

Message ID: 41006

FortiOS 7.2.1 Log Reference 920


Fortinet Inc.
Message Description: LOG_ID_UPD_FSA_VIRDB
Message Meaning: FortiSandbox AV database updated
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

version Version string 64

41007 - LOG_ID_UPD_MANUAL_LICENSE_SUCC

Message ID: 41007


Message Description: LOG_ID_UPD_MANUAL_LICENSE_SUCC
Message Meaning: FortiGate Manual License update
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 921


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

41008 - LOG_ID_UPD_MANUAL_LICENSE_FAIL

Message ID: 41008


Message Description: LOG_ID_UPD_MANUAL_LICENSE_FAIL
Message Meaning: FortiGate Manual License is invalid
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

FortiOS 7.2.1 Log Reference 922


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

msg Log Message string 4096

41009 - LOG_ID_UPD_DB_SIGN_INVALID

Message ID: 41009


Message Description: LOG_ID_UPD_DB_SIGN_INVALID
Message Meaning: FortiGate database signature invalid
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

status Status string 23

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 923


Fortinet Inc.
41010 - LOG_ID_UPD_DB_SIGN_PASSED

Message ID: 41010


Message Description: LOG_ID_UPD_DB_SIGN_PASSED
Message Meaning: FortiGate database signature check passed
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

41984 - LOG_ID_EVENT_VPN_CERT_LOAD

Message ID: 41984


Message Description: LOG_ID_EVENT_VPN_CERT_LOAD
Message Meaning: Certificate loaded
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

FortiOS 7.2.1 Log Reference 924


Fortinet Inc.
Log Field Name Description Data Type Length

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

user User name of authenticated user string 256

msg Log Message string 4096

status Status string 23

ui User Interface string 64

name Display Name of the Connection string 128

cert-type Certification type string 6

41985 - LOG_ID_EVENT_VPN_CERT_REMOVAL

Message ID: 41985


Message Description: LOG_ID_EVENT_VPN_CERT_REMOVAL
Message Meaning: Certificate removed
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 925


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

user User name of authenticated user string 256

msg Log Message string 4096

status Status string 23

ui User Interface string 64

name Display Name of the Connection string 128

cert-type Certification type string 6

41986 - LOG_ID_EVENT_VPN_CERT_REGEN

Message ID: 41986


Message Description: LOG_ID_EVENT_VPN_CERT_REGEN
Message Meaning: Certificate regenerated
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 926


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

user User name of authenticated user string 256

msg Log Message string 4096

status Status string 23

ui User Interface string 64

name Display Name of the Connection string 128

cert-type Certification type string 6

41987 - LOG_ID_EVENT_VPN_CERT_UPDATE

Message ID: 41987


Message Description: LOG_ID_EVENT_VPN_CERT_UPDATE
Message Meaning: Certificate updated
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

FortiOS 7.2.1 Log Reference 927


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

status Status string 23

reason Reason string 256

name Display Name of the Connection string 128

cert-type Certification type string 6

method Method string 64

41988 - LOG_ID_EVENT_SSL_VPN_SETTING_UPDATE

Message ID: 41988


Message Description: LOG_ID_EVENT_SSL_VPN_SETTING_UPDATE
Message Meaning: SSL setting changed
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

user User name of authenticated user string 256

FortiOS 7.2.1 Log Reference 928


Fortinet Inc.
Log Field Name Description Data Type Length

msg Log Message string 4096

ui User Interface string 64

41989 - LOG_ID_EVENT_VPN_CERT_ERR

Message ID: 41989


Message Description: LOG_ID_EVENT_VPN_CERT_ERR
Message Meaning: Certificate error
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

status Status string 23

name Display Name of the Connection string 128

cert-type Certification type string 6

method Method string 64

41990 - LOG_ID_EVENT_VPN_CERT_UPDATE_FAILED

Message ID: 41990

FortiOS 7.2.1 Log Reference 929


Fortinet Inc.
Message Description: LOG_ID_EVENT_VPN_CERT_UPDATE_FAILED
Message Meaning: Certificate update failed
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

status Status string 23

reason Reason string 256

name Display Name of the Connection string 128

cert-type Certification type string 6

method Method string 64

41991 - LOG_ID_EVENT_VPN_CERT_EXPORT

Message ID: 41991


Message Description: LOG_ID_EVENT_VPN_CERT_EXPORT
Message Meaning: Certificate exported
Type: Event
Category: VPN
Severity: Information

FortiOS 7.2.1 Log Reference 930


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

user User name of authenticated user string 256

msg Log Message string 4096

status Status string 23

ui User Interface string 64

name Display Name of the Connection string 128

cert-type Certification type string 6

41992 - LOG_ID_EVENT_VPN_CERT_CRL_EXPIRED

Message ID: 41992


Message Description: LOG_ID_EVENT_VPN_CERT_CRL_EXPIRED
Message Meaning: CRL certificate file is expired
Type: Event
Category: VPN
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 931


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

status Status string 23

name Display Name of the Connection string 128

cert-type Certification type string 6

method Method string 64

42201 - LOG_ID_NETX_VMX_ATTACH

Message ID: 42201


Message Description: LOG_ID_NETX_VMX_ATTACH
Message Meaning: VMX instance successfully attached
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 932


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

42202 - LOG_ID_NETX_VMX_DETACH

Message ID: 42202


Message Description: LOG_ID_NETX_VMX_DETACH
Message Meaning: VMX instance successfully detached
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

42203 - LOG_ID_NETX_VMX_DENIED

Message ID: 42203


Message Description: LOG_ID_NETX_VMX_DENIED
Message Meaning: VMX instance successfully denied

FortiOS 7.2.1 Log Reference 933


Fortinet Inc.
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

43008 - LOG_ID_EVENT_AUTH_SUCCESS

Message ID: 43008


Message Description: LOG_ID_EVENT_AUTH_SUCCESS
Message Meaning: Authentication success
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 934


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

authproto The protocol that initiated the authentication string 512

action Policy Action string 65

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

reason Reason string 256

dstip Destination IP ip 39

policyid Policy ID uint32 10

interface Interface string 32

group User group Name string 512

43009 - LOG_ID_EVENT_AUTH_FAILED

Message ID: 43009


Message Description: LOG_ID_EVENT_AUTH_FAILED
Message Meaning: Authentication failed
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 935


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

authproto The protocol that initiated the authentication string 512

action Policy Action string 65

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

reason Reason string 256

dstip Destination IP ip 39

policyid Policy ID uint32 10

interface Interface string 32

group User group Name string 512

43010 - LOG_ID_EVENT_AUTH_LOCKOUT

Message ID: 43010


Message Description: LOG_ID_EVENT_AUTH_LOCKOUT
Message Meaning: Authentication lockout
Type: Event
Category: USER
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 936


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

authproto The protocol that initiated the authentication string 512

action Policy Action string 65

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

reason Reason string 256

dstip Destination IP ip 39

policyid Policy ID uint32 10

interface Interface string 32

group User group Name string 512

authid string 36

43011 - LOG_ID_EVENT_AUTH_TIME_OUT

Message ID: 43011


Message Description: LOG_ID_EVENT_AUTH_TIME_OUT
Message Meaning: Authentication timed out
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 937


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

authproto The protocol that initiated the authentication string 512

action Policy Action string 65

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

reason Reason string 256

dstip Destination IP ip 39

policyid Policy ID uint32 10

interface Interface string 32

group User group Name string 512

authserver Remote Authentication server string 64

43014 - LOG_ID_EVENT_AUTH_FSAE_LOGON

Message ID: 43014


Message Description: LOG_ID_EVENT_AUTH_FSAE_LOGON
Message Meaning: FSSO logon authentication status
Type: Event
Category: USER
Severity: Notice

FortiOS 7.2.1 Log Reference 938


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

srcip Source IP ip 39

server AD server FQDN or IP string 64

43015 - LOG_ID_EVENT_AUTH_FSAE_LOGOFF

Message ID: 43015


Message Description: LOG_ID_EVENT_AUTH_FSAE_LOGOFF
Message Meaning: FSSO log off authentication status
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 939


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

srcip Source IP ip 39

server AD server FQDN or IP string 64

43016 - LOG_ID_EVENT_AUTH_NTLM_AUTH_SUCCESS

Message ID: 43016


Message Description: LOG_ID_EVENT_AUTH_NTLM_AUTH_SUCCESS
Message Meaning: NTLM authentication successful
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

FortiOS 7.2.1 Log Reference 940


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc Log Description string 4096

user User name of authenticated user string 256

authproto The protocol that initiated the authentication string 512

action Policy Action string 65

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

reason Reason string 256

dstip Destination IP ip 39

policyid Policy ID uint32 10

group User group Name string 512

adgroup AD Group Name of FSSO user string 128

43017 - LOG_ID_EVENT_AUTH_NTLM_AUTH_FAIL

Message ID: 43017


Message Description: LOG_ID_EVENT_AUTH_NTLM_AUTH_FAIL
Message Meaning: NTLM authentication failed
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 941


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

authproto The protocol that initiated the authentication string 512

action Policy Action string 65

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

reason Reason string 256

dstip Destination IP ip 39

policyid Policy ID uint32 10

group User group Name string 512

adgroup AD Group Name of FSSO user string 128

43018 - LOG_ID_EVENT_AUTH_FGOVRD_FAIL

Message ID: 43018


Message Description: LOG_ID_EVENT_AUTH_FGOVRD_FAIL
Message Meaning: FortiGuard override failed
Type: Event
Category: USER
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 942


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

reason Reason string 256

dstip Destination IP ip 39

initiator Original login user name for Fortiguard override string 64

43020 - LOG_ID_EVENT_AUTH_FGOVRD_SUCCESS

Message ID: 43020


Message Description: LOG_ID_EVENT_AUTH_FGOVRD_SUCCESS
Message Meaning: FortiGuard override successful
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

FortiOS 7.2.1 Log Reference 943


Fortinet Inc.
Log Field Name Description Data Type Length

msg Log Message string 4096

srcip Source IP ip 39

reason Reason string 256

dstip Destination IP ip 39

initiator Original login user name for Fortiguard override string 64

scope FortiGuard Override Scope string 16

expiry FortiGuard override expiry timestamp string 64

oldwprof Old Web Filter Profile string 64

43025 - LOG_ID_EVENT_AUTH_PROXY_SUCCESS

Message ID: 43025


Message Description: LOG_ID_EVENT_AUTH_PROXY_SUCCESS
Message Meaning: Explicit proxy authentication successful
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

authproto The protocol that initiated the authentication string 512

FortiOS 7.2.1 Log Reference 944


Fortinet Inc.
Log Field Name Description Data Type Length

action Policy Action string 65

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

reason Reason string 256

dstip Destination IP ip 39

group User group Name string 512

authid string 36

43026 - LOG_ID_EVENT_AUTH_PROXY_FAILED

Message ID: 43026


Message Description: LOG_ID_EVENT_AUTH_PROXY_FAILED
Message Meaning: Explicit proxy authentication failed
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

authproto The protocol that initiated the authentication string 512

FortiOS 7.2.1 Log Reference 945


Fortinet Inc.
Log Field Name Description Data Type Length

action Policy Action string 65

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

reason Reason string 256

dstip Destination IP ip 39

group User group Name string 512

authid string 36

43027 - LOG_ID_EVENT_AUTH_PROXY_TIME_OUT

Message ID: 43027


Message Description: LOG_ID_EVENT_AUTH_PROXY_TIME_OUT
Message Meaning: Explicit proxy authentication timed out
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

authproto The protocol that initiated the authentication string 512

FortiOS 7.2.1 Log Reference 946


Fortinet Inc.
Log Field Name Description Data Type Length

action Policy Action string 65

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

reason Reason string 256

dstip Destination IP ip 39

43028 - LOG_ID_EVENT_AUTH_PROXY_GROUP_INFO_FAILED

Message ID: 43028


Message Description: LOG_ID_EVENT_AUTH_PROXY_GROUP_INFO_FAILED
Message Meaning: Explicit proxy user group query failed
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

authproto The protocol that initiated the authentication string 512

action Policy Action string 65

status Status string 23

FortiOS 7.2.1 Log Reference 947


Fortinet Inc.
Log Field Name Description Data Type Length

msg Log Message string 4096

srcip Source IP ip 39

reason Reason string 256

dstip Destination IP ip 39

group User group Name string 512

authid string 36

43029 - LOG_ID_EVENT_AUTH_WARNING_SUCCESS

Message ID: 43029


Message Description: LOG_ID_EVENT_AUTH_WARNING_SUCCESS
Message Meaning: FortiGuard authentication override successful
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

reason Reason string 256

FortiOS 7.2.1 Log Reference 948


Fortinet Inc.
Log Field Name Description Data Type Length

dstip Destination IP ip 39

initiator Original login user name for Fortiguard override string 64

scope FortiGuard Override Scope string 16

expiry FortiGuard override expiry timestamp string 64

oldwprof Old Web Filter Profile string 64

category Log category uint32 10

43030 - LOG_ID_EVENT_AUTH_WARNING_TBL_FULL

Message ID: 43030


Message Description: LOG_ID_EVENT_AUTH_WARNING_TBL_FULL
Message Meaning: FortiGuard authentication override failed
Type: Event
Category: USER
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

reason Reason string 256

FortiOS 7.2.1 Log Reference 949


Fortinet Inc.
Log Field Name Description Data Type Length

dstip Destination IP ip 39

initiator Original login user name for Fortiguard override string 64

43032 - LOG_ID_EVENT_AUTH_PROXY_USER_LIMIT_REACHED

Message ID: 43032


Message Description: LOG_ID_EVENT_AUTH_PROXY_USER_LIMIT_REACHED
Message Meaning: Explicit proxy authentication user limit reached
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

authproto The protocol that initiated the authentication string 512

action Policy Action string 65

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

reason Reason string 256

dstip Destination IP ip 39

FortiOS 7.2.1 Log Reference 950


Fortinet Inc.
Log Field Name Description Data Type Length

group User group Name string 512

authid string 36

43033 - LOG_ID_EVENT_AUTH_PROXY_MULTIPLE_LOGIN

Message ID: 43033


Message Description: LOG_ID_EVENT_AUTH_PROXY_MULTIPLE_LOGIN
Message Meaning: Explicit proxy authentication user concurrent check failed
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

authproto The protocol that initiated the authentication string 512

action Policy Action string 65

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

reason Reason string 256

dstip Destination IP ip 39

FortiOS 7.2.1 Log Reference 951


Fortinet Inc.
Log Field Name Description Data Type Length

group User group Name string 512

authid string 36

43034 - LOG_ID_EVENT_AUTH_PROXY_NO_RESP

Message ID: 43034


Message Description: LOG_ID_EVENT_AUTH_PROXY_NO_RESP
Message Meaning: Explicit proxy authentication no response
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

dstip Destination IP ip 39

policyid Policy ID uint32 10

url URL string 512

agent SNMP agent string 1024

FortiOS 7.2.1 Log Reference 952


Fortinet Inc.
43037 - LOG_ID_EVENT_AUTH_IPV4_FLUSH

Message ID: 43037


Message Description: LOG_ID_EVENT_AUTH_IPV4_FLUSH
Message Meaning: Authentication IPv4 logon flush
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

43038 - LOG_ID_EVENT_AUTH_IPV6_FLUSH

Message ID: 43038


Message Description: LOG_ID_EVENT_AUTH_IPV6_FLUSH
Message Meaning: Authentication IPv6 logon flush
Type: Event
Category: USER
Severity: Notice

FortiOS 7.2.1 Log Reference 953


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

43039 - LOG_ID_EVENT_AUTH_LOGON

Message ID: 43039


Message Description: LOG_ID_EVENT_AUTH_LOGON
Message Meaning: Authentication logon
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 954


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

authserver Remote Authentication server string 64

43040 - LOG_ID_EVENT_AUTH_LOGOUT

Message ID: 43040


Message Description: LOG_ID_EVENT_AUTH_LOGOUT
Message Meaning: Authentication logout
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 955


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

action Policy Action string 65

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

authserver Remote Authentication server string 64

43041 - LOG_ID_EVENT_AUTH_DISCLAIMER_ACCEPT

Message ID: 43041


Message Description: LOG_ID_EVENT_AUTH_DISCLAIMER_ACCEPT
Message Meaning: Disclaimer accepted
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

authproto The protocol that initiated the authentication string 512

action Policy Action string 65

status Status string 23

FortiOS 7.2.1 Log Reference 956


Fortinet Inc.
Log Field Name Description Data Type Length

msg Log Message string 4096

srcip Source IP ip 39

reason Reason string 256

dstip Destination IP ip 39

policyid Policy ID uint32 10

interface Interface string 32

group User group Name string 512

43042 - LOG_ID_EVENT_AUTH_DISCLAIMER_DECLINE

Message ID: 43042


Message Description: LOG_ID_EVENT_AUTH_DISCLAIMER_DECLINE
Message Meaning: Disclaimer declined
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

authproto The protocol that initiated the authentication string 512

action Policy Action string 65

FortiOS 7.2.1 Log Reference 957


Fortinet Inc.
Log Field Name Description Data Type Length

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

reason Reason string 256

dstip Destination IP ip 39

policyid Policy ID uint32 10

interface Interface string 32

group User group Name string 512

43043 - LOG_ID_EVENT_AUTH_EMAIL_COLLECTING_SUCCESS

Message ID: 43043


Message Description: LOG_ID_EVENT_AUTH_EMAIL_COLLECTING_SUCCESS
Message Meaning: Email collecting succeeded
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

authproto The protocol that initiated the authentication string 512

FortiOS 7.2.1 Log Reference 958


Fortinet Inc.
Log Field Name Description Data Type Length

action Policy Action string 65

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

reason Reason string 256

dstip Destination IP ip 39

policyid Policy ID uint32 10

interface Interface string 32

group User group Name string 512

43044 - LOG_ID_EVENT_AUTH_EMAIL_COLLECTING_FAIL

Message ID: 43044


Message Description: LOG_ID_EVENT_AUTH_EMAIL_COLLECTING_FAIL
Message Meaning: Email collecting failed
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

FortiOS 7.2.1 Log Reference 959


Fortinet Inc.
Log Field Name Description Data Type Length

authproto The protocol that initiated the authentication string 512

action Policy Action string 65

status Status string 23

msg Log Message string 4096

srcip Source IP ip 39

reason Reason string 256

dstip Destination IP ip 39

policyid Policy ID uint32 10

interface Interface string 32

group User group Name string 512

43045 - LOG_ID_EVENT_AUTH_8021X_SUCCESS

Message ID: 43045


Message Description: LOG_ID_EVENT_AUTH_8021X_SUCCESS
Message Meaning: 802.1x authentication succeeded
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 960


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

action Policy Action string 65

status Status string 23

msg Log Message string 4096

reason Reason string 256

interface Interface string 32

stamac The MAC address of wifi station string 17

43046 - LOG_ID_EVENT_AUTH_8021X_FAIL

Message ID: 43046


Message Description: LOG_ID_EVENT_AUTH_8021X_FAIL
Message Meaning: 802.1x authentication failed
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

status Status string 23

FortiOS 7.2.1 Log Reference 961


Fortinet Inc.
Log Field Name Description Data Type Length

msg Log Message string 4096

reason Reason string 256

interface Interface string 32

stamac The MAC address of wifi station string 17

43050 - LOG_ID_EVENT_AUTH_FSAE_CONNECT

Message ID: 43050


Message Description: LOG_ID_EVENT_AUTH_FSAE_CONNECT
Message Meaning: FSSO server connected
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

server AD server FQDN or IP string 64

43051 - LOG_ID_EVENT_AUTH_FSAE_DISCONNECT

Message ID: 43051


Message Description: LOG_ID_EVENT_AUTH_FSAE_DISCONNECT

FortiOS 7.2.1 Log Reference 962


Fortinet Inc.
Message Meaning: FSSO server disconnected
Type: Event
Category: USER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

server AD server FQDN or IP string 64

43520 - LOG_ID_EVENT_WIRELESS_SYS

Message ID: 43520


Message Description: LOG_ID_EVENT_WIRELESS_SYS
Message Meaning: Wireless system activity
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 963


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

43521 - LOG_ID_EVENT_WIRELESS_ROGUE

Message ID: 43521


Message Description: LOG_ID_EVENT_WIRELESS_ROGUE
Message Meaning: Rogue AP activity
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 964


Fortinet Inc.
Log Field Name Description Data Type Length

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

bssid Basic service set ID string 17

aptype The AP type is Ad-hoc mode or regular AP mode uint8 3

rate WiFi band width rate uint16 6

radioband The operating radio band string 64

channel Channel uint8 3

manuf Manufacturer name string 20

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

noise WiFi signal noise level int8 4

live Time in seconds uint32 10

age Time in seconds - time passed since last seen uint32 10

onwire The rogue ap is onwire or not string 3

detectionmethod Detection Method string 21

stamac The MAC address of wifi station string 17

apscan The name of AP to detect rogue ap string 36

sndetected SN of the AP which detected the rogue AP string 36

radioiddetected The radio ID on the AP which detected the rogue ap uint8 3

stacount The count of wifi stations uint32 10

snclosest SN of the AP closest to the rogue AP string 36

radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3

apstatus Rogue AP status like unclassify(0), rogue(1), accept(2), uint8 3


suppress(3)

43522 - LOG_ID_EVENT_WIRELESS_WTP

Message ID: 43522


Message Description: LOG_ID_EVENT_WIRELESS_WTP
Message Meaning: Physical AP activity
Type: Event

FortiOS 7.2.1 Log Reference 965


Fortinet Inc.
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

sn Serial Number string 64

ap Access Point string 36

profile Profile Name string 64

ip ip 39

meshmode Mesh mode string 19

snmeshparent SN of the mesh parent string 36

reason Reason string 256

43524 - LOG_ID_EVENT_WIRELESS_STA

Message ID: 43524


Message Description: LOG_ID_EVENT_WIRELESS_STA
Message Meaning: Wireless client activity
Type: Event
Category: WIRELESS
Severity: Notice

FortiOS 7.2.1 Log Reference 966


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

group User group Name string 512

authserver Remote Authentication server string 64

srcip Source IP ip 39

snr int8 4

mpsk Multiple pre-shared keys string 33

FortiOS 7.2.1 Log Reference 967


Fortinet Inc.
43525 - LOG_ID_EVENT_WIRELESS_ONWIRE

Message ID: 43525


Message Description: LOG_ID_EVENT_WIRELESS_ONWIRE
Message Meaning: Rogue AP on wire
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

bssid Basic service set ID string 17

aptype The AP type is Ad-hoc mode or regular AP mode uint8 3

rate WiFi band width rate uint16 6

radioband The operating radio band string 64

channel Channel uint8 3

manuf Manufacturer name string 20

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

FortiOS 7.2.1 Log Reference 968


Fortinet Inc.
Log Field Name Description Data Type Length

noise WiFi signal noise level int8 4

live Time in seconds uint32 10

age Time in seconds - time passed since last seen uint32 10

onwire The rogue ap is onwire or not string 3

detectionmethod Detection Method string 21

stamac The MAC address of wifi station string 17

apscan The name of AP to detect rogue ap string 36

sndetected SN of the AP which detected the rogue AP string 36

radioiddetected The radio ID on the AP which detected the rogue ap uint8 3

stacount The count of wifi stations uint32 10

snclosest SN of the AP closest to the rogue AP string 36

radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3

apstatus Rogue AP status like unclassify(0), rogue(1), accept(2), uint8 3


suppress(3)

43526 - LOG_ID_EVENT_WIRELESS_WTPR

Message ID: 43526


Message Description: LOG_ID_EVENT_WIRELESS_WTPR
Message Meaning: Physical AP radio activity
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 969


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

sn Serial Number string 64

ap Access Point string 36

ip ip 39

radioid The operating radio ID uint8 3

bandwidth Bandwidth string 42

configcountry Config Country string 4

opercountry The name of operating country on a AP string 4

cfgtxpower Config TX power uint32 10

opertxpower The value of operating tx power uint32 10

slctdrmamode string 10

operdrmamode string 10

43527 - LOG_ID_EVENT_WIRELESS_ROGUE_CFG

Message ID: 43527


Message Description: LOG_ID_EVENT_WIRELESS_ROGUE_CFG
Message Meaning: Rogue AP status configured
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 970


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

bssid Basic service set ID string 17

apstatus Rogue AP status like unclassify(0), rogue(1), accept(2), uint8 3


suppress(3)

43528 - LOG_ID_EVENT_WIRELESS_WTPR_ERROR

Message ID: 43528


Message Description: LOG_ID_EVENT_WIRELESS_WTPR_ERROR
Message Meaning: Physical AP radio error activity
Type: Event
Category: WIRELESS
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 971


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

sn Serial Number string 64

ap Access Point string 36

ip ip 39

radioid The operating radio ID uint8 3

bandwidth Bandwidth string 42

configcountry Config Country string 4

opercountry The name of operating country on a AP string 4

cfgtxpower Config TX power uint32 10

opertxpower The value of operating tx power uint32 10

slctdrmamode string 10

operdrmamode string 10

43529 - LOG_ID_EVENT_WIRELESS_CLB

Message ID: 43529


Message Description: LOG_ID_EVENT_WIRELESS_CLB
Message Meaning: Wireless client load balancing
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 972


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

stamac The MAC address of wifi station string 17

stacount The count of wifi stations uint32 10

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

43530 - LOG_ID_EVENT_WIRELESS_WIDS_WL_BRIDGE

Message ID: 43530


Message Description: LOG_ID_EVENT_WIRELESS_WIDS_WL_BRIDGE
Message Meaning: Wireless bridge intrusion detected
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 973


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

bssid Basic service set ID string 17

channel Channel uint8 3

manuf Manufacturer name string 20

live Time in seconds uint32 10

age Time in seconds - time passed since last seen uint32 10

sndetected SN of the AP which detected the rogue AP string 36

radioiddetected The radio ID on the AP which detected the rogue ap uint8 3

threattype WIDS threat type string 64

rssi The value of Received signal strength indicator uint8 3

frametype Frame Type string 32

ds Direction with distribution system string 8

seq Sequence string 512

encrypt The packet is encrypted or not uint8 3

tamac The MAC address of Transmitter. If none, then Receiver string 17

43531 - LOG_ID_EVENT_WIRELESS_WIDS_BR_DEAUTH

Message ID: 43531


Message Description: LOG_ID_EVENT_WIRELESS_WIDS_BR_DEAUTH
Message Meaning: Wireless broadcasting deauthentication detected
Type: Event
Category: WIRELESS
Severity: Notice

FortiOS 7.2.1 Log Reference 974


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

bssid Basic service set ID string 17

channel Channel uint8 3

manuf Manufacturer name string 20

live Time in seconds uint32 10

age Time in seconds - time passed since last seen uint32 10

sndetected SN of the AP which detected the rogue AP string 36

radioiddetected The radio ID on the AP which detected the rogue ap uint8 3

threattype WIDS threat type string 64

rssi The value of Received signal strength indicator uint8 3

frametype Frame Type string 32

ds Direction with distribution system string 8

seq Sequence string 512

encrypt The packet is encrypted or not uint8 3

tamac The MAC address of Transmitter. If none, then Receiver string 17

43532 - LOG_ID_EVENT_WIRELESS_WIDS_NL_PBRESP

Message ID: 43532


Message Description: LOG_ID_EVENT_WIRELESS_WIDS_NL_PBRESP

FortiOS 7.2.1 Log Reference 975


Fortinet Inc.
Message Meaning: Wireless null SSID probe response detected
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

bssid Basic service set ID string 17

channel Channel uint8 3

manuf Manufacturer name string 20

live Time in seconds uint32 10

age Time in seconds - time passed since last seen uint32 10

sndetected SN of the AP which detected the rogue AP string 36

radioiddetected The radio ID on the AP which detected the rogue ap uint8 3

threattype WIDS threat type string 64

rssi The value of Received signal strength indicator uint8 3

frametype Frame Type string 32

ds Direction with distribution system string 8

seq Sequence string 512

encrypt The packet is encrypted or not uint8 3

tamac The MAC address of Transmitter. If none, then Receiver string 17

FortiOS 7.2.1 Log Reference 976


Fortinet Inc.
43533 - LOG_ID_EVENT_WIRELESS_WIDS_MAC_OUI

Message ID: 43533


Message Description: LOG_ID_EVENT_WIRELESS_WIDS_MAC_OUI
Message Meaning: Wireless invalid MAC OUI detected
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

bssid Basic service set ID string 17

channel Channel uint8 3

manuf Manufacturer name string 20

live Time in seconds uint32 10

age Time in seconds - time passed since last seen uint32 10

sndetected SN of the AP which detected the rogue AP string 36

radioiddetected The radio ID on the AP which detected the rogue ap uint8 3

threattype WIDS threat type string 64

rssi The value of Received signal strength indicator uint8 3

frametype Frame Type string 32

FortiOS 7.2.1 Log Reference 977


Fortinet Inc.
Log Field Name Description Data Type Length

ds Direction with distribution system string 8

seq Sequence string 512

encrypt The packet is encrypted or not uint8 3

tamac The MAC address of Transmitter. If none, then Receiver string 17

invalidmac Detected MAC address with invalid OUI string 17

43534 - LOG_ID_EVENT_WIRELESS_WIDS_LONG_DUR

Message ID: 43534


Message Description: LOG_ID_EVENT_WIRELESS_WIDS_LONG_DUR
Message Meaning: Wireless long duration attack detected
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

bssid Basic service set ID string 17

channel Channel uint8 3

manuf Manufacturer name string 20

FortiOS 7.2.1 Log Reference 978


Fortinet Inc.
Log Field Name Description Data Type Length

live Time in seconds uint32 10

age Time in seconds - time passed since last seen uint32 10

sndetected SN of the AP which detected the rogue AP string 36

radioiddetected The radio ID on the AP which detected the rogue ap uint8 3

threattype WIDS threat type string 64

rssi The value of Received signal strength indicator uint8 3

frametype Frame Type string 32

ds Direction with distribution system string 8

seq Sequence string 512

encrypt The packet is encrypted or not uint8 3

tamac The MAC address of Transmitter. If none, then Receiver string 17

duration Duration of the last threatening packed captured from TA uint32 10

43535 - LOG_ID_EVENT_WIRELESS_WIDS_WEP_IV

Message ID: 43535


Message Description: LOG_ID_EVENT_WIRELESS_WIDS_WEP_IV
Message Meaning: Wireless Weak WEP IV detected
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 979


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

bssid Basic service set ID string 17

channel Channel uint8 3

manuf Manufacturer name string 20

live Time in seconds uint32 10

age Time in seconds - time passed since last seen uint32 10

sndetected SN of the AP which detected the rogue AP string 36

radioiddetected The radio ID on the AP which detected the rogue ap uint8 3

threattype WIDS threat type string 64

rssi The value of Received signal strength indicator uint8 3

frametype Frame Type string 32

ds Direction with distribution system string 8

seq Sequence string 512

encrypt The packet is encrypted or not uint8 3

tamac The MAC address of Transmitter. If none, then Receiver string 17

weakwepiv Weak Wep Initiation Vector string 8

43542 - LOG_ID_EVENT_WIRELESS_WIDS_EAPOL_FLOOD

Message ID: 43542


Message Description: LOG_ID_EVENT_WIRELESS_WIDS_EAPOL_FLOOD
Message Meaning: Wireless EAPOL packet flooding detected
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 980


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

manuf Manufacturer name string 20

live Time in seconds uint32 10

sndetected SN of the AP which detected the rogue AP string 36

radioiddetected The radio ID on the AP which detected the rogue ap uint8 3

threattype WIDS threat type string 64

tamac The MAC address of Transmitter. If none, then Receiver string 17

eapoltype The packet type of EAPOL string 16

eapolcnt The count of EAPOL packets uint32 10

43544 - LOG_ID_EVENT_WIRELESS_WIDS_MGMT_FLOOD

Message ID: 43544


Message Description: LOG_ID_EVENT_WIRELESS_WIDS_MGMT_FLOOD
Message Meaning: Wireless management flooding detected
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 981


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

bssid Basic service set ID string 17

channel Channel uint8 3

manuf Manufacturer name string 20

live Time in seconds uint32 10

age Time in seconds - time passed since last seen uint32 10

sndetected SN of the AP which detected the rogue AP string 36

radioiddetected The radio ID on the AP which detected the rogue ap uint8 3

threattype WIDS threat type string 64

rssi The value of Received signal strength indicator uint8 3

frametype Frame Type string 32

ds Direction with distribution system string 8

tamac The MAC address of Transmitter. If none, then Receiver string 17

mgmtcnt The number of unauthorized client flooding managemet uint32 10


frames

43546 - LOG_ID_EVENT_WIRELESS_WIDS_SPOOF_DEAUTH

Message ID: 43546


Message Description: LOG_ID_EVENT_WIRELESS_WIDS_SPOOF_DEAUTH
Message Meaning: Wireless spoofed deauthentication detected
Type: Event
Category: WIRELESS

FortiOS 7.2.1 Log Reference 982


Fortinet Inc.
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

bssid Basic service set ID string 17

channel Channel uint8 3

manuf Manufacturer name string 20

live Time in seconds uint32 10

age Time in seconds - time passed since last seen uint32 10

sndetected SN of the AP which detected the rogue AP string 36

radioiddetected The radio ID on the AP which detected the rogue ap uint8 3

threattype WIDS threat type string 64

rssi The value of Received signal strength indicator uint8 3

frametype Frame Type string 32

ds Direction with distribution system string 8

seq Sequence string 512

encrypt The packet is encrypted or not uint8 3

tamac The MAC address of Transmitter. If none, then Receiver string 17

43548 - LOG_ID_EVENT_WIRELESS_WIDS_ASLEAP

Message ID: 43548

FortiOS 7.2.1 Log Reference 983


Fortinet Inc.
Message Description: LOG_ID_EVENT_WIRELESS_WIDS_ASLEAP
Message Meaning: Wireless Asleap attack detected
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

bssid Basic service set ID string 17

channel Channel uint8 3

manuf Manufacturer name string 20

live Time in seconds uint32 10

age Time in seconds - time passed since last seen uint32 10

sndetected SN of the AP which detected the rogue AP string 36

radioiddetected The radio ID on the AP which detected the rogue ap uint8 3

threattype WIDS threat type string 64

rssi The value of Received signal strength indicator uint8 3

frametype Frame Type string 32

ds Direction with distribution system string 8

seq Sequence string 512

encrypt The packet is encrypted or not uint8 3

tamac The MAC address of Transmitter. If none, then Receiver string 17

FortiOS 7.2.1 Log Reference 984


Fortinet Inc.
43550 - LOG_ID_EVENT_WIRELESS_STA_LOCATE

Message ID: 43550


Message Description: LOG_ID_EVENT_WIRELESS_STA_LOCATE
Message Meaning: Wireless station presence detection
Type: Event
Category: WIRELESS
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

radioband The operating radio band string 64

signal The signal value of SSID or client int8 4

noise WiFi signal noise level int8 4

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

radioid The operating radio ID uint8 3

43551 - LOG_ID_EVENT_WIRELESS_WTP_JOIN

Message ID: 43551


Message Description: LOG_ID_EVENT_WIRELESS_WTP_JOIN

FortiOS 7.2.1 Log Reference 985


Fortinet Inc.
Message Meaning: Physical AP join
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

sn Serial Number string 64

ap Access Point string 36

profile Profile Name string 64

ip ip 39

meshmode Mesh mode string 19

snmeshparent SN of the mesh parent string 36

reason Reason string 256

43552 - LOG_ID_EVENT_WIRELESS_WTP_LEAVE

Message ID: 43552


Message Description: LOG_ID_EVENT_WIRELESS_WTP_LEAVE
Message Meaning: Physical AP leave
Type: Event
Category: WIRELESS
Severity: Notice

FortiOS 7.2.1 Log Reference 986


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

sn Serial Number string 64

ap Access Point string 36

profile Profile Name string 64

ip ip 39

meshmode Mesh mode string 19

snmeshparent SN of the mesh parent string 36

reason Reason string 256

43553 - LOG_ID_EVENT_WIRELESS_WTP_FAIL

Message ID: 43553


Message Description: LOG_ID_EVENT_WIRELESS_WTP_FAIL
Message Meaning: Physical AP fail
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

FortiOS 7.2.1 Log Reference 987


Fortinet Inc.
Log Field Name Description Data Type Length

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

sn Serial Number string 64

ap Access Point string 36

profile Profile Name string 64

ip ip 39

meshmode Mesh mode string 19

snmeshparent SN of the mesh parent string 36

reason Reason string 256

43554 - LOG_ID_EVENT_WIRELESS_WTP_UPDATE

Message ID: 43554


Message Description: LOG_ID_EVENT_WIRELESS_WTP_UPDATE
Message Meaning: Physical AP update
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 988


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

sn Serial Number string 64

ap Access Point string 36

profile Profile Name string 64

ip ip 39

meshmode Mesh mode string 19

snmeshparent SN of the mesh parent string 36

reason Reason string 256

43555 - LOG_ID_EVENT_WIRELESS_WTP_RESET

Message ID: 43555


Message Description: LOG_ID_EVENT_WIRELESS_WTP_RESET
Message Meaning: Physical AP reset
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 989


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

sn Serial Number string 64

ap Access Point string 36

profile Profile Name string 64

ip ip 39

meshmode Mesh mode string 19

snmeshparent SN of the mesh parent string 36

reason Reason string 256

43556 - LOG_ID_EVENT_WIRELESS_WTP_KICK

Message ID: 43556


Message Description: LOG_ID_EVENT_WIRELESS_WTP_KICK
Message Meaning: Physical AP kick
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 990


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

sn Serial Number string 64

ap Access Point string 36

profile Profile Name string 64

ip ip 39

meshmode Mesh mode string 19

snmeshparent SN of the mesh parent string 36

reason Reason string 256

43557 - LOG_ID_EVENT_WIRELESS_WTP_ADD_FAILURE

Message ID: 43557


Message Description: LOG_ID_EVENT_WIRELESS_WTP_ADD_FAILURE
Message Meaning: Physical AP add failure
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 991


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

sn Serial Number string 64

ap Access Point string 36

profile Profile Name string 64

ip ip 39

meshmode Mesh mode string 19

snmeshparent SN of the mesh parent string 36

reason Reason string 256

43558 - LOG_ID_EVENT_WIRELESS_WTP_CFG_ERR

Message ID: 43558


Message Description: LOG_ID_EVENT_WIRELESS_WTP_CFG_ERR
Message Meaning: Physical AP config error
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 992


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

sn Serial Number string 64

ap Access Point string 36

profile Profile Name string 64

ip ip 39

meshmode Mesh mode string 19

snmeshparent SN of the mesh parent string 36

reason Reason string 256

43559 - LOG_ID_EVENT_WIRELESS_WTP_SN_MISMATCH

Message ID: 43559


Message Description: LOG_ID_EVENT_WIRELESS_WTP_SN_MISMATCH
Message Meaning: Physical AP SN mismatch
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 993


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

sn Serial Number string 64

ap Access Point string 36

profile Profile Name string 64

ip ip 39

meshmode Mesh mode string 19

snmeshparent SN of the mesh parent string 36

reason Reason string 256

43560 - LOG_ID_EVENT_WIRELESS_SYS_AC_RESTARTED

Message ID: 43560


Message Description: LOG_ID_EVENT_WIRELESS_SYS_AC_RESTARTED
Message Meaning: Wireless system restarted
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 994


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

43561 - LOG_ID_EVENT_WIRELESS_SYS_AC_HOSTAPD_UP

Message ID: 43561


Message Description: LOG_ID_EVENT_WIRELESS_SYS_AC_HOSTAPD_UP
Message Meaning: Wireless system hostapd up
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

43562 - LOG_ID_EVENT_WIRELESS_SYS_AC_HOSTAPD_DOWN

Message ID: 43562


Message Description: LOG_ID_EVENT_WIRELESS_SYS_AC_HOSTAPD_DOWN

FortiOS 7.2.1 Log Reference 995


Fortinet Inc.
Message Meaning: Wireless system hostapd down
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

43563 - LOG_ID_EVENT_WIRELESS_ROGUE_DETECT

Message ID: 43563


Message Description: LOG_ID_EVENT_WIRELESS_ROGUE_DETECT
Message Meaning: Rogue AP detected
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 996


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

bssid Basic service set ID string 17

aptype The AP type is Ad-hoc mode or regular AP mode uint8 3

rate WiFi band width rate uint16 6

radioband The operating radio band string 64

channel Channel uint8 3

manuf Manufacturer name string 20

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

noise WiFi signal noise level int8 4

live Time in seconds uint32 10

age Time in seconds - time passed since last seen uint32 10

onwire The rogue ap is onwire or not string 3

detectionmethod Detection Method string 21

stamac The MAC address of wifi station string 17

apscan The name of AP to detect rogue ap string 36

sndetected SN of the AP which detected the rogue AP string 36

radioiddetected The radio ID on the AP which detected the rogue ap uint8 3

stacount The count of wifi stations uint32 10

snclosest SN of the AP closest to the rogue AP string 36

FortiOS 7.2.1 Log Reference 997


Fortinet Inc.
Log Field Name Description Data Type Length

radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3

apstatus Rogue AP status like unclassify(0), rogue(1), accept(2), uint8 3


suppress(3)

43564 - LOG_ID_EVENT_WIRELESS_ROGUE_OFFAIR

Message ID: 43564


Message Description: LOG_ID_EVENT_WIRELESS_ROGUE_OFFAIR
Message Meaning: Rogue AP off air
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

bssid Basic service set ID string 17

aptype The AP type is Ad-hoc mode or regular AP mode uint8 3

rate WiFi band width rate uint16 6

radioband The operating radio band string 64

channel Channel uint8 3

FortiOS 7.2.1 Log Reference 998


Fortinet Inc.
Log Field Name Description Data Type Length

manuf Manufacturer name string 20

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

noise WiFi signal noise level int8 4

live Time in seconds uint32 10

age Time in seconds - time passed since last seen uint32 10

onwire The rogue ap is onwire or not string 3

detectionmethod Detection Method string 21

stamac The MAC address of wifi station string 17

apscan The name of AP to detect rogue ap string 36

sndetected SN of the AP which detected the rogue AP string 36

radioiddetected The radio ID on the AP which detected the rogue ap uint8 3

stacount The count of wifi stations uint32 10

snclosest SN of the AP closest to the rogue AP string 36

radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3

apstatus Rogue AP status like unclassify(0), rogue(1), accept(2), uint8 3


suppress(3)

43565 - LOG_ID_EVENT_WIRELESS_ROGUE_ONAIR

Message ID: 43565


Message Description: LOG_ID_EVENT_WIRELESS_ROGUE_ONAIR
Message Meaning: Rogue AP on air
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 999


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

bssid Basic service set ID string 17

aptype The AP type is Ad-hoc mode or regular AP mode uint8 3

rate WiFi band width rate uint16 6

radioband The operating radio band string 64

channel Channel uint8 3

manuf Manufacturer name string 20

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

noise WiFi signal noise level int8 4

live Time in seconds uint32 10

age Time in seconds - time passed since last seen uint32 10

onwire The rogue ap is onwire or not string 3

detectionmethod Detection Method string 21

stamac The MAC address of wifi station string 17

apscan The name of AP to detect rogue ap string 36

sndetected SN of the AP which detected the rogue AP string 36

radioiddetected The radio ID on the AP which detected the rogue ap uint8 3

stacount The count of wifi stations uint32 10

snclosest SN of the AP closest to the rogue AP string 36

FortiOS 7.2.1 Log Reference 1000


Fortinet Inc.
Log Field Name Description Data Type Length

radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3

apstatus Rogue AP status like unclassify(0), rogue(1), accept(2), uint8 3


suppress(3)

43566 - LOG_ID_EVENT_WIRELESS_ROGUE_OFFWIRE

Message ID: 43566


Message Description: LOG_ID_EVENT_WIRELESS_ROGUE_OFFWIRE
Message Meaning: Rogue AP off wire
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

bssid Basic service set ID string 17

aptype The AP type is Ad-hoc mode or regular AP mode uint8 3

rate WiFi band width rate uint16 6

radioband The operating radio band string 64

channel Channel uint8 3

FortiOS 7.2.1 Log Reference 1001


Fortinet Inc.
Log Field Name Description Data Type Length

manuf Manufacturer name string 20

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

noise WiFi signal noise level int8 4

live Time in seconds uint32 10

age Time in seconds - time passed since last seen uint32 10

onwire The rogue ap is onwire or not string 3

detectionmethod Detection Method string 21

stamac The MAC address of wifi station string 17

apscan The name of AP to detect rogue ap string 36

sndetected SN of the AP which detected the rogue AP string 36

radioiddetected The radio ID on the AP which detected the rogue ap uint8 3

stacount The count of wifi stations uint32 10

snclosest SN of the AP closest to the rogue AP string 36

radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3

apstatus Rogue AP status like unclassify(0), rogue(1), accept(2), uint8 3


suppress(3)

43567 - LOG_ID_EVENT_WIRELESS_FAKEAP_DETECT

Message ID: 43567


Message Description: LOG_ID_EVENT_WIRELESS_FAKEAP_DETECT
Message Meaning: Fake AP detected
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 1002


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

bssid Basic service set ID string 17

aptype The AP type is Ad-hoc mode or regular AP mode uint8 3

rate WiFi band width rate uint16 6

radioband The operating radio band string 64

channel Channel uint8 3

manuf Manufacturer name string 20

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

noise WiFi signal noise level int8 4

live Time in seconds uint32 10

age Time in seconds - time passed since last seen uint32 10

onwire The rogue ap is onwire or not string 3

detectionmethod Detection Method string 21

stamac The MAC address of wifi station string 17

apscan The name of AP to detect rogue ap string 36

sndetected SN of the AP which detected the rogue AP string 36

radioiddetected The radio ID on the AP which detected the rogue ap uint8 3

stacount The count of wifi stations uint32 10

snclosest SN of the AP closest to the rogue AP string 36

FortiOS 7.2.1 Log Reference 1003


Fortinet Inc.
Log Field Name Description Data Type Length

radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3

apstatus Rogue AP status like unclassify(0), rogue(1), accept(2), uint8 3


suppress(3)

43568 - LOG_ID_EVENT_WIRELESS_FAKEAP_ONAIR

Message ID: 43568


Message Description: LOG_ID_EVENT_WIRELESS_FAKEAP_ONAIR
Message Meaning: Fake AP on air
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

bssid Basic service set ID string 17

aptype The AP type is Ad-hoc mode or regular AP mode uint8 3

rate WiFi band width rate uint16 6

radioband The operating radio band string 64

channel Channel uint8 3

FortiOS 7.2.1 Log Reference 1004


Fortinet Inc.
Log Field Name Description Data Type Length

manuf Manufacturer name string 20

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

noise WiFi signal noise level int8 4

live Time in seconds uint32 10

age Time in seconds - time passed since last seen uint32 10

onwire The rogue ap is onwire or not string 3

detectionmethod Detection Method string 21

stamac The MAC address of wifi station string 17

apscan The name of AP to detect rogue ap string 36

sndetected SN of the AP which detected the rogue AP string 36

radioiddetected The radio ID on the AP which detected the rogue ap uint8 3

stacount The count of wifi stations uint32 10

snclosest SN of the AP closest to the rogue AP string 36

radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3

apstatus Rogue AP status like unclassify(0), rogue(1), accept(2), uint8 3


suppress(3)

43569 - LOG_ID_EVENT_WIRELESS_ROGUE_SUPPRESSED

Message ID: 43569


Message Description: LOG_ID_EVENT_WIRELESS_ROGUE_SUPPRESSED
Message Meaning: Rogue AP suppressed
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 1005


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

bssid Basic service set ID string 17

aptype The AP type is Ad-hoc mode or regular AP mode uint8 3

rate WiFi band width rate uint16 6

radioband The operating radio band string 64

channel Channel uint8 3

manuf Manufacturer name string 20

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

noise WiFi signal noise level int8 4

live Time in seconds uint32 10

age Time in seconds - time passed since last seen uint32 10

onwire The rogue ap is onwire or not string 3

detectionmethod Detection Method string 21

stamac The MAC address of wifi station string 17

apscan The name of AP to detect rogue ap string 36

sndetected SN of the AP which detected the rogue AP string 36

radioiddetected The radio ID on the AP which detected the rogue ap uint8 3

stacount The count of wifi stations uint32 10

snclosest SN of the AP closest to the rogue AP string 36

FortiOS 7.2.1 Log Reference 1006


Fortinet Inc.
Log Field Name Description Data Type Length

radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3

apstatus Rogue AP status like unclassify(0), rogue(1), accept(2), uint8 3


suppress(3)

43570 - LOG_ID_EVENT_WIRELESS_ROGUE_UNSUPPRESSED

Message ID: 43570


Message Description: LOG_ID_EVENT_WIRELESS_ROGUE_UNSUPPRESSED
Message Meaning: Rogue AP unsuppressed
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

bssid Basic service set ID string 17

aptype The AP type is Ad-hoc mode or regular AP mode uint8 3

rate WiFi band width rate uint16 6

radioband The operating radio band string 64

channel Channel uint8 3

FortiOS 7.2.1 Log Reference 1007


Fortinet Inc.
Log Field Name Description Data Type Length

manuf Manufacturer name string 20

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

noise WiFi signal noise level int8 4

live Time in seconds uint32 10

age Time in seconds - time passed since last seen uint32 10

onwire The rogue ap is onwire or not string 3

detectionmethod Detection Method string 21

stamac The MAC address of wifi station string 17

apscan The name of AP to detect rogue ap string 36

sndetected SN of the AP which detected the rogue AP string 36

radioiddetected The radio ID on the AP which detected the rogue ap uint8 3

stacount The count of wifi stations uint32 10

snclosest SN of the AP closest to the rogue AP string 36

radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3

apstatus Rogue AP status like unclassify(0), rogue(1), accept(2), uint8 3


suppress(3)

43571 - LOG_ID_EVENT_WIRELESS_ROGUE_DETECT_CHG

Message ID: 43571


Message Description: LOG_ID_EVENT_WIRELESS_ROGUE_DETECT_CHG
Message Meaning: Rogue AP change detected
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 1008


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

bssid Basic service set ID string 17

aptype The AP type is Ad-hoc mode or regular AP mode uint8 3

rate WiFi band width rate uint16 6

radioband The operating radio band string 64

channel Channel uint8 3

manuf Manufacturer name string 20

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

noise WiFi signal noise level int8 4

live Time in seconds uint32 10

age Time in seconds - time passed since last seen uint32 10

onwire The rogue ap is onwire or not string 3

detectionmethod Detection Method string 21

stamac The MAC address of wifi station string 17

apscan The name of AP to detect rogue ap string 36

sndetected SN of the AP which detected the rogue AP string 36

radioiddetected The radio ID on the AP which detected the rogue ap uint8 3

stacount The count of wifi stations uint32 10

snclosest SN of the AP closest to the rogue AP string 36

FortiOS 7.2.1 Log Reference 1009


Fortinet Inc.
Log Field Name Description Data Type Length

radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3

apstatus Rogue AP status like unclassify(0), rogue(1), accept(2), uint8 3


suppress(3)

43572 - LOG_ID_EVENT_WIRELESS_STA_ASSO

Message ID: 43572


Message Description: LOG_ID_EVENT_WIRELESS_STA_ASSO
Message Meaning: Wireless client associated
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

FortiOS 7.2.1 Log Reference 1010


Fortinet Inc.
Log Field Name Description Data Type Length

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

group User group Name string 512

authserver Remote Authentication server string 64

srcip Source IP ip 39

snr int8 4

mpsk Multiple pre-shared keys string 33

43573 - LOG_ID_EVENT_WIRELESS_STA_AUTH

Message ID: 43573


Message Description: LOG_ID_EVENT_WIRELESS_STA_AUTH
Message Meaning: Wireless client authenticated
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 1011


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

group User group Name string 512

authserver Remote Authentication server string 64

srcip Source IP ip 39

snr int8 4

mpsk Multiple pre-shared keys string 33

43574 - LOG_ID_EVENT_WIRELESS_STA_DASS

Message ID: 43574


Message Description: LOG_ID_EVENT_WIRELESS_STA_DASS
Message Meaning: Wireless client disassociated
Type: Event
Category: WIRELESS
Severity: Notice

FortiOS 7.2.1 Log Reference 1012


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

group User group Name string 512

authserver Remote Authentication server string 64

srcip Source IP ip 39

snr int8 4

FortiOS 7.2.1 Log Reference 1013


Fortinet Inc.
Log Field Name Description Data Type Length

mpsk Multiple pre-shared keys string 33

remotewtptime The time of AP when client trying to connect string 32

43575 - LOG_ID_EVENT_WIRELESS_STA_DAUT

Message ID: 43575


Message Description: LOG_ID_EVENT_WIRELESS_STA_DAUT
Message Meaning: Wireless client deauthenticated
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

FortiOS 7.2.1 Log Reference 1014


Fortinet Inc.
Log Field Name Description Data Type Length

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

group User group Name string 512

authserver Remote Authentication server string 64

srcip Source IP ip 39

snr int8 4

mpsk Multiple pre-shared keys string 33

remotewtptime The time of AP when client trying to connect string 32

43576 - LOG_ID_EVENT_WIRELESS_STA_IDLE

Message ID: 43576


Message Description: LOG_ID_EVENT_WIRELESS_STA_IDLE
Message Meaning: Wireless client idle
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 1015


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

group User group Name string 512

authserver Remote Authentication server string 64

srcip Source IP ip 39

snr int8 4

mpsk Multiple pre-shared keys string 33

43577 - LOG_ID_EVENT_WIRELESS_STA_DENY

Message ID: 43577


Message Description: LOG_ID_EVENT_WIRELESS_STA_DENY
Message Meaning: Wireless client denied
Type: Event
Category: WIRELESS
Severity: Notice

FortiOS 7.2.1 Log Reference 1016


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

group User group Name string 512

authserver Remote Authentication server string 64

srcip Source IP ip 39

snr int8 4

FortiOS 7.2.1 Log Reference 1017


Fortinet Inc.
Log Field Name Description Data Type Length

mpsk Multiple pre-shared keys string 33

remotewtptime The time of AP when client trying to connect string 32

43578 - LOG_ID_EVENT_WIRELESS_STA_KICK

Message ID: 43578


Message Description: LOG_ID_EVENT_WIRELESS_STA_KICK
Message Meaning: Wireless client kicked
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

FortiOS 7.2.1 Log Reference 1018


Fortinet Inc.
Log Field Name Description Data Type Length

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

group User group Name string 512

authserver Remote Authentication server string 64

srcip Source IP ip 39

snr int8 4

mpsk Multiple pre-shared keys string 33

43579 - LOG_ID_EVENT_WIRELESS_STA_IP

Message ID: 43579


Message Description: LOG_ID_EVENT_WIRELESS_STA_IP
Message Meaning: Wireless client IP assigned
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 1019


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

group User group Name string 512

authserver Remote Authentication server string 64

srcip Source IP ip 39

snr int8 4

mpsk Multiple pre-shared keys string 33

43580 - LOG_ID_EVENT_WIRELESS_STA_LEAVE_WTP

Message ID: 43580


Message Description: LOG_ID_EVENT_WIRELESS_STA_LEAVE_WTP
Message Meaning: Wireless client left WTP
Type: Event
Category: WIRELESS
Severity: Notice

FortiOS 7.2.1 Log Reference 1020


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

group User group Name string 512

authserver Remote Authentication server string 64

srcip Source IP ip 39

snr int8 4

mpsk Multiple pre-shared keys string 33

FortiOS 7.2.1 Log Reference 1021


Fortinet Inc.
43581 - LOG_ID_EVENT_WIRELESS_STA_WTP_DISCONN

Message ID: 43581


Message Description: LOG_ID_EVENT_WIRELESS_STA_WTP_DISCONN
Message Meaning: Wireless client WTP disconnected
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

FortiOS 7.2.1 Log Reference 1022


Fortinet Inc.
Log Field Name Description Data Type Length

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

group User group Name string 512

authserver Remote Authentication server string 64

srcip Source IP ip 39

snr int8 4

mpsk Multiple pre-shared keys string 33

43582 - LOG_ID_EVENT_WIRELESS_ROGUE_CFG_UNCLASSIFIED

Message ID: 43582


Message Description: LOG_ID_EVENT_WIRELESS_ROGUE_CFG_UNCLASSIFIED
Message Meaning: Rogue AP status configured as unclassified
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 1023


Fortinet Inc.
Log Field Name Description Data Type Length

ssid WiFi Service Set ID string 33

bssid Basic service set ID string 17

apstatus Rogue AP status like unclassify(0), rogue(1), accept(2), uint8 3


suppress(3)

43583 - LOG_ID_EVENT_WIRELESS_ROGUE_CFG_ACCEPTED

Message ID: 43583


Message Description: LOG_ID_EVENT_WIRELESS_ROGUE_CFG_ACCEPTED
Message Meaning: Rogue AP status configured as accepted
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

bssid Basic service set ID string 17

apstatus Rogue AP status like unclassify(0), rogue(1), accept(2), uint8 3


suppress(3)

FortiOS 7.2.1 Log Reference 1024


Fortinet Inc.
43584 - LOG_ID_EVENT_WIRELESS_ROGUE_CFG_ROGUE

Message ID: 43584


Message Description: LOG_ID_EVENT_WIRELESS_ROGUE_CFG_ROGUE
Message Meaning: Rogue AP status configured as rogue
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

bssid Basic service set ID string 17

apstatus Rogue AP status like unclassify(0), rogue(1), accept(2), uint8 3


suppress(3)

43585 - LOG_ID_EVENT_WIRELESS_ROGUE_CFG_SUPPRESSED

Message ID: 43585


Message Description: LOG_ID_EVENT_WIRELESS_ROGUE_CFG_SUPPRESSED
Message Meaning: Rogue AP status configured as suppressed
Type: Event
Category: WIRELESS

FortiOS 7.2.1 Log Reference 1025


Fortinet Inc.
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

bssid Basic service set ID string 17

apstatus Rogue AP status like unclassify(0), rogue(1), accept(2), uint8 3


suppress(3)

43586 - LOG_ID_EVENT_WIRELESS_WTPR_DARRP_CHAN

Message ID: 43586


Message Description: LOG_ID_EVENT_WIRELESS_WTPR_DARRP_CHAN
Message Meaning: Physical AP radio DARRP channel change
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 1026


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

sn Serial Number string 64

ap Access Point string 36

ip ip 39

radioid The operating radio ID uint8 3

bandwidth Bandwidth string 42

configcountry Config Country string 4

opercountry The name of operating country on a AP string 4

cfgtxpower Config TX power uint32 10

opertxpower The value of operating tx power uint32 10

slctdrmamode string 10

operdrmamode string 10

43587 - LOG_ID_EVENT_WIRELESS_WTPR_DARRP_START

Message ID: 43587


Message Description: LOG_ID_EVENT_WIRELESS_WTPR_DARRP_START
Message Meaning: Physical AP radio DARRP start
Type: Event
Category: WIRELESS
Severity: Notice

FortiOS 7.2.1 Log Reference 1027


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

sn Serial Number string 64

ap Access Point string 36

ip ip 39

radioid The operating radio ID uint8 3

bandwidth Bandwidth string 42

configcountry Config Country string 4

opercountry The name of operating country on a AP string 4

cfgtxpower Config TX power uint32 10

opertxpower The value of operating tx power uint32 10

slctdrmamode string 10

operdrmamode string 10

43588 - LOG_ID_EVENT_WIRELESS_WTPR_OPER_CHAN

Message ID: 43588


Message Description: LOG_ID_EVENT_WIRELESS_WTPR_OPER_CHAN
Message Meaning: Physical AP radio operation channel change

FortiOS 7.2.1 Log Reference 1028


Fortinet Inc.
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

sn Serial Number string 64

ap Access Point string 36

ip ip 39

radioid The operating radio ID uint8 3

bandwidth Bandwidth string 42

configcountry Config Country string 4

opercountry The name of operating country on a AP string 4

cfgtxpower Config TX power uint32 10

opertxpower The value of operating tx power uint32 10

slctdrmamode string 10

operdrmamode string 10

FortiOS 7.2.1 Log Reference 1029


Fortinet Inc.
43589 - LOG_ID_EVENT_WIRELESS_WTPR_RADAR

Message ID: 43589


Message Description: LOG_ID_EVENT_WIRELESS_WTPR_RADAR
Message Meaning: Physical AP radio radar detected
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

sn Serial Number string 64

ap Access Point string 36

ip ip 39

radioid The operating radio ID uint8 3

bandwidth Bandwidth string 42

configcountry Config Country string 4

opercountry The name of operating country on a AP string 4

cfgtxpower Config TX power uint32 10

FortiOS 7.2.1 Log Reference 1030


Fortinet Inc.
Log Field Name Description Data Type Length

opertxpower The value of operating tx power uint32 10

slctdrmamode string 10

operdrmamode string 10

43590 - LOG_ID_EVENT_WIRELESS_WTPR_NOL

Message ID: 43590


Message Description: LOG_ID_EVENT_WIRELESS_WTPR_NOL
Message Meaning: Physical AP radio channel removed from NOL
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

sn Serial Number string 64

ap Access Point string 36

ip ip 39

FortiOS 7.2.1 Log Reference 1031


Fortinet Inc.
Log Field Name Description Data Type Length

radioid The operating radio ID uint8 3

bandwidth Bandwidth string 42

configcountry Config Country string 4

opercountry The name of operating country on a AP string 4

cfgtxpower Config TX power uint32 10

opertxpower The value of operating tx power uint32 10

slctdrmamode string 10

operdrmamode string 10

43591 - LOG_ID_EVENT_WIRELESS_WTPR_COUNTRY_CFG_SUCCESS

Message ID: 43591


Message Description: LOG_ID_EVENT_WIRELESS_WTPR_COUNTRY_CFG_SUCCESS
Message Meaning: Physical AP radio country config success
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 1032


Fortinet Inc.
Log Field Name Description Data Type Length

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

sn Serial Number string 64

ap Access Point string 36

ip ip 39

radioid The operating radio ID uint8 3

bandwidth Bandwidth string 42

configcountry Config Country string 4

opercountry The name of operating country on a AP string 4

cfgtxpower Config TX power uint32 10

opertxpower The value of operating tx power uint32 10

slctdrmamode string 10

operdrmamode string 10

43592 - LOG_ID_EVENT_WIRELESS_WTPR_OPER_COUNTRY

Message ID: 43592


Message Description: LOG_ID_EVENT_WIRELESS_WTPR_OPER_COUNTRY
Message Meaning: Physical AP radio operation country
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 1033


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

sn Serial Number string 64

ap Access Point string 36

ip ip 39

radioid The operating radio ID uint8 3

bandwidth Bandwidth string 42

configcountry Config Country string 4

opercountry The name of operating country on a AP string 4

cfgtxpower Config TX power uint32 10

opertxpower The value of operating tx power uint32 10

slctdrmamode string 10

operdrmamode string 10

43593 - LOG_ID_EVENT_WIRELESS_WTPR_CFG_TXPOWER

Message ID: 43593


Message Description: LOG_ID_EVENT_WIRELESS_WTPR_CFG_TXPOWER
Message Meaning: Physical AP radio config TX power
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 1034


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

sn Serial Number string 64

ap Access Point string 36

ip ip 39

radioid The operating radio ID uint8 3

bandwidth Bandwidth string 42

configcountry Config Country string 4

opercountry The name of operating country on a AP string 4

cfgtxpower Config TX power uint32 10

opertxpower The value of operating tx power uint32 10

slctdrmamode string 10

operdrmamode string 10

43594 - LOG_ID_EVENT_WIRELESS_WTPR_OPER_TXPOWER

Message ID: 43594


Message Description: LOG_ID_EVENT_WIRELESS_WTPR_OPER_TXPOWER
Message Meaning: Physical AP radio operation TX power
Type: Event
Category: WIRELESS
Severity: Notice

FortiOS 7.2.1 Log Reference 1035


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

sn Serial Number string 64

ap Access Point string 36

ip ip 39

radioid The operating radio ID uint8 3

bandwidth Bandwidth string 42

configcountry Config Country string 4

opercountry The name of operating country on a AP string 4

cfgtxpower Config TX power uint32 10

opertxpower The value of operating tx power uint32 10

slctdrmamode string 10

operdrmamode string 10

43595 - LOG_ID_EVENT_WIRELESS_CLB_DENY

Message ID: 43595


Message Description: LOG_ID_EVENT_WIRELESS_CLB_DENY
Message Meaning: Wireless client load balancing denied

FortiOS 7.2.1 Log Reference 1036


Fortinet Inc.
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

stamac The MAC address of wifi station string 17

stacount The count of wifi stations uint32 10

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

43596 - LOG_ID_EVENT_WIRELESS_CLB_RETRY

Message ID: 43596


Message Description: LOG_ID_EVENT_WIRELESS_CLB_RETRY
Message Meaning: Wireless client load balancing retry
Type: Event
Category: WIRELESS
Severity: Notice

FortiOS 7.2.1 Log Reference 1037


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

stamac The MAC address of wifi station string 17

stacount The count of wifi stations uint32 10

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

43597 - LOG_ID_EVENT_WIRELESS_WTP_ADD

Message ID: 43597


Message Description: LOG_ID_EVENT_WIRELESS_WTP_ADD
Message Meaning: Physical AP add
Type: Event
Category: WIRELESS
Severity: Notice

FortiOS 7.2.1 Log Reference 1038


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

sn Serial Number string 64

ap Access Point string 36

profile Profile Name string 64

ip ip 39

meshmode Mesh mode string 19

snmeshparent SN of the mesh parent string 36

reason Reason string 256

43598 - LOG_ID_EVENT_WIRELESS_WTP_ADD_XSS

Message ID: 43598


Message Description: LOG_ID_EVENT_WIRELESS_WTP_ADD_XSS
Message Meaning: Physical AP add XSS
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

FortiOS 7.2.1 Log Reference 1039


Fortinet Inc.
Log Field Name Description Data Type Length

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

sn Serial Number string 64

ap Access Point string 36

profile Profile Name string 64

ip ip 39

meshmode Mesh mode string 19

snmeshparent SN of the mesh parent string 36

reason Reason string 256

43599 - LOG_ID_EVENT_WIRELESS_WTP_DEL

Message ID: 43599


Message Description: LOG_ID_EVENT_WIRELESS_WTP_DEL
Message Meaning: Physical AP delete
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 1040


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

sn Serial Number string 64

ap Access Point string 36

profile Profile Name string 64

ip ip 39

meshmode Mesh mode string 19

snmeshparent SN of the mesh parent string 36

reason Reason string 256

43600 - LOG_ID_EVENT_WIRELESS_WTPR_DARRP_STOP

Message ID: 43600


Message Description: LOG_ID_EVENT_WIRELESS_WTPR_DARRP_STOP
Message Meaning: Physical AP radio DARRP stop
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 1041


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

sn Serial Number string 64

ap Access Point string 36

ip ip 39

radioid The operating radio ID uint8 3

bandwidth Bandwidth string 42

configcountry Config Country string 4

opercountry The name of operating country on a AP string 4

cfgtxpower Config TX power uint32 10

opertxpower The value of operating tx power uint32 10

slctdrmamode string 10

operdrmamode string 10

43601 - LOG_ID_EVENT_WIRELESS_STA_CAP_SIGNON

Message ID: 43601


Message Description: LOG_ID_EVENT_WIRELESS_STA_CAP_SIGNON
Message Meaning: Wireless station sign on
Type: Event
Category: WIRELESS
Severity: Warning

FortiOS 7.2.1 Log Reference 1042


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

group User group Name string 512

authserver Remote Authentication server string 64

srcip Source IP ip 39

snr int8 4

mpsk Multiple pre-shared keys string 33

FortiOS 7.2.1 Log Reference 1043


Fortinet Inc.
43602 - LOG_ID_EVENT_WIRELESS_STA_CAP_SIGNON_SUCCESS

Message ID: 43602


Message Description: LOG_ID_EVENT_WIRELESS_STA_CAP_SIGNON_SUCCESS
Message Meaning: Wireless station sign on success
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

FortiOS 7.2.1 Log Reference 1044


Fortinet Inc.
Log Field Name Description Data Type Length

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

group User group Name string 512

authserver Remote Authentication server string 64

srcip Source IP ip 39

snr int8 4

mpsk Multiple pre-shared keys string 33

43603 - LOG_ID_EVENT_WIRELESS_STA_CAP_SIGNON_FAILURE

Message ID: 43603


Message Description: LOG_ID_EVENT_WIRELESS_STA_CAP_SIGNON_FAILURE
Message Meaning: Wireless station sign on failed
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 1045


Fortinet Inc.
Log Field Name Description Data Type Length

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

group User group Name string 512

authserver Remote Authentication server string 64

srcip Source IP ip 39

snr int8 4

mpsk Multiple pre-shared keys string 33

43604 - LOG_ID_EVENT_WIRELESS_STA_CAP_EMAIL_REQUEST

Message ID: 43604


Message Description: LOG_ID_EVENT_WIRELESS_STA_CAP_EMAIL_REQUEST
Message Meaning: Captive-portal VAP e-mail collect request sent
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 1046


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

group User group Name string 512

authserver Remote Authentication server string 64

srcip Source IP ip 39

snr int8 4

mpsk Multiple pre-shared keys string 33

43605 - LOG_ID_EVENT_WIRELESS_STA_CAP_EMAIL_SUCCESS

Message ID: 43605

FortiOS 7.2.1 Log Reference 1047


Fortinet Inc.
Message Description: LOG_ID_EVENT_WIRELESS_STA_CAP_EMAIL_SUCCESS
Message Meaning: Captive-portal VAP e-mail collect success
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

FortiOS 7.2.1 Log Reference 1048


Fortinet Inc.
Log Field Name Description Data Type Length

group User group Name string 512

authserver Remote Authentication server string 64

srcip Source IP ip 39

snr int8 4

mpsk Multiple pre-shared keys string 33

43606 - LOG_ID_EVENT_WIRELESS_STA_CAP_EMAIL_FAILURE

Message ID: 43606


Message Description: LOG_ID_EVENT_WIRELESS_STA_CAP_EMAIL_FAILURE
Message Meaning: Captive-portal VAP e-mail collect failed
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

channel Channel uint8 3

FortiOS 7.2.1 Log Reference 1049


Fortinet Inc.
Log Field Name Description Data Type Length

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

group User group Name string 512

authserver Remote Authentication server string 64

srcip Source IP ip 39

snr int8 4

mpsk Multiple pre-shared keys string 33

43607 - LOG_ID_EVENT_WIRELESS_STA_CAP_DISCLAIMER_CHECK

Message ID: 43607


Message Description: LOG_ID_EVENT_WIRELESS_STA_CAP_DISCLAIMER_CHECK
Message Meaning: Captive-portal VAP disclaimer agreed
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 1050


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

group User group Name string 512

authserver Remote Authentication server string 64

srcip Source IP ip 39

snr int8 4

mpsk Multiple pre-shared keys string 33

43608 - LOG_ID_EVENT_WIRELESS_STA_CAP_DISCLAIMER_DECLINE

Message ID: 43608


Message Description: LOG_ID_EVENT_WIRELESS_STA_CAP_DISCLAIMER_DECLINE
Message Meaning: Captive-portal VAP disclaimer declined
Type: Event
Category: WIRELESS

FortiOS 7.2.1 Log Reference 1051


Fortinet Inc.
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

group User group Name string 512

authserver Remote Authentication server string 64

srcip Source IP ip 39

snr int8 4

mpsk Multiple pre-shared keys string 33

FortiOS 7.2.1 Log Reference 1052


Fortinet Inc.
43609 - LOG_ID_EVENT_WIRELESS_WTPR_DARRP_OPTIMIZATION_START

Message ID: 43609


Message Description: LOG_ID_EVENT_WIRELESS_WTPR_DARRP_OPTIMIZATION_START
Message Meaning: DARRP optimization start
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

sn Serial Number string 64

ap Access Point string 36

ip ip 39

radioid The operating radio ID uint8 3

bandwidth Bandwidth string 42

configcountry Config Country string 4

opercountry The name of operating country on a AP string 4

cfgtxpower Config TX power uint32 10

FortiOS 7.2.1 Log Reference 1053


Fortinet Inc.
Log Field Name Description Data Type Length

opertxpower The value of operating tx power uint32 10

slctdrmamode string 10

operdrmamode string 10

43610 - LOG_ID_EVENT_WIRELESS_WTPR_DARRP_OPTIMIZATION_STOP

Message ID: 43610


Message Description: LOG_ID_EVENT_WIRELESS_WTPR_DARRP_OPTIMIZATION_STOP
Message Meaning: DARRP optimization stop
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

sn Serial Number string 64

ap Access Point string 36

ip ip 39

FortiOS 7.2.1 Log Reference 1054


Fortinet Inc.
Log Field Name Description Data Type Length

radioid The operating radio ID uint8 3

bandwidth Bandwidth string 42

configcountry Config Country string 4

opercountry The name of operating country on a AP string 4

cfgtxpower Config TX power uint32 10

opertxpower The value of operating tx power uint32 10

slctdrmamode string 10

operdrmamode string 10

43611 - LOG_ID_EVENT_WIRELESS_SYS_AC_UP

Message ID: 43611


Message Description: LOG_ID_EVENT_WIRELESS_SYS_AC_UP
Message Meaning: Wireless controller start
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 1055


Fortinet Inc.
43612 - LOG_ID_EVENT_WIRELESS_SYS_AC_CFG_LOADED

Message ID: 43612


Message Description: LOG_ID_EVENT_WIRELESS_SYS_AC_CFG_LOADED
Message Meaning: Wireless controller configuration loaded
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

43613 - LOG_ID_EVENT_WIRELESS_WTP_ERR

Message ID: 43613


Message Description: LOG_ID_EVENT_WIRELESS_WTP_ERR
Message Meaning: Physical AP error
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

FortiOS 7.2.1 Log Reference 1056


Fortinet Inc.
Log Field Name Description Data Type Length

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

sn Serial Number string 64

ap Access Point string 36

profile Profile Name string 64

ip ip 39

meshmode Mesh mode string 19

snmeshparent SN of the mesh parent string 36

reason Reason string 256

43614 - LOG_ID_EVENT_WIRELESS_DHCP_STAVATION

Message ID: 43614


Message Description: LOG_ID_EVENT_WIRELESS_DHCP_STAVATION
Message Meaning: DHCP Starvation detected
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 1057


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

sn Serial Number string 64

ap Access Point string 36

vap Virtual Access Point string 36

source_mac The source MAC address of wifi station string 17

client_addr Client address string 17

xid uint32 10

vapmode Virtual Access Point mode string 17

43615 - LOG_ID_EVENT_WIRELESS_SYS_AC_IPSEC_FAIL

Message ID: 43615


Message Description: LOG_ID_EVENT_WIRELESS_SYS_AC_IPSEC_FAIL
Message Meaning: Wireless controller IPsec setup failed
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 1058


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

43616 - LOG_ID_EVENT_WIRELESS_WTPR_NOL_ADD

Message ID: 43616


Message Description: LOG_ID_EVENT_WIRELESS_WTPR_NOL_ADD
Message Meaning: Physical AP radio NOL added
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

FortiOS 7.2.1 Log Reference 1059


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

sn Serial Number string 64

ap Access Point string 36

ip ip 39

radioid The operating radio ID uint8 3

bandwidth Bandwidth string 42

configcountry Config Country string 4

opercountry The name of operating country on a AP string 4

cfgtxpower Config TX power uint32 10

opertxpower The value of operating tx power uint32 10

slctdrmamode string 10

operdrmamode string 10

43618 - LOG_ID_EVENT_WIRELESS_WTP_IMAGE_RC_SUCCESS

Message ID: 43618


Message Description: LOG_ID_EVENT_WIRELESS_WTP_IMAGE_RC_SUCCESS
Message Meaning: Physical AP image receive success
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 1060


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

sn Serial Number string 64

ap Access Point string 36

profile Profile Name string 64

ip ip 39

meshmode Mesh mode string 19

snmeshparent SN of the mesh parent string 36

reason Reason string 256

43619 - LOG_ID_EVENT_WIRELESS_OFFENDINGAP_DETECT

Message ID: 43619


Message Description: LOG_ID_EVENT_WIRELESS_OFFENDINGAP_DETECT
Message Meaning: Offending AP detected
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 1061


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

bssid Basic service set ID string 17

aptype The AP type is Ad-hoc mode or regular AP mode uint8 3

rate WiFi band width rate uint16 6

radioband The operating radio band string 64

channel Channel uint8 3

manuf Manufacturer name string 20

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

noise WiFi signal noise level int8 4

live Time in seconds uint32 10

age Time in seconds - time passed since last seen uint32 10

onwire The rogue ap is onwire or not string 3

detectionmethod Detection Method string 21

stamac The MAC address of wifi station string 17

apscan The name of AP to detect rogue ap string 36

sndetected SN of the AP which detected the rogue AP string 36

radioiddetected The radio ID on the AP which detected the rogue ap uint8 3

stacount The count of wifi stations uint32 10

snclosest SN of the AP closest to the rogue AP string 36

radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3

apstatus Rogue AP status like unclassify(0), rogue(1), accept(2), uint8 3


suppress(3)

FortiOS 7.2.1 Log Reference 1062


Fortinet Inc.
43620 - LOG_ID_EVENT_WIRELESS_OFFENDINGAP_ONAIR

Message ID: 43620


Message Description: LOG_ID_EVENT_WIRELESS_OFFENDINGAP_ONAIR
Message Meaning: Offending AP on air
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

bssid Basic service set ID string 17

aptype The AP type is Ad-hoc mode or regular AP mode uint8 3

rate WiFi band width rate uint16 6

radioband The operating radio band string 64

channel Channel uint8 3

manuf Manufacturer name string 20

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

FortiOS 7.2.1 Log Reference 1063


Fortinet Inc.
Log Field Name Description Data Type Length

noise WiFi signal noise level int8 4

live Time in seconds uint32 10

age Time in seconds - time passed since last seen uint32 10

onwire The rogue ap is onwire or not string 3

detectionmethod Detection Method string 21

stamac The MAC address of wifi station string 17

apscan The name of AP to detect rogue ap string 36

sndetected SN of the AP which detected the rogue AP string 36

radioiddetected The radio ID on the AP which detected the rogue ap uint8 3

stacount The count of wifi stations uint32 10

snclosest SN of the AP closest to the rogue AP string 36

radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3

apstatus Rogue AP status like unclassify(0), rogue(1), accept(2), uint8 3


suppress(3)

43621 - LOG_ID_EVENT_WIRELESS_WTP_DATA_CHAN_CHG

Message ID: 43621


Message Description: LOG_ID_EVENT_WIRELESS_WTP_DATA_CHAN_CHG
Message Meaning: Wireless wtp data channel changed
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 1064


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

sn Serial Number string 64

ap Access Point string 36

profile Profile Name string 64

ip ip 39

meshmode Mesh mode string 19

snmeshparent SN of the mesh parent string 36

reason Reason string 256

43622 - LOG_ID_EVENT_WIRELESS_WTP_VLAN_PROBE

Message ID: 43622


Message Description: LOG_ID_EVENT_WIRELESS_WTP_VLAN_PROBE
Message Meaning: WTP is probing vlan
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 1065


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

sn Serial Number string 64

ap Access Point string 36

profile Profile Name string 64

ip ip 39

meshmode Mesh mode string 19

snmeshparent SN of the mesh parent string 36

reason Reason string 256

43623 - LOG_ID_EVENT_WIRELESS_WTP_VLAN_MISSING

Message ID: 43623


Message Description: LOG_ID_EVENT_WIRELESS_WTP_VLAN_MISSING
Message Meaning: VLAN not detected
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

FortiOS 7.2.1 Log Reference 1066


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

sn Serial Number string 64

ap Access Point string 36

profile Profile Name string 64

ip ip 39

meshmode Mesh mode string 19

snmeshparent SN of the mesh parent string 36

reason Reason string 256

43624 - LOG_ID_EVENT_WIRELESS_WTP_VLAN_DETECTED

Message ID: 43624


Message Description: LOG_ID_EVENT_WIRELESS_WTP_VLAN_DETECTED
Message Meaning: VLAN detected
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 1067


Fortinet Inc.
Log Field Name Description Data Type Length

action Policy Action string 65

msg Log Message string 4096

sn Serial Number string 64

ap Access Point string 36

profile Profile Name string 64

ip ip 39

meshmode Mesh mode string 19

snmeshparent SN of the mesh parent string 36

reason Reason string 256

43625 - LOG_ID_EVENT_WIRELESS_STA_CAP_CMCC_SUCCESS

Message ID: 43625


Message Description: LOG_ID_EVENT_WIRELESS_STA_CAP_CMCC_SUCCESS
Message Meaning: Wireless station CMCC sign on success
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

FortiOS 7.2.1 Log Reference 1068


Fortinet Inc.
Log Field Name Description Data Type Length

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

group User group Name string 512

authserver Remote Authentication server string 64

srcip Source IP ip 39

snr int8 4

mpsk Multiple pre-shared keys string 33

43626 - LOG_ID_EVENT_WIRELESS_STA_CAP_CMCC_FAILURE

Message ID: 43626


Message Description: LOG_ID_EVENT_WIRELESS_STA_CAP_CMCC_FAILURE
Message Meaning: Wireless station CMCC sign on failed
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 1069


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

group User group Name string 512

authserver Remote Authentication server string 64

srcip Source IP ip 39

snr int8 4

mpsk Multiple pre-shared keys string 33

FortiOS 7.2.1 Log Reference 1070


Fortinet Inc.
43627 - LOG_ID_EVENT_WIRELESS_STA_CAP_CMCC_TIMEOUT

Message ID: 43627


Message Description: LOG_ID_EVENT_WIRELESS_STA_CAP_CMCC_TIMEOUT
Message Meaning: Wireless station CMCC sign on timeout
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

FortiOS 7.2.1 Log Reference 1071


Fortinet Inc.
Log Field Name Description Data Type Length

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

group User group Name string 512

authserver Remote Authentication server string 64

srcip Source IP ip 39

snr int8 4

mpsk Multiple pre-shared keys string 33

43628 - LOG_ID_EVENT_WIRELESS_STA_CAP_CMCC_MAC_AUTH_SUCCESS

Message ID: 43628


Message Description: LOG_ID_EVENT_WIRELESS_STA_CAP_CMCC_MAC_AUTH_SUCCESS
Message Meaning: Wireless station CMCC MAC auth success
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 1072


Fortinet Inc.
Log Field Name Description Data Type Length

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

group User group Name string 512

authserver Remote Authentication server string 64

srcip Source IP ip 39

snr int8 4

mpsk Multiple pre-shared keys string 33

43629 - LOG_ID_EVENT_WIRELESS_STA_RADIUS_AUTH_FAILURE

Message ID: 43629


Message Description: LOG_ID_EVENT_WIRELESS_STA_RADIUS_AUTH_FAILURE
Message Meaning: Wireless client RADIUS authentication failure
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 1073


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43630 - LOG_ID_EVENT_WIRELESS_STA_RADIUS_AUTH_SUCCESS

Message ID: 43630


Message Description: LOG_ID_EVENT_WIRELESS_STA_RADIUS_AUTH_SUCCESS
Message Meaning: Wireless client RADIUS authentication success
Type: Event
Category: WIRELESS
Severity: Warning

FortiOS 7.2.1 Log Reference 1074


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43631 - LOG_ID_EVENT_WIRELESS_STA_RADIUS_AUTH_NO_RESP

Message ID: 43631


Message Description: LOG_ID_EVENT_WIRELESS_STA_RADIUS_AUTH_NO_RESP
Message Meaning: Wireless client RADIUS authentication server not responding

FortiOS 7.2.1 Log Reference 1075


Fortinet Inc.
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

FortiOS 7.2.1 Log Reference 1076


Fortinet Inc.
43632 - LOG_ID_EVENT_WIRELESS_STA_RADIUS_MAC_AUTH_FAILURE

Message ID: 43632


Message Description: LOG_ID_EVENT_WIRELESS_STA_RADIUS_MAC_AUTH_FAILURE
Message Meaning: Wireless client RADIUS MAC authentication failure
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

FortiOS 7.2.1 Log Reference 1077


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43633 - LOG_ID_EVENT_WIRELESS_STA_RADIUS_MAC_AUTH_SUCCESS

Message ID: 43633


Message Description: LOG_ID_EVENT_WIRELESS_STA_RADIUS_MAC_AUTH_SUCCESS
Message Meaning: Wireless client RADIUS MAC authentication success
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

FortiOS 7.2.1 Log Reference 1078


Fortinet Inc.
Log Field Name Description Data Type Length

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43634 - LOG_ID_EVENT_WIRELESS_STA_RADIUS_MAC_AUTH_NO_RESP

Message ID: 43634


Message Description: LOG_ID_EVENT_WIRELESS_STA_RADIUS_MAC_AUTH_NO_RESP
Message Meaning: Wireless client RADIUS MAC authentication server not responding
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 1079


Fortinet Inc.
Log Field Name Description Data Type Length

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43635 - LOG_ID_EVENT_WIRELESS_STA_OKC_NO_MATCH

Message ID: 43635


Message Description: LOG_ID_EVENT_WIRELESS_STA_OKC_NO_MATCH
Message Meaning: Wireless client authenticates through OKC failed with no match
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 1080


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43636 - LOG_ID_EVENT_WIRELESS_STA_OKC_LOCAL_MATCH

Message ID: 43636


Message Description: LOG_ID_EVENT_WIRELESS_STA_OKC_LOCAL_MATCH
Message Meaning: Wireless client authenticates through local OKC success
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 1081


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43637 - LOG_ID_EVENT_WIRELESS_STA_OKC_INTER_AC_MATCH

Message ID: 43637


Message Description: LOG_ID_EVENT_WIRELESS_STA_OKC_INTER_AC_MATCH
Message Meaning: Wireless client authenticates through inter AC OKC success
Type: Event
Category: WIRELESS
Severity: Notice

FortiOS 7.2.1 Log Reference 1082


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43638 - LOG_ID_EVENT_WIRELESS_STA_OKC_INTER_AP_MATCH

Message ID: 43638


Message Description: LOG_ID_EVENT_WIRELESS_STA_OKC_INTER_AP_MATCH
Message Meaning: Wireless client authenticates through inter AP OKC success

FortiOS 7.2.1 Log Reference 1083


Fortinet Inc.
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

FortiOS 7.2.1 Log Reference 1084


Fortinet Inc.
43639 - LOG_ID_EVENT_WIRELESS_STA_FT_INVALID_ACTION_REQ

Message ID: 43639


Message Description: LOG_ID_EVENT_WIRELESS_STA_FT_INVALID_ACTION_REQ
Message Meaning: Wireless client sent invalid FT action request
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

FortiOS 7.2.1 Log Reference 1085


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43640 - LOG_ID_EVENT_WIRELESS_STA_FT_INVALID_AUTH_REQ

Message ID: 43640


Message Description: LOG_ID_EVENT_WIRELESS_STA_FT_INVALID_AUTH_REQ
Message Meaning: Wireless client sent invalid FT auth request
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

FortiOS 7.2.1 Log Reference 1086


Fortinet Inc.
Log Field Name Description Data Type Length

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43641 - LOG_ID_EVENT_WIRELESS_STA_FT_INVALID_REASSOC_REQ

Message ID: 43641


Message Description: LOG_ID_EVENT_WIRELESS_STA_FT_INVALID_REASSOC_REQ
Message Meaning: Wireless client sent invalid FT reassociation request
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 1087


Fortinet Inc.
Log Field Name Description Data Type Length

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43642 - LOG_ID_EVENT_WIRELESS_STA_FT_ACTION_REQ

Message ID: 43642


Message Description: LOG_ID_EVENT_WIRELESS_STA_FT_ACTION_REQ
Message Meaning: Wireless client sent FT action reqeust
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 1088


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43643 - LOG_ID_EVENT_WIRELESS_STA_FT_ACTION_RESP

Message ID: 43643


Message Description: LOG_ID_EVENT_WIRELESS_STA_FT_ACTION_RESP
Message Meaning: FT action response was sent to wireless client
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 1089


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43644 - LOG_ID_EVENT_WIRELESS_STA_FT_AUTH_REQ

Message ID: 43644


Message Description: LOG_ID_EVENT_WIRELESS_STA_FT_AUTH_REQ
Message Meaning: Wireless client sent FT auth request
Type: Event
Category: WIRELESS
Severity: Notice

FortiOS 7.2.1 Log Reference 1090


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43645 - LOG_ID_EVENT_WIRELESS_STA_FT_AUTH_RESP

Message ID: 43645


Message Description: LOG_ID_EVENT_WIRELESS_STA_FT_AUTH_RESP
Message Meaning: FT auth response was sent to wireless client

FortiOS 7.2.1 Log Reference 1091


Fortinet Inc.
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

FortiOS 7.2.1 Log Reference 1092


Fortinet Inc.
43646 - LOG_ID_EVENT_WIRELESS_STA_FT_REASSOC_REQ

Message ID: 43646


Message Description: LOG_ID_EVENT_WIRELESS_STA_FT_REASSOC_REQ
Message Meaning: Wireless client sent FT reassociation request
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

FortiOS 7.2.1 Log Reference 1093


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43647 - LOG_ID_EVENT_WIRELESS_STA_FT_REASSOC_RESP

Message ID: 43647


Message Description: LOG_ID_EVENT_WIRELESS_STA_FT_REASSOC_RESP
Message Meaning: FT reassociation response was sent to wireless client
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

FortiOS 7.2.1 Log Reference 1094


Fortinet Inc.
Log Field Name Description Data Type Length

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43648 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_INVALID_SECOND_MSG

Message ID: 43648


Message Description: LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_INVALID_SECOND_MSG
Message Meaning: Wireless client 4 way handshake failed with invalid 2/4 message
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 1095


Fortinet Inc.
Log Field Name Description Data Type Length

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43649 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_INVALID_FOURTH_MSG

Message ID: 43649


Message Description: LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_INVALID_FOURTH_MSG
Message Meaning: Wireless client 4 way handshake failed with invalid 4/4 message
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 1096


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43650 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_FIRST_MSG

Message ID: 43650


Message Description: LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_FIRST_MSG
Message Meaning: AP sent 1/4 message of 4 way handshake to wireless client
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 1097


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43651 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_SECOND_MSG

Message ID: 43651


Message Description: LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_SECOND_MSG
Message Meaning: Wireless client sent 2/4 message of 4 way handshake
Type: Event
Category: WIRELESS
Severity: Warning

FortiOS 7.2.1 Log Reference 1098


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43652 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_THIRD_MSG

Message ID: 43652


Message Description: LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_THIRD_MSG
Message Meaning: AP sent 3/4 message of 4 way handshake to wireless client

FortiOS 7.2.1 Log Reference 1099


Fortinet Inc.
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

FortiOS 7.2.1 Log Reference 1100


Fortinet Inc.
43653 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_FOURTH_MSG

Message ID: 43653


Message Description: LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_FOURTH_MSG
Message Meaning: Wireless client sent 4/4 message of 4 way handshake
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

FortiOS 7.2.1 Log Reference 1101


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43654 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_FIRST_GROUP_MSG

Message ID: 43654


Message Description: LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_FIRST_GROUP_MSG
Message Meaning: AP sent 1/2 message of group key handshake to wireless client
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

FortiOS 7.2.1 Log Reference 1102


Fortinet Inc.
Log Field Name Description Data Type Length

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43655 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_SECOND_GROUP_MSG

Message ID: 43655


Message Description: LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_SECOND_GROUP_MSG
Message Meaning: Wireless client sent 2/2 message of group key handshake
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 1103


Fortinet Inc.
Log Field Name Description Data Type Length

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43656 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_MAX_STA_CNT

Message ID: 43656


Message Description: LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_MAX_STA_CNT
Message Meaning: Max sta count limit for the PSK was reached
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 1104


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43657 - LOG_ID_EVENT_WIRELESS_STA_ASSOC_FAIL

Message ID: 43657


Message Description: LOG_ID_EVENT_WIRELESS_STA_ASSOC_FAIL
Message Meaning: Wireless station association failed
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 1105


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43658 - LOG_ID_EVENT_WIRELESS_STA_DHCP_NO_RESP

Message ID: 43658


Message Description: LOG_ID_EVENT_WIRELESS_STA_DHCP_NO_RESP
Message Meaning: Wireless station DHCP process failed with no server response
Type: Event
Category: WIRELESS
Severity: Warning

FortiOS 7.2.1 Log Reference 1106


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

43659 - LOG_ID_EVENT_WIRELESS_STA_DHCP_DIFF_OFFER

Message ID: 43659


Message Description: LOG_ID_EVENT_WIRELESS_STA_DHCP_DIFF_OFFER
Message Meaning: Another DHCP server sent DHCP offer to wireless station
Type: Event
Category: WIRELESS
Severity: Warning

FortiOS 7.2.1 Log Reference 1107


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

43660 - LOG_ID_EVENT_WIRELESS_STA_DHCP_NO_ACK

Message ID: 43660


Message Description: LOG_ID_EVENT_WIRELESS_STA_DHCP_NO_ACK
Message Meaning: No DHCP ACK from server
Type: Event
Category: WIRELESS
Severity: Warning

FortiOS 7.2.1 Log Reference 1108


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

43661 - LOG_ID_EVENT_WIRELESS_STA_DHCP_NAK

Message ID: 43661


Message Description: LOG_ID_EVENT_WIRELESS_STA_DHCP_NAK
Message Meaning: DHCP server sent DHCP NAK
Type: Event
Category: WIRELESS
Severity: Warning

FortiOS 7.2.1 Log Reference 1109


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

43662 - LOG_ID_EVENT_WIRELESS_STA_DHCP_DUP_IP

Message ID: 43662


Message Description: LOG_ID_EVENT_WIRELESS_STA_DHCP_DUP_IP
Message Meaning: IP offered has been used by another wireless station
Type: Event
Category: WIRELESS
Severity: Warning

FortiOS 7.2.1 Log Reference 1110


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

43663 - LOG_ID_EVENT_WIRELESS_STA_DHCP_DISCOVER

Message ID: 43663


Message Description: LOG_ID_EVENT_WIRELESS_STA_DHCP_DISCOVER
Message Meaning: Wireless station sent DHCP DISCOVER
Type: Event
Category: WIRELESS
Severity: Notice

FortiOS 7.2.1 Log Reference 1111


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

43664 - LOG_ID_EVENT_WIRELESS_STA_DHCP_OFFER

Message ID: 43664


Message Description: LOG_ID_EVENT_WIRELESS_STA_DHCP_OFFER
Message Meaning: DHCP server sent DHCP OFFER
Type: Event
Category: WIRELESS
Severity: Notice

FortiOS 7.2.1 Log Reference 1112


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

43665 - LOG_ID_EVENT_WIRELESS_STA_DHCP_DECLINE

Message ID: 43665


Message Description: LOG_ID_EVENT_WIRELESS_STA_DHCP_DECLINE
Message Meaning: Wireless station sent DHCP DECLINE
Type: Event
Category: WIRELESS
Severity: Warning

FortiOS 7.2.1 Log Reference 1113


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

43666 - LOG_ID_EVENT_WIRELESS_STA_DHCP_REQUEST

Message ID: 43666


Message Description: LOG_ID_EVENT_WIRELESS_STA_DHCP_REQUEST
Message Meaning: Wireless station sent DHCP REQUEST
Type: Event
Category: WIRELESS
Severity: Notice

FortiOS 7.2.1 Log Reference 1114


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

43667 - LOG_ID_EVENT_WIRELESS_STA_DHCP_ACK

Message ID: 43667


Message Description: LOG_ID_EVENT_WIRELESS_STA_DHCP_ACK
Message Meaning: DHCP server sent DHCP ACK
Type: Event
Category: WIRELESS
Severity: Notice

FortiOS 7.2.1 Log Reference 1115


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

43668 - LOG_ID_EVENT_WIRELESS_STA_DHCP_RELEASE

Message ID: 43668


Message Description: LOG_ID_EVENT_WIRELESS_STA_DHCP_RELEASE
Message Meaning: Wireless station sent DHCP RELEASE
Type: Event
Category: WIRELESS
Severity: Notice

FortiOS 7.2.1 Log Reference 1116


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

43669 - LOG_ID_EVENT_WIRELESS_STA_DHCP_INFORM

Message ID: 43669


Message Description: LOG_ID_EVENT_WIRELESS_STA_DHCP_INFORM
Message Meaning: Wireless station sent DHCP INFORM
Type: Event
Category: WIRELESS
Severity: Notice

FortiOS 7.2.1 Log Reference 1117


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

43670 - LOG_ID_EVENT_WIRELESS_STA_DHCP_SELF_ASSIGNED

Message ID: 43670


Message Description: LOG_ID_EVENT_WIRELESS_STA_DHCP_SELF_ASSIGNED
Message Meaning: Wireless station is using self-assigned IP
Type: Event
Category: WIRELESS
Severity: Warning

FortiOS 7.2.1 Log Reference 1118


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

43671 - LOG_ID_EVENT_WIRELESS_STA_DNS_NO_RESP

Message ID: 43671


Message Description: LOG_ID_EVENT_WIRELESS_STA_DNS_NO_RESP
Message Meaning: Wireless station DNS process failed with no server response
Type: Event
Category: WIRELESS
Severity: Warning

FortiOS 7.2.1 Log Reference 1119


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

43672 - LOG_ID_EVENT_WIRELESS_STA_DNS_SERVER_FAILURE

Message ID: 43672


Message Description: LOG_ID_EVENT_WIRELESS_STA_DNS_SERVER_FAILURE
Message Meaning: Wireless station DNS process failed due to server failure
Type: Event
Category: WIRELESS
Severity: Warning

FortiOS 7.2.1 Log Reference 1120


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

43673 - LOG_ID_EVENT_WIRELESS_STA_DNS_NO_DOMAIN

Message ID: 43673


Message Description: LOG_ID_EVENT_WIRELESS_STA_DNS_NO_DOMAIN
Message Meaning: Wireless station DNS process failed due to non-existing domain
Type: Event
Category: WIRELESS
Severity: Warning

FortiOS 7.2.1 Log Reference 1121


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

43674 - LOG_ID_EVENT_WIRELESS_STA_WPA_KRACK_FT_REASSOC

Message ID: 43674


Message Description: LOG_ID_EVENT_WIRELESS_STA_WPA_KRACK_FT_REASSOC
Message Meaning: Wireless station WPA key reinstallation attack on FT reassociation
Type: Event
Category: WIRELESS
Severity: Warning

FortiOS 7.2.1 Log Reference 1122


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43675 - LOG_ID_EVENT_WIRELESS_STA_AUTH_REQ

Message ID: 43675


Message Description: LOG_ID_EVENT_WIRELESS_STA_AUTH_REQ
Message Meaning: Authentication request from wireless station

FortiOS 7.2.1 Log Reference 1123


Fortinet Inc.
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

FortiOS 7.2.1 Log Reference 1124


Fortinet Inc.
43676 - LOG_ID_EVENT_WIRELESS_STA_AUTH_RESP

Message ID: 43676


Message Description: LOG_ID_EVENT_WIRELESS_STA_AUTH_RESP
Message Meaning: Authentication response to wireless station
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

FortiOS 7.2.1 Log Reference 1125


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43677 - LOG_ID_EVENT_WIRELESS_STA_ASSOC_REQ

Message ID: 43677


Message Description: LOG_ID_EVENT_WIRELESS_STA_ASSOC_REQ
Message Meaning: Association request from wireless station
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

FortiOS 7.2.1 Log Reference 1126


Fortinet Inc.
Log Field Name Description Data Type Length

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43678 - LOG_ID_EVENT_WIRELESS_STA_REASSOC_REQ

Message ID: 43678


Message Description: LOG_ID_EVENT_WIRELESS_STA_REASSOC_REQ
Message Meaning: Reassociation request from wireless station
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 1127


Fortinet Inc.
Log Field Name Description Data Type Length

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43679 - LOG_ID_EVENT_WIRELESS_STA_ASSOC_RESP

Message ID: 43679


Message Description: LOG_ID_EVENT_WIRELESS_STA_ASSOC_RESP
Message Meaning: Association response to wireless station
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 1128


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43680 - LOG_ID_EVENT_WIRELESS_STA_REASSOC_RESP

Message ID: 43680


Message Description: LOG_ID_EVENT_WIRELESS_STA_REASSOC_RESP
Message Meaning: Reassociation response to wireless station
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 1129


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43681 - LOG_ID_EVENT_WIRELESS_STA_PROBE_REQ

Message ID: 43681


Message Description: LOG_ID_EVENT_WIRELESS_STA_PROBE_REQ
Message Meaning: Probe request from wireless station
Type: Event
Category: WIRELESS
Severity: Information

FortiOS 7.2.1 Log Reference 1130


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43682 - LOG_ID_EVENT_WIRELESS_STA_PROBE_RESP

Message ID: 43682


Message Description: LOG_ID_EVENT_WIRELESS_STA_PROBE_RESP
Message Meaning: Probe response to wireless station

FortiOS 7.2.1 Log Reference 1131


Fortinet Inc.
Type: Event
Category: WIRELESS
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

FortiOS 7.2.1 Log Reference 1132


Fortinet Inc.
43683 - LOG_ID_EVENT_WIRELESS_BLE_DEV_LOCATE

Message ID: 43683


Message Description: LOG_ID_EVENT_WIRELESS_BLE_DEV_LOCATE
Message Meaning: Wireless ble dev detection
Type: Event
Category: WIRELESS
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

signal The signal value of SSID or client int8 4

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

43684 - LOG_ID_EVENT_WIRELESS_ADDRGRP_DUPLICATE_MAC

Message ID: 43684


Message Description: LOG_ID_EVENT_WIRELESS_ADDRGRP_DUPLICATE_MAC
Message Meaning: Wireless addrgrp duplicate mac
Type: Event
Category: WIRELESS

FortiOS 7.2.1 Log Reference 1133


Fortinet Inc.
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

addrgrp string 36

43685 - LOG_ID_EVENT_WIRELESS_ADDRGRP_ADDR_APPLY

Message ID: 43685


Message Description: LOG_ID_EVENT_WIRELESS_ADDRGRP_ADDR_APPLY
Message Meaning: Wireless addrgrp address apply
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 1134


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

addrgrp string 36

43686 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_INVALID_SCHEDULE

Message ID: 43686


Message Description: LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_INVALID_SCHEDULE
Message Meaning: PSK is out of any valid schedules
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 1135


Fortinet Inc.
Log Field Name Description Data Type Length

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43687 - LOG_ID_EVENT_WIRELESS_STA_WL_BRIDGE_TRAFFIC_STATS

Message ID: 43687


Message Description: LOG_ID_EVENT_WIRELESS_STA_WL_BRIDGE_TRAFFIC_STATS
Message Meaning: Traffic stats for station with bridge wlan
Type: Event
Category: WIRELESS
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 1136


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

signal The signal value of SSID or client int8 4

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

vap Virtual Access Point string 36

user User name of authenticated user string 256

srcip Source IP ip 39

snr int8 4

sentbyte Bytes Sent uint64 20

rcvdbyte Received Bytes uint64 20

nextstat Time interval in seconds for the next statistics uint32 10

43688 - LOG_ID_EVENT_WIRELESS_APCFG_RECEIVE

Message ID: 43688


Message Description: LOG_ID_EVENT_WIRELESS_APCFG_RECEIVE
Message Meaning: FortiAP receives the apcfg
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 1137


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

43689 - LOG_ID_EVENT_WIRELESS_APCFG_VALIDATING

Message ID: 43689


Message Description: LOG_ID_EVENT_WIRELESS_APCFG_VALIDATING
Message Meaning: FortiAP is validating the apcfg
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 1138


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

43690 - LOG_ID_EVENT_WIRELESS_APCFG_APPLY

Message ID: 43690


Message Description: LOG_ID_EVENT_WIRELESS_APCFG_APPLY
Message Meaning: FortiAP applies the apcfg
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

sn Serial Number string 64

FortiOS 7.2.1 Log Reference 1139


Fortinet Inc.
Log Field Name Description Data Type Length

ap Access Point string 36

reason Reason string 256

43691 - LOG_ID_EVENT_WIRELESS_APCFG_REJECT

Message ID: 43691


Message Description: LOG_ID_EVENT_WIRELESS_APCFG_REJECT
Message Meaning: FortiAP rejects the apcfg
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

43692 - LOG_ID_EVENT_WIRELESS_WTPR_ANTENNA_DEFECT_DETECT

Message ID: 43692


Message Description: LOG_ID_EVENT_WIRELESS_WTPR_ANTENNA_DEFECT_DETECT

FortiOS 7.2.1 Log Reference 1140


Fortinet Inc.
Message Meaning: Defect antenna detection
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

sn Serial Number string 64

ap Access Point string 36

ip ip 39

radioid The operating radio ID uint8 3

bandwidth Bandwidth string 42

configcountry Config Country string 4

opercountry The name of operating country on a AP string 4

cfgtxpower Config TX power uint32 10

opertxpower The value of operating tx power uint32 10

slctdrmamode string 10

operdrmamode string 10

FortiOS 7.2.1 Log Reference 1141


Fortinet Inc.
43693 - LOG_ID_EVENT_WIRELESS_STA_WNM_ACTION_BSTM_REQ

Message ID: 43693


Message Description: LOG_ID_EVENT_WIRELESS_STA_WNM_ACTION_BSTM_REQ
Message Meaning: AP sent WNM action BSTM request
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

FortiOS 7.2.1 Log Reference 1142


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43694 - LOG_ID_EVENT_WIRELESS_STA_WNM_ACTION_BSTM_RESP_ACCEPT

Message ID: 43694


Message Description: LOG_ID_EVENT_WIRELESS_STA_WNM_ACTION_BSTM_RESP_ACCEPT
Message Meaning: Wireless client sent WNM action BSTM response accept
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

FortiOS 7.2.1 Log Reference 1143


Fortinet Inc.
Log Field Name Description Data Type Length

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43695 - LOG_ID_EVENT_WIRELESS_STA_WNM_ACTION_BSTM_RESP_REJECT

Message ID: 43695


Message Description: LOG_ID_EVENT_WIRELESS_STA_WNM_ACTION_BSTM_RESP_REJECT
Message Meaning: Wireless client sent WNM action BSTM response reject
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 1144


Fortinet Inc.
Log Field Name Description Data Type Length

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

authserver Remote Authentication server string 64

remotewtptime The time of AP when client trying to connect string 32

43696 - LOG_ID_EVENT_WIRELESS_WTPR_DRMA_START

Message ID: 43696


Message Description: LOG_ID_EVENT_WIRELESS_WTPR_DRMA_START
Message Meaning: Physical AP radio DRMA start
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 1145


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

sn Serial Number string 64

ap Access Point string 36

ip ip 39

radioid The operating radio ID uint8 3

bandwidth Bandwidth string 42

configcountry Config Country string 4

opercountry The name of operating country on a AP string 4

cfgtxpower Config TX power uint32 10

opertxpower The value of operating tx power uint32 10

slctdrmamode string 10

operdrmamode string 10

43697 - LOG_ID_EVENT_WIRELESS_WTPR_DRMA_STOP

Message ID: 43697


Message Description: LOG_ID_EVENT_WIRELESS_WTPR_DRMA_STOP
Message Meaning: Physical AP radio DRMA stop
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 1146


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

sn Serial Number string 64

ap Access Point string 36

ip ip 39

radioid The operating radio ID uint8 3

bandwidth Bandwidth string 42

configcountry Config Country string 4

opercountry The name of operating country on a AP string 4

cfgtxpower Config TX power uint32 10

opertxpower The value of operating tx power uint32 10

slctdrmamode string 10

operdrmamode string 10

43698 - LOG_ID_EVENT_WIRELESS_WTPR_DRMA_MODE

Message ID: 43698


Message Description: LOG_ID_EVENT_WIRELESS_WTPR_DRMA_MODE
Message Meaning: Physical AP radio DRMA mode
Type: Event
Category: WIRELESS
Severity: Notice

FortiOS 7.2.1 Log Reference 1147


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

sn Serial Number string 64

ap Access Point string 36

ip ip 39

radioid The operating radio ID uint8 3

bandwidth Bandwidth string 42

configcountry Config Country string 4

opercountry The name of operating country on a AP string 4

cfgtxpower Config TX power uint32 10

opertxpower The value of operating tx power uint32 10

slctdrmamode string 10

operdrmamode string 10

43699 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_SOLICIT

Message ID: 43699


Message Description: LOG_ID_EVENT_WIRELESS_STA_DHCP6_SOLICIT
Message Meaning: Wireless station sent DHCP6 SOLICIT

FortiOS 7.2.1 Log Reference 1148


Fortinet Inc.
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

mac MAC Address string 17

43700 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_ADVERTISE

Message ID: 43700


Message Description: LOG_ID_EVENT_WIRELESS_STA_DHCP6_ADVERTISE
Message Meaning: DHCP6 server sent DHCP6 ADVERTISE

FortiOS 7.2.1 Log Reference 1149


Fortinet Inc.
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

mac MAC Address string 17

43701 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_REQUEST

Message ID: 43701


Message Description: LOG_ID_EVENT_WIRELESS_STA_DHCP6_REQUEST
Message Meaning: Wireless station sent DHCP6 REQUEST

FortiOS 7.2.1 Log Reference 1150


Fortinet Inc.
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

mac MAC Address string 17

43702 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_CONFIRM

Message ID: 43702


Message Description: LOG_ID_EVENT_WIRELESS_STA_DHCP6_CONFIRM
Message Meaning: Wireless station sent DHCP6 CONFIRM

FortiOS 7.2.1 Log Reference 1151


Fortinet Inc.
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

mac MAC Address string 17

43703 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_RENEW

Message ID: 43703


Message Description: LOG_ID_EVENT_WIRELESS_STA_DHCP6_RENEW
Message Meaning: Wireless station sent DHCP6 RENEW

FortiOS 7.2.1 Log Reference 1152


Fortinet Inc.
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

mac MAC Address string 17

43704 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_REPLY

Message ID: 43704


Message Description: LOG_ID_EVENT_WIRELESS_STA_DHCP6_REPLY
Message Meaning: DHCP6 server sent DHCP6 REPLY

FortiOS 7.2.1 Log Reference 1153


Fortinet Inc.
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

mac MAC Address string 17

43705 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_RELEASE

Message ID: 43705


Message Description: LOG_ID_EVENT_WIRELESS_STA_DHCP6_RELEASE
Message Meaning: Wireless station sent DHCP6 RELEASE

FortiOS 7.2.1 Log Reference 1154


Fortinet Inc.
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

mac MAC Address string 17

43706 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_RECONFIGURE

Message ID: 43706


Message Description: LOG_ID_EVENT_WIRELESS_STA_DHCP6_RECONFIGURE
Message Meaning: DHCP6 server sent DHCP6 RECONFIGURE

FortiOS 7.2.1 Log Reference 1155


Fortinet Inc.
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

mac MAC Address string 17

43707 - LOG_ID_EVENT_WIRELESS_WTPR_SSID_UP

Message ID: 43707


Message Description: LOG_ID_EVENT_WIRELESS_WTPR_SSID_UP
Message Meaning: Physical AP radio ssid up

FortiOS 7.2.1 Log Reference 1156


Fortinet Inc.
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

sn Serial Number string 64

ap Access Point string 36

ip ip 39

radioid The operating radio ID uint8 3

bandwidth Bandwidth string 42

configcountry Config Country string 4

opercountry The name of operating country on a AP string 4

cfgtxpower Config TX power uint32 10

opertxpower The value of operating tx power uint32 10

slctdrmamode string 10

operdrmamode string 10

FortiOS 7.2.1 Log Reference 1157


Fortinet Inc.
43708 - LOG_ID_EVENT_WIRELESS_WTPR_SSID_DOWN

Message ID: 43708


Message Description: LOG_ID_EVENT_WIRELESS_WTPR_SSID_DOWN
Message Meaning: Physical AP radio ssid down
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

sn Serial Number string 64

ap Access Point string 36

ip ip 39

radioid The operating radio ID uint8 3

bandwidth Bandwidth string 42

configcountry Config Country string 4

opercountry The name of operating country on a AP string 4

cfgtxpower Config TX power uint32 10

FortiOS 7.2.1 Log Reference 1158


Fortinet Inc.
Log Field Name Description Data Type Length

opertxpower The value of operating tx power uint32 10

slctdrmamode string 10

operdrmamode string 10

43709 - LOG_ID_EVENT_WIRELESS_STA_DHCP_ENFORCEMENT

Message ID: 43709


Message Description: LOG_ID_EVENT_WIRELESS_STA_DHCP_ENFORCEMENT
Message Meaning: Wireless client denied by DHCP enforcement for using static IP address
Type: Event
Category: WIRELESS
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

FortiOS 7.2.1 Log Reference 1159


Fortinet Inc.
Log Field Name Description Data Type Length

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

remotewtptime The time of AP when client trying to connect string 32

server AD server FQDN or IP string 64

43710 - LOG_ID_EVENT_WIRELESS_SAM_IPERF

Message ID: 43710


Message Description: LOG_ID_EVENT_WIRELESS_SAM_IPERF
Message Meaning: SAM iperf test result
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

bssid Basic service set ID string 17

channel Channel uint8 3

FortiOS 7.2.1 Log Reference 1160


Fortinet Inc.
Log Field Name Description Data Type Length

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

remotewtptime The time of AP when client trying to connect string 32

43711 - LOG_ID_EVENT_WIRELESS_SAM_PING

Message ID: 43711


Message Description: LOG_ID_EVENT_WIRELESS_SAM_PING
Message Meaning: SAM ping test result
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 1161


Fortinet Inc.
Log Field Name Description Data Type Length

ssid WiFi Service Set ID string 33

bssid Basic service set ID string 17

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

remotewtptime The time of AP when client trying to connect string 32

43712 - LOG_ID_EVENT_WIRELESS_SAM_AUTH_FAILED

Message ID: 43712


Message Description: LOG_ID_EVENT_WIRELESS_SAM_AUTH_FAILED
Message Meaning: AP as station failed in SAM authentication
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

FortiOS 7.2.1 Log Reference 1162


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

bssid Basic service set ID string 17

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

remotewtptime The time of AP when client trying to connect string 32

43713 - LOG_ID_EVENT_WIRELESS_SAM_CWP_AUTH_FAILED

Message ID: 43713


Message Description: LOG_ID_EVENT_WIRELESS_SAM_CWP_AUTH_FAILED
Message Meaning: AP as station failed in SAM CWP authentication
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 1163


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

bssid Basic service set ID string 17

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

remotewtptime The time of AP when client trying to connect string 32

43714 - LOG_ID_EVENT_WIRELESS_WTP_PARTIAL_PASSWD

Message ID: 43714


Message Description: LOG_ID_EVENT_WIRELESS_WTP_PARTIAL_PASSWD
Message Meaning: AP received partial login password
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 1164


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

sn Serial Number string 64

ap Access Point string 36

profile Profile Name string 64

ip ip 39

meshmode Mesh mode string 19

snmeshparent SN of the mesh parent string 36

reason Reason string 256

43715 - LOG_ID_EVENT_WIRELESS_WTPR_BSS_COLOR_COLLISION

Message ID: 43715


Message Description: LOG_ID_EVENT_WIRELESS_WTPR_BSS_COLOR_COLLISION
Message Meaning: AP radio BSS color collision detected.
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 1165


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

sn Serial Number string 64

ap Access Point string 36

ip ip 39

radioid The operating radio ID uint8 3

bandwidth Bandwidth string 42

configcountry Config Country string 4

opercountry The name of operating country on a AP string 4

cfgtxpower Config TX power uint32 10

opertxpower The value of operating tx power uint32 10

slctdrmamode string 10

operdrmamode string 10

43716 - LOG_ID_EVENT_WIRELESS_ADDRGRP_MAX_FW_ADDR

Message ID: 43716


Message Description: LOG_ID_EVENT_WIRELESS_ADDRGRP_MAX_FW_ADDR
Message Meaning: Wireless addrgrp reached firewal address maximum number
Type: Event
Category: WIRELESS
Severity: Warning

FortiOS 7.2.1 Log Reference 1166


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

addrgrp string 36

43717 - LOG_ID_EVENT_WIRELESS_STA_L3R_REHOME

Message ID: 43717


Message Description: LOG_ID_EVENT_WIRELESS_STA_L3R_REHOME
Message Meaning: Wireless client layer3 roaming rehome
Type: Event
Category: WIRELESS
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 1167


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

radioband The operating radio band string 64

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

signal The signal value of SSID or client int8 4

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

reason Reason string 256

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

user User name of authenticated user string 256

group User group Name string 512

authserver Remote Authentication server string 64

srcip Source IP ip 39

snr int8 4

mpsk Multiple pre-shared keys string 33

43719 - LOG_ID_EVENT_WIRELESS_STA_PROBE_LOW_RSSI

Message ID: 43719


Message Description: LOG_ID_EVENT_WIRELESS_STA_PROBE_LOW_RSSI
Message Meaning: Probe request from wireless station failed due to low rssi
Type: Event
Category: WIRELESS
Severity: Notice

FortiOS 7.2.1 Log Reference 1168


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

ssid WiFi Service Set ID string 33

channel Channel uint8 3

security Security string 40

encryption The encryption type of detected rogue AP string 12

stamac The MAC address of wifi station string 17

sn Serial Number string 64

ap Access Point string 36

vap Virtual Access Point string 36

radioid The operating radio ID uint8 3

remotewtptime The time of AP when client trying to connect string 32

43776 - LOG_ID_EVENT_NAC_QUARANTINE

Message ID: 43776


Message Description: LOG_ID_EVENT_NAC_QUARANTINE
Message Meaning: NAC quarantine
Type: Event
Category: SYSTEM
Severity: Notice

FortiOS 7.2.1 Log Reference 1169


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

service Name of Service string 64

proto Protocol Number uint8 3

srcip Source IP ip 39

srcport Source port uint16 5

dstip Destination IP ip 39

dstport Destination Protocol Port uint16 5

duration Duration uint32 10

profile Profile Name string 64

src_int Source Interface string 64

dst_int Destination Interface string 64

group User group Name string 512

policyid Policy ID uint32 10

banned_src NAC quarantine Banned Source IP string 16

banned_rule NAC quarantine Banned Rule Name string 80

admin Administrator string 64

FortiOS 7.2.1 Log Reference 1170


Fortinet Inc.
43777 - LOG_ID_EVENT_NAC_ANOMALY_QUARANTINE

Message ID: 43777


Message Description: LOG_ID_EVENT_NAC_ANOMALY_QUARANTINE
Message Meaning: NAC anomaly quarantine
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

service Name of Service string 64

proto Protocol Number uint8 3

srcip Source IP ip 39

srcport Source port uint16 5

dstip Destination IP ip 39

dstport Destination Protocol Port uint16 5

duration Duration uint32 10

profile Profile Name string 64

src_int Source Interface string 64

FortiOS 7.2.1 Log Reference 1171


Fortinet Inc.
Log Field Name Description Data Type Length

dst_int Destination Interface string 64

group User group Name string 512

policyid Policy ID uint32 10

banned_src NAC quarantine Banned Source IP string 16

banned_rule NAC quarantine Banned Rule Name string 80

admin Administrator string 64

43800 - LOG_ID_EVENT_ELBC_BLADE_JOIN

Message ID: 43800


Message Description: LOG_ID_EVENT_ELBC_BLADE_JOIN
Message Meaning: Blade ready to process traffic
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

informationsource Information Source string 4096

slot Slot Number uint8 3

chassisid Chassis ID uint8 3

FortiOS 7.2.1 Log Reference 1172


Fortinet Inc.
43801 - LOG_ID_EVENT_ELBC_BLADE_LEAVE

Message ID: 43801


Message Description: LOG_ID_EVENT_ELBC_BLADE_LEAVE
Message Meaning: Blade not ready to process traffic
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

informationsource Information Source string 4096

slot Slot Number uint8 3

chassisid Chassis ID uint8 3

43802 - LOG_ID_EVENT_ELBC_MASTER_BLADE_FOUND

Message ID: 43802


Message Description: LOG_ID_EVENT_ELBC_MASTER_BLADE_FOUND
Message Meaning: Primary blade found
Type: Event
Category: SYSTEM
Severity: Critical

FortiOS 7.2.1 Log Reference 1173


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

informationsource Information Source string 4096

slot Slot Number uint8 3

chassisid Chassis ID uint8 3

43803 - LOG_ID_EVENT_ELBC_MASTER_BLADE_LOST

Message ID: 43803


Message Description: LOG_ID_EVENT_ELBC_MASTER_BLADE_LOST
Message Meaning: Primary blade lost
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 1174


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

informationsource Information Source string 4096

slot Slot Number uint8 3

chassisid Chassis ID uint8 3

43804 - LOG_ID_EVENT_ELBC_MASTER_BLADE_CHANGE

Message ID: 43804


Message Description: LOG_ID_EVENT_ELBC_MASTER_BLADE_CHANGE
Message Meaning: Primary blade changed
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

FortiOS 7.2.1 Log Reference 1175


Fortinet Inc.
Log Field Name Description Data Type Length

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

informationsource Information Source string 4096

oldslot Original Slot Number uint8 3

oldchassisid Original Chassis Number uint8 3

newslot New Slot Number uint8 3

newchassisid New Chassis ID uint8 3

43805 - LOG_ID_EVENT_ELBC_ACTIVE_CHANNEL_FOUND

Message ID: 43805


Message Description: LOG_ID_EVENT_ELBC_ACTIVE_CHANNEL_FOUND
Message Meaning: ELBC channel active
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 1176


Fortinet Inc.
Log Field Name Description Data Type Length

informationsource Information Source string 4096

slot Slot Number uint8 3

chassisid Chassis ID uint8 3

newchannel New Channel Number uint8 3

43806 - LOG_ID_EVENT_ELBC_ACTIVE_CHANNEL_LOST

Message ID: 43806


Message Description: LOG_ID_EVENT_ELBC_ACTIVE_CHANNEL_LOST
Message Meaning: ELBC channel inactive
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

informationsource Information Source string 4096

slot Slot Number uint8 3

chassisid Chassis ID uint8 3

oldchannel Original Channel Number uint8 3

FortiOS 7.2.1 Log Reference 1177


Fortinet Inc.
43807 - LOG_ID_EVENT_ELBC_ACTIVE_CHANNEL_CHANGE

Message ID: 43807


Message Description: LOG_ID_EVENT_ELBC_ACTIVE_CHANNEL_CHANGE
Message Meaning: ELBC channel failover
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

informationsource Information Source string 4096

slot Slot Number uint8 3

chassisid Chassis ID uint8 3

newchannel New Channel Number uint8 3

oldchannel Original Channel Number uint8 3

43808 - LOG_ID_EVENT_ELBC_CHASSIS_ACTIVE

Message ID: 43808


Message Description: LOG_ID_EVENT_ELBC_CHASSIS_ACTIVE
Message Meaning: ELBC chassis active
Type: Event

FortiOS 7.2.1 Log Reference 1178


Fortinet Inc.
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

informationsource Information Source string 4096

chassisid Chassis ID uint8 3

43809 - LOG_ID_EVENT_ELBC_CHASSIS_INACTIVE

Message ID: 43809


Message Description: LOG_ID_EVENT_ELBC_CHASSIS_INACTIVE
Message Meaning: ELBC chassis inactive
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 1179


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

msg Log Message string 4096

informationsource Information Source string 4096

chassisid Chassis ID uint8 3

44544 - LOGID_EVENT_CONFIG_PATH

Message ID: 44544


Message Description: LOGID_EVENT_CONFIG_PATH
Message Meaning: Path configured
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 1180


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

cfgtid Config transaction id uint32 10

cfgpath Configuration path string 128

44545 - LOGID_EVENT_CONFIG_OBJ

Message ID: 44545


Message Description: LOGID_EVENT_CONFIG_OBJ
Message Meaning: Object configured
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 1181


Fortinet Inc.
Log Field Name Description Data Type Length

cfgtid Config transaction id uint32 10

cfgpath Configuration path string 128

cfgobj Configuration object string 256

44546 - LOGID_EVENT_CONFIG_ATTR

Message ID: 44546


Message Description: LOGID_EVENT_CONFIG_ATTR
Message Meaning: Attribute configured
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

cfgtid Config transaction id uint32 10

cfgpath Configuration path string 128

cfgattr Configuration attribute string 4096

FortiOS 7.2.1 Log Reference 1182


Fortinet Inc.
44547 - LOGID_EVENT_CONFIG_OBJATTR

Message ID: 44547


Message Description: LOGID_EVENT_CONFIG_OBJATTR
Message Meaning: Object attribute configured
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

cfgtid Config transaction id uint32 10

cfgpath Configuration path string 128

cfgobj Configuration object string 256

cfgattr Configuration attribute string 4096

44548 - LOGID_EVENT_CONFIG_EXEC

Message ID: 44548


Message Description: LOGID_EVENT_CONFIG_EXEC
Message Meaning: Action performed

FortiOS 7.2.1 Log Reference 1183


Fortinet Inc.
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

44549 - LOGID_EVENT_CONFIG_OBJATTR_MTNER

Message ID: 44549


Message Description: LOGID_EVENT_CONFIG_OBJATTR_MTNER
Message Meaning: Object attribute configured by maintainer
Type: Event
Category: SYSTEM
Severity: Alert

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 1184


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

cfgtid Config transaction id uint32 10

cfgpath Configuration path string 128

cfgobj Configuration object string 256

cfgattr Configuration attribute string 4096

44550 - LOGID_EVENT_CONFIG_OBJ_MTNER

Message ID: 44550


Message Description: LOGID_EVENT_CONFIG_OBJ_MTNER
Message Meaning: Object configured by maintainer
Type: Event
Category: SYSTEM
Severity: Alert

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 1185


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

cfgtid Config transaction id uint32 10

cfgpath Configuration path string 128

cfgobj Configuration object string 256

44551 - LOGID_EVENT_CONFIG_ATTR_MTNER

Message ID: 44551


Message Description: LOGID_EVENT_CONFIG_ATTR_MTNER
Message Meaning: Attribute configured by maintainer
Type: Event
Category: SYSTEM
Severity: Alert

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 1186


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

cfgtid Config transaction id uint32 10

cfgpath Configuration path string 128

cfgattr Configuration attribute string 4096

44552 - LOGID_EVENT_CONFIG_PATH_MTNER

Message ID: 44552


Message Description: LOGID_EVENT_CONFIG_PATH_MTNER
Message Meaning: Path configured by maintainer
Type: Event
Category: SYSTEM
Severity: Alert

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 1187


Fortinet Inc.
Log Field Name Description Data Type Length

user User name of authenticated user string 256

ui User Interface string 64

action Policy Action string 65

msg Log Message string 4096

cfgtid Config transaction id uint32 10

cfgpath Configuration path string 128

44555 - LOGID_EVENT_CMDB_DEADLOCK_DETECTED

Message ID: 44555


Message Description: LOGID_EVENT_CMDB_DEADLOCK_DETECTED
Message Meaning: CMDB lock deadlock is detected.
Type: Event
Category: SYSTEM
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

45057 - LOG_ID_FCC_ADD

Message ID: 45057


Message Description: LOG_ID_FCC_ADD

FortiOS 7.2.1 Log Reference 1188


Fortinet Inc.
Message Meaning: FortiClient connection added
Type: Event
Category: ENDPOINT
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

license_limit Maximum Number of FortiClients for the License string 32

used_for_type Connection for the type uint32 10

connection_type FortiClient Connection Type string 6

count Count of EndPoint Connections uint32 10

user User name of authenticated user string 256

ip Source IP ip 39

name Display Name of the Connection string 128

fctuid FortiClient UID string 32

msg Log Message string 4096

45058 - LOG_ID_FCC_CLOSE

Message ID: 45058


Message Description: LOG_ID_FCC_CLOSE
Message Meaning: FortiClient connection closed
Type: Event

FortiOS 7.2.1 Log Reference 1189


Fortinet Inc.
Category: ENDPOINT
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

license_limit Maximum Number of FortiClients for the License string 32

used_for_type Connection for the type uint32 10

connection_type FortiClient Connection Type string 6

count Count of EndPoint Connections uint32 10

user User name of authenticated user string 256

ip Source IP ip 39

name Display Name of the Connection string 128

fctuid FortiClient UID string 32

msg Log Message string 4096

45061 - LOG_ID_FCC_CLOSE_BY_TYPE

Message ID: 45061


Message Description: LOG_ID_FCC_CLOSE_BY_TYPE
Message Meaning: FortiClient connection closed by type
Type: Event
Category: ENDPOINT
Severity: Information

FortiOS 7.2.1 Log Reference 1190


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

license_limit Maximum Number of FortiClients for the License string 32

used_for_type Connection for the type uint32 10

connection_type FortiClient Connection Type string 6

count Count of EndPoint Connections uint32 10

user User name of authenticated user string 256

ip Source IP ip 39

name Display Name of the Connection string 128

fctuid FortiClient UID string 32

msg Log Message string 4096

45071 - LOG_ID_FCC_VULN_SCAN

Message ID: 45071


Message Description: LOG_ID_FCC_VULN_SCAN
Message Meaning: FortiClient Vulnerability Scan
Type: Event
Category: ENDPOINT
Severity: Notice

FortiOS 7.2.1 Log Reference 1191


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

fctuid FortiClient UID string 32

msg Log Message string 4096

scantime uint64 20

srcip Source IP ip 39

srcname Source name string 64

srcmac Source MAC address string 17

devtype Device type string 32

vulnid Vulnerability ID uint32 10

vulnname Vulnerability name string 128

vulncat Vulnerability Category string 32

severity Severity string 10

cveid CVE ID string 720

vendorurl string 256

45114 - LOG_ID_EC_REG_QUARANTINE

Message ID: 45114


Message Description: LOG_ID_EC_REG_QUARANTINE
Message Meaning: FortiClient endpoint quarantined
Type: Event
Category: ENDPOINT

FortiOS 7.2.1 Log Reference 1192


Fortinet Inc.
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ip Source IP ip 39

fctuid FortiClient UID string 32

msg Log Message string 4096

fctemssn string 16

hostname Hostname string 128

45115 - LOG_ID_EC_REG_UNQUARANTINE

Message ID: 45115


Message Description: LOG_ID_EC_REG_UNQUARANTINE
Message Meaning: FortiClient endpoint quarantine removed
Type: Event
Category: ENDPOINT
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 1193


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ip Source IP ip 39

fctuid FortiClient UID string 32

msg Log Message string 4096

fctemssn string 16

hostname Hostname string 128

45121 - LOG_ID_EC_EMS_WS_NOTIFICATION

Message ID: 45121


Message Description: LOG_ID_EC_EMS_WS_NOTIFICATION
Message Meaning: EMS WebSocket notification
Type: Event
Category: ENDPOINT
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 1194


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

fctemssn string 16

fctemsname string 36

45122 - LOG_ID_EC_EMS_REST_API_ERROR

Message ID: 45122


Message Description: LOG_ID_EC_EMS_REST_API_ERROR
Message Meaning: EMS REST API error
Type: Event
Category: ENDPOINT
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

fctemssn string 16

fctemsname string 36

FortiOS 7.2.1 Log Reference 1195


Fortinet Inc.
Log Field Name Description Data Type Length

url URL string 512

httpcode uint16 3

45123 - LOG_ID_EC_EMS_WS_CONN_ERROR

Message ID: 45123


Message Description: LOG_ID_EC_EMS_WS_CONN_ERROR
Message Meaning: EMS WebSocket connection error
Type: Event
Category: ENDPOINT
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

fctemssn string 16

fctemsname string 36

url URL string 512

wscode uint16 4

45124 - LOG_ID_EC_VPND_CONNECT

Message ID: 45124


Message Description: LOG_ID_EC_VPND_CONNECT

FortiOS 7.2.1 Log Reference 1196


Fortinet Inc.
Message Meaning: FortiClient VPN connected
Type: Event
Category: ENDPOINT
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ip Source IP ip 39

fctuid FortiClient UID string 32

msg Log Message string 4096

sn Serial Number string 64

intf Interface string 16

45125 - LOG_ID_EC_VPND_DISCONNECT

Message ID: 45125


Message Description: LOG_ID_EC_VPND_DISCONNECT
Message Meaning: FortiClient VPN disconnected
Type: Event
Category: ENDPOINT
Severity: Warning

FortiOS 7.2.1 Log Reference 1197


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ip Source IP ip 39

fctuid FortiClient UID string 32

msg Log Message string 4096

sn Serial Number string 64

intf Interface string 16

45126 - LOG_ID_EC_CLOUD_ENTITLEMENT_LOST

Message ID: 45126


Message Description: LOG_ID_EC_CLOUD_ENTITLEMENT_LOST
Message Meaning: EMS Cloud entitlement lost and connection dropped
Type: Event
Category: ENDPOINT
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 1198


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

45128 - LOG_ID_EC_EMS_REST_API_NEW_SUCCESS

Message ID: 45128


Message Description: LOG_ID_EC_EMS_REST_API_NEW_SUCCESS
Message Meaning: EMS REST API recovered from an error
Type: Event
Category: ENDPOINT
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

fctemssn string 16

FortiOS 7.2.1 Log Reference 1199


Fortinet Inc.
Log Field Name Description Data Type Length

fctemsname string 36

url URL string 512

httpcode uint16 3

45129 - LOG_ID_EC_EMS_EMS_VERIFY

Message ID: 45129


Message Description: LOG_ID_EC_EMS_EMS_VERIFY
Message Meaning: FCEMS entry has been verified
Type: Event
Category: ENDPOINT
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

fctemsname string 36

45130 - LOG_ID_EC_EMS_EMS_VERIFY_FAILED

Message ID: 45130


Message Description: LOG_ID_EC_EMS_EMS_VERIFY_FAILED
Message Meaning: FCEMS entry has failed to be verified
Type: Event

FortiOS 7.2.1 Log Reference 1200


Fortinet Inc.
Category: ENDPOINT
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

fctemsname string 36

45131 - LOG_ID_EC_EMS_EMS_UNVERIFY

Message ID: 45131


Message Description: LOG_ID_EC_EMS_EMS_UNVERIFY
Message Meaning: FCEMS entry has been unverified
Type: Event
Category: ENDPOINT
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 1201


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

fctemsname string 36

46000 - LOG_ID_VIP_REAL_SVR_ENA

Message ID: 46000


Message Description: LOG_ID_VIP_REAL_SVR_ENA
Message Meaning: VIP real server enabled
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

server Server IP Address string 64

FortiOS 7.2.1 Log Reference 1202


Fortinet Inc.
Log Field Name Description Data Type Length

port Port Number uint16 5

vip Virtual IP string 64

46001 - LOG_ID_VIP_REAL_SVR_DISA

Message ID: 46001


Message Description: LOG_ID_VIP_REAL_SVR_DISA
Message Meaning: VIP real server disabled
Type: Event
Category: SYSTEM
Severity: Alert

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

server Server IP Address string 64

port Port Number uint16 5

vip Virtual IP string 64

46002 - LOG_ID_VIP_REAL_SVR_UP

Message ID: 46002

FortiOS 7.2.1 Log Reference 1203


Fortinet Inc.
Message Description: LOG_ID_VIP_REAL_SVR_UP
Message Meaning: VIP real server up
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

server Server IP Address string 64

port Port Number uint16 5

vip Virtual IP string 64

46003 - LOG_ID_VIP_REAL_SVR_DOWN

Message ID: 46003


Message Description: LOG_ID_VIP_REAL_SVR_DOWN
Message Meaning: VIP real server down
Type: Event
Category: SYSTEM
Severity: Alert

FortiOS 7.2.1 Log Reference 1204


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

server Server IP Address string 64

port Port Number uint16 5

vip Virtual IP string 64

46004 - LOG_ID_VIP_REAL_SVR_ENT_HOLDDOWN

Message ID: 46004


Message Description: LOG_ID_VIP_REAL_SVR_ENT_HOLDDOWN
Message Meaning: VIP real server entered hold-down
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 1205


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

server Server IP Address string 64

port Port Number uint16 5

vip Virtual IP string 64

46005 - LOG_ID_VIP_REAL_SVR_FAIL_HOLDDOWN

Message ID: 46005


Message Description: LOG_ID_VIP_REAL_SVR_FAIL_HOLDDOWN
Message Meaning: VIP real server health check failed during hold-down
Type: Event
Category: SYSTEM
Severity: Alert

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 1206


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

server Server IP Address string 64

port Port Number uint16 5

vip Virtual IP string 64

46006 - LOG_ID_VIP_REAL_SVR_FAIL

Message ID: 46006


Message Description: LOG_ID_VIP_REAL_SVR_FAIL
Message Meaning: VIP real server health check failed
Type: Event
Category: SYSTEM
Severity: Debug

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

FortiOS 7.2.1 Log Reference 1207


Fortinet Inc.
Log Field Name Description Data Type Length

status Status string 23

msg Log Message string 4096

server Server IP Address string 64

port Port Number uint16 5

vip Virtual IP string 64

monitor-name Health Monitor Type string 35

monitor-type Health Monitor Name string 32

46400 - LOG_ID_EVENT_EXT_SYS

Message ID: 46400


Message Description: LOG_ID_EVENT_EXT_SYS
Message Meaning: FortiExtender system activity
Type: Event
Category: FORTIEXTENDER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

46401 - LOG_ID_EVENT_EXT_LOCAL

Message ID: 46401

FortiOS 7.2.1 Log Reference 1208


Fortinet Inc.
Message Description: LOG_ID_EVENT_EXT_LOCAL
Message Meaning: FortiExtender controller activity
Type: Event
Category: FORTIEXTENDER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

version string 64

sn Serial Number string 64

ip ip 39

action string 65

46402 - LOG_ID_EVENT_EXT_LOCAL_ERROR

Message ID: 46402


Message Description: LOG_ID_EVENT_EXT_LOCAL_ERROR
Message Meaning: FortiExtender controller activity error
Type: Event
Category: FORTIEXTENDER
Severity: Error

FortiOS 7.2.1 Log Reference 1209


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

version string 64

sn Serial Number string 64

ip ip 39

action string 65

46403 - LOG_ID_EVENT_EXT_REMOTE_EMERG

Message ID: 46403


Message Description: LOG_ID_EVENT_EXT_REMOTE_EMERG
Message Meaning: Remote FortiExtender emergency activity
Type: Event
Category: FORTIEXTENDER
Severity: Emergency

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 1210


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

sn Serial Number string 64

ip ip 39

46404 - LOG_ID_EVENT_EXT_REMOTE_ALERT

Message ID: 46404


Message Description: LOG_ID_EVENT_EXT_REMOTE_ALERT
Message Meaning: Remote FortiExtender alert activity
Type: Event
Category: FORTIEXTENDER
Severity: Alert

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 1211


Fortinet Inc.
Log Field Name Description Data Type Length

sn Serial Number string 64

ip ip 39

46405 - LOG_ID_EVENT_EXT_REMOTE_CRITICAL

Message ID: 46405


Message Description: LOG_ID_EVENT_EXT_REMOTE_CRITICAL
Message Meaning: Remote FortiExtender critical activity
Type: Event
Category: FORTIEXTENDER
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

sn Serial Number string 64

ip ip 39

46406 - LOG_ID_EVENT_EXT_REMOTE_ERROR

Message ID: 46406


Message Description: LOG_ID_EVENT_EXT_REMOTE_ERROR
Message Meaning: Remote FortiExtender error activity
Type: Event

FortiOS 7.2.1 Log Reference 1212


Fortinet Inc.
Category: FORTIEXTENDER
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

sn Serial Number string 64

ip ip 39

46407 - LOG_ID_EVENT_EXT_REMOTE_WARNING

Message ID: 46407


Message Description: LOG_ID_EVENT_EXT_REMOTE_WARNING
Message Meaning: Remote FortiExtender warning activity
Type: Event
Category: FORTIEXTENDER
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 1213


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

sn Serial Number string 64

ip ip 39

46408 - LOG_ID_EVENT_EXT_REMOTE_NOTIF

Message ID: 46408


Message Description: LOG_ID_EVENT_EXT_REMOTE_NOTIF
Message Meaning: Remote FortiExtender notify activity
Type: Event
Category: FORTIEXTENDER
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

sn Serial Number string 64

ip ip 39

FortiOS 7.2.1 Log Reference 1214


Fortinet Inc.
46409 - LOG_ID_EVENT_EXT_REMOTE_INFO

Message ID: 46409


Message Description: LOG_ID_EVENT_EXT_REMOTE_INFO
Message Meaning: Remote FortiExtender info activity
Type: Event
Category: FORTIEXTENDER
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

sn Serial Number string 64

ip ip 39

46410 - LOG_ID_EVENT_EXT_REMOTE_DEBUG

Message ID: 46410


Message Description: LOG_ID_EVENT_EXT_REMOTE_DEBUG
Message Meaning: Remote FortiExtender debug activity
Type: Event
Category: FORTIEXTENDER
Severity: Debug

FortiOS 7.2.1 Log Reference 1215


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

sn Serial Number string 64

ip ip 39

46501 - LOG_ID_INTERNAL_LTE_MODEM_DETECTION

Message ID: 46501


Message Description: LOG_ID_INTERNAL_LTE_MODEM_DETECTION
Message Meaning: LTE modem detection
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 1216


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

46502 - LOG_ID_INTERNAL_LTE_MODEM_GPSD

Message ID: 46502


Message Description: LOG_ID_INTERNAL_LTE_MODEM_GPSD
Message Meaning: LTE modem GPS daemon started or stopped
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

46503 - LOG_ID_INTERNAL_LTE_MODEM_GPS_LOC_ACQUISITION

Message ID: 46503


Message Description: LOG_ID_INTERNAL_LTE_MODEM_GPS_LOC_ACQUISITION
Message Meaning: LTE modem GPS location acquisition

FortiOS 7.2.1 Log Reference 1217


Fortinet Inc.
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

46504 - LOG_ID_INTERNAL_LTE_MODEM_BILLD

Message ID: 46504


Message Description: LOG_ID_INTERNAL_LTE_MODEM_BILLD
Message Meaning: LTE modem billing daemon started or stopped
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 1218


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

46505 - LOG_ID_INTERNAL_LTE_MODEM_BILLING_PURGED

Message ID: 46505


Message Description: LOG_ID_INTERNAL_LTE_MODEM_BILLING_PURGED
Message Meaning: LTE billing data purged
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

46506 - LOG_ID_INTERNAL_LTE_MODEM_BILLING_DAILY_LOG

Message ID: 46506


Message Description: LOG_ID_INTERNAL_LTE_MODEM_BILLING_DAILY_LOG

FortiOS 7.2.1 Log Reference 1219


Fortinet Inc.
Message Meaning: LTE billing daily usage information
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

46507 - LOG_ID_INTERNAL_LTE_MODEM_FW_UPGRADE

Message ID: 46507


Message Description: LOG_ID_INTERNAL_LTE_MODEM_FW_UPGRADE
Message Meaning: LTE modem firmware upgrade event
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 1220


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

46508 - LOG_ID_INTERNAL_LTE_MODEM_QDL_DETECTION

Message ID: 46508


Message Description: LOG_ID_INTERNAL_LTE_MODEM_QDL_DETECTION
Message Meaning: LTE modem QDL device detection event
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

46509 - LOG_ID_INTERNAL_LTE_MODEM_REBOOT

Message ID: 46509

FortiOS 7.2.1 Log Reference 1221


Fortinet Inc.
Message Description: LOG_ID_INTERNAL_LTE_MODEM_REBOOT
Message Meaning: LTE modem reboot event
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

46510 - LOG_ID_INTERNAL_LTE_MODEM_OP_MODE

Message ID: 46510


Message Description: LOG_ID_INTERNAL_LTE_MODEM_OP_MODE
Message Meaning: LTE modem operation mode
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

FortiOS 7.2.1 Log Reference 1222


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

46511 - LOG_ID_INTERNAL_LTE_MODEM_POWER_ON_OFF

Message ID: 46511


Message Description: LOG_ID_INTERNAL_LTE_MODEM_POWER_ON_OFF
Message Meaning: LTE modem powered on or powered off
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 1223


Fortinet Inc.
46512 - LOG_ID_INTERNAL_LTE_MODEM_SIM_STATE

Message ID: 46512


Message Description: LOG_ID_INTERNAL_LTE_MODEM_SIM_STATE
Message Meaning: LTE modem sim card state event
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

46513 - LOG_ID_INTERNAL_LTE_MODEM_LINK_CONNECTION

Message ID: 46513


Message Description: LOG_ID_INTERNAL_LTE_MODEM_LINK_CONNECTION
Message Meaning: LTE modem data link connection event
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 1224


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

46514 - LOG_ID_INTERNAL_LTE_MODEM_MANUAL_HANDOVER

Message ID: 46514


Message Description: LOG_ID_INTERNAL_LTE_MODEM_MANUAL_HANDOVER
Message Meaning: LTE modem manual handover event
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 1225


Fortinet Inc.
46515 - LOG_ID_INTERNAL_LTE_MODEM_IP_ADDR

Message ID: 46515


Message Description: LOG_ID_INTERNAL_LTE_MODEM_IP_ADDR
Message Meaning: LTE modem ip address event
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

46516 - LOG_ID_INTERNAL_LTE_MODEM_BEARER_TECH_CHANGE

Message ID: 46516


Message Description: LOG_ID_INTERNAL_LTE_MODEM_BEARER_TECH_CHANGE
Message Meaning: LTE modem bearer event
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 1226


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

46517 - LOG_ID_INTERNAL_LTE_MODEM_WRONG_PIN

Message ID: 46517


Message Description: LOG_ID_INTERNAL_LTE_MODEM_WRONG_PIN
Message Meaning: LTE unlock SIM PIM failed.
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 1227


Fortinet Inc.
46600 - LOG_ID_EVENT_AUTOMATION_TRIGGERED

Message ID: 46600


Message Description: LOG_ID_EVENT_AUTOMATION_TRIGGERED
Message Meaning: Automation stitch triggered
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

stitch Automation stitch name string 36

trigger Automation trigger name string 36

stitchaction string 256

from Sender Email Address for Notification string 128

46900 - LOG_ID_POE_STATUS_REPORT

Message ID: 46900


Message Description: LOG_ID_POE_STATUS_REPORT
Message Meaning: PoE device status reported
Type: Event
Category: SYSTEM
Severity: Error

FortiOS 7.2.1 Log Reference 1228


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

47000 - LOG_ID_MALWARE_LIST_TRUNCATED_ENTER

Message ID: 47000


Message Description: LOG_ID_MALWARE_LIST_TRUNCATED_ENTER
Message Meaning: External blocklist list is truncated
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

FortiOS 7.2.1 Log Reference 1229


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

47001 - LOG_ID_MALWARE_LIST_TRUNCATED_EXIT

Message ID: 47001


Message Description: LOG_ID_MALWARE_LIST_TRUNCATED_EXIT
Message Meaning: External blocklist list is no longer truncated
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

47002 - LOG_ID_FILE_HASH_EMS_LIST_TRUNCATED_ENTER

Message ID: 47002


Message Description: LOG_ID_FILE_HASH_EMS_LIST_TRUNCATED_ENTER
Message Meaning: EMS file-hash list is truncated
Type: Event
Category: SYSTEM

FortiOS 7.2.1 Log Reference 1230


Fortinet Inc.
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

47003 - LOG_ID_FILE_HASH_EMS_LIST_TRUNCATED_EXIT

Message ID: 47003


Message Description: LOG_ID_FILE_HASH_EMS_LIST_TRUNCATED_EXIT
Message Meaning: EMS file-hash list is no longer truncated
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 1231


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

47004 - LOG_ID_FILE_HASH_EMS_LIST_LOAD

Message ID: 47004


Message Description: LOG_ID_FILE_HASH_EMS_LIST_LOAD
Message Meaning: EMS file-hash list loaded
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

reason Reason string 256

desc Description string 128

47203 - LOG_ID_ENTER_BYPASS

Message ID: 47203


Message Description: LOG_ID_ENTER_BYPASS

FortiOS 7.2.1 Log Reference 1232


Fortinet Inc.
Message Meaning: Bypass ports pair entered bypass mode
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

47204 - LOG_ID_EXIT_BYPASS

Message ID: 47204


Message Description: LOG_ID_EXIT_BYPASS
Message Meaning: Bypass ports pair exited bypass mode
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 1233


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

47301 - LOG_ID_EVENT_REST_API_OK

Message ID: 47301


Message Description: LOG_ID_EVENT_REST_API_OK
Message Meaning: REST API request success
Type: Event
Category: REST-API
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

method Method string 64

FortiOS 7.2.1 Log Reference 1234


Fortinet Inc.
Log Field Name Description Data Type Length

path string 512

status Status string 23

url URL string 512

47302 - LOG_ID_EVENT_REST_API_ERR

Message ID: 47302


Message Description: LOG_ID_EVENT_REST_API_ERR
Message Meaning: REST API request failed
Type: Event
Category: REST-API
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

ui User Interface string 64

method Method string 64

path string 512

status Status string 23

url URL string 512

FortiOS 7.2.1 Log Reference 1235


Fortinet Inc.
48040 - LOG_ID_WAD_WANOPT_TUNNEL_CREATE

Message ID: 48040


Message Description: LOG_ID_WAD_WANOPT_TUNNEL_CREATE
Message Meaning: WANOPT Tunnel successfully created
Type: Event
Category: WAD
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

policyid Policy ID uint32 10

srcip Source IP ip 39

srcport Source port uint16 5

dstip Destination IP ip 39

dstport Destination Protocol Port uint16 5

authgrp Authorization Group string 36

peer Address type string 36

48041 - LOG_ID_WAD_WANOPT_TUNNEL_CLOSED

Message ID: 48041

FortiOS 7.2.1 Log Reference 1236


Fortinet Inc.
Message Description: LOG_ID_WAD_WANOPT_TUNNEL_CLOSED
Message Meaning: WANOPT Tunnel closed
Type: Event
Category: WAD
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

tunnelid IPsec VPN tunnel ID uint32 10

tunneltype IPsec VPN tunnel type string 64

policyid Policy ID uint32 10

srcip Source IP ip 39

srcport Source port uint16 5

dstip Destination IP ip 39

dstport Destination Protocol Port uint16 5

peer Address type string 36

remotetunnelid uint32 10

wanout uint64 20

wanin uint64 20

48101 - LOG_ID_WAD_AUTH_FAIL_PSK

Message ID: 48101

FortiOS 7.2.1 Log Reference 1237


Fortinet Inc.
Message Description: LOG_ID_WAD_AUTH_FAIL_PSK
Message Meaning: WAN Optimization peer PSK authentication failed
Type: Event
Category: WAD
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

policyid Policy ID uint32 10

srcip Source IP ip 39

srcport Source port uint16 5

dstip Destination IP ip 39

dstport Destination Protocol Port uint16 5

authgrp Authorization Group string 36

serial Serial Number uint32 10

host Host Name string 256

48102 - LOG_ID_WAD_AUTH_FAIL_OTH

Message ID: 48102


Message Description: LOG_ID_WAD_AUTH_FAIL_OTH
Message Meaning: WAN Optimization peer authentication failed
Type: Event
Category: WAD

FortiOS 7.2.1 Log Reference 1238


Fortinet Inc.
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

policyid Policy ID uint32 10

srcip Source IP ip 39

srcport Source port uint16 5

dstip Destination IP ip 39

dstport Destination Protocol Port uint16 5

authgrp Authorization Group string 36

peer Address type string 36

serial Serial Number uint32 10

48301 - LOG_ID_UNEXP_APP_TYPE

Message ID: 48301


Message Description: LOG_ID_UNEXP_APP_TYPE
Message Meaning: Unexpected application type for WAN Optimization
Type: Event
Category: WAD
Severity: Critical

FortiOS 7.2.1 Log Reference 1239


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

policyid Policy ID uint32 10

srcip Source IP ip 39

srcport Source port uint16 5

dstip Destination IP ip 39

dstport Destination Protocol Port uint16 5

session_id Session ID uint32 10

app-type Application type string 64

49002 - LOG_ID_VNP_DPDK_PRIMARY_RESTART

Message ID: 49002


Message Description: LOG_ID_VNP_DPDK_PRIMARY_RESTART
Message Meaning: VNP Primary restarted
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 1240


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

49004 - LOGID_EVENT_HYPERV_SRIOV_SHOW_UP

Message ID: 49004


Message Description: LOGID_EVENT_HYPERV_SRIOV_SHOW_UP
Message Meaning: Hyper-V SR-IOV VF secondary is hot plugged
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 1241


Fortinet Inc.
49005 - LOGID_EVENT_HYPERV_SRIOV_DISAPPEAR

Message ID: 49005


Message Description: LOGID_EVENT_HYPERV_SRIOV_DISAPPEAR
Message Meaning: Hyper-V SR-IOV VF secondary is hot unplugged
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

51000 - LOG_ID_NB_TBL_CHG

Message ID: 51000


Message Description: LOG_ID_NB_TBL_CHG
Message Meaning: Neighbor table changed
Type: Event
Category: ROUTER
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 1242


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

action Policy Action string 65

service Name of Service string 64

mac MAC Address string 17

src_int Source Interface string 64

srcip Source IP ip 39

52000 - LOG_ID_EVENT_SECURITY_AUDIT_FABRIC_SUMMARY

Message ID: 52000


Message Description: LOG_ID_EVENT_SECURITY_AUDIT_FABRIC_SUMMARY
Message Meaning: Security Rating summary
Type: Event
Category: SECURITY-RATING
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

FortiOS 7.2.1 Log Reference 1243


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

auditid Security Rating ID uint64 20

audittime Security Rating time uint64 20

auditscore Security Rating score string 20

auditreporttype Security Rating report type string 20

criticalcount Critical level threat count int32 10

highcount Security Rating result failed count for high severity int32 10

mediumcount Security Rating result failed count for medium severity int32 10

lowcount Security Rating result failed count for low severity int32 10

passedcount Security Rating result passed count int32 10

52001 - LOG_ID_EVENT_SECURITY_AUDIT_FABRIC_CHANGE

Message ID: 52001


Message Description: LOG_ID_EVENT_SECURITY_AUDIT_FABRIC_CHANGE
Message Meaning: Security Rating result change
Type: Event
Category: SECURITY-RATING
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 1244


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

auditid Security Rating ID uint64 20

audittime Security Rating time uint64 20

auditscore Security Rating score string 20

auditreporttype Security Rating report type string 20

criticalcount Critical level threat count int32 10

highcount Security Rating result failed count for high severity int32 10

mediumcount Security Rating result failed count for medium severity int32 10

lowcount Security Rating result failed count for low severity int32 10

passedcount Security Rating result passed count int32 10

53000 - LOG_ID_SDNC_CONNECTED

Message ID: 53000


Message Description: LOG_ID_SDNC_CONNECTED
Message Meaning: Connected to SDN server
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 1245


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

53001 - LOG_ID_SDNC_DISCONNECTED

Message ID: 53001


Message Description: LOG_ID_SDNC_DISCONNECTED
Message Meaning: Disconnected from SDN server
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

user User name of authenticated user string 256

action Policy Action string 65

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 1246


Fortinet Inc.
53002 - LOG_ID_SDNC_SUBSCRIBE

Message ID: 53002


Message Description: LOG_ID_SDNC_SUBSCRIBE
Message Meaning: Dynamic SDN address channel opened
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

53003 - LOG_ID_SDNC_UNSUBSCRIBE

Message ID: 53003


Message Description: LOG_ID_SDNC_UNSUBSCRIBE
Message Meaning: Dynamic SDN address channel closed
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 1247


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

53100 - LOG_ID_VPN_OCVPN_REGISTERED

Message ID: 53100


Message Description: LOG_ID_VPN_OCVPN_REGISTERED
Message Meaning: Overlay Controller VPN registered
Type: Event
Category: VPN
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

FortiOS 7.2.1 Log Reference 1248


Fortinet Inc.
Log Field Name Description Data Type Length

msg Log Message string 4096

status Status string 23

53101 - LOG_ID_VPN_OCVPN_UNREGISTERED

Message ID: 53101


Message Description: LOG_ID_VPN_OCVPN_UNREGISTERED
Message Meaning: Overlay Controller VPN unregistered
Type: Event
Category: VPN
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

status Status string 23

53102 - LOG_ID_VPN_OCVPN_COMM_ESTABLISHED

Message ID: 53102


Message Description: LOG_ID_VPN_OCVPN_COMM_ESTABLISHED
Message Meaning: Overlay Controller VPN server communication established
Type: Event
Category: VPN

FortiOS 7.2.1 Log Reference 1249


Fortinet Inc.
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

status Status string 23

53103 - LOG_ID_VPN_OCVPN_COMM_ERROR

Message ID: 53103


Message Description: LOG_ID_VPN_OCVPN_COMM_ERROR
Message Meaning: Overlay Controller VPN server communication error
Type: Event
Category: VPN
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 1250


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

status Status string 23

53104 - LOG_ID_VPN_OCVPN_DNS_ERROR

Message ID: 53104


Message Description: LOG_ID_VPN_OCVPN_DNS_ERROR
Message Meaning: Overlay Controller VPN DNS error
Type: Event
Category: VPN
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

status Status string 23

53105 - LOG_ID_VPN_OCVPN_ROUTE_ERROR

Message ID: 53105

FortiOS 7.2.1 Log Reference 1251


Fortinet Inc.
Message Description: LOG_ID_VPN_OCVPN_ROUTE_ERROR
Message Meaning: Overlay Controller VPN routing error
Type: Event
Category: VPN
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

status Status string 23

53200 - LOG_ID_CONNECTOR_OBJECT_ADD

Message ID: 53200


Message Description: LOG_ID_CONNECTOR_OBJECT_ADD
Message Meaning: Dynamic address added
Type: Event
Category: CONNECTOR
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 1252


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

cfgobj Configuration object string 256

action Policy Action string 65

addr IP Address string 80

port Port Number uint16 5

protocol string 128

cldobjid string 128

netid string 128

msg Log Message string 4096

53201 - LOG_ID_CONNECTOR_OBJECT_REMOVE

Message ID: 53201


Message Description: LOG_ID_CONNECTOR_OBJECT_REMOVE
Message Meaning: Dynamic address removed
Type: Event
Category: CONNECTOR
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 1253


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

cfgobj Configuration object string 256

action Policy Action string 65

addr IP Address string 80

port Port Number uint16 5

protocol string 128

cldobjid string 128

netid string 128

msg Log Message string 4096

53202 - LOG_ID_CONNECTOR_API_FAILED

Message ID: 53202


Message Description: LOG_ID_CONNECTOR_API_FAILED
Message Meaning: SDN Connector API failed
Type: Event
Category: CONNECTOR
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 1254


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

addr IP Address string 80

msg Log Message string 4096

fctemssn string 16

53203 - LOG_ID_CONNECTOR_OBJECT_UPDATE

Message ID: 53203


Message Description: LOG_ID_CONNECTOR_OBJECT_UPDATE
Message Meaning: Dynamic address updated.
Type: Event
Category: CONNECTOR
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

addr IP Address string 80

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 1255


Fortinet Inc.
53204 - LOG_ID_CONNECTOR_OBJECT_CANT_ADD

Message ID: 53204


Message Description: LOG_ID_CONNECTOR_OBJECT_CANT_ADD
Message Meaning: Dynamic address can't be added
Type: Event
Category: CONNECTOR
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

addr IP Address string 80

msg Log Message string 4096

fctemssn string 16

53205 - LOG_ID_CONNECTOR_OBJECT_CANT_REMOVE

Message ID: 53205


Message Description: LOG_ID_CONNECTOR_OBJECT_CANT_REMOVE
Message Meaning: Dynamic address can't be removed
Type: Event
Category: CONNECTOR
Severity: Warning

FortiOS 7.2.1 Log Reference 1256


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

addr IP Address string 80

msg Log Message string 4096

fctemssn string 16

53300 - LOG_ID_VNE_PRO_UPDATE_COMPLETED

Message ID: 53300


Message Description: LOG_ID_VNE_PRO_UPDATE_COMPLETED
Message Meaning: VNE provision server update completed
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

FortiOS 7.2.1 Log Reference 1257


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

server Server IP Address string 64

hostname Hostname string 128

53301 - LOG_ID_VNE_PRO_UPDATE_FAILED

Message ID: 53301


Message Description: LOG_ID_VNE_PRO_UPDATE_FAILED
Message Meaning: VNE provision server update failed
Type: Event
Category: SYSTEM
Severity: Information

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

error Error Reason for Log Upload to Forticloud string 256

server Server IP Address string 64

hostname Hostname string 128

FortiOS 7.2.1 Log Reference 1258


Fortinet Inc.
53311 - LOG_ID_NPU_PER_MAPPING_ALLOCATION

Message ID: 53311


Message Description: LOG_ID_NPU_PER_MAPPING_ALLOCATION
Message Meaning: Resource per mapping allocation
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

53312 - LOG_ID_NPD_INFO

Message ID: 53312


Message Description: LOG_ID_NPD_INFO
Message Meaning: NPD INFO
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

FortiOS 7.2.1 Log Reference 1259


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

53313 - LOG_ID_NPD_WARNING

Message ID: 53313


Message Description: LOG_ID_NPD_WARNING
Message Meaning: NPD WARNING MSG
Type: Event
Category: SYSTEM
Severity: Warning

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 1260


Fortinet Inc.
53314 - LOG_ID_NPD_ERROR

Message ID: 53314


Message Description: LOG_ID_NPD_ERROR
Message Meaning: NPD ERROR MSG
Type: Event
Category: SYSTEM
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

53315 - LOG_ID_LPM_ERROR

Message ID: 53315


Message Description: LOG_ID_LPM_ERROR
Message Meaning: LPM ERROR MSG
Type: Event
Category: SYSTEM
Severity: Error

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

FortiOS 7.2.1 Log Reference 1261


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

53316 - LOG_ID_LPM_INFO

Message ID: 53316


Message Description: LOG_ID_LPM_INFO
Message Meaning: LPM INFO MSG
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

msg Log Message string 4096

FortiOS 7.2.1 Log Reference 1262


Fortinet Inc.
53400 - LOG_ID_FMG_TUNNEL_UP

Message ID: 53400


Message Description: LOG_ID_FMG_TUNNEL_UP
Message Meaning: FortiManager tunnel connection up
Type: Event
Category: SYSTEM
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

53401 - LOG_ID_FMG_TUNNEL_DOWN

Message ID: 53401


Message Description: LOG_ID_FMG_TUNNEL_DOWN
Message Meaning: FortiManager tunnel connection down
Type: Event
Category: SYSTEM
Severity: Warning

FortiOS 7.2.1 Log Reference 1263


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

time Time string 8

logid Log ID string 10

type Log Type string 16

subtype Log Subtype string 20

level Log Level string 11

devid Device ID string 16

vd Virtual Domain Name string 32

eventtime Event time uint64 20

tz Time zone string 5

logdesc Log Description string 4096

action Policy Action string 65

status Status string 23

msg Log Message string 4096

63002 - LOG_ID_CIFS_CONN_FAIL

Message ID: 63002


Message Description: LOG_ID_CIFS_CONN_FAIL
Message Meaning: Unable to connect to the CIFS Domain Controller
Type: Event
Category: CIFS-AUTH-FAIL
Severity: Warning

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

FortiOS 7.2.1 Log Reference 1264


Fortinet Inc.
Log Field Name Description Data Type Length

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

srcintfrole string 10

dstintfrole string 10

srcip ip 39

dstip ip 39

srcport uint16 5

dstport uint16 5

src_int string 64

dst_int string 64

policyid uint32 10

profile string 64

domainctrlip ip 39

domainctrlname string 64

domainctrldomain string 80

domainctrlusername string 65

domainctrlauthstate uint32 5

domainctrlauthtype uint32 5

domainctrlprotocoltype uint32 5

error string 256

msg string 4096

63003 - LOG_ID_CIFS_AUTH_FAIL

Message ID: 63003


Message Description: LOG_ID_CIFS_AUTH_FAIL
Message Meaning: Unable to authenticate with the CIFS Domain Controller
Type: Event
Category: CIFS-AUTH-FAIL
Severity: Warning

FortiOS 7.2.1 Log Reference 1265


Fortinet Inc.
Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

srcintfrole string 10

dstintfrole string 10

srcip ip 39

dstip ip 39

srcport uint16 5

dstport uint16 5

src_int string 64

dst_int string 64

policyid uint32 10

profile string 64

domainctrlip ip 39

domainctrlname string 64

domainctrldomain string 80

domainctrlusername string 65

domainctrlauthstate uint32 5

domainctrlauthtype uint32 5

domainctrlprotocoltype uint32 5

error string 256

msg string 4096

FortiOS 7.2.1 Log Reference 1266


Fortinet Inc.
63004 - LOG_ID_CIFS_AUTH_INTERNAL_ERROR

Message ID: 63004


Message Description: LOG_ID_CIFS_AUTH_INTERNAL_ERROR
Message Meaning: An error occurred in processing CIFS authentication
Type: Event
Category: CIFS-AUTH-FAIL
Severity: Warning

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

srcintfrole string 10

dstintfrole string 10

srcip ip 39

dstip ip 39

srcport uint16 5

dstport uint16 5

src_int string 64

dst_int string 64

policyid uint32 10

profile string 64

domainctrlip ip 39

domainctrlname string 64

FortiOS 7.2.1 Log Reference 1267


Fortinet Inc.
Log Field Name Description Data Type Length

domainctrldomain string 80

domainctrlusername string 65

domainctrlauthstate uint32 5

domainctrlauthtype uint32 5

domainctrlprotocoltype uint32 5

error string 256

msg string 4096

63005 - LOG_ID_CIFS_AUTH_KRB_ERROR

Message ID: 63005


Message Description: LOG_ID_CIFS_AUTH_KRB_ERROR
Message Meaning: An error occurred in processing CIFS authentication.
Type: Event
Category: CIFS-AUTH-FAIL
Severity: Warning

Log Field Name Description Data Type Length

date string 10

time string 8

logid string 10

type string 16

subtype string 20

level string 11

devid string 16

vd string 32

eventtime uint64 20

tz string 5

logdesc string 4096

srcintfrole string 10

dstintfrole string 10

srcip ip 39

FortiOS 7.2.1 Log Reference 1268


Fortinet Inc.
Log Field Name Description Data Type Length

dstip ip 39

srcport uint16 5

dstport uint16 5

src_int string 64

dst_int string 64

policyid uint32 10

profile string 64

domainctrlip ip 39

domainctrlname string 64

domainctrldomain string 80

domainctrlusername string 65

domainctrlauthstate uint32 5

domainctrlauthtype uint32 5

domainctrlprotocoltype uint32 5

error string 256

msg string 4096

FortiOS 7.2.1 Log Reference 1269


Fortinet Inc.
FILE-FILTER

64000 - LOG_ID_FILE_FILTER_BLOCK

Message ID: 64000


Message Description: LOG_ID_FILE_FILTER_BLOCK
Message Meaning: File was blocked by file filter
Type: FILE-FILTER
Category: FILE-FILTER
Severity: Warning

Log Field Name Description Data Type Length

action string 20

agent string 1024

attachment string 3

authserver string 64

cc string 512

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

eventtime uint64 20

eventtype string 32

fctuid string 32

filename string 256

FortiOS 7.2.1 Log Reference 1270


Fortinet Inc.
Log Field Name Description Data Type Length

filesize uint64 10

filetype string 23

filtername string 36

forwardedfor string 128

from string 128

group string 512

hostname string 256

httpmethod string 20

level string 11

logid string 10

matchfilename string 256

matchfiletype string 23

msg string 512

pathname string 256

policyid uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

rawdata string 1024

recipient string 512

referralurl string 512

sender string 128

service string 36

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

FortiOS 7.2.1 Log Reference 1271


Fortinet Inc.
Log Field Name Description Data Type Length

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

url string 512

user string 256

vd string 32

vrf uint8 3

64001 - LOG_ID_FILE_FILTER_LOG

Message ID: 64001


Message Description: LOG_ID_FILE_FILTER_LOG
Message Meaning: File was detected by file filter
Type: FILE-FILTER
Category: FILE-FILTER
Severity: Notice

Log Field Name Description Data Type Length

action string 20

agent string 1024

attachment string 3

FortiOS 7.2.1 Log Reference 1272


Fortinet Inc.
Log Field Name Description Data Type Length

authserver string 64

cc string 512

date string 10

devid string 16

direction string 8

dstauthserver string 64

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

eventtime uint64 20

eventtype string 32

fctuid string 32

filename string 256

filesize uint64 10

filetype string 23

filtername string 36

forwardedfor string 128

from string 128

group string 512

hostname string 256

httpmethod string 20

level string 11

logid string 10

matchfilename string 256

matchfiletype string 23

msg string 512

FortiOS 7.2.1 Log Reference 1273


Fortinet Inc.
Log Field Name Description Data Type Length

pathname string 256

policyid uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

rawdata string 1024

recipient string 512

referralurl string 512

sender string 128

service string 36

sessionid uint32 10

sharename string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subject string 256

subservice string 16

subtype string 20

time string 8

to string 512

trueclntip ip 39

type string 16

tz string 5

unauthuser string 66

FortiOS 7.2.1 Log Reference 1274


Fortinet Inc.
Log Field Name Description Data Type Length

unauthusersource string 66

url string 512

user string 256

vd string 32

vrf uint8 3

FortiOS 7.2.1 Log Reference 1275


Fortinet Inc.
FORTI-SWITCH

56001 - LOG_ID_FSW_FLOW

Message ID: 56001


Message Description: LOG_ID_FSW_FLOW
Message Meaning: (null)
Type: FORTI-SWITCH
Category: FSW-FLOW
Severity: Information

Log Field Name Description Data Type Length

date string 10

devid string 16

dstip ip 39

duration uint32 10

eventtime uint64 20

ftlkintf string 32

level string 11

logid string 10

proto uint8 3

rcvdbyte uint32 10

rcvdpkt uint32 10

srcip ip 39

subtype string 20

switchid string 32

time string 8

type string 16

tz string 5

vd string 32

FortiOS 7.2.1 Log Reference 1276


Fortinet Inc.
GTP

41216 - LOGID_GTP_FORWARD

Message ID: 41216


Message Description: LOGID_GTP_FORWARD
Message Meaning: GTP forward
Type: GTP
Category: GTP-ALL
Severity: Information

Log Field Name Description Data Type Length

apn Access Point Name string 128

c-gsn Control Plane GSN ip 39

cgsn6 ip 39

cpteid Control Plane teid (either downlink or uplink) uint32 10

date Date string 10

deny_cause Deny Cause string 25

devid Device ID string 16

dstport Destination Port uint16 5

dtlexp Detailed Explanation string 64

end-usr-address End user IP Address ip 39

endusraddress6 ip 39

eventtime Event time line uint64 20

from From ip 128

from6 ip 39

headerteid Tunnel Endpoint ID Header uint32 10

ietype Malformed GTP IE number uint8 3

imei-sv IMEI(International Mobile Equipment Identity) Software string 32


Version

imsi International mobile subscriber ID string 16

level Log Level string 11

FortiOS 7.2.1 Log Reference 1277


Fortinet Inc.
Log Field Name Description Data Type Length

linked-nsapi Linked Netscape Server Application Programming Interface uint8 3

logid Log ID string 10

msg-type Message Type string 50

msisdn Mobile Subscriber Integrated Services Digital Network- string 16


Number (telephone # to a SIM card)

nsapi Netscape Server Application Programming Interface uint8 3

profile Profile Name string 64

rai Routing Area Identifier string 32

rat-type Radio Access Technology type string 7

selection APN selection, which is one IE in gtp packet string 14

seqnum GTP packet sequence number uint32 10

srcport Source Port uint16 5

status Status string 23

subtype Log Subtype string 20

time Time string 8

timeoutdelete uint8 3

to To ip 512

to6 ip 39

tunnel-idx Tunnel serial number, internally assigned uint32 10

type Log Type string 16

tz Time zone string 5

u-gsn User Plane GSN ip 39

ugsn6 ip 39

uli User Location Information string 120

ulimcc uint16 3

ulimnc uint16 3

upteid uint32 10

vd Virtual Domain Name string 32

version Version uint32 64

41217 - LOGID_GTP_DENY

Message ID: 41217

FortiOS 7.2.1 Log Reference 1278


Fortinet Inc.
Message Description: LOGID_GTP_DENY
Message Meaning: GTP deny
Type: GTP
Category: GTP-ALL
Severity: Information

Log Field Name Description Data Type Length

apn Access Point Name string 128

c-gsn Control Plane GSN ip 39

cgsn6 ip 39

cpteid Control Plane teid (either downlink or uplink) uint32 10

date Date string 10

deny_cause Deny Cause string 25

devid Device ID string 16

dstport Destination Port uint16 5

dtlexp Detailed Explanation string 64

end-usr-address End user IP Address ip 39

endusraddress6 ip 39

eventtime Event time line uint64 20

from From ip 128

from6 ip 39

headerteid Tunnel Endpoint ID Header uint32 10

ietype Malformed GTP IE number uint8 3

imei-sv IMEI(International Mobile Equipment Identity) Software string 32


Version

imsi International mobile subscriber ID string 16

level Log Level string 11

linked-nsapi Linked Netscape Server Application Programming Interface uint8 3

logid Log ID string 10

msg-type Message Type string 50

msisdn Mobile Subscriber Integrated Services Digital Network- string 16


Number (telephone # to a SIM card)

nsapi Netscape Server Application Programming Interface uint8 3

profile Profile Name string 64

FortiOS 7.2.1 Log Reference 1279


Fortinet Inc.
Log Field Name Description Data Type Length

rai Routing Area Identifier string 32

rat-type Radio Access Technology type string 7

selection APN selection, which is one IE in gtp packet string 14

seqnum GTP packet sequence number uint32 10

srcport Source Port uint16 5

status Status string 23

subtype Log Subtype string 20

time Time string 8

timeoutdelete uint8 3

to To ip 512

to6 ip 39

tunnel-idx Tunnel serial number, internally assigned uint32 10

type Log Type string 16

tz Time zone string 5

u-gsn User Plane GSN ip 39

ugsn6 ip 39

uli User Location Information string 120

ulimcc uint16 3

ulimnc uint16 3

upteid uint32 10

vd Virtual Domain Name string 32

version Version uint32 64

41218 - LOGID_GTP_RATE_LIMIT

Message ID: 41218


Message Description: LOGID_GTP_RATE_LIMIT
Message Meaning: GTP rate limit
Type: GTP
Category: GTP-ALL
Severity: Information

FortiOS 7.2.1 Log Reference 1280


Fortinet Inc.
Log Field Name Description Data Type Length

apn Access Point Name string 128

c-gsn Control Plane GSN ip 39

cgsn6 ip 39

cpteid Control Plane teid (either downlink or uplink) uint32 10

date Date string 10

deny_cause Deny Cause string 25

devid Device ID string 16

dstport Destination Port uint16 5

dtlexp Detailed Explanation string 64

end-usr-address End user IP Address ip 39

endusraddress6 ip 39

eventtime Event time line uint64 20

from From ip 128

from6 ip 39

headerteid Tunnel Endpoint ID Header uint32 10

ietype Malformed GTP IE number uint8 3

imei-sv IMEI(International Mobile Equipment Identity) Software string 32


Version

imsi International mobile subscriber ID string 16

level Log Level string 11

linked-nsapi Linked Netscape Server Application Programming Interface uint8 3

logid Log ID string 10

msg-type Message Type string 50

msisdn Mobile Subscriber Integrated Services Digital Network- string 16


Number (telephone # to a SIM card)

nsapi Netscape Server Application Programming Interface uint8 3

profile Profile Name string 64

rai Routing Area Identifier string 32

rat-type Radio Access Technology type string 7

selection APN selection, which is one IE in gtp packet string 14

seqnum GTP packet sequence number uint32 10

FortiOS 7.2.1 Log Reference 1281


Fortinet Inc.
Log Field Name Description Data Type Length

srcport Source Port uint16 5

status Status string 23

subtype Log Subtype string 20

time Time string 8

timeoutdelete uint8 3

to To ip 512

to6 ip 39

tunnel-idx Tunnel serial number, internally assigned uint32 10

type Log Type string 16

tz Time zone string 5

u-gsn User Plane GSN ip 39

ugsn6 ip 39

uli User Location Information string 120

ulimcc uint16 3

ulimnc uint16 3

upteid uint32 10

vd Virtual Domain Name string 32

version Version uint32 64

41219 - LOGID_GTP_STATE_INVALID

Message ID: 41219


Message Description: LOGID_GTP_STATE_INVALID
Message Meaning: GTP state invalid
Type: GTP
Category: GTP-ALL
Severity: Information

Log Field Name Description Data Type Length

apn Access Point Name string 128

c-gsn Control Plane GSN ip 39

cgsn6 ip 39

FortiOS 7.2.1 Log Reference 1282


Fortinet Inc.
Log Field Name Description Data Type Length

cpteid Control Plane teid (either downlink or uplink) uint32 10

date Date string 10

deny_cause Deny Cause string 25

devid Device ID string 16

dstport Destination Port uint16 5

dtlexp Detailed Explanation string 64

end-usr-address End user IP Address ip 39

endusraddress6 ip 39

eventtime Event time line uint64 20

from From ip 128

from6 ip 39

headerteid Tunnel Endpoint ID Header uint32 10

ietype Malformed GTP IE number uint8 3

imei-sv IMEI(International Mobile Equipment Identity) Software string 32


Version

imsi International mobile subscriber ID string 16

level Log Level string 11

linked-nsapi Linked Netscape Server Application Programming Interface uint8 3

logid Log ID string 10

msg-type Message Type string 50

msisdn Mobile Subscriber Integrated Services Digital Network- string 16


Number (telephone # to a SIM card)

nsapi Netscape Server Application Programming Interface uint8 3

profile Profile Name string 64

rai Routing Area Identifier string 32

rat-type Radio Access Technology type string 7

selection APN selection, which is one IE in gtp packet string 14

seqnum GTP packet sequence number uint32 10

srcport Source Port uint16 5

status Status string 23

subtype Log Subtype string 20

FortiOS 7.2.1 Log Reference 1283


Fortinet Inc.
Log Field Name Description Data Type Length

time Time string 8

timeoutdelete uint8 3

to To ip 512

to6 ip 39

tunnel-idx Tunnel serial number, internally assigned uint32 10

type Log Type string 16

tz Time zone string 5

u-gsn User Plane GSN ip 39

ugsn6 ip 39

uli User Location Information string 120

ulimcc uint16 3

ulimnc uint16 3

upteid uint32 10

vd Virtual Domain Name string 32

version Version uint32 64

41220 - LOGID_GTP_TUNNEL_LIMIT

Message ID: 41220


Message Description: LOGID_GTP_TUNNEL_LIMIT
Message Meaning: Tunnel limit GTP message. These messages occur only when the maximum number of GTP
tunnels is reached. No new tunnels are created when the maximum number is reached
Type: GTP
Category: GTP-ALL
Severity: Information

Log Field Name Description Data Type Length

apn Access Point Name string 128

c-gsn Control Plane GSN ip 39

cgsn6 ip 39

cpteid Control Plane teid (either downlink or uplink) uint32 10

date Date string 10

deny_cause Deny Cause string 25

FortiOS 7.2.1 Log Reference 1284


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

dstport Destination Port uint16 5

dtlexp Detailed Explanation string 64

end-usr-address End user IP Address ip 39

endusraddress6 ip 39

eventtime Event time line uint64 20

from From ip 128

from6 ip 39

headerteid Tunnel Endpoint ID Header uint32 10

ietype Malformed GTP IE number uint8 3

imei-sv IMEI(International Mobile Equipment Identity) Software string 32


Version

imsi International mobile subscriber ID string 16

level Log Level string 11

linked-nsapi Linked Netscape Server Application Programming Interface uint8 3

logid Log ID string 10

msg-type Message Type string 50

msisdn Mobile Subscriber Integrated Services Digital Network- string 16


Number (telephone # to a SIM card)

nsapi Netscape Server Application Programming Interface uint8 3

profile Profile Name string 64

rai Routing Area Identifier string 32

rat-type Radio Access Technology type string 7

selection APN selection, which is one IE in gtp packet string 14

seqnum GTP packet sequence number uint32 10

srcport Source Port uint16 5

status Status string 23

subtype Log Subtype string 20

time Time string 8

timeoutdelete uint8 3

to To ip 512

FortiOS 7.2.1 Log Reference 1285


Fortinet Inc.
Log Field Name Description Data Type Length

to6 ip 39

tunnel-idx Tunnel serial number, internally assigned uint32 10

type Log Type string 16

tz Time zone string 5

u-gsn User Plane GSN ip 39

ugsn6 ip 39

uli User Location Information string 120

ulimcc uint16 3

ulimnc uint16 3

upteid uint32 10

vd Virtual Domain Name string 32

version Version uint32 64

41221 - LOGID_GTP_TRAFFIC_COUNT

Message ID: 41221


Message Description: LOGID_GTP_TRAFFIC_COUNT
Message Meaning: Statistic summary information when the GTP tunnel is being torn down
Type: GTP
Category: GTP-ALL
Severity: Information

Log Field Name Description Data Type Length

apn Access Point Name string 128

date Date string 10

devid Device ID string 16

end-usr-address End user IP Address ip 39

endusraddress6 ip 39

eventtime Event time line uint64 20

imei-sv IMEI(International Mobile Equipment Identity) Software string 32


Version

imsi International mobile subscriber ID string 16

level Log Level string 11

FortiOS 7.2.1 Log Reference 1286


Fortinet Inc.
Log Field Name Description Data Type Length

linked-nsapi Linked Netscape Server Application Programming Interface uint8 3

logid Log ID string 10

msisdn Mobile Subscriber Integrated Services Digital Network- string 16


Number (telephone # to a SIM card)

nsapi Netscape Server Application Programming Interface uint8 3

profile Profile Name string 64

rai Routing Area Identifier string 32

rat-type Radio Access Technology type string 7

selection APN selection, which is one IE in gtp packet string 14

status Status string 23

subtype Log Subtype string 20

time Time string 8

timeoutdelete uint8 3

tunnel-idx Tunnel serial number, internally assigned uint32 10

type Log Type string 16

tz Time zone string 5

uli User Location Information string 120

ulimcc uint16 3

ulimnc uint16 3

vd Virtual Domain Name string 32

version Version uint32 64

c-bytes Control Plane Data Bytes uint64 20

c-ggsn Control Plane GGSN IP Address ip 39

c-ggsn-teid Control Plane GGSN Tunnel Endpoint Identifier uint32 10

c-pkts Control Plane Packets uint64 20

c-sgsn Control Plane SGSN IP Address ip 39

c-sgsn-teid Control Plane SGSN Tunnel Endpoint Identifier uint32 10

cggsn6 ip 39

clashtunnelidx uint32 10

csgsn6 ip 39

duration Tunnel duration uint32 10

FortiOS 7.2.1 Log Reference 1287


Fortinet Inc.
Log Field Name Description Data Type Length

u-bytes User Plane Data Bytes uint64 20

u-ggsn User plane ggsn IP address ip 39

u-ggsn-teid User plane ggsn teid uint32 10

u-pkts User Plane Packets uint64 20

u-sgsn User plane sgsn IP address ip 39

u-sgsn-teid User plane sgsn tunnel endpoint identifier uint32 10

uggsn6 ip 39

usgsn6 ip 39

41222 - LOGID_GTP_USER_DATA

Message ID: 41222


Message Description: LOGID_GTP_USER_DATA
Message Meaning: GTP user data
Type: GTP
Category: GTP-ALL
Severity: Information

Log Field Name Description Data Type Length

apn Access Point Name string 128

date Date string 10

devid Device ID string 16

end-usr-address End user IP Address ip 39

endusraddress6 ip 39

eventtime Event time line uint64 20

from From ip 128

from6 ip 39

imsi International mobile subscriber ID string 16

level Log Level string 11

logid Log ID string 10

profile Profile Name string 64

status Status string 23

FortiOS 7.2.1 Log Reference 1288


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log Subtype string 20

time Time string 8

to To ip 512

to6 ip 39

tunnel-idx Tunnel serial number, internally assigned uint32 10

type Log Type string 16

tz Time zone string 5

vd Virtual Domain Name string 32

version Version uint32 64

user_data User traffic content inside GTP-U tunnel string 256

41223 - LOGID_GTPV2_FORWARD

Message ID: 41223


Message Description: LOGID_GTPV2_FORWARD
Message Meaning: GTPv2 forward message
Type: GTP
Category: GTP-ALL
Severity: Information

Log Field Name Description Data Type Length

apn Access Point Name string 128

cpteid Control Plane teid (either downlink or uplink) uint32 10

date Date string 10

deny_cause Deny Cause string 25

devid Device ID string 16

dstport Destination Port uint16 5

dtlexp Detailed Explanation string 64

end-usr-address End user IP Address ip 39

endusraddress6 ip 39

eventtime Event time line uint64 20

from From ip 128

FortiOS 7.2.1 Log Reference 1289


Fortinet Inc.
Log Field Name Description Data Type Length

from6 ip 39

headerteid Tunnel Endpoint ID Header uint32 10

ietype Malformed GTP IE number uint8 3

imei-sv IMEI(International Mobile Equipment Identity) Software string 32


Version

imsi International mobile subscriber ID string 16

level Log Level string 11

logid Log ID string 10

msg-type Message Type string 50

msisdn Mobile Subscriber Integrated Services Digital Network- string 16


Number (telephone # to a SIM card)

profile Profile Name string 64

rat-type Radio Access Technology type string 7

selection APN selection, which is one IE in gtp packet string 14

seqnum GTP packet sequence number uint32 10

srcport Source Port uint16 5

status Status string 23

subtype Log Subtype string 20

time Time string 8

timeoutdelete uint8 3

to To ip 512

to6 ip 39

tunnel-idx Tunnel serial number, internally assigned uint32 10

type Log Type string 16

tz Time zone string 5

uli User Location Information string 120

ulimcc uint16 3

ulimnc uint16 3

vd Virtual Domain Name string 32

version Version uint32 64

cpaddr Control Plane Address (either downlink or uplink) ip 39

FortiOS 7.2.1 Log Reference 1290


Fortinet Inc.
Log Field Name Description Data Type Length

cpaddr6 ip 39

snetwork Source Network, it's a IE type in GTPv2 packet string 64

41224 - LOGID_GTPV2_DENY

Message ID: 41224


Message Description: LOGID_GTPV2_DENY
Message Meaning: GTPv2 deny message
Type: GTP
Category: GTP-ALL
Severity: Information

Log Field Name Description Data Type Length

apn Access Point Name string 128

cpteid Control Plane teid (either downlink or uplink) uint32 10

date Date string 10

deny_cause Deny Cause string 25

devid Device ID string 16

dstport Destination Port uint16 5

dtlexp Detailed Explanation string 64

end-usr-address End user IP Address ip 39

endusraddress6 ip 39

eventtime Event time line uint64 20

from From ip 128

from6 ip 39

headerteid Tunnel Endpoint ID Header uint32 10

ietype Malformed GTP IE number uint8 3

imei-sv IMEI(International Mobile Equipment Identity) Software string 32


Version

imsi International mobile subscriber ID string 16

level Log Level string 11

logid Log ID string 10

msg-type Message Type string 50

FortiOS 7.2.1 Log Reference 1291


Fortinet Inc.
Log Field Name Description Data Type Length

msisdn Mobile Subscriber Integrated Services Digital Network- string 16


Number (telephone # to a SIM card)

profile Profile Name string 64

rat-type Radio Access Technology type string 7

selection APN selection, which is one IE in gtp packet string 14

seqnum GTP packet sequence number uint32 10

srcport Source Port uint16 5

status Status string 23

subtype Log Subtype string 20

time Time string 8

timeoutdelete uint8 3

to To ip 512

to6 ip 39

tunnel-idx Tunnel serial number, internally assigned uint32 10

type Log Type string 16

tz Time zone string 5

uli User Location Information string 120

ulimcc uint16 3

ulimnc uint16 3

vd Virtual Domain Name string 32

version Version uint32 64

cpaddr Control Plane Address (either downlink or uplink) ip 39

cpaddr6 ip 39

snetwork Source Network, it's a IE type in GTPv2 packet string 64

41225 - LOGID_GTPV2_RATE_LIMIT

Message ID: 41225


Message Description: LOGID_GTPV2_RATE_LIMIT
Message Meaning: GTPv2 rate limit message
Type: GTP
Category: GTP-ALL
Severity: Information

FortiOS 7.2.1 Log Reference 1292


Fortinet Inc.
Log Field Name Description Data Type Length

apn Access Point Name string 128

cpteid Control Plane teid (either downlink or uplink) uint32 10

date Date string 10

deny_cause Deny Cause string 25

devid Device ID string 16

dstport Destination Port uint16 5

dtlexp Detailed Explanation string 64

end-usr-address End user IP Address ip 39

endusraddress6 ip 39

eventtime Event time line uint64 20

from From ip 128

from6 ip 39

headerteid Tunnel Endpoint ID Header uint32 10

ietype Malformed GTP IE number uint8 3

imei-sv IMEI(International Mobile Equipment Identity) Software string 32


Version

imsi International mobile subscriber ID string 16

level Log Level string 11

logid Log ID string 10

msg-type Message Type string 50

msisdn Mobile Subscriber Integrated Services Digital Network- string 16


Number (telephone # to a SIM card)

profile Profile Name string 64

rat-type Radio Access Technology type string 7

selection APN selection, which is one IE in gtp packet string 14

seqnum GTP packet sequence number uint32 10

srcport Source Port uint16 5

status Status string 23

subtype Log Subtype string 20

time Time string 8

timeoutdelete uint8 3

FortiOS 7.2.1 Log Reference 1293


Fortinet Inc.
Log Field Name Description Data Type Length

to To ip 512

to6 ip 39

tunnel-idx Tunnel serial number, internally assigned uint32 10

type Log Type string 16

tz Time zone string 5

uli User Location Information string 120

ulimcc uint16 3

ulimnc uint16 3

vd Virtual Domain Name string 32

version Version uint32 64

cpaddr Control Plane Address (either downlink or uplink) ip 39

cpaddr6 ip 39

snetwork Source Network, it's a IE type in GTPv2 packet string 64

41226 - LOGID_GTPV2_STATE_INVALID

Message ID: 41226


Message Description: LOGID_GTPV2_STATE_INVALID
Message Meaning: GTPv2 state invalid message
Type: GTP
Category: GTP-ALL
Severity: Information

Log Field Name Description Data Type Length

apn Access Point Name string 128

cpteid Control Plane teid (either downlink or uplink) uint32 10

date Date string 10

deny_cause Deny Cause string 25

devid Device ID string 16

dstport Destination Port uint16 5

dtlexp Detailed Explanation string 64

end-usr-address End user IP Address ip 39

FortiOS 7.2.1 Log Reference 1294


Fortinet Inc.
Log Field Name Description Data Type Length

endusraddress6 ip 39

eventtime Event time line uint64 20

from From ip 128

from6 ip 39

headerteid Tunnel Endpoint ID Header uint32 10

ietype Malformed GTP IE number uint8 3

imei-sv IMEI(International Mobile Equipment Identity) Software string 32


Version

imsi International mobile subscriber ID string 16

level Log Level string 11

logid Log ID string 10

msg-type Message Type string 50

msisdn Mobile Subscriber Integrated Services Digital Network- string 16


Number (telephone # to a SIM card)

profile Profile Name string 64

rat-type Radio Access Technology type string 7

selection APN selection, which is one IE in gtp packet string 14

seqnum GTP packet sequence number uint32 10

srcport Source Port uint16 5

status Status string 23

subtype Log Subtype string 20

time Time string 8

timeoutdelete uint8 3

to To ip 512

to6 ip 39

tunnel-idx Tunnel serial number, internally assigned uint32 10

type Log Type string 16

tz Time zone string 5

uli User Location Information string 120

ulimcc uint16 3

ulimnc uint16 3

FortiOS 7.2.1 Log Reference 1295


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual Domain Name string 32

version Version uint32 64

cpaddr Control Plane Address (either downlink or uplink) ip 39

cpaddr6 ip 39

snetwork Source Network, it's a IE type in GTPv2 packet string 64

41227 - LOGID_GTPV2_TUNNEL_LIMIT

Message ID: 41227


Message Description: LOGID_GTPV2_TUNNEL_LIMIT
Message Meaning: Tunnel limit GTP (version 2) message
Type: GTP
Category: GTP-ALL
Severity: Information

Log Field Name Description Data Type Length

apn Access Point Name string 128

cpteid Control Plane teid (either downlink or uplink) uint32 10

date Date string 10

deny_cause Deny Cause string 25

devid Device ID string 16

dstport Destination Port uint16 5

dtlexp Detailed Explanation string 64

end-usr-address End user IP Address ip 39

endusraddress6 ip 39

eventtime Event time line uint64 20

from From ip 128

from6 ip 39

headerteid Tunnel Endpoint ID Header uint32 10

ietype Malformed GTP IE number uint8 3

imei-sv IMEI(International Mobile Equipment Identity) Software string 32


Version

imsi International mobile subscriber ID string 16

FortiOS 7.2.1 Log Reference 1296


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

logid Log ID string 10

msg-type Message Type string 50

msisdn Mobile Subscriber Integrated Services Digital Network- string 16


Number (telephone # to a SIM card)

profile Profile Name string 64

rat-type Radio Access Technology type string 7

selection APN selection, which is one IE in gtp packet string 14

seqnum GTP packet sequence number uint32 10

srcport Source Port uint16 5

status Status string 23

subtype Log Subtype string 20

time Time string 8

timeoutdelete uint8 3

to To ip 512

to6 ip 39

tunnel-idx Tunnel serial number, internally assigned uint32 10

type Log Type string 16

tz Time zone string 5

uli User Location Information string 120

ulimcc uint16 3

ulimnc uint16 3

vd Virtual Domain Name string 32

version Version uint32 64

cpaddr Control Plane Address (either downlink or uplink) ip 39

cpaddr6 ip 39

snetwork Source Network, it's a IE type in GTPv2 packet string 64

41228 - LOGID_GTPV2_TRAFFIC_COUNT

Message ID: 41228


Message Description: LOGID_GTPV2_TRAFFIC_COUNT
Message Meaning: Statistic summary information when the GTPv2 tunnel is being torn down

FortiOS 7.2.1 Log Reference 1297


Fortinet Inc.
Type: GTP
Category: GTP-ALL
Severity: Information

Log Field Name Description Data Type Length

apn Access Point Name string 128

date Date string 10

devid Device ID string 16

end-usr-address End user IP Address ip 39

endusraddress6 ip 39

eventtime Event time line uint64 20

imei-sv IMEI(International Mobile Equipment Identity) Software string 32


Version

imsi International mobile subscriber ID string 16

level Log Level string 11

logid Log ID string 10

msisdn Mobile Subscriber Integrated Services Digital Network- string 16


Number (telephone # to a SIM card)

profile Profile Name string 64

rat-type Radio Access Technology type string 7

selection APN selection, which is one IE in gtp packet string 14

status Status string 23

subtype Log Subtype string 20

time Time string 8

timeoutdelete uint8 3

tunnel-idx Tunnel serial number, internally assigned uint32 10

type Log Type string 16

tz Time zone string 5

uli User Location Information string 120

ulimcc uint16 3

ulimnc uint16 3

vd Virtual Domain Name string 32

version Version uint32 64

c-bytes Control Plane Data Bytes uint64 20

FortiOS 7.2.1 Log Reference 1298


Fortinet Inc.
Log Field Name Description Data Type Length

c-pkts Control Plane Packets uint64 20

clashtunnelidx uint32 10

duration Tunnel duration uint32 10

u-bytes User Plane Data Bytes uint64 20

u-pkts User Plane Packets uint64 20

snetwork Source Network, it's a IE type in GTPv2 packet string 64

cpdladdr Control Plane Downlink IP Address ip 39

cpdladdr6 ip 39

cpdlisraddr Control Plane ISR Downlink IP Address ip 39

cpdlisraddr6 ip 39

cpdlisrteid control plane ISR downlink tunnel endpoint identifier uint32 10

cpdlteid control plane downlink tunnel endpoint identifier uint32 10

cpuladdr control plane uplink IP address ip 39

cpuladdr6 ip 39

cpulteid control plane uplink teid uint32 10

41229 - LOGID_GTPU_FORWARD

Message ID: 41229


Message Description: LOGID_GTPU_FORWARD
Message Meaning: GTPU forward message
Type: GTP
Category: GTP-ALL
Severity: Information

Log Field Name Description Data Type Length

apn Access Point Name string 128

date Date string 10

deny_cause Deny Cause string 25

devid Device ID string 16

dstport Destination Port uint16 5

eventtime Event time line uint64 20

FortiOS 7.2.1 Log Reference 1299


Fortinet Inc.
Log Field Name Description Data Type Length

from From ip 128

from6 ip 39

headerteid Tunnel Endpoint ID Header uint32 10

imsi International mobile subscriber ID string 16

level Log Level string 11

logid Log ID string 10

msg-type Message Type string 50

msisdn Mobile Subscriber Integrated Services Digital Network- string 16


Number (telephone # to a SIM card)

profile Profile Name string 64

srcport Source Port uint16 5

status Status string 23

subtype Log Subtype string 20

time Time string 8

to To ip 512

to6 ip 39

tunnel-idx Tunnel serial number, internally assigned uint32 10

type Log Type string 16

tz Time zone string 5

vd Virtual Domain Name string 32

version Version uint32 64

41230 - LOGID_GTPU_DENY

Message ID: 41230


Message Description: LOGID_GTPU_DENY
Message Meaning: GTPU deny message
Type: GTP
Category: GTP-ALL
Severity: Information

Log Field Name Description Data Type Length

apn Access Point Name string 128

FortiOS 7.2.1 Log Reference 1300


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

deny_cause Deny Cause string 25

devid Device ID string 16

dstport Destination Port uint16 5

eventtime Event time line uint64 20

from From ip 128

from6 ip 39

headerteid Tunnel Endpoint ID Header uint32 10

imsi International mobile subscriber ID string 16

level Log Level string 11

logid Log ID string 10

msg-type Message Type string 50

msisdn Mobile Subscriber Integrated Services Digital Network- string 16


Number (telephone # to a SIM card)

profile Profile Name string 64

srcport Source Port uint16 5

status Status string 23

subtype Log Subtype string 20

time Time string 8

to To ip 512

to6 ip 39

tunnel-idx Tunnel serial number, internally assigned uint32 10

type Log Type string 16

tz Time zone string 5

vd Virtual Domain Name string 32

version Version uint32 64

41231 - LOGID_PFCP_FORWARD

Message ID: 41231


Message Description: LOGID_PFCP_FORWARD
Message Meaning: PFCP forward message
Type: GTP

FortiOS 7.2.1 Log Reference 1301


Fortinet Inc.
Category: PFCP-ALL
Severity: Information

Log Field Name Description Data Type Length

apn Access Point Name string 128

cfseid string 20

cfseidaddr ip 39

date Date string 10

deny_cause Deny Cause string 25

devid Device ID string 16

dstport Destination Port uint16 5

dtlexp Detailed Explanation string 64

eventtime Event time line uint64 20

from From ip 128

from6 ip 39

hseid string 20

ietype Malformed GTP IE number uint8 3

imei-sv IMEI(International Mobile Equipment Identity) Software string 32


Version

imsi International mobile subscriber ID string 16

level Log Level string 11

logid Log ID string 10

msg-type Message Type string 50

msisdn Mobile Subscriber Integrated Services Digital Network- string 16


Number (telephone # to a SIM card)

nai string 128

profile Profile Name string 64

seqnum GTP packet sequence number uint32 10

srcport Source Port uint16 5

status Status string 23

subtype Log Subtype string 20

time Time string 8

to To ip 512

FortiOS 7.2.1 Log Reference 1302


Fortinet Inc.
Log Field Name Description Data Type Length

to6 ip 39

type Log Type string 16

tz Time zone string 5

ufseid string 20

ufseidaddr ip 39

vd Virtual Domain Name string 32

version Version uint32 64

41232 - LOGID_PFCP_DENY

Message ID: 41232


Message Description: LOGID_PFCP_DENY
Message Meaning: PFCP deny message
Type: GTP
Category: PFCP-ALL
Severity: Information

Log Field Name Description Data Type Length

apn Access Point Name string 128

cfseid string 20

cfseidaddr ip 39

date Date string 10

deny_cause Deny Cause string 25

devid Device ID string 16

dstport Destination Port uint16 5

dtlexp Detailed Explanation string 64

eventtime Event time line uint64 20

from From ip 128

from6 ip 39

hseid string 20

ietype Malformed GTP IE number uint8 3

imei-sv IMEI(International Mobile Equipment Identity) Software string 32


Version

FortiOS 7.2.1 Log Reference 1303


Fortinet Inc.
Log Field Name Description Data Type Length

imsi International mobile subscriber ID string 16

level Log Level string 11

logid Log ID string 10

msg-type Message Type string 50

msisdn Mobile Subscriber Integrated Services Digital Network- string 16


Number (telephone # to a SIM card)

nai string 128

profile Profile Name string 64

seqnum GTP packet sequence number uint32 10

srcport Source Port uint16 5

status Status string 23

subtype Log Subtype string 20

time Time string 8

to To ip 512

to6 ip 39

type Log Type string 16

tz Time zone string 5

ufseid string 20

ufseidaddr ip 39

vd Virtual Domain Name string 32

version Version uint32 64

41233 - LOGID_PFCP_TRAFFIC_COUNT

Message ID: 41233


Message Description: LOGID_PFCP_TRAFFIC_COUNT
Message Meaning: Statistic summary information when the PFCP session is being torn down
Type: GTP
Category: PFCP-ALL
Severity: Information

Log Field Name Description Data Type Length

apn Access Point Name string 128

FortiOS 7.2.1 Log Reference 1304


Fortinet Inc.
Log Field Name Description Data Type Length

cfseid string 20

cfseidaddr ip 39

date Date string 10

devid Device ID string 16

eventtime Event time line uint64 20

imei-sv IMEI(International Mobile Equipment Identity) Software string 32


Version

imsi International mobile subscriber ID string 16

level Log Level string 11

logid Log ID string 10

msisdn Mobile Subscriber Integrated Services Digital Network- string 16


Number (telephone # to a SIM card)

nai string 128

profile Profile Name string 64

status Status string 23

subtype Log Subtype string 20

time Time string 8

type Log Type string 16

tz Time zone string 5

ufseid string 20

ufseidaddr ip 39

vd Virtual Domain Name string 32

version Version uint32 64

c-bytes Control Plane Data Bytes uint64 20

c-pkts Control Plane Packets uint64 20

duration Tunnel duration uint32 10

sessionid uint32 10

u-bytes User Plane Data Bytes uint64 20

u-pkts User Plane Packets uint64 20

FortiOS 7.2.1 Log Reference 1305


Fortinet Inc.
ICAP

60000 - LOG_ID_ICAP_SERVER_ERROR

Message ID: 60000


Message Description: LOG_ID_ICAP_SERVER_ERROR
Message Meaning: Traffic blocked as it cannot be forwarded to ICAP Server.
Type: ICAP
Category: ICAP
Severity: Warning

Log Field Name Description Data Type Length

action string 17

date string 10

devid string 16

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuuid string 37

eventtime uint64 20

eventtype string 32

infection string 96

level string 11

logid string 10

msg string 4096

policyid uint32 10

policytype string 24

profile string 64

proto uint8 3

service string 5

FortiOS 7.2.1 Log Reference 1306


Fortinet Inc.
Log Field Name Description Data Type Length

sessionid uint32 10

srccountry string 64

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subtype string 20

time string 8

type string 16

tz string 5

url string 512

vd string 32

virusid string 64

vrf uint8 3

60001 - LOG_ID_ICAP_INFECTION_BLOCK

Message ID: 60001


Message Description: LOG_ID_ICAP_INFECTION_BLOCK
Message Meaning: Traffic blocked as ICAP server found infection.
Type: ICAP
Category: ICAP
Severity: Warning

Log Field Name Description Data Type Length

action string 17

date string 10

devid string 16

dstcountry string 64

dstintf string 32

dstintfrole string 10

FortiOS 7.2.1 Log Reference 1307


Fortinet Inc.
Log Field Name Description Data Type Length

dstip ip 39

dstport uint16 5

dstuuid string 37

eventtime uint64 20

eventtype string 32

infection string 96

level string 11

logid string 10

msg string 4096

policyid uint32 10

policytype string 24

profile string 64

proto uint8 3

service string 5

sessionid uint32 10

srccountry string 64

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subtype string 20

time string 8

type string 16

tz string 5

url string 512

vd string 32

virusid string 64

vrf uint8 3

FortiOS 7.2.1 Log Reference 1308


Fortinet Inc.
60002 - LOG_ID_ICAP_SERVER_CLOSE_CONN

Message ID: 60002


Message Description: LOG_ID_ICAP_SERVER_CLOSE_CONN
Message Meaning: Traffic dropped as ICAP server connection is closed.
Type: ICAP
Category: ICAP
Severity: Warning

Log Field Name Description Data Type Length

action string 17

date string 10

devid string 16

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuuid string 37

eventtime uint64 20

eventtype string 32

infection string 96

level string 11

logid string 10

msg string 4096

policyid uint32 10

policytype string 24

profile string 64

proto uint8 3

service string 5

sessionid uint32 10

srccountry string 64

srcintf string 32

FortiOS 7.2.1 Log Reference 1309


Fortinet Inc.
Log Field Name Description Data Type Length

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subtype string 20

time string 8

type string 16

tz string 5

url string 512

vd string 32

virusid string 64

vrf uint8 3

FortiOS 7.2.1 Log Reference 1310


Fortinet Inc.
IPS

16384 - LOGID_ATTCK_SIGNATURE_TCP_UDP

Message ID: 16384


Message Description: LOGID_ATTCK_SIGNATURE_TCP_UDP
Message Meaning: Attack detected by UDP/TCP signature
Type: IPS
Category: SIGNATURE
Severity: Alert

Log Field Name Description Data Type Length

action Security action performed by IPS: detected - Attack is string 16


detected , but NOT blocked (similar to monitor) dropped -
Silent packet blocked reset - Blocked and respond with Reset
reset_client - Blocked and reset sent to the client reset_server
- Blocked and reset sent to the server drop_session - Silent
block pass_session - Session allowed clear_session - Session
was removed /closed

agent string 1024

attack Attack Name string 256

attackcontext The trigger patterns and the packet data with base64 encoding string 2048

attackcontextid Attack context ID / total string 10

attackid Attack ID uint32 10

authserver Authentication server for the user string 64

craction Action performed by Threat Weight uint32 10

crlevel Client Reputation Level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Deivce ID string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 64

FortiOS 7.2.1 Log Reference 1311


Fortinet Inc.
Log Field Name Description Data Type Length

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

eventtime Time when detection occured uint64 20

eventtype IPS Event Type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

incidentserialno Incident serial number uint32 10

level Log Level string 11

logid Log ID string 10

msg Log message for the attack string 518

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Profile name for IPS string 64

proto Protocol number uint8 3

psrcport uint16 5

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rawdataid string 10

ref URL of the FortiGuard IPS database entry for the attack. string 4096

referralurl string 512

service Service name string 80

sessionid Session ID uint32 10

FortiOS 7.2.1 Log Reference 1312


Fortinet Inc.
Log Field Name Description Data Type Length

severity Severity of the attack string 8

srccountry Country name for Source IP string 64

srcdomain string 255

srcintf Source Interface string 64

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

subtype Log Subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

16385 - LOGID_ATTCK_SIGNATURE_ICMP

Message ID: 16385


Message Description: LOGID_ATTCK_SIGNATURE_ICMP
Message Meaning: Attack detected by ICMP signature
Type: IPS
Category: SIGNATURE
Severity: Alert

FortiOS 7.2.1 Log Reference 1313


Fortinet Inc.
Log Field Name Description Data Type Length

action Security action performed by IPS: detected - Attack is string 16


detected , but NOT blocked (similar to monitor) dropped -
Silent packet blocked reset - Blocked and respond with Reset
reset_client - Blocked and reset sent to the client reset_server
- Blocked and reset sent to the server drop_session - Silent
block pass_session - Session allowed clear_session - Session
was removed /closed

attack Attack Name string 256

attackcontext The trigger patterns and the packet data with base64 encoding string 2048

attackcontextid Attack context ID / total string 10

attackid Attack ID uint32 10

authserver Authentication server for the user string 64

craction Action performed by Threat Weight uint32 10

crlevel Client Reputation Level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Deivce ID string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstuser string 256

eventtime Time when detection occured uint64 20

eventtype IPS Event Type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

incidentserialno Incident serial number uint32 10

level Log Level string 11

logid Log ID string 10

FortiOS 7.2.1 Log Reference 1314


Fortinet Inc.
Log Field Name Description Data Type Length

msg Log message for the attack string 518

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Profile name for IPS string 64

proto Protocol number uint8 3

psrcport uint16 5

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rawdataid string 10

ref URL of the FortiGuard IPS database entry for the attack. string 4096

service Service name string 80

sessionid Session ID uint32 10

severity Severity of the attack string 8

srccountry Country name for Source IP string 64

srcdomain string 255

srcintf Source Interface string 64

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

subtype Log Subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

user User name string 256

vd Virtual domain name string 32

FortiOS 7.2.1 Log Reference 1315


Fortinet Inc.
Log Field Name Description Data Type Length

vrf Virtual router forwarding uint8 3

icmpcode Destination Port of the ICMP message string 6

icmpid Source port of the ICMP message string 8

icmptype The type of ICMP message string 6

16386 - LOGID_ATTCK_SIGNATURE_OTHERS

Message ID: 16386


Message Description: LOGID_ATTCK_SIGNATURE_OTHERS
Message Meaning: Attack detected by other signature
Type: IPS
Category: SIGNATURE
Severity: Alert

Log Field Name Description Data Type Length

action Security action performed by IPS: detected - Attack is string 16


detected , but NOT blocked (similar to monitor) dropped -
Silent packet blocked reset - Blocked and respond with Reset
reset_client - Blocked and reset sent to the client reset_server
- Blocked and reset sent to the server drop_session - Silent
block pass_session - Session allowed clear_session - Session
was removed /closed

attack Attack Name string 256

attackcontext The trigger patterns and the packet data with base64 encoding string 2048

attackcontextid Attack context ID / total string 10

attackid Attack ID uint32 10

authserver Authentication server for the user string 64

craction Action performed by Threat Weight uint32 10

crlevel Client Reputation Level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Deivce ID string 16

direction Message/packets direction string 8

dstauthserver string 64

FortiOS 7.2.1 Log Reference 1316


Fortinet Inc.
Log Field Name Description Data Type Length

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstuser string 256

eventtime Time when detection occured uint64 20

eventtype IPS Event Type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

incidentserialno Incident serial number uint32 10

level Log Level string 11

logid Log ID string 10

msg Log message for the attack string 518

pdstport uint16 5

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Profile name for IPS string 64

proto Protocol number uint8 3

psrcport uint16 5

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rawdataid string 10

ref URL of the FortiGuard IPS database entry for the attack. string 4096

service Service name string 80

sessionid Session ID uint32 10

severity Severity of the attack string 8

srccountry Country name for Source IP string 64

FortiOS 7.2.1 Log Reference 1317


Fortinet Inc.
Log Field Name Description Data Type Length

srcdomain string 255

srcintf Source Interface string 64

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

subtype Log Subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

16399 - LOGID_ATTACK_MALICIOUS_URL

Message ID: 16399


Message Description: LOGID_ATTACK_MALICIOUS_URL
Message Meaning: Attack detected by a malicious URL
Type: IPS
Category: MALICIOUS-URL
Severity: Warning

Log Field Name Description Data Type Length

action Security action performed by IPS: detected - Attack is string 16


detected , but NOT blocked (similar to monitor) dropped -
Silent packet blocked reset - Blocked and respond with Reset
reset_client - Blocked and reset sent to the client reset_server
- Blocked and reset sent to the server drop_session - Silent
block pass_session - Session allowed clear_session - Session
was removed /closed

agent string 1024

attack Attack Name string 256

FortiOS 7.2.1 Log Reference 1318


Fortinet Inc.
Log Field Name Description Data Type Length

attackcontext The trigger patterns and the packet data with base64 encoding string 2048

attackcontextid Attack context ID / total string 10

authserver Authentication server for the user string 64

craction Action performed by Threat Weight uint32 10

crlevel Client Reputation Level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Deivce ID string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

eventtime Time when detection occured uint64 20

eventtype IPS Event Type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

hostname The host name of a URL string 256

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log message for the attack string 518

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Profile name for IPS string 64

FortiOS 7.2.1 Log Reference 1319


Fortinet Inc.
Log Field Name Description Data Type Length

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rawdataid string 10

referralurl string 512

service Service name string 80

sessionid Session ID uint32 10

severity Severity of the attack string 8

srccountry Country name for Source IP string 64

srcdomain string 255

srcintf Source Interface string 64

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

subtype Log Subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

16400 - LOGID_ATTACK_BOTNET_WARNING

Message ID: 16400


Message Description: LOGID_ATTACK_BOTNET_WARNING
Message Meaning: Botnet C&amp;C Communication (warning)
Type: IPS

FortiOS 7.2.1 Log Reference 1320


Fortinet Inc.
Category: BOTNET
Severity: Warning

Log Field Name Description Data Type Length

action Security action performed by IPS: detected - Attack is string 16


detected , but NOT blocked (similar to monitor) dropped -
Silent packet blocked reset - Blocked and respond with Reset
reset_client - Blocked and reset sent to the client reset_server
- Blocked and reset sent to the server drop_session - Silent
block pass_session - Session allowed clear_session - Session
was removed /closed

attack Attack Name string 256

attackcontext The trigger patterns and the packet data with base64 encoding string 2048

attackcontextid Attack context ID / total string 10

attackid Attack ID uint32 10

authserver Authentication server for the user string 64

craction Action performed by Threat Weight uint32 10

crlevel Client Reputation Level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Deivce ID string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

eventtime Time when detection occured uint64 20

eventtype IPS Event Type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

level Log Level string 11

FortiOS 7.2.1 Log Reference 1321


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

msg Log message for the attack string 518

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Profile name for IPS string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rawdataid string 10

ref URL of the FortiGuard IPS database entry for the attack. string 4096

service Service name string 80

sessionid Session ID uint32 10

severity Severity of the attack string 8

srccountry Country name for Source IP string 64

srcdomain string 255

srcintf Source Interface string 64

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

subtype Log Subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

FortiOS 7.2.1 Log Reference 1322


Fortinet Inc.
16401 - LOGID_ATTACK_BOTNET_NOTIF

Message ID: 16401


Message Description: LOGID_ATTACK_BOTNET_NOTIF
Message Meaning: Botnet C&amp;C Communication (notice)
Type: IPS
Category: BOTNET
Severity: Notice

Log Field Name Description Data Type Length

action Security action performed by IPS: detected - Attack is string 16


detected , but NOT blocked (similar to monitor) dropped -
Silent packet blocked reset - Blocked and respond with Reset
reset_client - Blocked and reset sent to the client reset_server
- Blocked and reset sent to the server drop_session - Silent
block pass_session - Session allowed clear_session - Session
was removed /closed

attack Attack Name string 256

attackcontext The trigger patterns and the packet data with base64 encoding string 2048

attackcontextid Attack context ID / total string 10

attackid Attack ID uint32 10

authserver Authentication server for the user string 64

craction Action performed by Threat Weight uint32 10

crlevel Client Reputation Level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Deivce ID string 16

direction Message/packets direction string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 64

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

FortiOS 7.2.1 Log Reference 1323


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Time when detection occured uint64 20

eventtype IPS Event Type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

level Log Level string 11

logid Log ID string 10

msg Log message for the attack string 518

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Profile name for IPS string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rawdataid string 10

ref URL of the FortiGuard IPS database entry for the attack. string 4096

service Service name string 80

sessionid Session ID uint32 10

severity Severity of the attack string 8

srccountry Country name for Source IP string 64

srcdomain string 255

srcintf Source Interface string 64

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

subtype Log Subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

FortiOS 7.2.1 Log Reference 1324


Fortinet Inc.
Log Field Name Description Data Type Length

type Log type string 16

tz string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

FortiOS 7.2.1 Log Reference 1325


Fortinet Inc.
SSH

61000 - LOG_ID_SSH_COMMAND_BLOCK

Message ID: 61000


Message Description: LOG_ID_SSH_COMMAND_BLOCK
Message Meaning: SSH shell command is blocked
Type: SSH
Category: SSH-COMMAND
Severity: Warning

Log Field Name Description Data Type Length

action The status of the ssh-channel: passthrough - channel is string 17


allowed blocked - channel is blocked

channeltype Type of Channel: x11, shell, exec, tcp-fprward, tun-forward, string 15


sftp. scp

command Shell command string 256

date Date string 10

devid Device ID string 16

direction Direction of session string 4096

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Event time uint64 20

eventtype Event Type string 32

fctuid FortiClient UID string 32

group Group name for authentication string 512

hostkeystatus string 15

FortiOS 7.2.1 Log Reference 1326


Fortinet Inc.
Log Field Name Description Data Type Length

level Log level string 11

logid Log ID string 10

login SSH login Name string 128

policyid Policy ID uint32 10

policytype string 24

profile Full profile name string 64

proto Protocol number uint8 3

sessionid Session ID uint32 10

severity Severity level of shell command string 8

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated User string 66

unauthusersource Unauthenticated User Source string 66

user User name for authentication string 256

vd Virtual Domain Name string 32

61001 - LOG_ID_SSH_COMMAND_BLOCK_ALERT

Message ID: 61001


Message Description: LOG_ID_SSH_COMMAND_BLOCK_ALERT
Message Meaning: SSH shell command is blocked
Type: SSH
Category: SSH-COMMAND
Severity: Alert

FortiOS 7.2.1 Log Reference 1327


Fortinet Inc.
Log Field Name Description Data Type Length

action The status of the ssh-channel: passthrough - channel is string 17


allowed blocked - channel is blocked

channeltype Type of Channel: x11, shell, exec, tcp-fprward, tun-forward, string 15


sftp. scp

command Shell command string 256

date Date string 10

devid Device ID string 16

direction Direction of session string 4096

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Event time uint64 20

eventtype Event Type string 32

fctuid FortiClient UID string 32

group Group name for authentication string 512

hostkeystatus string 15

level Log level string 11

logid Log ID string 10

login SSH login Name string 128

policyid Policy ID uint32 10

policytype string 24

profile Full profile name string 64

proto Protocol number uint8 3

sessionid Session ID uint32 10

severity Severity level of shell command string 8

srccountry string 64

srcdomain string 255

FortiOS 7.2.1 Log Reference 1328


Fortinet Inc.
Log Field Name Description Data Type Length

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated User string 66

unauthusersource Unauthenticated User Source string 66

user User name for authentication string 256

vd Virtual Domain Name string 32

61002 - LOG_ID_SSH_COMMAND_PASS

Message ID: 61002


Message Description: LOG_ID_SSH_COMMAND_PASS
Message Meaning: SSH shell command is detected
Type: SSH
Category: SSH-COMMAND
Severity: Notice

Log Field Name Description Data Type Length

action The status of the ssh-channel: passthrough - channel is string 17


allowed blocked - channel is blocked

channeltype Type of Channel: x11, shell, exec, tcp-fprward, tun-forward, string 15


sftp. scp

command Shell command string 256

date Date string 10

devid Device ID string 16

direction Direction of session string 4096

dstcountry string 64

FortiOS 7.2.1 Log Reference 1329


Fortinet Inc.
Log Field Name Description Data Type Length

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Event time uint64 20

eventtype Event Type string 32

fctuid FortiClient UID string 32

group Group name for authentication string 512

hostkeystatus string 15

level Log level string 11

logid Log ID string 10

login SSH login Name string 128

policyid Policy ID uint32 10

policytype string 24

profile Full profile name string 64

proto Protocol number uint8 3

sessionid Session ID uint32 10

severity Severity level of shell command string 8

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

type Log type string 16

FortiOS 7.2.1 Log Reference 1330


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

unauthuser Unauthenticated User string 66

unauthusersource Unauthenticated User Source string 66

user User name for authentication string 256

vd Virtual Domain Name string 32

61003 - LOG_ID_SSH_COMMAND_PASS_ALERT

Message ID: 61003


Message Description: LOG_ID_SSH_COMMAND_PASS_ALERT
Message Meaning: SSH shell command is detected
Type: SSH
Category: SSH-COMMAND
Severity: Alert

Log Field Name Description Data Type Length

action The status of the ssh-channel: passthrough - channel is string 17


allowed blocked - channel is blocked

channeltype Type of Channel: x11, shell, exec, tcp-fprward, tun-forward, string 15


sftp. scp

command Shell command string 256

date Date string 10

devid Device ID string 16

direction Direction of session string 4096

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Event time uint64 20

eventtype Event Type string 32

FortiOS 7.2.1 Log Reference 1331


Fortinet Inc.
Log Field Name Description Data Type Length

fctuid FortiClient UID string 32

group Group name for authentication string 512

hostkeystatus string 15

level Log level string 11

logid Log ID string 10

login SSH login Name string 128

policyid Policy ID uint32 10

policytype string 24

profile Full profile name string 64

proto Protocol number uint8 3

sessionid Session ID uint32 10

severity Severity level of shell command string 8

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated User string 66

unauthusersource Unauthenticated User Source string 66

user User name for authentication string 256

vd Virtual Domain Name string 32

61010 - LOG_ID_SSH_CHANNEL_BLOCK

Message ID: 61010


Message Description: LOG_ID_SSH_CHANNEL_BLOCK

FortiOS 7.2.1 Log Reference 1332


Fortinet Inc.
Message Meaning: SSH channel is blocked
Type: SSH
Category: SSH-CHANNEL
Severity: Warning

Log Field Name Description Data Type Length

action The status of the ssh-channel: passthrough - channel is string 17


allowed blocked - channel is blocked

channeltype Type of Channel: x11, shell, exec, tcp-fprward, tun-forward, string 15


sftp. scp

command Shell command string 256

date Date string 10

devid Device ID string 16

direction Direction of session string 4096

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Event time uint64 20

eventtype Event Type string 32

fctuid FortiClient UID string 32

group Group name for authentication string 512

hostkeystatus string 15

level Log level string 11

logid Log ID string 10

login SSH login Name string 128

policyid Policy ID uint32 10

policytype string 24

profile Full profile name string 64

proto Protocol number uint8 3

sessionid Session ID uint32 10

FortiOS 7.2.1 Log Reference 1333


Fortinet Inc.
Log Field Name Description Data Type Length

severity Severity level of shell command string 8

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated User string 66

unauthusersource Unauthenticated User Source string 66

user User name for authentication string 256

vd Virtual Domain Name string 32

61011 - LOG_ID_SSH_CHANNEL_PASS

Message ID: 61011


Message Description: LOG_ID_SSH_CHANNEL_PASS
Message Meaning: SSH channel is detected
Type: SSH
Category: SSH-CHANNEL
Severity: Notice

Log Field Name Description Data Type Length

action The status of the ssh-channel: passthrough - channel is string 17


allowed blocked - channel is blocked

channeltype Type of Channel: x11, shell, exec, tcp-fprward, tun-forward, string 15


sftp. scp

command Shell command string 256

date Date string 10

FortiOS 7.2.1 Log Reference 1334


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

direction Direction of session string 4096

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Event time uint64 20

eventtype Event Type string 32

fctuid FortiClient UID string 32

group Group name for authentication string 512

hostkeystatus string 15

level Log level string 11

logid Log ID string 10

login SSH login Name string 128

policyid Policy ID uint32 10

policytype string 24

profile Full profile name string 64

proto Protocol number uint8 3

sessionid Session ID uint32 10

severity Severity level of shell command string 8

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

FortiOS 7.2.1 Log Reference 1335


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log subtype string 20

time Time string 8

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated User string 66

unauthusersource Unauthenticated User Source string 66

user User name for authentication string 256

vd Virtual Domain Name string 32

61012 - LOG_ID_SSH_HOST_KEY_WARNING

Message ID: 61012


Message Description: LOG_ID_SSH_HOST_KEY_WARNING
Message Meaning: SSH connection is blocked, because host-key is not trust
Type: SSH
Category: SSH-HOSTKEY
Severity: Warning

Log Field Name Description Data Type Length

action The status of the ssh-channel: passthrough - channel is string 17


allowed blocked - channel is blocked

channeltype Type of Channel: x11, shell, exec, tcp-fprward, tun-forward, string 15


sftp. scp

command Shell command string 256

date Date string 10

devid Device ID string 16

direction Direction of session string 4096

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

FortiOS 7.2.1 Log Reference 1336


Fortinet Inc.
Log Field Name Description Data Type Length

dstuuid string 37

eventtime Event time uint64 20

eventtype Event Type string 32

fctuid FortiClient UID string 32

group Group name for authentication string 512

hostkeystatus string 15

level Log level string 11

logid Log ID string 10

login SSH login Name string 128

policyid Policy ID uint32 10

policytype string 24

profile Full profile name string 64

proto Protocol number uint8 3

sessionid Session ID uint32 10

severity Severity level of shell command string 8

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated User string 66

unauthusersource Unauthenticated User Source string 66

user User name for authentication string 256

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 1337


Fortinet Inc.
61013 - LOG_ID_SSH_HOST_KEY_NOTIF

Message ID: 61013


Message Description: LOG_ID_SSH_HOST_KEY_NOTIF
Message Meaning: SSH host-key is not trust
Type: SSH
Category: SSH-HOSTKEY
Severity: Notice

Log Field Name Description Data Type Length

action The status of the ssh-channel: passthrough - channel is string 17


allowed blocked - channel is blocked

channeltype Type of Channel: x11, shell, exec, tcp-fprward, tun-forward, string 15


sftp. scp

command Shell command string 256

date Date string 10

devid Device ID string 16

direction Direction of session string 4096

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Event time uint64 20

eventtype Event Type string 32

fctuid FortiClient UID string 32

group Group name for authentication string 512

hostkeystatus string 15

level Log level string 11

logid Log ID string 10

login SSH login Name string 128

policyid Policy ID uint32 10

FortiOS 7.2.1 Log Reference 1338


Fortinet Inc.
Log Field Name Description Data Type Length

policytype string 24

profile Full profile name string 64

proto Protocol number uint8 3

sessionid Session ID uint32 10

severity Severity level of shell command string 8

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated User string 66

unauthusersource Unauthenticated User Source string 66

user User name for authentication string 256

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 1339


Fortinet Inc.
SSL

62004 - LOG_ID_SSL_EXEMPT_ADDR

Message ID: 62004


Message Description: LOG_ID_SSL_EXEMPT_ADDR
Message Meaning: SSL connection is exempted based on address
Type: SSL
Category: SSL-EXEMPT
Severity: Notice

Log Field Name Description Data Type Length

action string 20

authalgo string 7

cat uint8 3

catdesc string 64

cipher string 6

date string 10

devid string 16

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

eventsubtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

group string 512

hostname string 256

FortiOS 7.2.1 Log Reference 1340


Fortinet Inc.
Log Field Name Description Data Type Length

kxcurve string 32

kxproto string 7

level string 11

logid string 10

msg string 512

policyid uint32 10

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

service string 5

sessionid uint32 10

sni string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subtype string 20

time string 8

tlsver string 8

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

user string 256

vd string 32

vrf uint8 3

FortiOS 7.2.1 Log Reference 1341


Fortinet Inc.
62006 - LOG_ID_SSL_EXEMPT_ALLOWLIST

Message ID: 62006


Message Description: LOG_ID_SSL_EXEMPT_ALLOWLIST
Message Meaning: SSL connection is exempted based on allowlist
Type: SSL
Category: SSL-EXEMPT
Severity: Notice

Log Field Name Description Data Type Length

action string 20

authalgo string 7

cat uint8 3

catdesc string 64

cipher string 6

date string 10

devid string 16

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

eventsubtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

group string 512

hostname string 256

kxcurve string 32

kxproto string 7

level string 11

FortiOS 7.2.1 Log Reference 1342


Fortinet Inc.
Log Field Name Description Data Type Length

logid string 10

msg string 512

policyid uint32 10

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

service string 5

sessionid uint32 10

sni string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subtype string 20

time string 8

tlsver string 8

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

user string 256

vd string 32

vrf uint8 3

62007 - LOG_ID_SSL_EXEMPT_FTGD_CATEGORY

Message ID: 62007


Message Description: LOG_ID_SSL_EXEMPT_FTGD_CATEGORY

FortiOS 7.2.1 Log Reference 1343


Fortinet Inc.
Message Meaning: SSL connection is exempted based on FortiGuard category rating
Type: SSL
Category: SSL-EXEMPT
Severity: Notice

Log Field Name Description Data Type Length

action string 20

authalgo string 7

cat uint8 3

catdesc string 64

cipher string 6

date string 10

devid string 16

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

eventsubtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

group string 512

hostname string 256

kxcurve string 32

kxproto string 7

level string 11

logid string 10

msg string 512

policyid uint32 10

policytype string 24

FortiOS 7.2.1 Log Reference 1344


Fortinet Inc.
Log Field Name Description Data Type Length

poluuid string 37

profile string 64

proto uint8 3

service string 5

sessionid uint32 10

sni string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subtype string 20

time string 8

tlsver string 8

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

user string 256

vd string 32

vrf uint8 3

62008 - LOG_ID_SSL_EXEMPT_LOCAL_CATEGORY

Message ID: 62008


Message Description: LOG_ID_SSL_EXEMPT_LOCAL_CATEGORY
Message Meaning: SSL connection is exempted based on local category rating
Type: SSL
Category: SSL-EXEMPT
Severity: Notice

FortiOS 7.2.1 Log Reference 1345


Fortinet Inc.
Log Field Name Description Data Type Length

action string 20

authalgo string 7

cat uint8 3

catdesc string 64

cipher string 6

date string 10

devid string 16

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

eventsubtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

group string 512

hostname string 256

kxcurve string 32

kxproto string 7

level string 11

logid string 10

msg string 512

policyid uint32 10

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

FortiOS 7.2.1 Log Reference 1346


Fortinet Inc.
Log Field Name Description Data Type Length

service string 5

sessionid uint32 10

sni string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subtype string 20

time string 8

tlsver string 8

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

user string 256

vd string 32

vrf uint8 3

62009 - LOG_ID_SSL_EXEMPT_USER_CATEGORY

Message ID: 62009


Message Description: LOG_ID_SSL_EXEMPT_USER_CATEGORY
Message Meaning: SSL connection is exempted based on user category rating
Type: SSL
Category: SSL-EXEMPT
Severity: Notice

Log Field Name Description Data Type Length

action string 20

FortiOS 7.2.1 Log Reference 1347


Fortinet Inc.
Log Field Name Description Data Type Length

authalgo string 7

cat uint8 3

catdesc string 64

cipher string 6

date string 10

devid string 16

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

eventsubtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

group string 512

hostname string 256

kxcurve string 32

kxproto string 7

level string 11

logid string 10

msg string 512

policyid uint32 10

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

service string 5

FortiOS 7.2.1 Log Reference 1348


Fortinet Inc.
Log Field Name Description Data Type Length

sessionid uint32 10

sni string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subtype string 20

time string 8

tlsver string 8

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

user string 256

vd string 32

vrf uint8 3

62100 - LOG_ID_SSL_NEGOTIATION_INSPECT

Message ID: 62100


Message Description: LOG_ID_SSL_NEGOTIATION_INSPECT
Message Meaning: Continue inspect the SSL connection
Type: SSL
Category: SSL-NEGOTIATION
Severity: Notice

Log Field Name Description Data Type Length

action string 20

authalgo string 7

FortiOS 7.2.1 Log Reference 1349


Fortinet Inc.
Log Field Name Description Data Type Length

certhash string 40

cipher string 6

cn string 64

date string 10

devid string 16

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

eventsubtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

group string 512

hostname string 256

issuer string 64

keyalgo string 8

keysize uint16 4

kxcurve string 32

kxproto string 7

level string 11

logid string 10

msg string 512

notafter string 20

notbefore string 20

policyid uint32 10

policytype string 24

FortiOS 7.2.1 Log Reference 1350


Fortinet Inc.
Log Field Name Description Data Type Length

poluuid string 37

profile string 64

proto uint8 3

san string 448

service string 5

sessionid uint32 10

ski string 64

sn string 40

sni string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subtype string 20

time string 8

tlsver string 8

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

user string 256

vd string 32

vrf uint8 3

62101 - LOG_ID_SSL_NEGOTIATION_BLOCK

Message ID: 62101


Message Description: LOG_ID_SSL_NEGOTIATION_BLOCK
Message Meaning: SSL connection is blocked due to its SSL negotiation

FortiOS 7.2.1 Log Reference 1351


Fortinet Inc.
Type: SSL
Category: SSL-NEGOTIATION
Severity: Warning

Log Field Name Description Data Type Length

action string 20

authalgo string 7

certhash string 40

cipher string 6

cn string 64

date string 10

devid string 16

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

eventsubtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

group string 512

hostname string 256

issuer string 64

keyalgo string 8

keysize uint16 4

kxcurve string 32

kxproto string 7

level string 11

logid string 10

msg string 512

FortiOS 7.2.1 Log Reference 1352


Fortinet Inc.
Log Field Name Description Data Type Length

notafter string 20

notbefore string 20

policyid uint32 10

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

san string 448

service string 5

sessionid uint32 10

ski string 64

sn string 40

sni string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subtype string 20

time string 8

tlsver string 8

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

user string 256

vd string 32

vrf uint8 3

FortiOS 7.2.1 Log Reference 1353


Fortinet Inc.
62102 - LOG_ID_SSL_NEGOTIATION_BYPASS

Message ID: 62102


Message Description: LOG_ID_SSL_NEGOTIATION_BYPASS
Message Meaning: SSL connection is bypassed due to its SSL negotiation
Type: SSL
Category: SSL-NEGOTIATION
Severity: Notice

Log Field Name Description Data Type Length

action string 20

authalgo string 7

certhash string 40

cipher string 6

cn string 64

date string 10

devid string 16

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

eventsubtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

group string 512

hostname string 256

issuer string 64

keyalgo string 8

keysize uint16 4

FortiOS 7.2.1 Log Reference 1354


Fortinet Inc.
Log Field Name Description Data Type Length

kxcurve string 32

kxproto string 7

level string 11

logid string 10

msg string 512

notafter string 20

notbefore string 20

policyid uint32 10

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

san string 448

service string 5

sessionid uint32 10

ski string 64

sn string 40

sni string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subtype string 20

time string 8

tlsver string 8

type string 16

tz string 5

FortiOS 7.2.1 Log Reference 1355


Fortinet Inc.
Log Field Name Description Data Type Length

unauthuser string 66

unauthusersource string 66

user string 256

vd string 32

vrf uint8 3

62103 - LOG_ID_SSL_NEGOTIATION_INFO

Message ID: 62103


Message Description: LOG_ID_SSL_NEGOTIATION_INFO
Message Meaning: (null)
Type: SSL
Category: SSL-NEGOTIATION
Severity: Information

Log Field Name Description Data Type Length

action string 20

authalgo string 7

certhash string 40

cipher string 6

cn string 64

date string 10

devid string 16

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

eventsubtype string 32

eventtime uint64 20

FortiOS 7.2.1 Log Reference 1356


Fortinet Inc.
Log Field Name Description Data Type Length

eventtype string 32

fctuid string 32

group string 512

hostname string 256

issuer string 64

keyalgo string 8

keysize uint16 4

kxcurve string 32

kxproto string 7

level string 11

logid string 10

msg string 512

notafter string 20

notbefore string 20

policyid uint32 10

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

san string 448

service string 5

sessionid uint32 10

ski string 64

sn string 40

sni string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

FortiOS 7.2.1 Log Reference 1357


Fortinet Inc.
Log Field Name Description Data Type Length

srcport uint16 5

srcuuid string 37

subtype string 20

time string 8

tlsver string 8

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

user string 256

vd string 32

vrf uint8 3

62200 - LOG_ID_SSL_SERVER_CERT_INFO

Message ID: 62200


Message Description: LOG_ID_SSL_SERVER_CERT_INFO
Message Meaning: (null)
Type: SSL
Category: SSL-SERVER-CERT-INFO
Severity: Information

Log Field Name Description Data Type Length

action string 20

authalgo string 7

certhash string 40

cipher string 6

cn string 64

date string 10

devid string 16

dstcountry string 64

dstintf string 32

FortiOS 7.2.1 Log Reference 1358


Fortinet Inc.
Log Field Name Description Data Type Length

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

eventsubtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

group string 512

hostname string 256

issuer string 64

keyalgo string 8

keysize uint16 4

kxcurve string 32

kxproto string 7

level string 11

logid string 10

notafter string 20

notbefore string 20

policyid uint32 10

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

san string 448

service string 5

sessionid uint32 10

ski string 64

sn string 40

FortiOS 7.2.1 Log Reference 1359


Fortinet Inc.
Log Field Name Description Data Type Length

sni string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subtype string 20

time string 8

tlsver string 8

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

user string 256

vd string 32

vrf uint8 3

62220 - LOG_ID_SSL_HANDSHAKE_INFO

Message ID: 62220


Message Description: LOG_ID_SSL_HANDSHAKE_INFO
Message Meaning: (null)
Type: SSL
Category: SSL-HANDSHAKE
Severity: Information

Log Field Name Description Data Type Length

action string 20

authalgo string 7

certhash string 40

FortiOS 7.2.1 Log Reference 1360


Fortinet Inc.
Log Field Name Description Data Type Length

cipher string 6

cn string 64

date string 10

devid string 16

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

eventsubtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

group string 512

handshake string 11

hostname string 256

issuer string 64

keyalgo string 8

keysize uint16 4

kxcurve string 32

kxproto string 7

level string 11

logid string 10

mitm string 3

notafter string 20

notbefore string 20

policyid uint32 10

policytype string 24

FortiOS 7.2.1 Log Reference 1361


Fortinet Inc.
Log Field Name Description Data Type Length

poluuid string 37

profile string 64

proto uint8 3

san string 448

service string 5

sessionid uint32 10

ski string 64

sn string 40

sni string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subtype string 20

time string 8

tlsver string 8

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

user string 256

vd string 32

vrf uint8 3

62300 - LOG_ID_SSL_ANOMALY_CERT_BLOCKLISTED

Message ID: 62300


Message Description: LOG_ID_SSL_ANOMALY_CERT_BLOCKLISTED
Message Meaning: SSL connection is blocked due to the server certificate is blocklisted

FortiOS 7.2.1 Log Reference 1362


Fortinet Inc.
Type: SSL
Category: SSL-ANOMALY
Severity: Warning

Log Field Name Description Data Type Length

action string 20

authalgo string 7

certdesc string 64

certhash string 40

cipher string 6

date string 10

devid string 16

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

eventsubtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

group string 512

hostname string 256

kxcurve string 32

kxproto string 7

level string 11

logid string 10

msg string 512

policyid uint32 10

policytype string 24

poluuid string 37

FortiOS 7.2.1 Log Reference 1363


Fortinet Inc.
Log Field Name Description Data Type Length

profile string 64

proto uint8 3

service string 5

sessionid uint32 10

sni string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subtype string 20

time string 8

tlsver string 8

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

user string 256

vd string 32

vrf uint8 3

62301 - LOG_ID_SSL_ANOMALY_CERT_RESIGN_TRUSTED

Message ID: 62301


Message Description: LOG_ID_SSL_ANOMALY_CERT_RESIGN_TRUSTED
Message Meaning: (null)
Type: SSL
Category: SSL-ANOMALY
Severity: Notice

FortiOS 7.2.1 Log Reference 1364


Fortinet Inc.
Log Field Name Description Data Type Length

action string 20

authalgo string 7

certdesc string 64

certhash string 40

cipher string 6

date string 10

devid string 16

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

eventsubtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

group string 512

hostname string 256

kxcurve string 32

kxproto string 7

level string 11

logid string 10

msg string 512

policyid uint32 10

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

FortiOS 7.2.1 Log Reference 1365


Fortinet Inc.
Log Field Name Description Data Type Length

service string 5

sessionid uint32 10

sni string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subtype string 20

time string 8

tlsver string 8

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

user string 256

vd string 32

vrf uint8 3

62302 - LOG_ID_SSL_ANOMALY_CERT_RESIGN_UNTRUSTED

Message ID: 62302


Message Description: LOG_ID_SSL_ANOMALY_CERT_RESIGN_UNTRUSTED
Message Meaning: (null)
Type: SSL
Category: SSL-ANOMALY
Severity: Notice

Log Field Name Description Data Type Length

action string 20

FortiOS 7.2.1 Log Reference 1366


Fortinet Inc.
Log Field Name Description Data Type Length

authalgo string 7

certdesc string 64

certhash string 40

cipher string 6

date string 10

devid string 16

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

eventsubtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

group string 512

hostname string 256

kxcurve string 32

kxproto string 7

level string 11

logid string 10

msg string 512

policyid uint32 10

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

service string 5

FortiOS 7.2.1 Log Reference 1367


Fortinet Inc.
Log Field Name Description Data Type Length

sessionid uint32 10

sni string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subtype string 20

time string 8

tlsver string 8

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

user string 256

vd string 32

vrf uint8 3

62303 - LOG_ID_SSL_ANOMALY_CERT_BLOCKED

Message ID: 62303


Message Description: LOG_ID_SSL_ANOMALY_CERT_BLOCKED
Message Meaning: (null)
Type: SSL
Category: SSL-ANOMALY
Severity: Warning

Log Field Name Description Data Type Length

action string 20

authalgo string 7

FortiOS 7.2.1 Log Reference 1368


Fortinet Inc.
Log Field Name Description Data Type Length

certdesc string 64

certhash string 40

cipher string 6

date string 10

devid string 16

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

eventsubtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

group string 512

hostname string 256

kxcurve string 32

kxproto string 7

level string 11

logid string 10

msg string 512

policyid uint32 10

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

service string 5

sessionid uint32 10

FortiOS 7.2.1 Log Reference 1369


Fortinet Inc.
Log Field Name Description Data Type Length

sni string 256

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subtype string 20

time string 8

tlsver string 8

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

user string 256

vd string 32

vrf uint8 3

62304 - LOG_ID_SSL_ANOMALY_CERT_SNI_MISMATCHED

Message ID: 62304


Message Description: LOG_ID_SSL_ANOMALY_CERT_SNI_MISMATCHED
Message Meaning: (null)
Type: SSL
Category: SSL-ANOMALY
Severity: Warning

Log Field Name Description Data Type Length

action string 20

authalgo string 7

certdesc string 64

FortiOS 7.2.1 Log Reference 1370


Fortinet Inc.
Log Field Name Description Data Type Length

certhash string 40

cipher string 6

date string 10

devid string 16

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

eventsubtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

group string 512

hostname string 256

kxcurve string 32

kxproto string 7

level string 11

logid string 10

msg string 512

policyid uint32 10

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

service string 5

sessionid uint32 10

sni string 256

FortiOS 7.2.1 Log Reference 1371


Fortinet Inc.
Log Field Name Description Data Type Length

srccountry string 64

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subtype string 20

time string 8

tlsver string 8

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

user string 256

vd string 32

vrf uint8 3

62305 - LOG_ID_SSL_ANOMALY_CERT_PROBE_FAILURE_BLOCK

Message ID: 62305


Message Description: LOG_ID_SSL_ANOMALY_CERT_PROBE_FAILURE_BLOCK
Message Meaning: (null)
Type: SSL
Category: SSL-ANOMALY
Severity: Warning

Log Field Name Description Data Type Length

action string 20

authalgo string 7

certdesc string 64

certhash string 40

FortiOS 7.2.1 Log Reference 1372


Fortinet Inc.
Log Field Name Description Data Type Length

cipher string 6

date string 10

devid string 16

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

eventsubtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

group string 512

hostname string 256

kxcurve string 32

kxproto string 7

level string 11

logid string 10

msg string 512

policyid uint32 10

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

service string 5

sessionid uint32 10

sni string 256

srccountry string 64

FortiOS 7.2.1 Log Reference 1373


Fortinet Inc.
Log Field Name Description Data Type Length

srcdomain string 255

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subtype string 20

time string 8

tlsver string 8

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

user string 256

vd string 32

vrf uint8 3

62306 - LOG_ID_SSL_ANOMALY_CERT_PROBE_FAILURE_PASS

Message ID: 62306


Message Description: LOG_ID_SSL_ANOMALY_CERT_PROBE_FAILURE_PASS
Message Meaning: (null)
Type: SSL
Category: SSL-ANOMALY
Severity: Notice

Log Field Name Description Data Type Length

action string 20

authalgo string 7

certdesc string 64

certhash string 40

cipher string 6

FortiOS 7.2.1 Log Reference 1374


Fortinet Inc.
Log Field Name Description Data Type Length

date string 10

devid string 16

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

eventsubtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

group string 512

hostname string 256

kxcurve string 32

kxproto string 7

level string 11

logid string 10

msg string 512

policyid uint32 10

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

service string 5

sessionid uint32 10

sni string 256

srccountry string 64

srcdomain string 255

FortiOS 7.2.1 Log Reference 1375


Fortinet Inc.
Log Field Name Description Data Type Length

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subtype string 20

time string 8

tlsver string 8

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

user string 256

vd string 32

vrf uint8 3

62307 - LOG_ID_SSL_ANOMALY_CERT_SNI_MISMATCHED_INFO

Message ID: 62307


Message Description: LOG_ID_SSL_ANOMALY_CERT_SNI_MISMATCHED_INFO
Message Meaning: (null)
Type: SSL
Category: SSL-ANOMALY
Severity: Information

Log Field Name Description Data Type Length

action string 20

authalgo string 7

certdesc string 64

certhash string 40

cipher string 6

date string 10

FortiOS 7.2.1 Log Reference 1376


Fortinet Inc.
Log Field Name Description Data Type Length

devid string 16

dstcountry string 64

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

dstuuid string 37

eventsubtype string 32

eventtime uint64 20

eventtype string 32

fctuid string 32

group string 512

hostname string 256

kxcurve string 32

kxproto string 7

level string 11

logid string 10

msg string 512

policyid uint32 10

policytype string 24

poluuid string 37

profile string 64

proto uint8 3

service string 5

sessionid uint32 10

sni string 256

srccountry string 64

srcdomain string 255

srcintf string 32

FortiOS 7.2.1 Log Reference 1377


Fortinet Inc.
Log Field Name Description Data Type Length

srcintfrole string 10

srcip ip 39

srcport uint16 5

srcuuid string 37

subtype string 20

time string 8

tlsver string 8

type string 16

tz string 5

unauthuser string 66

unauthusersource string 66

user string 256

vd string 32

vrf uint8 3

FortiOS 7.2.1 Log Reference 1378


Fortinet Inc.
Traffic

2 - LOG_ID_TRAFFIC_ALLOW

Message ID: 2
Message Description: LOG_ID_TRAFFIC_ALLOW
Message Meaning: Allowed traffic
Type: Traffic
Category: FORWARD
Severity: Notice

Log Field Name Description Data Type Length

accessproxy string 80

action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server

agent User agent - eg. agent="Mozilla/5.0" string 1024

ap Access Point name string 36

app Application name string 96

appact The security action from app control string 16

appcat Application category string 64

appid Application ID uint32 10

applist Application Control profile (name) string 64

apprisk Application Risk Level string 16

apsn Access Point serial number string 36

authserver Remote Authentication server string 64

centralnatid central-snat-map id uint32 10

channel WiFi Channel uint32 10

clientdeviceid string 80

clientdeviceowner string 80

FortiOS 7.2.1 Log Reference 1379


Fortinet Inc.
Log Field Name Description Data Type Length

clientdevicetags string 512

comment Customized policy comment string 1024

craction Action performed by Threat Weight uint32 10

crlevel Threat Weight level string 10

crscore Threat Weight score uint32 10

date Date string 10

devid Device Serial Number string 16

devtype Device Type string 66

dstauthserver string 64

dstcity string 64

dstcountry Country name for the destination IP string 64

dstdevtype Destination Device Type string 66

dstfamily string 66

dsthwvendor string 66

dsthwversion string 66

dstinetsvc Internet service name for the destination string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstmac Destination Mac Address string 17

dstname Destination name string 66

dstosname Destination OS name string 66

dstport Destination Protocol Port Number uint16 5

dstregion string 64

dstreputation uint32 10

dstserver Destination Server uint8 3

dstssid Destination SSID string 33

dstswversion string 66

dstthreatfeed string 36

dstunauthuser string 66

FortiOS 7.2.1 Log Reference 1380


Fortinet Inc.
Log Field Name Description Data Type Length

dstunauthusersource string 66

dstuser string 256

dstuuid UUID of the Destination Address Object string 37

duration Duration of the session uint32 10

eventtime Epoch time in nanoseconds uint64 20

fctuid FortiClient UID string 32

gatewayid uint32 10

group User group name string 512

identifier uint16 5

lanin LAN incoming traffic in bytes uint64 20

lanout LAN outgoing traffic in bytes uint64 20

level Log Level string 11

logid Log ID string 10

masterdstmac Destination master MAC address string 17

mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces

msg Log message string 512

osname Name of the device's OS string 66

pdstport uint16 5

policyid Firewall Policy ID uint32 10

policymode string 8

policyname Policy name string 36

policytype Policy type string 24

poluuid UUID of the Firewall Policy string 37

proto Protocol Number uint8 3

psrcport uint16 5

radioband Radio Band string 64

rcvdbyte Received Bytes uint64 20

rcvddelta Delta Received Bytes uint64 20

rcvdpkt Received Packets uint32 10

saasname string 80

FortiOS 7.2.1 Log Reference 1381


Fortinet Inc.
Log Field Name Description Data Type Length

sentbyte Sent Bytes uint64 20

sentdelta Delta Sent Bytes uint64 20

sentpkt Sent Packets uint32 10

service Name of Service string 80

sessionid Session ID uint32 10

shaperdroprcvdbyte Received bytes dropped by shaper uint32 10

shaperdropsentbyte Sent bytes dropped by shaper uint32 10

shaperperipdropbyte Dropped bytes per IP by shaper uint32 10

shaperperipname Traffic shaper name (per IP) string 36

shaperrcvdname Traffic shaper name for received traffic string 36

shapersentname Traffic shaper name for sent traffic string 36

shapingpolicyid Shaping Policy ID uint32 10

shapingpolicyname string 36

signal int8 4

snr int8 4

srccity string 64

srccountry Country name for Source IP string 64

srcdomain string 255

srcfamily string 66

srchwvendor string 66

srchwversion string 66

srcinetsvc Internet service name for the source string 64

srcintf Source interface name string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP address ip 39

srcmac MAC address associated with the Source IP string 17

srcmacvendor string 66

srcname Source name string 66

srcport Source protocol port number uint16 5

srcregion string 64

FortiOS 7.2.1 Log Reference 1382


Fortinet Inc.
Log Field Name Description Data Type Length

srcreputation uint32 10

srcserver Source server uint8 3

srcssid Source SSID string 33

srcswversion string 66

srcthreatfeed string 36

srcuuid UUID of the Source Address Object string 37

sslaction Action taken by ssl-ssh-profile string 26

subtype Subtype of the traffic string 20

time Time string 8

trandisp NAT translation type string 16

tranip NAT Destination IP ip 39

tranport NAT Destination Port uint16 5

transip NAT Source IP ip 39

transport NAT Source Protocol Port uint16 5

tunnelid uint32 10

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated user name string 66

unauthusersource The method used to detect unauthenticated user name string 66

url URL string 512

user User name string 256

utmaction Security action performed by UTM string 32

vd Virtual domain name string 32

vip string 64

vpntype The type of the VPN tunnel string 14

vrf Virtual router forwarding uint8 3

vwlid Virtual Wan Link (SD-WAN) service id uint32 10

vwlname string 36

vwlquality Quality info of the service rule that is matched by traffic string 320

vwlservice Application that is matched by the traffic (internet-service- string 64


app-ctrl)

FortiOS 7.2.1 Log Reference 1383


Fortinet Inc.
Log Field Name Description Data Type Length

vwpvlanid Virtual Wire Pair vlan id uint32 10

wanin WAN incoming traffic in bytes uint64 20

wanoptapptype WAN Optimization Application type string 9

wanout WAN outgoing traffic in bytes uint64 20

3 - LOG_ID_TRAFFIC_DENY

Message ID: 3
Message Description: LOG_ID_TRAFFIC_DENY
Message Meaning: Traffic violation
Type: Traffic
Category: FORWARD
Severity: Warning

Log Field Name Description Data Type Length

accessproxy string 80

action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server

agent User agent - eg. agent="Mozilla/5.0" string 1024

ap Access Point name string 36

app Application name string 96

appact The security action from app control string 16

appcat Application category string 64

appid Application ID uint32 10

applist Application Control profile (name) string 64

apprisk Application Risk Level string 16

apsn Access Point serial number string 36

authserver Remote Authentication server string 64

centralnatid central-snat-map id uint32 10

FortiOS 7.2.1 Log Reference 1384


Fortinet Inc.
Log Field Name Description Data Type Length

channel WiFi Channel uint32 10

clientdeviceid string 80

clientdeviceowner string 80

clientdevicetags string 512

comment Customized policy comment string 1024

craction Action performed by Threat Weight uint32 10

crlevel Threat Weight level string 10

crscore Threat Weight score uint32 10

date Date string 10

devid Device Serial Number string 16

devtype Device Type string 66

dstauthserver string 64

dstcity string 64

dstcountry Country name for the destination IP string 64

dstdevtype Destination Device Type string 66

dstfamily string 66

dsthwvendor string 66

dsthwversion string 66

dstinetsvc Internet service name for the destination string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstmac Destination Mac Address string 17

dstname Destination name string 66

dstosname Destination OS name string 66

dstport Destination Protocol Port Number uint16 5

dstregion string 64

dstreputation uint32 10

dstserver Destination Server uint8 3

dstssid Destination SSID string 33

FortiOS 7.2.1 Log Reference 1385


Fortinet Inc.
Log Field Name Description Data Type Length

dstswversion string 66

dstthreatfeed string 36

dstunauthuser string 66

dstunauthusersource string 66

dstuser string 256

dstuuid UUID of the Destination Address Object string 37

duration Duration of the session uint32 10

eventtime Epoch time in nanoseconds uint64 20

fctuid FortiClient UID string 32

gatewayid uint32 10

group User group name string 512

identifier uint16 5

lanin LAN incoming traffic in bytes uint64 20

lanout LAN outgoing traffic in bytes uint64 20

level Log Level string 11

logid Log ID string 10

masterdstmac Destination master MAC address string 17

mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces

msg Log message string 512

osname Name of the device's OS string 66

pdstport uint16 5

policyid Firewall Policy ID uint32 10

policymode string 8

policyname Policy name string 36

policytype Policy type string 24

poluuid UUID of the Firewall Policy string 37

proto Protocol Number uint8 3

psrcport uint16 5

radioband Radio Band string 64

rcvdbyte Received Bytes uint64 20

FortiOS 7.2.1 Log Reference 1386


Fortinet Inc.
Log Field Name Description Data Type Length

rcvddelta Delta Received Bytes uint64 20

rcvdpkt Received Packets uint32 10

saasname string 80

sentbyte Sent Bytes uint64 20

sentdelta Delta Sent Bytes uint64 20

sentpkt Sent Packets uint32 10

service Name of Service string 80

sessionid Session ID uint32 10

shaperdroprcvdbyte Received bytes dropped by shaper uint32 10

shaperdropsentbyte Sent bytes dropped by shaper uint32 10

shaperperipdropbyte Dropped bytes per IP by shaper uint32 10

shaperperipname Traffic shaper name (per IP) string 36

shaperrcvdname Traffic shaper name for received traffic string 36

shapersentname Traffic shaper name for sent traffic string 36

shapingpolicyid Shaping Policy ID uint32 10

shapingpolicyname string 36

signal int8 4

snr int8 4

srccity string 64

srccountry Country name for Source IP string 64

srcdomain string 255

srcfamily string 66

srchwvendor string 66

srchwversion string 66

srcinetsvc Internet service name for the source string 64

srcintf Source interface name string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP address ip 39

srcmac MAC address associated with the Source IP string 17

srcmacvendor string 66

FortiOS 7.2.1 Log Reference 1387


Fortinet Inc.
Log Field Name Description Data Type Length

srcname Source name string 66

srcport Source protocol port number uint16 5

srcregion string 64

srcreputation uint32 10

srcserver Source server uint8 3

srcssid Source SSID string 33

srcswversion string 66

srcthreatfeed string 36

srcuuid UUID of the Source Address Object string 37

sslaction Action taken by ssl-ssh-profile string 26

subtype Subtype of the traffic string 20

time Time string 8

trandisp NAT translation type string 16

tranip NAT Destination IP ip 39

tranport NAT Destination Port uint16 5

transip NAT Source IP ip 39

transport NAT Source Protocol Port uint16 5

tunnelid uint32 10

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated user name string 66

unauthusersource The method used to detect unauthenticated user name string 66

url URL string 512

user User name string 256

utmaction Security action performed by UTM string 32

vd Virtual domain name string 32

vip string 64

vpntype The type of the VPN tunnel string 14

vrf Virtual router forwarding uint8 3

vwlid Virtual Wan Link (SD-WAN) service id uint32 10

FortiOS 7.2.1 Log Reference 1388


Fortinet Inc.
Log Field Name Description Data Type Length

vwlname string 36

vwlquality Quality info of the service rule that is matched by traffic string 320

vwlservice Application that is matched by the traffic (internet-service- string 64


app-ctrl)

vwpvlanid Virtual Wire Pair vlan id uint32 10

wanin WAN incoming traffic in bytes uint64 20

wanoptapptype WAN Optimization Application type string 9

wanout WAN outgoing traffic in bytes uint64 20

4 - LOG_ID_TRAFFIC_OTHER_START

Message ID: 4
Message Description: LOG_ID_TRAFFIC_OTHER_START
Message Meaning: Traffic other session start
Type: Traffic
Category: FORWARD
Severity: Notice

Log Field Name Description Data Type Length

accessproxy string 80

action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server

agent User agent - eg. agent="Mozilla/5.0" string 1024

ap Access Point name string 36

app Application name string 96

appact The security action from app control string 16

appcat Application category string 64

appid Application ID uint32 10

applist Application Control profile (name) string 64

apprisk Application Risk Level string 16

FortiOS 7.2.1 Log Reference 1389


Fortinet Inc.
Log Field Name Description Data Type Length

apsn Access Point serial number string 36

authserver Remote Authentication server string 64

centralnatid central-snat-map id uint32 10

channel WiFi Channel uint32 10

clientdeviceid string 80

clientdeviceowner string 80

clientdevicetags string 512

comment Customized policy comment string 1024

craction Action performed by Threat Weight uint32 10

crlevel Threat Weight level string 10

crscore Threat Weight score uint32 10

date Date string 10

devid Device Serial Number string 16

devtype Device Type string 66

dstauthserver string 64

dstcity string 64

dstcountry Country name for the destination IP string 64

dstdevtype Destination Device Type string 66

dstfamily string 66

dsthwvendor string 66

dsthwversion string 66

dstinetsvc Internet service name for the destination string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstmac Destination Mac Address string 17

dstname Destination name string 66

dstosname Destination OS name string 66

dstport Destination Protocol Port Number uint16 5

dstregion string 64

FortiOS 7.2.1 Log Reference 1390


Fortinet Inc.
Log Field Name Description Data Type Length

dstreputation uint32 10

dstserver Destination Server uint8 3

dstssid Destination SSID string 33

dstswversion string 66

dstthreatfeed string 36

dstunauthuser string 66

dstunauthusersource string 66

dstuser string 256

dstuuid UUID of the Destination Address Object string 37

duration Duration of the session uint32 10

eventtime Epoch time in nanoseconds uint64 20

fctuid FortiClient UID string 32

gatewayid uint32 10

group User group name string 512

identifier uint16 5

lanin LAN incoming traffic in bytes uint64 20

lanout LAN outgoing traffic in bytes uint64 20

level Log Level string 11

logid Log ID string 10

masterdstmac Destination master MAC address string 17

mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces

msg Log message string 512

osname Name of the device's OS string 66

pdstport uint16 5

policyid Firewall Policy ID uint32 10

policymode string 8

policyname Policy name string 36

policytype Policy type string 24

poluuid UUID of the Firewall Policy string 37

proto Protocol Number uint8 3

FortiOS 7.2.1 Log Reference 1391


Fortinet Inc.
Log Field Name Description Data Type Length

psrcport uint16 5

radioband Radio Band string 64

rcvdbyte Received Bytes uint64 20

rcvddelta Delta Received Bytes uint64 20

rcvdpkt Received Packets uint32 10

saasname string 80

sentbyte Sent Bytes uint64 20

sentdelta Delta Sent Bytes uint64 20

sentpkt Sent Packets uint32 10

service Name of Service string 80

sessionid Session ID uint32 10

shaperdroprcvdbyte Received bytes dropped by shaper uint32 10

shaperdropsentbyte Sent bytes dropped by shaper uint32 10

shaperperipdropbyte Dropped bytes per IP by shaper uint32 10

shaperperipname Traffic shaper name (per IP) string 36

shaperrcvdname Traffic shaper name for received traffic string 36

shapersentname Traffic shaper name for sent traffic string 36

shapingpolicyid Shaping Policy ID uint32 10

shapingpolicyname string 36

signal int8 4

snr int8 4

srccity string 64

srccountry Country name for Source IP string 64

srcdomain string 255

srcfamily string 66

srchwvendor string 66

srchwversion string 66

srcinetsvc Internet service name for the source string 64

srcintf Source interface name string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

FortiOS 7.2.1 Log Reference 1392


Fortinet Inc.
Log Field Name Description Data Type Length

srcip Source IP address ip 39

srcmac MAC address associated with the Source IP string 17

srcmacvendor string 66

srcname Source name string 66

srcport Source protocol port number uint16 5

srcregion string 64

srcreputation uint32 10

srcserver Source server uint8 3

srcssid Source SSID string 33

srcswversion string 66

srcthreatfeed string 36

srcuuid UUID of the Source Address Object string 37

sslaction Action taken by ssl-ssh-profile string 26

subtype Subtype of the traffic string 20

time Time string 8

trandisp NAT translation type string 16

tranip NAT Destination IP ip 39

tranport NAT Destination Port uint16 5

transip NAT Source IP ip 39

transport NAT Source Protocol Port uint16 5

tunnelid uint32 10

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated user name string 66

unauthusersource The method used to detect unauthenticated user name string 66

url URL string 512

user User name string 256

utmaction Security action performed by UTM string 32

vd Virtual domain name string 32

vip string 64

FortiOS 7.2.1 Log Reference 1393


Fortinet Inc.
Log Field Name Description Data Type Length

vpntype The type of the VPN tunnel string 14

vrf Virtual router forwarding uint8 3

vwlid Virtual Wan Link (SD-WAN) service id uint32 10

vwlname string 36

vwlquality Quality info of the service rule that is matched by traffic string 320

vwlservice Application that is matched by the traffic (internet-service- string 64


app-ctrl)

vwpvlanid Virtual Wire Pair vlan id uint32 10

wanin WAN incoming traffic in bytes uint64 20

wanoptapptype WAN Optimization Application type string 9

wanout WAN outgoing traffic in bytes uint64 20

5 - LOG_ID_TRAFFIC_OTHER_ICMP_ALLOW

Message ID: 5
Message Description: LOG_ID_TRAFFIC_OTHER_ICMP_ALLOW
Message Meaning: Traffic allowed ICMP
Type: Traffic
Category: FORWARD
Severity: Notice

Log Field Name Description Data Type Length

accessproxy string 80

action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server

agent User agent - eg. agent="Mozilla/5.0" string 1024

ap Access Point name string 36

app Application name string 96

appact The security action from app control string 16

appcat Application category string 64

FortiOS 7.2.1 Log Reference 1394


Fortinet Inc.
Log Field Name Description Data Type Length

appid Application ID uint32 10

applist Application Control profile (name) string 64

apprisk Application Risk Level string 16

apsn Access Point serial number string 36

authserver Remote Authentication server string 64

centralnatid central-snat-map id uint32 10

channel WiFi Channel uint32 10

clientdeviceid string 80

clientdeviceowner string 80

clientdevicetags string 512

comment Customized policy comment string 1024

craction Action performed by Threat Weight uint32 10

crlevel Threat Weight level string 10

crscore Threat Weight score uint32 10

date Date string 10

devid Device Serial Number string 16

devtype Device Type string 66

dstauthserver string 64

dstcity string 64

dstcountry Country name for the destination IP string 64

dstdevtype Destination Device Type string 66

dstfamily string 66

dsthwvendor string 66

dsthwversion string 66

dstinetsvc Internet service name for the destination string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstmac Destination Mac Address string 17

dstname Destination name string 66

FortiOS 7.2.1 Log Reference 1395


Fortinet Inc.
Log Field Name Description Data Type Length

dstosname Destination OS name string 66

dstport Destination Protocol Port Number uint16 5

dstregion string 64

dstreputation uint32 10

dstserver Destination Server uint8 3

dstssid Destination SSID string 33

dstswversion string 66

dstthreatfeed string 36

dstunauthuser string 66

dstunauthusersource string 66

dstuser string 256

dstuuid UUID of the Destination Address Object string 37

duration Duration of the session uint32 10

eventtime Epoch time in nanoseconds uint64 20

fctuid FortiClient UID string 32

gatewayid uint32 10

group User group name string 512

identifier uint16 5

lanin LAN incoming traffic in bytes uint64 20

lanout LAN outgoing traffic in bytes uint64 20

level Log Level string 11

logid Log ID string 10

masterdstmac Destination master MAC address string 17

mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces

msg Log message string 512

osname Name of the device's OS string 66

pdstport uint16 5

policyid Firewall Policy ID uint32 10

policymode string 8

policyname Policy name string 36

FortiOS 7.2.1 Log Reference 1396


Fortinet Inc.
Log Field Name Description Data Type Length

policytype Policy type string 24

poluuid UUID of the Firewall Policy string 37

proto Protocol Number uint8 3

psrcport uint16 5

radioband Radio Band string 64

rcvdbyte Received Bytes uint64 20

rcvddelta Delta Received Bytes uint64 20

rcvdpkt Received Packets uint32 10

saasname string 80

sentbyte Sent Bytes uint64 20

sentdelta Delta Sent Bytes uint64 20

sentpkt Sent Packets uint32 10

service Name of Service string 80

sessionid Session ID uint32 10

shaperdroprcvdbyte Received bytes dropped by shaper uint32 10

shaperdropsentbyte Sent bytes dropped by shaper uint32 10

shaperperipdropbyte Dropped bytes per IP by shaper uint32 10

shaperperipname Traffic shaper name (per IP) string 36

shaperrcvdname Traffic shaper name for received traffic string 36

shapersentname Traffic shaper name for sent traffic string 36

shapingpolicyid Shaping Policy ID uint32 10

shapingpolicyname string 36

signal int8 4

snr int8 4

srccity string 64

srccountry Country name for Source IP string 64

srcdomain string 255

srcfamily string 66

srchwvendor string 66

srchwversion string 66

FortiOS 7.2.1 Log Reference 1397


Fortinet Inc.
Log Field Name Description Data Type Length

srcinetsvc Internet service name for the source string 64

srcintf Source interface name string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP address ip 39

srcmac MAC address associated with the Source IP string 17

srcmacvendor string 66

srcname Source name string 66

srcport Source protocol port number uint16 5

srcregion string 64

srcreputation uint32 10

srcserver Source server uint8 3

srcssid Source SSID string 33

srcswversion string 66

srcthreatfeed string 36

srcuuid UUID of the Source Address Object string 37

sslaction Action taken by ssl-ssh-profile string 26

subtype Subtype of the traffic string 20

time Time string 8

trandisp NAT translation type string 16

tranip NAT Destination IP ip 39

tranport NAT Destination Port uint16 5

transip NAT Source IP ip 39

transport NAT Source Protocol Port uint16 5

tunnelid uint32 10

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated user name string 66

unauthusersource The method used to detect unauthenticated user name string 66

url URL string 512

user User name string 256

FortiOS 7.2.1 Log Reference 1398


Fortinet Inc.
Log Field Name Description Data Type Length

utmaction Security action performed by UTM string 32

vd Virtual domain name string 32

vip string 64

vpntype The type of the VPN tunnel string 14

vrf Virtual router forwarding uint8 3

vwlid Virtual Wan Link (SD-WAN) service id uint32 10

vwlname string 36

vwlquality Quality info of the service rule that is matched by traffic string 320

vwlservice Application that is matched by the traffic (internet-service- string 64


app-ctrl)

vwpvlanid Virtual Wire Pair vlan id uint32 10

wanin WAN incoming traffic in bytes uint64 20

wanoptapptype WAN Optimization Application type string 9

wanout WAN outgoing traffic in bytes uint64 20

6 - LOG_ID_TRAFFIC_OTHER_ICMP_DENY

Message ID: 6
Message Description: LOG_ID_TRAFFIC_OTHER_ICMP_DENY
Message Meaning: Traffic denied ICMP
Type: Traffic
Category: FORWARD
Severity: Warning

Log Field Name Description Data Type Length

accessproxy string 80

action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server

agent User agent - eg. agent="Mozilla/5.0" string 1024

ap Access Point name string 36

FortiOS 7.2.1 Log Reference 1399


Fortinet Inc.
Log Field Name Description Data Type Length

app Application name string 96

appact The security action from app control string 16

appcat Application category string 64

appid Application ID uint32 10

applist Application Control profile (name) string 64

apprisk Application Risk Level string 16

apsn Access Point serial number string 36

authserver Remote Authentication server string 64

centralnatid central-snat-map id uint32 10

channel WiFi Channel uint32 10

clientdeviceid string 80

clientdeviceowner string 80

clientdevicetags string 512

comment Customized policy comment string 1024

craction Action performed by Threat Weight uint32 10

crlevel Threat Weight level string 10

crscore Threat Weight score uint32 10

date Date string 10

devid Device Serial Number string 16

devtype Device Type string 66

dstauthserver string 64

dstcity string 64

dstcountry Country name for the destination IP string 64

dstdevtype Destination Device Type string 66

dstfamily string 66

dsthwvendor string 66

dsthwversion string 66

dstinetsvc Internet service name for the destination string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

FortiOS 7.2.1 Log Reference 1400


Fortinet Inc.
Log Field Name Description Data Type Length

dstip Destination IP Address ip 39

dstmac Destination Mac Address string 17

dstname Destination name string 66

dstosname Destination OS name string 66

dstport Destination Protocol Port Number uint16 5

dstregion string 64

dstreputation uint32 10

dstserver Destination Server uint8 3

dstssid Destination SSID string 33

dstswversion string 66

dstthreatfeed string 36

dstunauthuser string 66

dstunauthusersource string 66

dstuser string 256

dstuuid UUID of the Destination Address Object string 37

duration Duration of the session uint32 10

eventtime Epoch time in nanoseconds uint64 20

fctuid FortiClient UID string 32

gatewayid uint32 10

group User group name string 512

identifier uint16 5

lanin LAN incoming traffic in bytes uint64 20

lanout LAN outgoing traffic in bytes uint64 20

level Log Level string 11

logid Log ID string 10

masterdstmac Destination master MAC address string 17

mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces

msg Log message string 512

osname Name of the device's OS string 66

pdstport uint16 5

FortiOS 7.2.1 Log Reference 1401


Fortinet Inc.
Log Field Name Description Data Type Length

policyid Firewall Policy ID uint32 10

policymode string 8

policyname Policy name string 36

policytype Policy type string 24

poluuid UUID of the Firewall Policy string 37

proto Protocol Number uint8 3

psrcport uint16 5

radioband Radio Band string 64

rcvdbyte Received Bytes uint64 20

rcvddelta Delta Received Bytes uint64 20

rcvdpkt Received Packets uint32 10

saasname string 80

sentbyte Sent Bytes uint64 20

sentdelta Delta Sent Bytes uint64 20

sentpkt Sent Packets uint32 10

service Name of Service string 80

sessionid Session ID uint32 10

shaperdroprcvdbyte Received bytes dropped by shaper uint32 10

shaperdropsentbyte Sent bytes dropped by shaper uint32 10

shaperperipdropbyte Dropped bytes per IP by shaper uint32 10

shaperperipname Traffic shaper name (per IP) string 36

shaperrcvdname Traffic shaper name for received traffic string 36

shapersentname Traffic shaper name for sent traffic string 36

shapingpolicyid Shaping Policy ID uint32 10

shapingpolicyname string 36

signal int8 4

snr int8 4

srccity string 64

srccountry Country name for Source IP string 64

srcdomain string 255

FortiOS 7.2.1 Log Reference 1402


Fortinet Inc.
Log Field Name Description Data Type Length

srcfamily string 66

srchwvendor string 66

srchwversion string 66

srcinetsvc Internet service name for the source string 64

srcintf Source interface name string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP address ip 39

srcmac MAC address associated with the Source IP string 17

srcmacvendor string 66

srcname Source name string 66

srcport Source protocol port number uint16 5

srcregion string 64

srcreputation uint32 10

srcserver Source server uint8 3

srcssid Source SSID string 33

srcswversion string 66

srcthreatfeed string 36

srcuuid UUID of the Source Address Object string 37

sslaction Action taken by ssl-ssh-profile string 26

subtype Subtype of the traffic string 20

time Time string 8

trandisp NAT translation type string 16

tranip NAT Destination IP ip 39

tranport NAT Destination Port uint16 5

transip NAT Source IP ip 39

transport NAT Source Protocol Port uint16 5

tunnelid uint32 10

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated user name string 66

FortiOS 7.2.1 Log Reference 1403


Fortinet Inc.
Log Field Name Description Data Type Length

unauthusersource The method used to detect unauthenticated user name string 66

url URL string 512

user User name string 256

utmaction Security action performed by UTM string 32

vd Virtual domain name string 32

vip string 64

vpntype The type of the VPN tunnel string 14

vrf Virtual router forwarding uint8 3

vwlid Virtual Wan Link (SD-WAN) service id uint32 10

vwlname string 36

vwlquality Quality info of the service rule that is matched by traffic string 320

vwlservice Application that is matched by the traffic (internet-service- string 64


app-ctrl)

vwpvlanid Virtual Wire Pair vlan id uint32 10

wanin WAN incoming traffic in bytes uint64 20

wanoptapptype WAN Optimization Application type string 9

wanout WAN outgoing traffic in bytes uint64 20

7 - LOG_ID_TRAFFIC_OTHER_INVALID

Message ID: 7
Message Description: LOG_ID_TRAFFIC_OTHER_INVALID
Message Meaning: Traffic other invalid
Type: Traffic
Category: FORWARD
Severity: Warning

Log Field Name Description Data Type Length

accessproxy string 80

FortiOS 7.2.1 Log Reference 1404


Fortinet Inc.
Log Field Name Description Data Type Length

action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server

agent User agent - eg. agent="Mozilla/5.0" string 1024

ap Access Point name string 36

app Application name string 96

appact The security action from app control string 16

appcat Application category string 64

appid Application ID uint32 10

applist Application Control profile (name) string 64

apprisk Application Risk Level string 16

apsn Access Point serial number string 36

authserver Remote Authentication server string 64

centralnatid central-snat-map id uint32 10

channel WiFi Channel uint32 10

clientdeviceid string 80

clientdeviceowner string 80

clientdevicetags string 512

comment Customized policy comment string 1024

craction Action performed by Threat Weight uint32 10

crlevel Threat Weight level string 10

crscore Threat Weight score uint32 10

date Date string 10

devid Device Serial Number string 16

devtype Device Type string 66

dstauthserver string 64

dstcity string 64

dstcountry Country name for the destination IP string 64

FortiOS 7.2.1 Log Reference 1405


Fortinet Inc.
Log Field Name Description Data Type Length

dstdevtype Destination Device Type string 66

dstfamily string 66

dsthwvendor string 66

dsthwversion string 66

dstinetsvc Internet service name for the destination string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstmac Destination Mac Address string 17

dstname Destination name string 66

dstosname Destination OS name string 66

dstport Destination Protocol Port Number uint16 5

dstregion string 64

dstreputation uint32 10

dstserver Destination Server uint8 3

dstssid Destination SSID string 33

dstswversion string 66

dstthreatfeed string 36

dstunauthuser string 66

dstunauthusersource string 66

dstuser string 256

dstuuid UUID of the Destination Address Object string 37

duration Duration of the session uint32 10

eventtime Epoch time in nanoseconds uint64 20

fctuid FortiClient UID string 32

gatewayid uint32 10

group User group name string 512

identifier uint16 5

lanin LAN incoming traffic in bytes uint64 20

lanout LAN outgoing traffic in bytes uint64 20

FortiOS 7.2.1 Log Reference 1406


Fortinet Inc.
Log Field Name Description Data Type Length

level Log Level string 11

logid Log ID string 10

masterdstmac Destination master MAC address string 17

mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces

msg Log message string 512

osname Name of the device's OS string 66

pdstport uint16 5

policyid Firewall Policy ID uint32 10

policymode string 8

policyname Policy name string 36

policytype Policy type string 24

poluuid UUID of the Firewall Policy string 37

proto Protocol Number uint8 3

psrcport uint16 5

radioband Radio Band string 64

rcvdbyte Received Bytes uint64 20

rcvddelta Delta Received Bytes uint64 20

rcvdpkt Received Packets uint32 10

saasname string 80

sentbyte Sent Bytes uint64 20

sentdelta Delta Sent Bytes uint64 20

sentpkt Sent Packets uint32 10

service Name of Service string 80

sessionid Session ID uint32 10

shaperdroprcvdbyte Received bytes dropped by shaper uint32 10

shaperdropsentbyte Sent bytes dropped by shaper uint32 10

shaperperipdropbyte Dropped bytes per IP by shaper uint32 10

shaperperipname Traffic shaper name (per IP) string 36

shaperrcvdname Traffic shaper name for received traffic string 36

shapersentname Traffic shaper name for sent traffic string 36

FortiOS 7.2.1 Log Reference 1407


Fortinet Inc.
Log Field Name Description Data Type Length

shapingpolicyid Shaping Policy ID uint32 10

shapingpolicyname string 36

signal int8 4

snr int8 4

srccity string 64

srccountry Country name for Source IP string 64

srcdomain string 255

srcfamily string 66

srchwvendor string 66

srchwversion string 66

srcinetsvc Internet service name for the source string 64

srcintf Source interface name string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP address ip 39

srcmac MAC address associated with the Source IP string 17

srcmacvendor string 66

srcname Source name string 66

srcport Source protocol port number uint16 5

srcregion string 64

srcreputation uint32 10

srcserver Source server uint8 3

srcssid Source SSID string 33

srcswversion string 66

srcthreatfeed string 36

srcuuid UUID of the Source Address Object string 37

sslaction Action taken by ssl-ssh-profile string 26

subtype Subtype of the traffic string 20

time Time string 8

trandisp NAT translation type string 16

tranip NAT Destination IP ip 39

FortiOS 7.2.1 Log Reference 1408


Fortinet Inc.
Log Field Name Description Data Type Length

tranport NAT Destination Port uint16 5

transip NAT Source IP ip 39

transport NAT Source Protocol Port uint16 5

tunnelid uint32 10

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated user name string 66

unauthusersource The method used to detect unauthenticated user name string 66

url URL string 512

user User name string 256

utmaction Security action performed by UTM string 32

vd Virtual domain name string 32

vip string 64

vpntype The type of the VPN tunnel string 14

vrf Virtual router forwarding uint8 3

vwlid Virtual Wan Link (SD-WAN) service id uint32 10

vwlname string 36

vwlquality Quality info of the service rule that is matched by traffic string 320

vwlservice Application that is matched by the traffic (internet-service- string 64


app-ctrl)

vwpvlanid Virtual Wire Pair vlan id uint32 10

wanin WAN incoming traffic in bytes uint64 20

wanoptapptype WAN Optimization Application type string 9

wanout WAN outgoing traffic in bytes uint64 20

8 - LOG_ID_TRAFFIC_WANOPT

Message ID: 8
Message Description: LOG_ID_TRAFFIC_WANOPT
Message Meaning: WAN optimization traffic
Type: Traffic
Category: FORWARD
Severity: Notice

FortiOS 7.2.1 Log Reference 1409


Fortinet Inc.
Log Field Name Description Data Type Length

accessproxy string 80

action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server

agent User agent - eg. agent="Mozilla/5.0" string 1024

ap Access Point name string 36

app Application name string 96

appact The security action from app control string 16

appcat Application category string 64

appid Application ID uint32 10

applist Application Control profile (name) string 64

apprisk Application Risk Level string 16

apsn Access Point serial number string 36

authserver Remote Authentication server string 64

centralnatid central-snat-map id uint32 10

channel WiFi Channel uint32 10

clientdeviceid string 80

clientdeviceowner string 80

clientdevicetags string 512

comment Customized policy comment string 1024

craction Action performed by Threat Weight uint32 10

crlevel Threat Weight level string 10

crscore Threat Weight score uint32 10

date Date string 10

devid Device Serial Number string 16

devtype Device Type string 66

dstauthserver string 64

dstcity string 64

FortiOS 7.2.1 Log Reference 1410


Fortinet Inc.
Log Field Name Description Data Type Length

dstcountry Country name for the destination IP string 64

dstdevtype Destination Device Type string 66

dstfamily string 66

dsthwvendor string 66

dsthwversion string 66

dstinetsvc Internet service name for the destination string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstmac Destination Mac Address string 17

dstname Destination name string 66

dstosname Destination OS name string 66

dstport Destination Protocol Port Number uint16 5

dstregion string 64

dstreputation uint32 10

dstserver Destination Server uint8 3

dstssid Destination SSID string 33

dstswversion string 66

dstthreatfeed string 36

dstunauthuser string 66

dstunauthusersource string 66

dstuser string 256

dstuuid UUID of the Destination Address Object string 37

duration Duration of the session uint32 10

eventtime Epoch time in nanoseconds uint64 20

fctuid FortiClient UID string 32

gatewayid uint32 10

group User group name string 512

identifier uint16 5

lanin LAN incoming traffic in bytes uint64 20

FortiOS 7.2.1 Log Reference 1411


Fortinet Inc.
Log Field Name Description Data Type Length

lanout LAN outgoing traffic in bytes uint64 20

level Log Level string 11

logid Log ID string 10

masterdstmac Destination master MAC address string 17

mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces

msg Log message string 512

osname Name of the device's OS string 66

pdstport uint16 5

policyid Firewall Policy ID uint32 10

policymode string 8

policyname Policy name string 36

policytype Policy type string 24

poluuid UUID of the Firewall Policy string 37

proto Protocol Number uint8 3

psrcport uint16 5

radioband Radio Band string 64

rcvdbyte Received Bytes uint64 20

rcvddelta Delta Received Bytes uint64 20

rcvdpkt Received Packets uint32 10

saasname string 80

sentbyte Sent Bytes uint64 20

sentdelta Delta Sent Bytes uint64 20

sentpkt Sent Packets uint32 10

service Name of Service string 80

sessionid Session ID uint32 10

shaperdroprcvdbyte Received bytes dropped by shaper uint32 10

shaperdropsentbyte Sent bytes dropped by shaper uint32 10

shaperperipdropbyte Dropped bytes per IP by shaper uint32 10

shaperperipname Traffic shaper name (per IP) string 36

shaperrcvdname Traffic shaper name for received traffic string 36

FortiOS 7.2.1 Log Reference 1412


Fortinet Inc.
Log Field Name Description Data Type Length

shapersentname Traffic shaper name for sent traffic string 36

shapingpolicyid Shaping Policy ID uint32 10

shapingpolicyname string 36

signal int8 4

snr int8 4

srccity string 64

srccountry Country name for Source IP string 64

srcdomain string 255

srcfamily string 66

srchwvendor string 66

srchwversion string 66

srcinetsvc Internet service name for the source string 64

srcintf Source interface name string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP address ip 39

srcmac MAC address associated with the Source IP string 17

srcmacvendor string 66

srcname Source name string 66

srcport Source protocol port number uint16 5

srcregion string 64

srcreputation uint32 10

srcserver Source server uint8 3

srcssid Source SSID string 33

srcswversion string 66

srcthreatfeed string 36

srcuuid UUID of the Source Address Object string 37

sslaction Action taken by ssl-ssh-profile string 26

subtype Subtype of the traffic string 20

time Time string 8

trandisp NAT translation type string 16

FortiOS 7.2.1 Log Reference 1413


Fortinet Inc.
Log Field Name Description Data Type Length

tranip NAT Destination IP ip 39

tranport NAT Destination Port uint16 5

transip NAT Source IP ip 39

transport NAT Source Protocol Port uint16 5

tunnelid uint32 10

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated user name string 66

unauthusersource The method used to detect unauthenticated user name string 66

url URL string 512

user User name string 256

utmaction Security action performed by UTM string 32

vd Virtual domain name string 32

vip string 64

vpntype The type of the VPN tunnel string 14

vrf Virtual router forwarding uint8 3

vwlid Virtual Wan Link (SD-WAN) service id uint32 10

vwlname string 36

vwlquality Quality info of the service rule that is matched by traffic string 320

vwlservice Application that is matched by the traffic (internet-service- string 64


app-ctrl)

vwpvlanid Virtual Wire Pair vlan id uint32 10

wanin WAN incoming traffic in bytes uint64 20

wanoptapptype WAN Optimization Application type string 9

wanout WAN outgoing traffic in bytes uint64 20

countapp Number of App Ctrl logs associated with the session uint32 10

countav Number of AV logs associated with the session uint32 10

countcifs uint32 10

countdlp Number of DLP logs associated with the session uint32 10

countdns Number of DNS Query logs associated with the session uint32 10

countemail Number of Email logs associated with the session uint32 10

FortiOS 7.2.1 Log Reference 1414


Fortinet Inc.
Log Field Name Description Data Type Length

countff uint32 10

counticap uint32 10

countips Number of IPS logs associated with the session uint32 10

countsctpf uint32 10

countssh Number of SSH logs associated with the session uint32 10

countssl uint32 10

countwaf Number of WAF logs associated with the session uint32 10

countweb Number of Web Filter logs associated with the session uint32 10

9 - LOG_ID_TRAFFIC_WEBCACHE

Message ID: 9
Message Description: LOG_ID_TRAFFIC_WEBCACHE
Message Meaning: Web cache traffic
Type: Traffic
Category: FORWARD
Severity: Notice

Log Field Name Description Data Type Length

accessproxy string 80

action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server

agent User agent - eg. agent="Mozilla/5.0" string 1024

ap Access Point name string 36

app Application name string 96

appact The security action from app control string 16

appcat Application category string 64

appid Application ID uint32 10

applist Application Control profile (name) string 64

FortiOS 7.2.1 Log Reference 1415


Fortinet Inc.
Log Field Name Description Data Type Length

apprisk Application Risk Level string 16

apsn Access Point serial number string 36

authserver Remote Authentication server string 64

centralnatid central-snat-map id uint32 10

channel WiFi Channel uint32 10

clientdeviceid string 80

clientdeviceowner string 80

clientdevicetags string 512

comment Customized policy comment string 1024

craction Action performed by Threat Weight uint32 10

crlevel Threat Weight level string 10

crscore Threat Weight score uint32 10

date Date string 10

devid Device Serial Number string 16

devtype Device Type string 66

dstauthserver string 64

dstcity string 64

dstcountry Country name for the destination IP string 64

dstdevtype Destination Device Type string 66

dstfamily string 66

dsthwvendor string 66

dsthwversion string 66

dstinetsvc Internet service name for the destination string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstmac Destination Mac Address string 17

dstname Destination name string 66

dstosname Destination OS name string 66

dstport Destination Protocol Port Number uint16 5

FortiOS 7.2.1 Log Reference 1416


Fortinet Inc.
Log Field Name Description Data Type Length

dstregion string 64

dstreputation uint32 10

dstserver Destination Server uint8 3

dstssid Destination SSID string 33

dstswversion string 66

dstthreatfeed string 36

dstunauthuser string 66

dstunauthusersource string 66

dstuser string 256

dstuuid UUID of the Destination Address Object string 37

duration Duration of the session uint32 10

eventtime Epoch time in nanoseconds uint64 20

fctuid FortiClient UID string 32

gatewayid uint32 10

group User group name string 512

identifier uint16 5

lanin LAN incoming traffic in bytes uint64 20

lanout LAN outgoing traffic in bytes uint64 20

level Log Level string 11

logid Log ID string 10

masterdstmac Destination master MAC address string 17

mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces

msg Log message string 512

osname Name of the device's OS string 66

pdstport uint16 5

policyid Firewall Policy ID uint32 10

policymode string 8

policyname Policy name string 36

policytype Policy type string 24

poluuid UUID of the Firewall Policy string 37

FortiOS 7.2.1 Log Reference 1417


Fortinet Inc.
Log Field Name Description Data Type Length

proto Protocol Number uint8 3

psrcport uint16 5

radioband Radio Band string 64

rcvdbyte Received Bytes uint64 20

rcvddelta Delta Received Bytes uint64 20

rcvdpkt Received Packets uint32 10

saasname string 80

sentbyte Sent Bytes uint64 20

sentdelta Delta Sent Bytes uint64 20

sentpkt Sent Packets uint32 10

service Name of Service string 80

sessionid Session ID uint32 10

shaperdroprcvdbyte Received bytes dropped by shaper uint32 10

shaperdropsentbyte Sent bytes dropped by shaper uint32 10

shaperperipdropbyte Dropped bytes per IP by shaper uint32 10

shaperperipname Traffic shaper name (per IP) string 36

shaperrcvdname Traffic shaper name for received traffic string 36

shapersentname Traffic shaper name for sent traffic string 36

shapingpolicyid Shaping Policy ID uint32 10

shapingpolicyname string 36

signal int8 4

snr int8 4

srccity string 64

srccountry Country name for Source IP string 64

srcdomain string 255

srcfamily string 66

srchwvendor string 66

srchwversion string 66

srcinetsvc Internet service name for the source string 64

srcintf Source interface name string 32

FortiOS 7.2.1 Log Reference 1418


Fortinet Inc.
Log Field Name Description Data Type Length

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP address ip 39

srcmac MAC address associated with the Source IP string 17

srcmacvendor string 66

srcname Source name string 66

srcport Source protocol port number uint16 5

srcregion string 64

srcreputation uint32 10

srcserver Source server uint8 3

srcssid Source SSID string 33

srcswversion string 66

srcthreatfeed string 36

srcuuid UUID of the Source Address Object string 37

sslaction Action taken by ssl-ssh-profile string 26

subtype Subtype of the traffic string 20

time Time string 8

trandisp NAT translation type string 16

tranip NAT Destination IP ip 39

tranport NAT Destination Port uint16 5

transip NAT Source IP ip 39

transport NAT Source Protocol Port uint16 5

tunnelid uint32 10

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated user name string 66

unauthusersource The method used to detect unauthenticated user name string 66

url URL string 512

user User name string 256

utmaction Security action performed by UTM string 32

vd Virtual domain name string 32

FortiOS 7.2.1 Log Reference 1419


Fortinet Inc.
Log Field Name Description Data Type Length

vip string 64

vpntype The type of the VPN tunnel string 14

vrf Virtual router forwarding uint8 3

vwlid Virtual Wan Link (SD-WAN) service id uint32 10

vwlname string 36

vwlquality Quality info of the service rule that is matched by traffic string 320

vwlservice Application that is matched by the traffic (internet-service- string 64


app-ctrl)

vwpvlanid Virtual Wire Pair vlan id uint32 10

wanin WAN incoming traffic in bytes uint64 20

wanoptapptype WAN Optimization Application type string 9

wanout WAN outgoing traffic in bytes uint64 20

countapp Number of App Ctrl logs associated with the session uint32 10

countav Number of AV logs associated with the session uint32 10

countcifs uint32 10

countdlp Number of DLP logs associated with the session uint32 10

countdns Number of DNS Query logs associated with the session uint32 10

countemail Number of Email logs associated with the session uint32 10

countff uint32 10

counticap uint32 10

countips Number of IPS logs associated with the session uint32 10

countsctpf uint32 10

countssh Number of SSH logs associated with the session uint32 10

countssl uint32 10

countwaf Number of WAF logs associated with the session uint32 10

countweb Number of Web Filter logs associated with the session uint32 10

10 - LOG_ID_TRAFFIC_EXPLICIT_PROXY

Message ID: 10
Message Description: LOG_ID_TRAFFIC_EXPLICIT_PROXY
Message Meaning: Explicit proxy traffic
Type: Traffic

FortiOS 7.2.1 Log Reference 1420


Fortinet Inc.
Category: FORWARD
Severity: Notice

Log Field Name Description Data Type Length

accessproxy string 80

action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server

agent User agent - eg. agent="Mozilla/5.0" string 1024

ap Access Point name string 36

app Application name string 96

appact The security action from app control string 16

appcat Application category string 64

appid Application ID uint32 10

applist Application Control profile (name) string 64

apprisk Application Risk Level string 16

apsn Access Point serial number string 36

authserver Remote Authentication server string 64

centralnatid central-snat-map id uint32 10

channel WiFi Channel uint32 10

clientdeviceid string 80

clientdeviceowner string 80

clientdevicetags string 512

comment Customized policy comment string 1024

craction Action performed by Threat Weight uint32 10

crlevel Threat Weight level string 10

crscore Threat Weight score uint32 10

date Date string 10

devid Device Serial Number string 16

devtype Device Type string 66

dstauthserver string 64

FortiOS 7.2.1 Log Reference 1421


Fortinet Inc.
Log Field Name Description Data Type Length

dstcity string 64

dstcountry Country name for the destination IP string 64

dstdevtype Destination Device Type string 66

dstfamily string 66

dsthwvendor string 66

dsthwversion string 66

dstinetsvc Internet service name for the destination string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstmac Destination Mac Address string 17

dstname Destination name string 66

dstosname Destination OS name string 66

dstport Destination Protocol Port Number uint16 5

dstregion string 64

dstreputation uint32 10

dstserver Destination Server uint8 3

dstssid Destination SSID string 33

dstswversion string 66

dstthreatfeed string 36

dstunauthuser string 66

dstunauthusersource string 66

dstuser string 256

dstuuid UUID of the Destination Address Object string 37

duration Duration of the session uint32 10

eventtime Epoch time in nanoseconds uint64 20

fctuid FortiClient UID string 32

gatewayid uint32 10

group User group name string 512

identifier uint16 5

FortiOS 7.2.1 Log Reference 1422


Fortinet Inc.
Log Field Name Description Data Type Length

lanin LAN incoming traffic in bytes uint64 20

lanout LAN outgoing traffic in bytes uint64 20

level Log Level string 11

logid Log ID string 10

masterdstmac Destination master MAC address string 17

mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces

msg Log message string 512

osname Name of the device's OS string 66

pdstport uint16 5

policyid Firewall Policy ID uint32 10

policymode string 8

policyname Policy name string 36

policytype Policy type string 24

poluuid UUID of the Firewall Policy string 37

proto Protocol Number uint8 3

psrcport uint16 5

radioband Radio Band string 64

rcvdbyte Received Bytes uint64 20

rcvddelta Delta Received Bytes uint64 20

rcvdpkt Received Packets uint32 10

saasname string 80

sentbyte Sent Bytes uint64 20

sentdelta Delta Sent Bytes uint64 20

sentpkt Sent Packets uint32 10

service Name of Service string 80

sessionid Session ID uint32 10

shaperdroprcvdbyte Received bytes dropped by shaper uint32 10

shaperdropsentbyte Sent bytes dropped by shaper uint32 10

shaperperipdropbyte Dropped bytes per IP by shaper uint32 10

shaperperipname Traffic shaper name (per IP) string 36

FortiOS 7.2.1 Log Reference 1423


Fortinet Inc.
Log Field Name Description Data Type Length

shaperrcvdname Traffic shaper name for received traffic string 36

shapersentname Traffic shaper name for sent traffic string 36

shapingpolicyid Shaping Policy ID uint32 10

shapingpolicyname string 36

signal int8 4

snr int8 4

srccity string 64

srccountry Country name for Source IP string 64

srcdomain string 255

srcfamily string 66

srchwvendor string 66

srchwversion string 66

srcinetsvc Internet service name for the source string 64

srcintf Source interface name string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP address ip 39

srcmac MAC address associated with the Source IP string 17

srcmacvendor string 66

srcname Source name string 66

srcport Source protocol port number uint16 5

srcregion string 64

srcreputation uint32 10

srcserver Source server uint8 3

srcssid Source SSID string 33

srcswversion string 66

srcthreatfeed string 36

srcuuid UUID of the Source Address Object string 37

sslaction Action taken by ssl-ssh-profile string 26

subtype Subtype of the traffic string 20

time Time string 8

FortiOS 7.2.1 Log Reference 1424


Fortinet Inc.
Log Field Name Description Data Type Length

trandisp NAT translation type string 16

tranip NAT Destination IP ip 39

tranport NAT Destination Port uint16 5

transip NAT Source IP ip 39

transport NAT Source Protocol Port uint16 5

tunnelid uint32 10

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated user name string 66

unauthusersource The method used to detect unauthenticated user name string 66

url URL string 512

user User name string 256

utmaction Security action performed by UTM string 32

vd Virtual domain name string 32

vip string 64

vpntype The type of the VPN tunnel string 14

vrf Virtual router forwarding uint8 3

vwlid Virtual Wan Link (SD-WAN) service id uint32 10

vwlname string 36

vwlquality Quality info of the service rule that is matched by traffic string 320

vwlservice Application that is matched by the traffic (internet-service- string 64


app-ctrl)

vwpvlanid Virtual Wire Pair vlan id uint32 10

wanin WAN incoming traffic in bytes uint64 20

wanoptapptype WAN Optimization Application type string 9

wanout WAN outgoing traffic in bytes uint64 20

countapp Number of App Ctrl logs associated with the session uint32 10

countav Number of AV logs associated with the session uint32 10

countcifs uint32 10

countdlp Number of DLP logs associated with the session uint32 10

countdns Number of DNS Query logs associated with the session uint32 10

FortiOS 7.2.1 Log Reference 1425


Fortinet Inc.
Log Field Name Description Data Type Length

countemail Number of Email logs associated with the session uint32 10

countff uint32 10

counticap uint32 10

countips Number of IPS logs associated with the session uint32 10

countsctpf uint32 10

countssh Number of SSH logs associated with the session uint32 10

countssl uint32 10

countwaf Number of WAF logs associated with the session uint32 10

countweb Number of Web Filter logs associated with the session uint32 10

11 - LOG_ID_TRAFFIC_FAIL_CONN

Message ID: 11
Message Description: LOG_ID_TRAFFIC_FAIL_CONN
Message Meaning: Failed connection attempts
Type: Traffic
Category: FORWARD
Severity: Warning

Log Field Name Description Data Type Length

accessproxy string 80

action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server

agent User agent - eg. agent="Mozilla/5.0" string 1024

ap Access Point name string 36

app Application name string 96

appact The security action from app control string 16

appcat Application category string 64

appid Application ID uint32 10

FortiOS 7.2.1 Log Reference 1426


Fortinet Inc.
Log Field Name Description Data Type Length

applist Application Control profile (name) string 64

apprisk Application Risk Level string 16

apsn Access Point serial number string 36

authserver Remote Authentication server string 64

centralnatid central-snat-map id uint32 10

channel WiFi Channel uint32 10

clientdeviceid string 80

clientdeviceowner string 80

clientdevicetags string 512

comment Customized policy comment string 1024

craction Action performed by Threat Weight uint32 10

crlevel Threat Weight level string 10

crscore Threat Weight score uint32 10

date Date string 10

devid Device Serial Number string 16

devtype Device Type string 66

dstauthserver string 64

dstcity string 64

dstcountry Country name for the destination IP string 64

dstdevtype Destination Device Type string 66

dstfamily string 66

dsthwvendor string 66

dsthwversion string 66

dstinetsvc Internet service name for the destination string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstmac Destination Mac Address string 17

dstname Destination name string 66

dstosname Destination OS name string 66

FortiOS 7.2.1 Log Reference 1427


Fortinet Inc.
Log Field Name Description Data Type Length

dstport Destination Protocol Port Number uint16 5

dstregion string 64

dstreputation uint32 10

dstserver Destination Server uint8 3

dstssid Destination SSID string 33

dstswversion string 66

dstthreatfeed string 36

dstunauthuser string 66

dstunauthusersource string 66

dstuser string 256

dstuuid UUID of the Destination Address Object string 37

duration Duration of the session uint32 10

eventtime Epoch time in nanoseconds uint64 20

fctuid FortiClient UID string 32

gatewayid uint32 10

group User group name string 512

identifier uint16 5

lanin LAN incoming traffic in bytes uint64 20

lanout LAN outgoing traffic in bytes uint64 20

level Log Level string 11

logid Log ID string 10

masterdstmac Destination master MAC address string 17

mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces

msg Log message string 512

osname Name of the device's OS string 66

pdstport uint16 5

policyid Firewall Policy ID uint32 10

policymode string 8

policyname Policy name string 36

policytype Policy type string 24

FortiOS 7.2.1 Log Reference 1428


Fortinet Inc.
Log Field Name Description Data Type Length

poluuid UUID of the Firewall Policy string 37

proto Protocol Number uint8 3

psrcport uint16 5

radioband Radio Band string 64

rcvdbyte Received Bytes uint64 20

rcvddelta Delta Received Bytes uint64 20

rcvdpkt Received Packets uint32 10

saasname string 80

sentbyte Sent Bytes uint64 20

sentdelta Delta Sent Bytes uint64 20

sentpkt Sent Packets uint32 10

service Name of Service string 80

sessionid Session ID uint32 10

shaperdroprcvdbyte Received bytes dropped by shaper uint32 10

shaperdropsentbyte Sent bytes dropped by shaper uint32 10

shaperperipdropbyte Dropped bytes per IP by shaper uint32 10

shaperperipname Traffic shaper name (per IP) string 36

shaperrcvdname Traffic shaper name for received traffic string 36

shapersentname Traffic shaper name for sent traffic string 36

shapingpolicyid Shaping Policy ID uint32 10

shapingpolicyname string 36

signal int8 4

snr int8 4

srccity string 64

srccountry Country name for Source IP string 64

srcdomain string 255

srcfamily string 66

srchwvendor string 66

srchwversion string 66

srcinetsvc Internet service name for the source string 64

FortiOS 7.2.1 Log Reference 1429


Fortinet Inc.
Log Field Name Description Data Type Length

srcintf Source interface name string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP address ip 39

srcmac MAC address associated with the Source IP string 17

srcmacvendor string 66

srcname Source name string 66

srcport Source protocol port number uint16 5

srcregion string 64

srcreputation uint32 10

srcserver Source server uint8 3

srcssid Source SSID string 33

srcswversion string 66

srcthreatfeed string 36

srcuuid UUID of the Source Address Object string 37

sslaction Action taken by ssl-ssh-profile string 26

subtype Subtype of the traffic string 20

time Time string 8

trandisp NAT translation type string 16

tranip NAT Destination IP ip 39

tranport NAT Destination Port uint16 5

transip NAT Source IP ip 39

transport NAT Source Protocol Port uint16 5

tunnelid uint32 10

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated user name string 66

unauthusersource The method used to detect unauthenticated user name string 66

url URL string 512

user User name string 256

utmaction Security action performed by UTM string 32

FortiOS 7.2.1 Log Reference 1430


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual domain name string 32

vip string 64

vpntype The type of the VPN tunnel string 14

vrf Virtual router forwarding uint8 3

vwlid Virtual Wan Link (SD-WAN) service id uint32 10

vwlname string 36

vwlquality Quality info of the service rule that is matched by traffic string 320

vwlservice Application that is matched by the traffic (internet-service- string 64


app-ctrl)

vwpvlanid Virtual Wire Pair vlan id uint32 10

wanin WAN incoming traffic in bytes uint64 20

wanoptapptype WAN Optimization Application type string 9

wanout WAN outgoing traffic in bytes uint64 20

12 - LOG_ID_TRAFFIC_MULTICAST

Message ID: 12
Message Description: LOG_ID_TRAFFIC_MULTICAST
Message Meaning: Multicast traffic
Type: Traffic
Category: MULTICAST
Severity: Notice

Log Field Name Description Data Type Length

accessproxy string 80

action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server

agent User agent - eg. agent="Mozilla/5.0" string 1024

ap Access Point name string 36

app Application name string 96

FortiOS 7.2.1 Log Reference 1431


Fortinet Inc.
Log Field Name Description Data Type Length

appact The security action from app control string 16

appcat Application category string 64

appid Application ID uint32 10

applist Application Control profile (name) string 64

apprisk Application Risk Level string 16

apsn Access Point serial number string 36

authserver Remote Authentication server string 64

centralnatid central-snat-map id uint32 10

channel WiFi Channel uint32 10

clientdeviceid string 80

clientdeviceowner string 80

clientdevicetags string 512

comment Customized policy comment string 1024

craction Action performed by Threat Weight uint32 10

crlevel Threat Weight level string 10

crscore Threat Weight score uint32 10

date Date string 10

devid Device Serial Number string 16

devtype Device Type string 66

dstauthserver string 64

dstcity string 64

dstcountry Country name for the destination IP string 64

dstdevtype Destination Device Type string 66

dstfamily string 66

dsthwvendor string 66

dsthwversion string 66

dstinetsvc Internet service name for the destination string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

FortiOS 7.2.1 Log Reference 1432


Fortinet Inc.
Log Field Name Description Data Type Length

dstmac Destination Mac Address string 17

dstname Destination name string 66

dstosname Destination OS name string 66

dstport Destination Protocol Port Number uint16 5

dstregion string 64

dstreputation uint32 10

dstserver Destination Server uint8 3

dstssid Destination SSID string 33

dstswversion string 66

dstthreatfeed string 36

dstunauthuser string 66

dstunauthusersource string 66

dstuser string 256

dstuuid UUID of the Destination Address Object string 37

duration Duration of the session uint32 10

eventtime Epoch time in nanoseconds uint64 20

fctuid FortiClient UID string 32

gatewayid uint32 10

group User group name string 512

identifier uint16 5

lanin LAN incoming traffic in bytes uint64 20

lanout LAN outgoing traffic in bytes uint64 20

level Log Level string 11

logid Log ID string 10

masterdstmac Destination master MAC address string 17

mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces

msg Log message string 512

osname Name of the device's OS string 66

pdstport uint16 5

policyid Firewall Policy ID uint32 10

FortiOS 7.2.1 Log Reference 1433


Fortinet Inc.
Log Field Name Description Data Type Length

policymode string 8

policyname Policy name string 36

policytype Policy type string 24

poluuid UUID of the Firewall Policy string 37

proto Protocol Number uint8 3

psrcport uint16 5

radioband Radio Band string 64

rcvdbyte Received Bytes uint64 20

rcvddelta Delta Received Bytes uint64 20

rcvdpkt Received Packets uint32 10

saasname string 80

sentbyte Sent Bytes uint64 20

sentdelta Delta Sent Bytes uint64 20

sentpkt Sent Packets uint32 10

service Name of Service string 80

sessionid Session ID uint32 10

shaperdroprcvdbyte Received bytes dropped by shaper uint32 10

shaperdropsentbyte Sent bytes dropped by shaper uint32 10

shaperperipdropbyte Dropped bytes per IP by shaper uint32 10

shaperperipname Traffic shaper name (per IP) string 36

shaperrcvdname Traffic shaper name for received traffic string 36

shapersentname Traffic shaper name for sent traffic string 36

shapingpolicyid Shaping Policy ID uint32 10

shapingpolicyname string 36

signal int8 4

snr int8 4

srccity string 64

srccountry Country name for Source IP string 64

srcdomain string 255

srcfamily string 66

FortiOS 7.2.1 Log Reference 1434


Fortinet Inc.
Log Field Name Description Data Type Length

srchwvendor string 66

srchwversion string 66

srcinetsvc Internet service name for the source string 64

srcintf Source interface name string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP address ip 39

srcmac MAC address associated with the Source IP string 17

srcmacvendor string 66

srcname Source name string 66

srcport Source protocol port number uint16 5

srcregion string 64

srcreputation uint32 10

srcserver Source server uint8 3

srcssid Source SSID string 33

srcswversion string 66

srcthreatfeed string 36

srcuuid UUID of the Source Address Object string 37

sslaction Action taken by ssl-ssh-profile string 26

subtype Subtype of the traffic string 20

time Time string 8

trandisp NAT translation type string 16

tranip NAT Destination IP ip 39

tranport NAT Destination Port uint16 5

transip NAT Source IP ip 39

transport NAT Source Protocol Port uint16 5

tunnelid uint32 10

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated user name string 66

unauthusersource The method used to detect unauthenticated user name string 66

FortiOS 7.2.1 Log Reference 1435


Fortinet Inc.
Log Field Name Description Data Type Length

url URL string 512

user User name string 256

utmaction Security action performed by UTM string 32

vd Virtual domain name string 32

vip string 64

vpntype The type of the VPN tunnel string 14

vrf Virtual router forwarding uint8 3

vwlid Virtual Wan Link (SD-WAN) service id uint32 10

vwlname string 36

vwlquality Quality info of the service rule that is matched by traffic string 320

vwlservice Application that is matched by the traffic (internet-service- string 64


app-ctrl)

vwpvlanid Virtual Wire Pair vlan id uint32 10

wanin WAN incoming traffic in bytes uint64 20

wanoptapptype WAN Optimization Application type string 9

wanout WAN outgoing traffic in bytes uint64 20

13 - LOG_ID_TRAFFIC_END_FORWARD

Message ID: 13
Message Description: LOG_ID_TRAFFIC_END_FORWARD
Message Meaning: Forward traffic
Type: Traffic
Category: FORWARD
Severity: Notice

Log Field Name Description Data Type Length

accessproxy string 80

action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server

FortiOS 7.2.1 Log Reference 1436


Fortinet Inc.
Log Field Name Description Data Type Length

agent User agent - eg. agent="Mozilla/5.0" string 1024

ap Access Point name string 36

app Application name string 96

appact The security action from app control string 16

appcat Application category string 64

appid Application ID uint32 10

applist Application Control profile (name) string 64

apprisk Application Risk Level string 16

apsn Access Point serial number string 36

authserver Remote Authentication server string 64

centralnatid central-snat-map id uint32 10

channel WiFi Channel uint32 10

clientdeviceid string 80

clientdeviceowner string 80

clientdevicetags string 512

comment Customized policy comment string 1024

craction Action performed by Threat Weight uint32 10

crlevel Threat Weight level string 10

crscore Threat Weight score uint32 10

date Date string 10

devid Device Serial Number string 16

devtype Device Type string 66

dstauthserver string 64

dstcity string 64

dstcountry Country name for the destination IP string 64

dstdevtype Destination Device Type string 66

dstfamily string 66

dsthwvendor string 66

dsthwversion string 66

dstinetsvc Internet service name for the destination string 64

FortiOS 7.2.1 Log Reference 1437


Fortinet Inc.
Log Field Name Description Data Type Length

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstmac Destination Mac Address string 17

dstname Destination name string 66

dstosname Destination OS name string 66

dstport Destination Protocol Port Number uint16 5

dstregion string 64

dstreputation uint32 10

dstserver Destination Server uint8 3

dstssid Destination SSID string 33

dstswversion string 66

dstthreatfeed string 36

dstunauthuser string 66

dstunauthusersource string 66

dstuser string 256

dstuuid UUID of the Destination Address Object string 37

duration Duration of the session uint32 10

eventtime Epoch time in nanoseconds uint64 20

fctuid FortiClient UID string 32

gatewayid uint32 10

group User group name string 512

identifier uint16 5

lanin LAN incoming traffic in bytes uint64 20

lanout LAN outgoing traffic in bytes uint64 20

level Log Level string 11

logid Log ID string 10

masterdstmac Destination master MAC address string 17

mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces

msg Log message string 512

FortiOS 7.2.1 Log Reference 1438


Fortinet Inc.
Log Field Name Description Data Type Length

osname Name of the device's OS string 66

pdstport uint16 5

policyid Firewall Policy ID uint32 10

policymode string 8

policyname Policy name string 36

policytype Policy type string 24

poluuid UUID of the Firewall Policy string 37

proto Protocol Number uint8 3

psrcport uint16 5

radioband Radio Band string 64

rcvdbyte Received Bytes uint64 20

rcvddelta Delta Received Bytes uint64 20

rcvdpkt Received Packets uint32 10

saasname string 80

sentbyte Sent Bytes uint64 20

sentdelta Delta Sent Bytes uint64 20

sentpkt Sent Packets uint32 10

service Name of Service string 80

sessionid Session ID uint32 10

shaperdroprcvdbyte Received bytes dropped by shaper uint32 10

shaperdropsentbyte Sent bytes dropped by shaper uint32 10

shaperperipdropbyte Dropped bytes per IP by shaper uint32 10

shaperperipname Traffic shaper name (per IP) string 36

shaperrcvdname Traffic shaper name for received traffic string 36

shapersentname Traffic shaper name for sent traffic string 36

shapingpolicyid Shaping Policy ID uint32 10

shapingpolicyname string 36

signal int8 4

snr int8 4

srccity string 64

FortiOS 7.2.1 Log Reference 1439


Fortinet Inc.
Log Field Name Description Data Type Length

srccountry Country name for Source IP string 64

srcdomain string 255

srcfamily string 66

srchwvendor string 66

srchwversion string 66

srcinetsvc Internet service name for the source string 64

srcintf Source interface name string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP address ip 39

srcmac MAC address associated with the Source IP string 17

srcmacvendor string 66

srcname Source name string 66

srcport Source protocol port number uint16 5

srcregion string 64

srcreputation uint32 10

srcserver Source server uint8 3

srcssid Source SSID string 33

srcswversion string 66

srcthreatfeed string 36

srcuuid UUID of the Source Address Object string 37

sslaction Action taken by ssl-ssh-profile string 26

subtype Subtype of the traffic string 20

time Time string 8

trandisp NAT translation type string 16

tranip NAT Destination IP ip 39

tranport NAT Destination Port uint16 5

transip NAT Source IP ip 39

transport NAT Source Protocol Port uint16 5

tunnelid uint32 10

type Log type string 16

FortiOS 7.2.1 Log Reference 1440


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time zone string 5

unauthuser Unauthenticated user name string 66

unauthusersource The method used to detect unauthenticated user name string 66

url URL string 512

user User name string 256

utmaction Security action performed by UTM string 32

vd Virtual domain name string 32

vip string 64

vpntype The type of the VPN tunnel string 14

vrf Virtual router forwarding uint8 3

vwlid Virtual Wan Link (SD-WAN) service id uint32 10

vwlname string 36

vwlquality Quality info of the service rule that is matched by traffic string 320

vwlservice Application that is matched by the traffic (internet-service- string 64


app-ctrl)

vwpvlanid Virtual Wire Pair vlan id uint32 10

wanin WAN incoming traffic in bytes uint64 20

wanoptapptype WAN Optimization Application type string 9

wanout WAN outgoing traffic in bytes uint64 20

countapp Number of App Ctrl logs associated with the session uint32 10

countav Number of AV logs associated with the session uint32 10

countcifs uint32 10

countdlp Number of DLP logs associated with the session uint32 10

countdns Number of DNS Query logs associated with the session uint32 10

countemail Number of Email logs associated with the session uint32 10

countff uint32 10

counticap uint32 10

countips Number of IPS logs associated with the session uint32 10

countsctpf uint32 10

countssh Number of SSH logs associated with the session uint32 10

countssl uint32 10

FortiOS 7.2.1 Log Reference 1441


Fortinet Inc.
Log Field Name Description Data Type Length

countwaf Number of WAF logs associated with the session uint32 10

countweb Number of Web Filter logs associated with the session uint32 10

14 - LOG_ID_TRAFFIC_END_LOCAL

Message ID: 14
Message Description: LOG_ID_TRAFFIC_END_LOCAL
Message Meaning: Local traffic
Type: Traffic
Category: LOCAL
Severity: Notice

Log Field Name Description Data Type Length

accessproxy string 80

action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server

agent User agent - eg. agent="Mozilla/5.0" string 1024

ap Access Point name string 36

app Application name string 96

appact The security action from app control string 16

appcat Application category string 64

appid Application ID uint32 10

applist Application Control profile (name) string 64

apprisk Application Risk Level string 16

apsn Access Point serial number string 36

authserver Remote Authentication server string 64

centralnatid central-snat-map id uint32 10

channel WiFi Channel uint32 10

clientdeviceid string 80

FortiOS 7.2.1 Log Reference 1442


Fortinet Inc.
Log Field Name Description Data Type Length

clientdeviceowner string 80

clientdevicetags string 512

comment Customized policy comment string 1024

craction Action performed by Threat Weight uint32 10

crlevel Threat Weight level string 10

crscore Threat Weight score uint32 10

date Date string 10

devid Device Serial Number string 16

devtype Device Type string 66

dstauthserver string 64

dstcity string 64

dstcountry Country name for the destination IP string 64

dstdevtype Destination Device Type string 66

dstfamily string 66

dsthwvendor string 66

dsthwversion string 66

dstinetsvc Internet service name for the destination string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstmac Destination Mac Address string 17

dstname Destination name string 66

dstosname Destination OS name string 66

dstport Destination Protocol Port Number uint16 5

dstregion string 64

dstreputation uint32 10

dstserver Destination Server uint8 3

dstssid Destination SSID string 33

dstswversion string 66

dstthreatfeed string 36

FortiOS 7.2.1 Log Reference 1443


Fortinet Inc.
Log Field Name Description Data Type Length

dstunauthuser string 66

dstunauthusersource string 66

dstuser string 256

dstuuid UUID of the Destination Address Object string 37

duration Duration of the session uint32 10

eventtime Epoch time in nanoseconds uint64 20

fctuid FortiClient UID string 32

gatewayid uint32 10

group User group name string 512

identifier uint16 5

lanin LAN incoming traffic in bytes uint64 20

lanout LAN outgoing traffic in bytes uint64 20

level Log Level string 11

logid Log ID string 10

masterdstmac Destination master MAC address string 17

mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces

msg Log message string 512

osname Name of the device's OS string 66

pdstport uint16 5

policyid Firewall Policy ID uint32 10

policymode string 8

policyname Policy name string 36

policytype Policy type string 24

poluuid UUID of the Firewall Policy string 37

proto Protocol Number uint8 3

psrcport uint16 5

radioband Radio Band string 64

rcvdbyte Received Bytes uint64 20

rcvddelta Delta Received Bytes uint64 20

rcvdpkt Received Packets uint32 10

FortiOS 7.2.1 Log Reference 1444


Fortinet Inc.
Log Field Name Description Data Type Length

saasname string 80

sentbyte Sent Bytes uint64 20

sentdelta Delta Sent Bytes uint64 20

sentpkt Sent Packets uint32 10

service Name of Service string 80

sessionid Session ID uint32 10

shaperdroprcvdbyte Received bytes dropped by shaper uint32 10

shaperdropsentbyte Sent bytes dropped by shaper uint32 10

shaperperipdropbyte Dropped bytes per IP by shaper uint32 10

shaperperipname Traffic shaper name (per IP) string 36

shaperrcvdname Traffic shaper name for received traffic string 36

shapersentname Traffic shaper name for sent traffic string 36

shapingpolicyid Shaping Policy ID uint32 10

shapingpolicyname string 36

signal int8 4

snr int8 4

srccity string 64

srccountry Country name for Source IP string 64

srcdomain string 255

srcfamily string 66

srchwvendor string 66

srchwversion string 66

srcinetsvc Internet service name for the source string 64

srcintf Source interface name string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP address ip 39

srcmac MAC address associated with the Source IP string 17

srcmacvendor string 66

srcname Source name string 66

srcport Source protocol port number uint16 5

FortiOS 7.2.1 Log Reference 1445


Fortinet Inc.
Log Field Name Description Data Type Length

srcregion string 64

srcreputation uint32 10

srcserver Source server uint8 3

srcssid Source SSID string 33

srcswversion string 66

srcthreatfeed string 36

srcuuid UUID of the Source Address Object string 37

sslaction Action taken by ssl-ssh-profile string 26

subtype Subtype of the traffic string 20

time Time string 8

trandisp NAT translation type string 16

tranip NAT Destination IP ip 39

tranport NAT Destination Port uint16 5

transip NAT Source IP ip 39

transport NAT Source Protocol Port uint16 5

tunnelid uint32 10

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated user name string 66

unauthusersource The method used to detect unauthenticated user name string 66

url URL string 512

user User name string 256

utmaction Security action performed by UTM string 32

vd Virtual domain name string 32

vip string 64

vpntype The type of the VPN tunnel string 14

vrf Virtual router forwarding uint8 3

vwlid Virtual Wan Link (SD-WAN) service id uint32 10

vwlname string 36

vwlquality Quality info of the service rule that is matched by traffic string 320

FortiOS 7.2.1 Log Reference 1446


Fortinet Inc.
Log Field Name Description Data Type Length

vwlservice Application that is matched by the traffic (internet-service- string 64


app-ctrl)

vwpvlanid Virtual Wire Pair vlan id uint32 10

wanin WAN incoming traffic in bytes uint64 20

wanoptapptype WAN Optimization Application type string 9

wanout WAN outgoing traffic in bytes uint64 20

15 - LOG_ID_TRAFFIC_START_FORWARD

Message ID: 15
Message Description: LOG_ID_TRAFFIC_START_FORWARD
Message Meaning: Forward traffic session start
Type: Traffic
Category: FORWARD
Severity: Notice

Log Field Name Description Data Type Length

accessproxy string 80

action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server

agent User agent - eg. agent="Mozilla/5.0" string 1024

ap Access Point name string 36

app Application name string 96

appact The security action from app control string 16

appcat Application category string 64

appid Application ID uint32 10

applist Application Control profile (name) string 64

apprisk Application Risk Level string 16

apsn Access Point serial number string 36

authserver Remote Authentication server string 64

FortiOS 7.2.1 Log Reference 1447


Fortinet Inc.
Log Field Name Description Data Type Length

centralnatid central-snat-map id uint32 10

channel WiFi Channel uint32 10

clientdeviceid string 80

clientdeviceowner string 80

clientdevicetags string 512

comment Customized policy comment string 1024

craction Action performed by Threat Weight uint32 10

crlevel Threat Weight level string 10

crscore Threat Weight score uint32 10

date Date string 10

devid Device Serial Number string 16

devtype Device Type string 66

dstauthserver string 64

dstcity string 64

dstcountry Country name for the destination IP string 64

dstdevtype Destination Device Type string 66

dstfamily string 66

dsthwvendor string 66

dsthwversion string 66

dstinetsvc Internet service name for the destination string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstmac Destination Mac Address string 17

dstname Destination name string 66

dstosname Destination OS name string 66

dstport Destination Protocol Port Number uint16 5

dstregion string 64

dstreputation uint32 10

dstserver Destination Server uint8 3

FortiOS 7.2.1 Log Reference 1448


Fortinet Inc.
Log Field Name Description Data Type Length

dstssid Destination SSID string 33

dstswversion string 66

dstthreatfeed string 36

dstunauthuser string 66

dstunauthusersource string 66

dstuser string 256

dstuuid UUID of the Destination Address Object string 37

duration Duration of the session uint32 10

eventtime Epoch time in nanoseconds uint64 20

fctuid FortiClient UID string 32

gatewayid uint32 10

group User group name string 512

identifier uint16 5

lanin LAN incoming traffic in bytes uint64 20

lanout LAN outgoing traffic in bytes uint64 20

level Log Level string 11

logid Log ID string 10

masterdstmac Destination master MAC address string 17

mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces

msg Log message string 512

osname Name of the device's OS string 66

pdstport uint16 5

policyid Firewall Policy ID uint32 10

policymode string 8

policyname Policy name string 36

policytype Policy type string 24

poluuid UUID of the Firewall Policy string 37

proto Protocol Number uint8 3

psrcport uint16 5

radioband Radio Band string 64

FortiOS 7.2.1 Log Reference 1449


Fortinet Inc.
Log Field Name Description Data Type Length

rcvdbyte Received Bytes uint64 20

rcvddelta Delta Received Bytes uint64 20

rcvdpkt Received Packets uint32 10

saasname string 80

sentbyte Sent Bytes uint64 20

sentdelta Delta Sent Bytes uint64 20

sentpkt Sent Packets uint32 10

service Name of Service string 80

sessionid Session ID uint32 10

shaperdroprcvdbyte Received bytes dropped by shaper uint32 10

shaperdropsentbyte Sent bytes dropped by shaper uint32 10

shaperperipdropbyte Dropped bytes per IP by shaper uint32 10

shaperperipname Traffic shaper name (per IP) string 36

shaperrcvdname Traffic shaper name for received traffic string 36

shapersentname Traffic shaper name for sent traffic string 36

shapingpolicyid Shaping Policy ID uint32 10

shapingpolicyname string 36

signal int8 4

snr int8 4

srccity string 64

srccountry Country name for Source IP string 64

srcdomain string 255

srcfamily string 66

srchwvendor string 66

srchwversion string 66

srcinetsvc Internet service name for the source string 64

srcintf Source interface name string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP address ip 39

srcmac MAC address associated with the Source IP string 17

FortiOS 7.2.1 Log Reference 1450


Fortinet Inc.
Log Field Name Description Data Type Length

srcmacvendor string 66

srcname Source name string 66

srcport Source protocol port number uint16 5

srcregion string 64

srcreputation uint32 10

srcserver Source server uint8 3

srcssid Source SSID string 33

srcswversion string 66

srcthreatfeed string 36

srcuuid UUID of the Source Address Object string 37

sslaction Action taken by ssl-ssh-profile string 26

subtype Subtype of the traffic string 20

time Time string 8

trandisp NAT translation type string 16

tranip NAT Destination IP ip 39

tranport NAT Destination Port uint16 5

transip NAT Source IP ip 39

transport NAT Source Protocol Port uint16 5

tunnelid uint32 10

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated user name string 66

unauthusersource The method used to detect unauthenticated user name string 66

url URL string 512

user User name string 256

utmaction Security action performed by UTM string 32

vd Virtual domain name string 32

vip string 64

vpntype The type of the VPN tunnel string 14

vrf Virtual router forwarding uint8 3

FortiOS 7.2.1 Log Reference 1451


Fortinet Inc.
Log Field Name Description Data Type Length

vwlid Virtual Wan Link (SD-WAN) service id uint32 10

vwlname string 36

vwlquality Quality info of the service rule that is matched by traffic string 320

vwlservice Application that is matched by the traffic (internet-service- string 64


app-ctrl)

vwpvlanid Virtual Wire Pair vlan id uint32 10

wanin WAN incoming traffic in bytes uint64 20

wanoptapptype WAN Optimization Application type string 9

wanout WAN outgoing traffic in bytes uint64 20

16 - LOG_ID_TRAFFIC_START_LOCAL

Message ID: 16
Message Description: LOG_ID_TRAFFIC_START_LOCAL
Message Meaning: Local traffic session start
Type: Traffic
Category: LOCAL
Severity: Notice

Log Field Name Description Data Type Length

accessproxy string 80

action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server

agent User agent - eg. agent="Mozilla/5.0" string 1024

ap Access Point name string 36

app Application name string 96

appact The security action from app control string 16

appcat Application category string 64

appid Application ID uint32 10

applist Application Control profile (name) string 64

FortiOS 7.2.1 Log Reference 1452


Fortinet Inc.
Log Field Name Description Data Type Length

apprisk Application Risk Level string 16

apsn Access Point serial number string 36

authserver Remote Authentication server string 64

centralnatid central-snat-map id uint32 10

channel WiFi Channel uint32 10

clientdeviceid string 80

clientdeviceowner string 80

clientdevicetags string 512

comment Customized policy comment string 1024

craction Action performed by Threat Weight uint32 10

crlevel Threat Weight level string 10

crscore Threat Weight score uint32 10

date Date string 10

devid Device Serial Number string 16

devtype Device Type string 66

dstauthserver string 64

dstcity string 64

dstcountry Country name for the destination IP string 64

dstdevtype Destination Device Type string 66

dstfamily string 66

dsthwvendor string 66

dsthwversion string 66

dstinetsvc Internet service name for the destination string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstmac Destination Mac Address string 17

dstname Destination name string 66

dstosname Destination OS name string 66

dstport Destination Protocol Port Number uint16 5

FortiOS 7.2.1 Log Reference 1453


Fortinet Inc.
Log Field Name Description Data Type Length

dstregion string 64

dstreputation uint32 10

dstserver Destination Server uint8 3

dstssid Destination SSID string 33

dstswversion string 66

dstthreatfeed string 36

dstunauthuser string 66

dstunauthusersource string 66

dstuser string 256

dstuuid UUID of the Destination Address Object string 37

duration Duration of the session uint32 10

eventtime Epoch time in nanoseconds uint64 20

fctuid FortiClient UID string 32

gatewayid uint32 10

group User group name string 512

identifier uint16 5

lanin LAN incoming traffic in bytes uint64 20

lanout LAN outgoing traffic in bytes uint64 20

level Log Level string 11

logid Log ID string 10

masterdstmac Destination master MAC address string 17

mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces

msg Log message string 512

osname Name of the device's OS string 66

pdstport uint16 5

policyid Firewall Policy ID uint32 10

policymode string 8

policyname Policy name string 36

policytype Policy type string 24

poluuid UUID of the Firewall Policy string 37

FortiOS 7.2.1 Log Reference 1454


Fortinet Inc.
Log Field Name Description Data Type Length

proto Protocol Number uint8 3

psrcport uint16 5

radioband Radio Band string 64

rcvdbyte Received Bytes uint64 20

rcvddelta Delta Received Bytes uint64 20

rcvdpkt Received Packets uint32 10

saasname string 80

sentbyte Sent Bytes uint64 20

sentdelta Delta Sent Bytes uint64 20

sentpkt Sent Packets uint32 10

service Name of Service string 80

sessionid Session ID uint32 10

shaperdroprcvdbyte Received bytes dropped by shaper uint32 10

shaperdropsentbyte Sent bytes dropped by shaper uint32 10

shaperperipdropbyte Dropped bytes per IP by shaper uint32 10

shaperperipname Traffic shaper name (per IP) string 36

shaperrcvdname Traffic shaper name for received traffic string 36

shapersentname Traffic shaper name for sent traffic string 36

shapingpolicyid Shaping Policy ID uint32 10

shapingpolicyname string 36

signal int8 4

snr int8 4

srccity string 64

srccountry Country name for Source IP string 64

srcdomain string 255

srcfamily string 66

srchwvendor string 66

srchwversion string 66

srcinetsvc Internet service name for the source string 64

srcintf Source interface name string 32

FortiOS 7.2.1 Log Reference 1455


Fortinet Inc.
Log Field Name Description Data Type Length

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP address ip 39

srcmac MAC address associated with the Source IP string 17

srcmacvendor string 66

srcname Source name string 66

srcport Source protocol port number uint16 5

srcregion string 64

srcreputation uint32 10

srcserver Source server uint8 3

srcssid Source SSID string 33

srcswversion string 66

srcthreatfeed string 36

srcuuid UUID of the Source Address Object string 37

sslaction Action taken by ssl-ssh-profile string 26

subtype Subtype of the traffic string 20

time Time string 8

trandisp NAT translation type string 16

tranip NAT Destination IP ip 39

tranport NAT Destination Port uint16 5

transip NAT Source IP ip 39

transport NAT Source Protocol Port uint16 5

tunnelid uint32 10

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated user name string 66

unauthusersource The method used to detect unauthenticated user name string 66

url URL string 512

user User name string 256

utmaction Security action performed by UTM string 32

vd Virtual domain name string 32

FortiOS 7.2.1 Log Reference 1456


Fortinet Inc.
Log Field Name Description Data Type Length

vip string 64

vpntype The type of the VPN tunnel string 14

vrf Virtual router forwarding uint8 3

vwlid Virtual Wan Link (SD-WAN) service id uint32 10

vwlname string 36

vwlquality Quality info of the service rule that is matched by traffic string 320

vwlservice Application that is matched by the traffic (internet-service- string 64


app-ctrl)

vwpvlanid Virtual Wire Pair vlan id uint32 10

wanin WAN incoming traffic in bytes uint64 20

wanoptapptype WAN Optimization Application type string 9

wanout WAN outgoing traffic in bytes uint64 20

17 - LOG_ID_TRAFFIC_SNIFFER

Message ID: 17
Message Description: LOG_ID_TRAFFIC_SNIFFER
Message Meaning: Sniffer traffic
Type: Traffic
Category: SNIFFER
Severity: Notice

Log Field Name Description Data Type Length

accessproxy string 80

action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server

agent User agent - eg. agent="Mozilla/5.0" string 1024

ap Access Point name string 36

app Application Name string 96

appact The security action from app control string 16

FortiOS 7.2.1 Log Reference 1457


Fortinet Inc.
Log Field Name Description Data Type Length

appcat Application category string 64

appid Application ID uint32 10

applist Application Control profile (name) string 64

apprisk Application Risk Level string 16

apsn Access Point serial number string 36

authserver Remote Authentication server string 64

centralnatid central-snat-map id uint32 10

channel WiFi Channel uint32 10

clientdeviceid string 80

clientdeviceowner string 80

clientdevicetags string 512

comment Customized policy comment string 1024

countapp Number of App Ctrl logs associated with the session uint32 10

countav Number of AV logs associated with the session uint32 10

countcifs uint32 10

countdlp Number of DLP logs associated with the session uint32 10

countdns Number of DNS Query logs associated with the session uint32 10

countemail Number of Email logs associated with the session uint32 10

countff uint32 10

counticap uint32 10

countips Number of IPS logs associated with the session uint32 10

countsctpf uint32 10

countssh Number of SSH logs associated with the session uint32 10

countssl uint32 10

countwaf Number of WAF logs associated with the session uint32 10

countweb Number of Web Filter logs associated with the session uint32 10

craction Action performed by Threat Weight uint32 10

crlevel Threat Weight level string 10

crscore Threat Weight score uint32 10

date Date string 10

FortiOS 7.2.1 Log Reference 1458


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device Serial Number string 16

devtype Device Type string 66

dstauthserver string 64

dstcity string 64

dstcountry Country name for the destination IP string 64

dstdevtype Destination Device Type string 66

dstfamily string 66

dsthwvendor string 66

dsthwversion string 66

dstinetsvc Internet service name for the destination string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstmac Destination Mac Address string 17

dstname Destination name string 66

dstosname Destination OS name string 66

dstport Destination Protocol Port Number uint16 5

dstregion string 64

dstreputation uint32 10

dstserver Destination Server uint8 3

dstssid Destination SSID string 33

dstswversion string 66

dstthreatfeed string 36

dstunauthuser string 66

dstunauthusersource string 66

dstuser string 256

dstuuid UUID of the Destination Address Object string 37

duration Duration of the session uint32 10

eventtime Epoch time in nanoseconds uint64 20

fctuid FortiClient UID string 32

FortiOS 7.2.1 Log Reference 1459


Fortinet Inc.
Log Field Name Description Data Type Length

gatewayid uint32 10

group User group name string 512

identifier uint16 5

lanin LAN incoming traffic in bytes uint64 20

lanout LAN outgoing traffic in bytes uint64 20

level Log Level string 11

logid Log ID string 10

masterdstmac Destination master MAC address string 17

mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces

msg Log message string 512

osname Name of the device's OS string 66

pdstport uint16 5

policyid Firewall Policy ID uint32 10

policymode string 8

policyname Policy name string 36

policytype Policy type string 24

poluuid UUID of the Firewall Policy string 37

proto Protocol Number uint8 3

psrcport uint16 5

radioband Radio Band string 64

rcvdbyte Received Bytes uint64 20

rcvddelta Delta Received Bytes uint64 20

rcvdpkt Received Packets uint32 10

saasname string 80

sentbyte Sent Bytes uint64 20

sentdelta Delta Sent Bytes uint64 20

sentpkt Sent Packets uint32 10

service Name of Service string 80

sessionid Session ID uint32 10

shaperdroprcvdbyte Received bytes dropped by shaper uint32 10

FortiOS 7.2.1 Log Reference 1460


Fortinet Inc.
Log Field Name Description Data Type Length

shaperdropsentbyte Sent bytes dropped by shaper uint32 10

shaperperipdropbyte Dropped bytes per IP by shaper uint32 10

shaperperipname Traffic shaper name (per IP) string 36

shaperrcvdname Traffic shaper name for received traffic string 36

shapersentname Traffic shaper name for sent traffic string 36

shapingpolicyid Shaping Policy ID uint32 10

shapingpolicyname string 36

signal int8 4

snr int8 4

srccity string 64

srccountry Country name for Source IP string 64

srcdomain string 255

srcfamily string 66

srchwvendor string 66

srchwversion string 66

srcinetsvc Internet service name for the source string 64

srcintf Source interface name string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP address ip 39

srcmac MAC address associated with the Source IP string 17

srcmacvendor string 66

srcname Source name string 66

srcport Source protocol port number uint16 5

srcregion string 64

srcreputation uint32 10

srcserver Source server uint8 3

srcssid Source SSID string 33

srcswversion string 66

srcthreatfeed string 36

srcuuid UUID of the Source Address Object string 37

FortiOS 7.2.1 Log Reference 1461


Fortinet Inc.
Log Field Name Description Data Type Length

sslaction Action taken by ssl-ssh-profile string 26

subtype Subtype of the traffic string 20

time Time string 8

trandisp NAT translation type string 16

tranip NAT Destination IP ip 39

tranport NAT Destination Port uint16 5

transip NAT Source IP ip 39

transport NAT Source Protocol Port uint16 5

tunnelid uint32 10

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated user name string 66

unauthusersource The method used to detect unauthenticated user name string 66

url URL string 512

user User name string 256

utmaction Security action performed by UTM string 32

vd Virtual domain name string 32

vip string 64

vpntype The type of the VPN tunnel string 14

vrf Virtual router forwarding uint8 3

vwlid Virtual Wan Link (SD-WAN) service id uint32 10

vwlname string 36

vwlquality Quality info of the service rule that is matched by traffic string 320

vwlservice Application that is matched by the traffic (internet-service- string 64


app-ctrl)

vwpvlanid Virtual Wire Pair vlan id uint32 10

wanin WAN incoming traffic in bytes uint64 20

wanoptapptype WAN Optimization Application type string 9

wanout WAN outgoing traffic in bytes uint64 20

19 - LOG_ID_TRAFFIC_BROADCAST

Message ID: 19

FortiOS 7.2.1 Log Reference 1462


Fortinet Inc.
Message Description: LOG_ID_TRAFFIC_BROADCAST
Message Meaning: Broadcast traffic
Type: Traffic
Category: MULTICAST
Severity: Notice

Log Field Name Description Data Type Length

accessproxy string 80

action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server

agent User agent - eg. agent="Mozilla/5.0" string 1024

ap Access Point name string 36

app Application name string 96

appact The security action from app control string 16

appcat Application category string 64

appid Application ID uint32 10

applist Application Control profile (name) string 64

apprisk Application Risk Level string 16

apsn Access Point serial number string 36

authserver Remote Authentication server string 64

centralnatid central-snat-map id uint32 10

channel WiFi Channel uint32 10

clientdeviceid string 80

clientdeviceowner string 80

clientdevicetags string 512

comment Customized policy comment string 1024

craction Action performed by Threat Weight uint32 10

crlevel Threat Weight level string 10

crscore Threat Weight score uint32 10

date Date string 10

FortiOS 7.2.1 Log Reference 1463


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device Serial Number string 16

devtype Device Type string 66

dstauthserver string 64

dstcity string 64

dstcountry Country name for the destination IP string 64

dstdevtype Destination Device Type string 66

dstfamily string 66

dsthwvendor string 66

dsthwversion string 66

dstinetsvc Internet service name for the destination string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstmac Destination Mac Address string 17

dstname Destination name string 66

dstosname Destination OS name string 66

dstport Destination Protocol Port Number uint16 5

dstregion string 64

dstreputation uint32 10

dstserver Destination Server uint8 3

dstssid Destination SSID string 33

dstswversion string 66

dstthreatfeed string 36

dstunauthuser string 66

dstunauthusersource string 66

dstuser string 256

dstuuid UUID of the Destination Address Object string 37

duration Duration of the session uint32 10

eventtime Epoch time in nanoseconds uint64 20

fctuid FortiClient UID string 32

FortiOS 7.2.1 Log Reference 1464


Fortinet Inc.
Log Field Name Description Data Type Length

gatewayid uint32 10

group User group name string 512

identifier uint16 5

lanin LAN incoming traffic in bytes uint64 20

lanout LAN outgoing traffic in bytes uint64 20

level Log Level string 11

logid Log ID string 10

masterdstmac Destination master MAC address string 17

mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces

msg Log message string 512

osname Name of the device's OS string 66

pdstport uint16 5

policyid Firewall Policy ID uint32 10

policymode string 8

policyname Policy name string 36

policytype Policy type string 24

poluuid UUID of the Firewall Policy string 37

proto Protocol Number uint8 3

psrcport uint16 5

radioband Radio Band string 64

rcvdbyte Received Bytes uint64 20

rcvddelta Delta Received Bytes uint64 20

rcvdpkt Received Packets uint32 10

saasname string 80

sentbyte Sent Bytes uint64 20

sentdelta Delta Sent Bytes uint64 20

sentpkt Sent Packets uint32 10

service Name of Service string 80

sessionid Session ID uint32 10

shaperdroprcvdbyte Received bytes dropped by shaper uint32 10

FortiOS 7.2.1 Log Reference 1465


Fortinet Inc.
Log Field Name Description Data Type Length

shaperdropsentbyte Sent bytes dropped by shaper uint32 10

shaperperipdropbyte Dropped bytes per IP by shaper uint32 10

shaperperipname Traffic shaper name (per IP) string 36

shaperrcvdname Traffic shaper name for received traffic string 36

shapersentname Traffic shaper name for sent traffic string 36

shapingpolicyid Shaping Policy ID uint32 10

shapingpolicyname string 36

signal int8 4

snr int8 4

srccity string 64

srccountry Country name for Source IP string 64

srcdomain string 255

srcfamily string 66

srchwvendor string 66

srchwversion string 66

srcinetsvc Internet service name for the source string 64

srcintf Source interface name string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP address ip 39

srcmac MAC address associated with the Source IP string 17

srcmacvendor string 66

srcname Source name string 66

srcport Source protocol port number uint16 5

srcregion string 64

srcreputation uint32 10

srcserver Source server uint8 3

srcssid Source SSID string 33

srcswversion string 66

srcthreatfeed string 36

srcuuid UUID of the Source Address Object string 37

FortiOS 7.2.1 Log Reference 1466


Fortinet Inc.
Log Field Name Description Data Type Length

sslaction Action taken by ssl-ssh-profile string 26

subtype Subtype of the traffic string 20

time Time string 8

trandisp NAT translation type string 16

tranip NAT Destination IP ip 39

tranport NAT Destination Port uint16 5

transip NAT Source IP ip 39

transport NAT Source Protocol Port uint16 5

tunnelid uint32 10

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated user name string 66

unauthusersource The method used to detect unauthenticated user name string 66

url URL string 512

user User name string 256

utmaction Security action performed by UTM string 32

vd Virtual domain name string 32

vip string 64

vpntype The type of the VPN tunnel string 14

vrf Virtual router forwarding uint8 3

vwlid Virtual Wan Link (SD-WAN) service id uint32 10

vwlname string 36

vwlquality Quality info of the service rule that is matched by traffic string 320

vwlservice Application that is matched by the traffic (internet-service- string 64


app-ctrl)

vwpvlanid Virtual Wire Pair vlan id uint32 10

wanin WAN incoming traffic in bytes uint64 20

wanoptapptype WAN Optimization Application type string 9

wanout WAN outgoing traffic in bytes uint64 20

20 - LOG_ID_TRAFFIC_STAT

Message ID: 20

FortiOS 7.2.1 Log Reference 1467


Fortinet Inc.
Message Description: LOG_ID_TRAFFIC_STAT
Message Meaning: Forward traffic statistics
Type: Traffic
Category: FORWARD
Severity: Notice

Log Field Name Description Data Type Length

accessproxy string 80

action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server

agent User agent - eg. agent="Mozilla/5.0" string 1024

ap Access Point name string 36

app Application name string 96

appact The security action from app control string 16

appcat Application category string 64

appid Application ID uint32 10

applist Application Control profile (name) string 64

apprisk Application Risk Level string 16

apsn Access Point serial number string 36

authserver Remote Authentication server string 64

centralnatid central-snat-map id uint32 10

channel WiFi Channel uint32 10

clientdeviceid string 80

clientdeviceowner string 80

clientdevicetags string 512

comment Customized policy comment string 1024

craction Action performed by Threat Weight uint32 10

crlevel Threat Weight level string 10

crscore Threat Weight score uint32 10

date Date string 10

FortiOS 7.2.1 Log Reference 1468


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device Serial Number string 16

devtype Device Type string 66

dstauthserver string 64

dstcity string 64

dstcountry Country name for the destination IP string 64

dstdevtype Destination Device Type string 66

dstfamily string 66

dsthwvendor string 66

dsthwversion string 66

dstinetsvc Internet service name for the destination string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstmac Destination Mac Address string 17

dstname Destination name string 66

dstosname Destination OS name string 66

dstport Destination Protocol Port Number uint16 5

dstregion string 64

dstreputation uint32 10

dstserver Destination Server uint8 3

dstssid Destination SSID string 33

dstswversion string 66

dstthreatfeed string 36

dstunauthuser string 66

dstunauthusersource string 66

dstuser string 256

dstuuid UUID of the Destination Address Object string 37

duration Duration of the session uint32 10

eventtime Epoch time in nanoseconds uint64 20

fctuid FortiClient UID string 32

FortiOS 7.2.1 Log Reference 1469


Fortinet Inc.
Log Field Name Description Data Type Length

gatewayid uint32 10

group User group name string 512

identifier uint16 5

lanin LAN incoming traffic in bytes uint64 20

lanout LAN outgoing traffic in bytes uint64 20

level Log Level string 11

logid Log ID string 10

masterdstmac Destination master MAC address string 17

mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces

msg Log message string 512

osname Name of the device's OS string 66

pdstport uint16 5

policyid Firewall Policy ID uint32 10

policymode string 8

policyname Policy name string 36

policytype Policy type string 24

poluuid UUID of the Firewall Policy string 37

proto Protocol Number uint8 3

psrcport uint16 5

radioband Radio Band string 64

rcvdbyte Received Bytes uint64 20

rcvddelta Delta Received Bytes uint64 20

rcvdpkt Received Packets uint32 10

saasname string 80

sentbyte Sent Bytes uint64 20

sentdelta Delta Sent Bytes uint64 20

sentpkt Sent Packets uint32 10

service Name of Service string 80

sessionid Session ID uint32 10

shaperdroprcvdbyte Received bytes dropped by shaper uint32 10

FortiOS 7.2.1 Log Reference 1470


Fortinet Inc.
Log Field Name Description Data Type Length

shaperdropsentbyte Sent bytes dropped by shaper uint32 10

shaperperipdropbyte Dropped bytes per IP by shaper uint32 10

shaperperipname Traffic shaper name (per IP) string 36

shaperrcvdname Traffic shaper name for received traffic string 36

shapersentname Traffic shaper name for sent traffic string 36

shapingpolicyid Shaping Policy ID uint32 10

shapingpolicyname string 36

signal int8 4

snr int8 4

srccity string 64

srccountry Country name for Source IP string 64

srcdomain string 255

srcfamily string 66

srchwvendor string 66

srchwversion string 66

srcinetsvc Internet service name for the source string 64

srcintf Source interface name string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP address ip 39

srcmac MAC address associated with the Source IP string 17

srcmacvendor string 66

srcname Source name string 66

srcport Source protocol port number uint16 5

srcregion string 64

srcreputation uint32 10

srcserver Source server uint8 3

srcssid Source SSID string 33

srcswversion string 66

srcthreatfeed string 36

srcuuid UUID of the Source Address Object string 37

FortiOS 7.2.1 Log Reference 1471


Fortinet Inc.
Log Field Name Description Data Type Length

sslaction Action taken by ssl-ssh-profile string 26

subtype Subtype of the traffic string 20

time Time string 8

trandisp NAT translation type string 16

tranip NAT Destination IP ip 39

tranport NAT Destination Port uint16 5

transip NAT Source IP ip 39

transport NAT Source Protocol Port uint16 5

tunnelid uint32 10

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated user name string 66

unauthusersource The method used to detect unauthenticated user name string 66

url URL string 512

user User name string 256

utmaction Security action performed by UTM string 32

vd Virtual domain name string 32

vip string 64

vpntype The type of the VPN tunnel string 14

vrf Virtual router forwarding uint8 3

vwlid Virtual Wan Link (SD-WAN) service id uint32 10

vwlname string 36

vwlquality Quality info of the service rule that is matched by traffic string 320

vwlservice Application that is matched by the traffic (internet-service- string 64


app-ctrl)

vwpvlanid Virtual Wire Pair vlan id uint32 10

wanin WAN incoming traffic in bytes uint64 20

wanoptapptype WAN Optimization Application type string 9

wanout WAN outgoing traffic in bytes uint64 20

21 - LOG_ID_TRAFFIC_SNIFFER_STAT

Message ID: 21

FortiOS 7.2.1 Log Reference 1472


Fortinet Inc.
Message Description: LOG_ID_TRAFFIC_SNIFFER_STAT
Message Meaning: Sniffer traffic statistics
Type: Traffic
Category: SNIFFER
Severity: Notice

Log Field Name Description Data Type Length

accessproxy string 80

action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server

agent User agent - eg. agent="Mozilla/5.0" string 1024

ap Access Point name string 36

app Application Name string 96

appact The security action from app control string 16

appcat Application category string 64

appid Application ID uint32 10

applist Application Control profile (name) string 64

apprisk Application Risk Level string 16

apsn Access Point serial number string 36

authserver Remote Authentication server string 64

centralnatid central-snat-map id uint32 10

channel WiFi Channel uint32 10

clientdeviceid string 80

clientdeviceowner string 80

clientdevicetags string 512

comment Customized policy comment string 1024

craction Action performed by Threat Weight uint32 10

crlevel Threat Weight level string 10

crscore Threat Weight score uint32 10

date Date string 10

FortiOS 7.2.1 Log Reference 1473


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device Serial Number string 16

devtype Device Type string 66

dstauthserver string 64

dstcity string 64

dstcountry Country name for the destination IP string 64

dstdevtype Destination Device Type string 66

dstfamily string 66

dsthwvendor string 66

dsthwversion string 66

dstinetsvc Internet service name for the destination string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstmac Destination Mac Address string 17

dstname Destination name string 66

dstosname Destination OS name string 66

dstport Destination Protocol Port Number uint16 5

dstregion string 64

dstreputation uint32 10

dstserver Destination Server uint8 3

dstssid Destination SSID string 33

dstswversion string 66

dstthreatfeed string 36

dstunauthuser string 66

dstunauthusersource string 66

dstuser string 256

dstuuid UUID of the Destination Address Object string 37

duration Duration of the session uint32 10

eventtime Epoch time in nanoseconds uint64 20

fctuid FortiClient UID string 32

FortiOS 7.2.1 Log Reference 1474


Fortinet Inc.
Log Field Name Description Data Type Length

gatewayid uint32 10

group User group name string 512

identifier uint16 5

lanin LAN incoming traffic in bytes uint64 20

lanout LAN outgoing traffic in bytes uint64 20

level Log Level string 11

logid Log ID string 10

masterdstmac Destination master MAC address string 17

mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces

msg Log message string 512

osname Name of the device's OS string 66

pdstport uint16 5

policyid Firewall Policy ID uint32 10

policymode string 8

policyname Policy name string 36

policytype Policy type string 24

poluuid UUID of the Firewall Policy string 37

proto Protocol Number uint8 3

psrcport uint16 5

radioband Radio Band string 64

rcvdbyte Received Bytes uint64 20

rcvddelta Delta Received Bytes uint64 20

rcvdpkt Received Packets uint32 10

saasname string 80

sentbyte Sent Bytes uint64 20

sentdelta Delta Sent Bytes uint64 20

sentpkt Sent Packets uint32 10

service Name of Service string 80

sessionid Session ID uint32 10

shaperdroprcvdbyte Received bytes dropped by shaper uint32 10

FortiOS 7.2.1 Log Reference 1475


Fortinet Inc.
Log Field Name Description Data Type Length

shaperdropsentbyte Sent bytes dropped by shaper uint32 10

shaperperipdropbyte Dropped bytes per IP by shaper uint32 10

shaperperipname Traffic shaper name (per IP) string 36

shaperrcvdname Traffic shaper name for received traffic string 36

shapersentname Traffic shaper name for sent traffic string 36

shapingpolicyid Shaping Policy ID uint32 10

shapingpolicyname string 36

signal int8 4

snr int8 4

srccity string 64

srccountry Country name for Source IP string 64

srcdomain string 255

srcfamily string 66

srchwvendor string 66

srchwversion string 66

srcinetsvc Internet service name for the source string 64

srcintf Source interface name string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP address ip 39

srcmac MAC address associated with the Source IP string 17

srcmacvendor string 66

srcname Source name string 66

srcport Source protocol port number uint16 5

srcregion string 64

srcreputation uint32 10

srcserver Source server uint8 3

srcssid Source SSID string 33

srcswversion string 66

srcthreatfeed string 36

srcuuid UUID of the Source Address Object string 37

FortiOS 7.2.1 Log Reference 1476


Fortinet Inc.
Log Field Name Description Data Type Length

sslaction Action taken by ssl-ssh-profile string 26

subtype Subtype of the traffic string 20

time Time string 8

trandisp NAT translation type string 16

tranip NAT Destination IP ip 39

tranport NAT Destination Port uint16 5

transip NAT Source IP ip 39

transport NAT Source Protocol Port uint16 5

tunnelid uint32 10

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated user name string 66

unauthusersource The method used to detect unauthenticated user name string 66

url URL string 512

user User name string 256

utmaction Security action performed by UTM string 32

vd Virtual domain name string 32

vip string 64

vpntype The type of the VPN tunnel string 14

vrf Virtual router forwarding uint8 3

vwlid Virtual Wan Link (SD-WAN) service id uint32 10

vwlname string 36

vwlquality Quality info of the service rule that is matched by traffic string 320

vwlservice Application that is matched by the traffic (internet-service- string 64


app-ctrl)

vwpvlanid Virtual Wire Pair vlan id uint32 10

wanin WAN incoming traffic in bytes uint64 20

wanoptapptype WAN Optimization Application type string 9

wanout WAN outgoing traffic in bytes uint64 20

22 - LOG_ID_TRAFFIC_UTM_CORRELATION

Message ID: 22

FortiOS 7.2.1 Log Reference 1477


Fortinet Inc.
Message Description: LOG_ID_TRAFFIC_UTM_CORRELATION
Message Meaning: Forward traffic for UTM correlation
Type: Traffic
Category: FORWARD
Severity: Notice

Log Field Name Description Data Type Length

accessproxy string 80

action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server

agent User agent - eg. agent="Mozilla/5.0" string 1024

ap Access Point name string 36

app Application name string 96

appact The security action from app control string 16

appcat Application category string 64

appid Application ID uint32 10

applist Application Control profile (name) string 64

apprisk Application Risk Level string 16

apsn Access Point serial number string 36

authserver Remote Authentication server string 64

centralnatid central-snat-map id uint32 10

channel WiFi Channel uint32 10

clientdeviceid string 80

clientdeviceowner string 80

clientdevicetags string 512

comment Customized policy comment string 1024

craction Action performed by Threat Weight uint32 10

crlevel Threat Weight level string 10

crscore Threat Weight score uint32 10

date Date string 10

FortiOS 7.2.1 Log Reference 1478


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device Serial Number string 16

devtype Device Type string 66

dstauthserver string 64

dstcity string 64

dstcountry Country name for the destination IP string 64

dstdevtype Destination Device Type string 66

dstfamily string 66

dsthwvendor string 66

dsthwversion string 66

dstinetsvc Internet service name for the destination string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstmac Destination Mac Address string 17

dstname Destination name string 66

dstosname Destination OS name string 66

dstport Destination Protocol Port Number uint16 5

dstregion string 64

dstreputation uint32 10

dstserver Destination Server uint8 3

dstssid Destination SSID string 33

dstswversion string 66

dstthreatfeed string 36

dstunauthuser string 66

dstunauthusersource string 66

dstuser string 256

dstuuid UUID of the Destination Address Object string 37

duration Duration of the session uint32 10

eventtime Epoch time in nanoseconds uint64 20

fctuid FortiClient UID string 32

FortiOS 7.2.1 Log Reference 1479


Fortinet Inc.
Log Field Name Description Data Type Length

gatewayid uint32 10

group User group name string 512

identifier uint16 5

lanin LAN incoming traffic in bytes uint64 20

lanout LAN outgoing traffic in bytes uint64 20

level Log Level string 11

logid Log ID string 10

masterdstmac Destination master MAC address string 17

mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces

msg Log message string 512

osname Name of the device's OS string 66

pdstport uint16 5

policyid Firewall Policy ID uint32 10

policymode string 8

policyname Policy name string 36

policytype Policy type string 24

poluuid UUID of the Firewall Policy string 37

proto Protocol Number uint8 3

psrcport uint16 5

radioband Radio Band string 64

rcvdbyte Received Bytes uint64 20

rcvddelta Delta Received Bytes uint64 20

rcvdpkt Received Packets uint32 10

saasname string 80

sentbyte Sent Bytes uint64 20

sentdelta Delta Sent Bytes uint64 20

sentpkt Sent Packets uint32 10

service Name of Service string 80

sessionid Session ID uint32 10

shaperdroprcvdbyte Received bytes dropped by shaper uint32 10

FortiOS 7.2.1 Log Reference 1480


Fortinet Inc.
Log Field Name Description Data Type Length

shaperdropsentbyte Sent bytes dropped by shaper uint32 10

shaperperipdropbyte Dropped bytes per IP by shaper uint32 10

shaperperipname Traffic shaper name (per IP) string 36

shaperrcvdname Traffic shaper name for received traffic string 36

shapersentname Traffic shaper name for sent traffic string 36

shapingpolicyid Shaping Policy ID uint32 10

shapingpolicyname string 36

signal int8 4

snr int8 4

srccity string 64

srccountry Country name for Source IP string 64

srcdomain string 255

srcfamily string 66

srchwvendor string 66

srchwversion string 66

srcinetsvc Internet service name for the source string 64

srcintf Source interface name string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP address ip 39

srcmac MAC address associated with the Source IP string 17

srcmacvendor string 66

srcname Source name string 66

srcport Source protocol port number uint16 5

srcregion string 64

srcreputation uint32 10

srcserver Source server uint8 3

srcssid Source SSID string 33

srcswversion string 66

srcthreatfeed string 36

srcuuid UUID of the Source Address Object string 37

FortiOS 7.2.1 Log Reference 1481


Fortinet Inc.
Log Field Name Description Data Type Length

sslaction Action taken by ssl-ssh-profile string 26

subtype Subtype of the traffic string 20

time Time string 8

trandisp NAT translation type string 16

tranip NAT Destination IP ip 39

tranport NAT Destination Port uint16 5

transip NAT Source IP ip 39

transport NAT Source Protocol Port uint16 5

tunnelid uint32 10

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated user name string 66

unauthusersource The method used to detect unauthenticated user name string 66

url URL string 512

user User name string 256

utmaction Security action performed by UTM string 32

vd Virtual domain name string 32

vip string 64

vpntype The type of the VPN tunnel string 14

vrf Virtual router forwarding uint8 3

vwlid Virtual Wan Link (SD-WAN) service id uint32 10

vwlname string 36

vwlquality Quality info of the service rule that is matched by traffic string 320

vwlservice Application that is matched by the traffic (internet-service- string 64


app-ctrl)

vwpvlanid Virtual Wire Pair vlan id uint32 10

wanin WAN incoming traffic in bytes uint64 20

wanoptapptype WAN Optimization Application type string 9

wanout WAN outgoing traffic in bytes uint64 20

countapp Number of App Ctrl logs associated with the session uint32 10

countav Number of AV logs associated with the session uint32 10

FortiOS 7.2.1 Log Reference 1482


Fortinet Inc.
Log Field Name Description Data Type Length

countcifs uint32 10

countdlp Number of DLP logs associated with the session uint32 10

countdns Number of DNS Query logs associated with the session uint32 10

countemail Number of Email logs associated with the session uint32 10

countff uint32 10

counticap uint32 10

countips Number of IPS logs associated with the session uint32 10

countsctpf uint32 10

countssh Number of SSH logs associated with the session uint32 10

countssl uint32 10

countwaf Number of WAF logs associated with the session uint32 10

countweb Number of Web Filter logs associated with the session uint32 10

24 - LOG_ID_TRAFFIC_ZTNA

Message ID: 24
Message Description: LOG_ID_TRAFFIC_ZTNA
Message Meaning: ZTNA traffic
Type: Traffic
Category: ZTNA
Severity: Notice

Log Field Name Description Data Type Length

accessproxy string 80

action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server

agent User agent - eg. agent="Mozilla/5.0" string 1024

ap Access Point name string 36

app Application Name string 96

FortiOS 7.2.1 Log Reference 1483


Fortinet Inc.
Log Field Name Description Data Type Length

appact The security action from app control string 16

appcat Application category string 64

appid Application ID uint32 10

applist Application Control profile (name) string 64

apprisk Application Risk Level string 16

apsn Access Point serial number string 36

authserver Remote Authentication server string 64

centralnatid central-snat-map id uint32 10

channel WiFi Channel uint32 10

clientdeviceid string 80

clientdeviceowner string 80

clientdevicetags string 512

comment Customized policy comment string 1024

craction Action performed by Threat Weight uint32 10

crlevel Threat Weight level string 10

crscore Threat Weight score uint32 10

date Date string 10

devid Device Serial Number string 16

devtype Device Type string 66

dstauthserver string 64

dstcity string 64

dstcountry Country name for the destination IP string 64

dstdevtype Destination Device Type string 66

dstfamily string 66

dsthwvendor string 66

dsthwversion string 66

dstinetsvc Internet service name for the destination string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

FortiOS 7.2.1 Log Reference 1484


Fortinet Inc.
Log Field Name Description Data Type Length

dstmac Destination Mac Address string 17

dstname Destination name string 66

dstosname Destination OS name string 66

dstport Destination Protocol Port Number uint16 5

dstregion string 64

dstreputation uint32 10

dstserver Destination Server uint8 3

dstssid Destination SSID string 33

dstswversion string 66

dstthreatfeed string 36

dstunauthuser string 66

dstunauthusersource string 66

dstuser string 256

dstuuid UUID of the Destination Address Object string 37

duration Duration of the session uint32 10

eventtime Epoch time in nanoseconds uint64 20

fctuid FortiClient UID string 32

gatewayid uint32 10

group User group name string 512

identifier uint16 5

lanin LAN incoming traffic in bytes uint64 20

lanout LAN outgoing traffic in bytes uint64 20

level Log Level string 11

logid Log ID string 10

masterdstmac Destination master MAC address string 17

mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces

msg Log message string 512

osname Name of the device's OS string 66

pdstport uint16 5

policyid Firewall Policy ID uint32 10

FortiOS 7.2.1 Log Reference 1485


Fortinet Inc.
Log Field Name Description Data Type Length

policymode string 8

policyname Policy name string 36

policytype Policy type string 24

poluuid UUID of the Firewall Policy string 37

proto Protocol Number uint8 3

psrcport uint16 5

radioband Radio Band string 64

rcvdbyte Received Bytes uint64 20

rcvddelta Delta Received Bytes uint64 20

rcvdpkt Received Packets uint32 10

saasname string 80

sentbyte Sent Bytes uint64 20

sentdelta Delta Sent Bytes uint64 20

sentpkt Sent Packets uint32 10

service Name of Service string 80

sessionid Session ID uint32 10

shaperdroprcvdbyte Received bytes dropped by shaper uint32 10

shaperdropsentbyte Sent bytes dropped by shaper uint32 10

shaperperipdropbyte Dropped bytes per IP by shaper uint32 10

shaperperipname Traffic shaper name (per IP) string 36

shaperrcvdname Traffic shaper name for received traffic string 36

shapersentname Traffic shaper name for sent traffic string 36

shapingpolicyid Shaping Policy ID uint32 10

shapingpolicyname string 36

signal int8 4

snr int8 4

srccity string 64

srccountry Country name for Source IP string 64

srcdomain string 255

srcfamily string 66

FortiOS 7.2.1 Log Reference 1486


Fortinet Inc.
Log Field Name Description Data Type Length

srchwvendor string 66

srchwversion string 66

srcinetsvc Internet service name for the source string 64

srcintf Source interface name string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP address ip 39

srcmac MAC address associated with the Source IP string 17

srcmacvendor string 66

srcname Source name string 66

srcport Source protocol port number uint16 5

srcregion string 64

srcreputation uint32 10

srcserver Source server uint8 3

srcssid Source SSID string 33

srcswversion string 66

srcthreatfeed string 36

srcuuid UUID of the Source Address Object string 37

sslaction Action taken by ssl-ssh-profile string 26

subtype Subtype of the traffic string 20

time Time string 8

trandisp NAT translation type string 16

tranip NAT Destination IP ip 39

tranport NAT Destination Port uint16 5

transip NAT Source IP ip 39

transport NAT Source Protocol Port uint16 5

tunnelid uint32 10

type Log type string 16

tz Time zone string 5

unauthuser Unauthenticated user name string 66

unauthusersource The method used to detect unauthenticated user name string 66

FortiOS 7.2.1 Log Reference 1487


Fortinet Inc.
Log Field Name Description Data Type Length

url URL string 512

user User name string 256

utmaction Security action performed by UTM string 32

vd Virtual domain name string 32

vip string 64

vpntype The type of the VPN tunnel string 14

vrf Virtual router forwarding uint8 3

vwlid Virtual Wan Link (SD-WAN) service id uint32 10

vwlname string 36

vwlquality Quality info of the service rule that is matched by traffic string 320

vwlservice Application that is matched by the traffic (internet-service- string 64


app-ctrl)

vwpvlanid Virtual Wire Pair vlan id uint32 10

wanin WAN incoming traffic in bytes uint64 20

wanoptapptype WAN Optimization Application type string 9

wanout WAN outgoing traffic in bytes uint64 20

25 - LOG_ID_TRAFFIC_SFLOW

Message ID: 25
Message Description: LOG_ID_TRAFFIC_SFLOW
Message Meaning: Sflow sample
Type: Traffic
Category: FORWARD
Severity: Notice

Log Field Name Description Data Type Length

date Date string 10

devid Device Serial Number string 16

eventtime Epoch time in nanoseconds uint64 20

level Log Level string 11

logid Log ID string 10

subtype Subtype of the traffic string 20

FortiOS 7.2.1 Log Reference 1488


Fortinet Inc.
Log Field Name Description Data Type Length

time Time string 8

type Log type string 16

tz Time zone string 5

vd Virtual domain name string 32

FortiOS 7.2.1 Log Reference 1489


Fortinet Inc.
VoIP

44032 - LOGID_EVENT_VOIP_SIP

Message ID: 44032


Message Description: LOGID_EVENT_VOIP_SIP
Message Meaning: VoIP SIP
Type: VoIP
Category: VOIP
Severity: Information

Log Field Name Description Data Type Length

date Day, month, and year when the log message was recorded. string 10

time Hour clock when the log message was recorded. string 8

logid Unique Log ID string 10

type Type of log. Ex: type="utm" string 16

subtype Subtype string 20

level Log Level string 11

devid Serial number of the device for the traffic's origin. string 16

vd Name of the virtual domain in which the log message was string 32
recorded.

eventtime Time when event occured uint64 20

tz Time zone string 5

session_id Session ID. Ex: session_id=232 uint32 10

epoch Epoch uint32 10

event_id Unique event ID uint32 10

srcip IP address of the traffic's origin. Ex: srcip=10.1.100.155 ip 39

src_port Port number of the traffic's origin. Ex: srcport=40772 uint16 5

dstip Destination IP ip 39

dst_port Destination port uint16 5

proto Protocol number. Ex: for SIP it will be proto=17 uint8 3

src_int Name of the source interface. Ex: src_int="port1" string 16

FortiOS 7.2.1 Log Reference 1490


Fortinet Inc.
Log Field Name Description Data Type Length

dst_int Destination Interface string 16

policy_id Name of the firewall policy governing the traffic which caused uint32 10
the log message.

profile Name or number of associated VOIP profile string 64

voip_proto SIP/SCCP/MGCP/h323 string 4

kind Kind of service. Typically it will have value "call" string 10

action Action. Eg. block , allow string 15

status Status. Ex: status="blocked" , status= "start" string 23

duration Duration of the session. Ex: 180 (in seconds) uint32 10

dir Destination Interface string 16

call_id Ex: call_id="[email protected]" string 64

from Where call was originated from string 128

to Destination address string 512

44033 - LOGID_EVENT_VOIP_SIP_BLOCK

Message ID: 44033


Message Description: LOGID_EVENT_VOIP_SIP_BLOCK
Message Meaning: VoIP SIP blocked
Type: VoIP
Category: VOIP
Severity: Notice

Log Field Name Description Data Type Length

date Day, month, and year when the log message was recorded. string 10

time Hour clock when the log message was recorded. string 8

logid Unique Log ID string 10

type Type of log. Ex: type="utm" string 16

subtype Subtype string 20

level Log Level string 11

devid Serial number of the device for the traffic's origin. string 16

vd Name of the virtual domain in which the log message was string 32
recorded.

FortiOS 7.2.1 Log Reference 1491


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Time when event occured uint64 20

tz Time zone string 5

session_id Session ID. Ex: session_id=232 uint32 10

epoch Epoch uint32 10

event_id Unique event ID uint32 10

srcip IP address of the traffic's origin. Ex: srcip=10.1.100.155 ip 39

src_port Port number of the traffic's origin. Ex: srcport=40772 uint16 5

dstip Destination IP ip 39

dst_port Destination port uint16 5

proto Protocol number. Ex: for SIP it will be proto=17 uint8 3

src_int Name of the source interface. Ex: src_int="port1" string 16

dst_int Destination Interface string 16

policy_id Name of the firewall policy governing the traffic which caused uint32 10
the log message.

profile Name or number of associated VOIP profile string 64

voip_proto SIP/SCCP/MGCP/h323 string 4

kind Kind of service. Typically it will have value "call" string 10

action Action. Eg. block , allow string 15

status Status. Ex: status="blocked" , status= "start" string 23

duration Duration of the session. Ex: 180 (in seconds) uint32 10

dir Destination Interface string 16

call_id Ex: call_id="[email protected]" string 64

from Where call was originated from string 128

to Destination address string 512

reason Reason. Ex: reason="unrecognized-form" string 128

message_type Message Type. Ex: message_type="request" string 16

request_name Name of request. Ex: request_name="INVITE" or "NOTIFY" string 64

count Session count uint32 10

44034 - LOGID_EVENT_VOIP_SIP_FUZZING

Message ID: 44034


Message Description: LOGID_EVENT_VOIP_SIP_FUZZING

FortiOS 7.2.1 Log Reference 1492


Fortinet Inc.
Message Meaning: VoIP SIP fuzzing
Type: VoIP
Category: VOIP
Severity: Information

Log Field Name Description Data Type Length

date Day, month, and year when the log message was recorded. string 10

time Hour clock when the log message was recorded. string 8

logid Unique Log ID string 10

type Type of log. Ex: type="utm" string 16

subtype Subtype string 20

level Log Level string 11

devid Serial number of the device for the traffic's origin. string 16

vd Name of the virtual domain in which the log message was string 32
recorded.

eventtime Time when event occured uint64 20

tz Time zone string 5

session_id Session ID. Ex: session_id=232 uint32 10

epoch Epoch uint32 10

event_id Unique event ID uint32 10

srcip IP address of the traffic's origin. Ex: srcip=10.1.100.155 ip 39

src_port Port number of the traffic's origin. Ex: srcport=40772 uint16 5

dstip Destination IP ip 39

dst_port Destination port uint16 5

proto Protocol number. Ex: for SIP it will be proto=17 uint8 3

src_int Name of the source interface. Ex: src_int="port1" string 16

dst_int Destination Interface string 16

policy_id Name of the firewall policy governing the traffic which caused uint32 10
the log message.

profile Name or number of associated VOIP profile string 64

voip_proto SIP/SCCP/MGCP/h323 string 4

kind Kind of service. Typically it will have value "call" string 10

action Action. Eg. block , allow string 15

duration Duration of the session. Ex: 180 (in seconds) uint32 10

FortiOS 7.2.1 Log Reference 1493


Fortinet Inc.
Log Field Name Description Data Type Length

dir Destination Interface string 16

call_id Ex: call_id="[email protected]" string 64

message_type Message Type. Ex: message_type="request" string 16

request_name Name of request. Ex: request_name="INVITE" or "NOTIFY" string 64

malform_desc Malformed header description string 47

malform_data Malformed header data uint32 10

line SIP header line string 128

column Ex: column=16 uint32 10

44035 - LOGID_EVENT_VOIP_SCCP_REGISTER

Message ID: 44035


Message Description: LOGID_EVENT_VOIP_SCCP_REGISTER
Message Meaning: VoIP SCCP registered
Type: VoIP
Category: VOIP
Severity: Information

Log Field Name Description Data Type Length

date Day, month, and year when the log message was recorded. string 10

time Hour clock when the log message was recorded. string 8

logid Unique Log ID string 10

type Type of log. Ex: type="utm" string 16

subtype Subtype string 20

level Log Level string 11

devid Serial number of the device for the traffic's origin. string 16

vd Name of the virtual domain in which the log message was string 32
recorded.

eventtime Time when event occured uint64 20

tz Time zone string 5

session_id Session ID. Ex: session_id=232 uint32 10

epoch Epoch uint32 10

event_id Unique event ID uint32 10

FortiOS 7.2.1 Log Reference 1494


Fortinet Inc.
Log Field Name Description Data Type Length

srcip IP address of the traffic's origin. Ex: srcip=10.1.100.155 ip 39

src_port Port number of the traffic's origin. Ex: srcport=40772 uint16 5

dstip Destination IP ip 39

dst_port Destination port uint16 5

proto Protocol number. Ex: for SIP it will be proto=17 uint8 3

src_int Name of the source interface. Ex: src_int="port1" string 16

policy_id Name of the firewall policy governing the traffic which caused uint32 10
the log message.

profile Name or number of associated VOIP profile string 64

voip_proto SIP/SCCP/MGCP/h323 string 4

kind Kind of service. Typically it will have value "call" string 10

action Action. Eg. block , allow string 15

status Status. Ex: status="blocked" , status= "start" string 23

locip Local IP ip 39

phone Phone string 64

44036 - LOGID_EVENT_VOIP_SCCP_UNREGISTER

Message ID: 44036


Message Description: LOGID_EVENT_VOIP_SCCP_UNREGISTER
Message Meaning: VoIP SCCP unregistered
Type: VoIP
Category: VOIP
Severity: Information

Log Field Name Description Data Type Length

date Day, month, and year when the log message was recorded. string 10

time Hour clock when the log message was recorded. string 8

logid Unique Log ID string 10

type Type of log. Ex: type="utm" string 16

subtype Subtype string 20

level Log Level string 11

devid Serial number of the device for the traffic's origin. string 16

FortiOS 7.2.1 Log Reference 1495


Fortinet Inc.
Log Field Name Description Data Type Length

vd Name of the virtual domain in which the log message was string 32
recorded.

eventtime Time when event occured uint64 20

tz Time zone string 5

session_id Session ID. Ex: session_id=232 uint32 10

epoch Epoch uint32 10

event_id Unique event ID uint32 10

srcip IP address of the traffic's origin. Ex: srcip=10.1.100.155 ip 39

src_port Port number of the traffic's origin. Ex: srcport=40772 uint16 5

dstip Destination IP ip 39

dst_port Destination port uint16 5

proto Protocol number. Ex: for SIP it will be proto=17 uint8 3

src_int Name of the source interface. Ex: src_int="port1" string 16

policy_id Name of the firewall policy governing the traffic which caused uint32 10
the log message.

profile Name or number of associated VOIP profile string 64

voip_proto SIP/SCCP/MGCP/h323 string 4

kind Kind of service. Typically it will have value "call" string 10

action Action. Eg. block , allow string 15

status Status. Ex: status="blocked" , status= "start" string 23

reason Reason. Ex: reason="unrecognized-form" string 128

locip Local IP ip 39

phone Phone string 64

44037 - LOGID_EVENT_VOIP_SCCP_CALL_BLOCK

Message ID: 44037


Message Description: LOGID_EVENT_VOIP_SCCP_CALL_BLOCK
Message Meaning: VoIP SCCP call blocked
Type: VoIP
Category: VOIP
Severity: Information

FortiOS 7.2.1 Log Reference 1496


Fortinet Inc.
Log Field Name Description Data Type Length

date Day, month, and year when the log message was recorded. string 10

time Hour clock when the log message was recorded. string 8

logid Unique Log ID string 10

type Type of log. Ex: type="utm" string 16

subtype Subtype string 20

level Log Level string 11

devid Serial number of the device for the traffic's origin. string 16

vd Name of the virtual domain in which the log message was string 32
recorded.

eventtime Time when event occured uint64 20

tz Time zone string 5

session_id Session ID. Ex: session_id=232 uint32 10

epoch Epoch uint32 10

event_id Unique event ID uint32 10

srcip IP address of the traffic's origin. Ex: srcip=10.1.100.155 ip 39

src_port Port number of the traffic's origin. Ex: srcport=40772 uint16 5

dstip Destination IP ip 39

dst_port Destination port uint16 5

proto Protocol number. Ex: for SIP it will be proto=17 uint8 3

src_int Name of the source interface. Ex: src_int="port1" string 16

policy_id Name of the firewall policy governing the traffic which caused uint32 10
the log message.

profile Name or number of associated VOIP profile string 64

voip_proto SIP/SCCP/MGCP/h323 string 4

kind Kind of service. Typically it will have value "call" string 10

action Action. Eg. block , allow string 15

status Status. Ex: status="blocked" , status= "start" string 23

reason Reason. Ex: reason="unrecognized-form" string 128

locip Local IP ip 39

phone Phone string 64

FortiOS 7.2.1 Log Reference 1497


Fortinet Inc.
44038 - LOGID_EVENT_VOIP_SCCP_CALL_INFO

Message ID: 44038


Message Description: LOGID_EVENT_VOIP_SCCP_CALL_INFO
Message Meaning: VoIP SCCP call information
Type: VoIP
Category: VOIP
Severity: Information

Log Field Name Description Data Type Length

date Day, month, and year when the log message was recorded. string 10

time Hour clock when the log message was recorded. string 8

logid Unique Log ID string 10

type Type of log. Ex: type="utm" string 16

subtype Subtype string 20

level Log Level string 11

devid Serial number of the device for the traffic's origin. string 16

vd Name of the virtual domain in which the log message was string 32
recorded.

eventtime Time when event occured uint64 20

tz Time zone string 5

session_id Session ID. Ex: session_id=232 uint32 10

epoch Epoch uint32 10

event_id Unique event ID uint32 10

srcip IP address of the traffic's origin. Ex: srcip=10.1.100.155 ip 39

src_port Port number of the traffic's origin. Ex: srcport=40772 uint16 5

dstip Destination IP ip 39

dst_port Destination port uint16 5

proto Protocol number. Ex: for SIP it will be proto=17 uint8 3

src_int Name of the source interface. Ex: src_int="port1" string 16

dst_int Destination Interface string 16

policy_id Name of the firewall policy governing the traffic which caused uint32 10
the log message.

profile Name or number of associated VOIP profile string 64

FortiOS 7.2.1 Log Reference 1498


Fortinet Inc.
Log Field Name Description Data Type Length

voip_proto SIP/SCCP/MGCP/h323 string 4

kind Kind of service. Typically it will have value "call" string 10

action Action. Eg. block , allow string 15

status Status. Ex: status="blocked" , status= "start" string 23

duration Duration of the session. Ex: 180 (in seconds) uint32 10

locip Local IP ip 39

phone Phone string 64

locport Local Port uint16 5

remip Remote IP ip 39

remport Remote Port uint16 5

FortiOS 7.2.1 Log Reference 1499


Fortinet Inc.
WAF

30248 - LOGID_WAF_SIGNATURE_BLOCK

Message ID: 30248


Message Description: LOGID_WAF_SIGNATURE_BLOCK
Message Meaning: Web application firewall blocked application by signature
Type: WAF
Category: WAF-SIGNATURE
Severity: Warning

Log Field Name Description Data Type Length

action Status of the session. Uses following definition: - Deny = string 17


blocked by firewall policy. - Start = session start log (special
option to enable logging at start of a session). This means
firewall allowed. - All Others = allowed by Firewall Policy and
the status indicates how it was closed.

agent Agent string 1024

authserver Authentication Server string 64

constraint WAF HTTP protocol restrictions string 4096

date Date string 10

devid Device ID string 16

direction Direction string 4096

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventid Event ID uint32 10

eventtime Event Time, Time when WAF event detected uint64 20

eventtype Event Type string 32

FortiOS 7.2.1 Log Reference 1500


Fortinet Inc.
Log Field Name Description Data Type Length

fctuid FortiClient UID string 32

group User Group Name string 512

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log Message string 4096

name Method or custom signature name string 64

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile Full profile name string 64

proto Protocol uint8 3

ratemethod string 4096

rawdata Raw Data string 1024

referralurl string 512

service Service name string 5

sessionid Session ID uint32 10

severity Severity string 6

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log Subtype string 20

time Time string 8

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated user string 66

FortiOS 7.2.1 Log Reference 1501


Fortinet Inc.
Log Field Name Description Data Type Length

unauthusersource Unauthenticated user source string 66

url URL string 512

user User Name string 256

vd Virtual Domain Name string 32

30249 - LOGID_WAF_SIGNATURE_PASS

Message ID: 30249


Message Description: LOGID_WAF_SIGNATURE_PASS
Message Meaning: Web application firewall passed application by signature
Type: WAF
Category: WAF-SIGNATURE
Severity: Warning

Log Field Name Description Data Type Length

action Status of the session. Uses following definition: - Deny = string 17


blocked by firewall policy. - Start = session start log (special
option to enable logging at start of a session). This means
firewall allowed. - All Others = allowed by Firewall Policy and
the status indicates how it was closed.

agent Agent string 1024

authserver Authentication Server string 64

constraint WAF HTTP protocol restrictions string 4096

date Date string 10

devid Device ID string 16

direction Direction string 4096

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

FortiOS 7.2.1 Log Reference 1502


Fortinet Inc.
Log Field Name Description Data Type Length

eventid Event ID uint32 10

eventtime Event Time, Time when WAF event detected uint64 20

eventtype Event Type string 32

fctuid FortiClient UID string 32

group User Group Name string 512

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log Message string 4096

name Method or custom signature name string 64

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile Full profile name string 64

proto Protocol uint8 3

ratemethod string 4096

rawdata Raw Data string 1024

referralurl string 512

service Service name string 5

sessionid Session ID uint32 10

severity Severity string 6

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log Subtype string 20

time Time string 8

FortiOS 7.2.1 Log Reference 1503


Fortinet Inc.
Log Field Name Description Data Type Length

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url URL string 512

user User Name string 256

vd Virtual Domain Name string 32

30250 - LOGID_WAF_SIGNATURE_ERASE

Message ID: 30250


Message Description: LOGID_WAF_SIGNATURE_ERASE
Message Meaning: Web application firewall erased application by signature
Type: WAF
Category: WAF-SIGNATURE
Severity: Warning

Log Field Name Description Data Type Length

action Status of the session. Uses following definition: - Deny = string 17


blocked by firewall policy. - Start = session start log (special
option to enable logging at start of a session). This means
firewall allowed. - All Others = allowed by Firewall Policy and
the status indicates how it was closed.

agent Agent string 1024

authserver Authentication Server string 64

constraint WAF HTTP protocol restrictions string 4096

date Date string 10

devid Device ID string 16

direction Direction string 4096

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

FortiOS 7.2.1 Log Reference 1504


Fortinet Inc.
Log Field Name Description Data Type Length

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventid Event ID uint32 10

eventtime Event Time, Time when WAF event detected uint64 20

eventtype Event Type string 32

fctuid FortiClient UID string 32

group User Group Name string 512

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log Message string 4096

name Method or custom signature name string 64

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile Full profile name string 64

proto Protocol uint8 3

ratemethod string 4096

rawdata Raw Data string 1024

referralurl string 512

service Service name string 5

sessionid Session ID uint32 10

severity Severity string 6

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

FortiOS 7.2.1 Log Reference 1505


Fortinet Inc.
Log Field Name Description Data Type Length

srcuuid string 37

subtype Log Subtype string 20

time Time string 8

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url URL string 512

user User Name string 256

vd Virtual Domain Name string 32

30251 - LOGID_WAF_CUSTOM_SIGNATURE_BLOCK

Message ID: 30251


Message Description: LOGID_WAF_CUSTOM_SIGNATURE_BLOCK
Message Meaning: Web application firewall blocked application by custom signature
Type: WAF
Category: WAF-CUSTOM-SIGNATURE
Severity: Warning

Log Field Name Description Data Type Length

action Status of the session. Uses following definition: - Deny = string 17


blocked by firewall policy. - Start = session start log (special
option to enable logging at start of a session). This means
firewall allowed. - All Others = allowed by Firewall Policy and
the status indicates how it was closed.

agent Agent string 1024

authserver Authentication Server string 64

constraint WAF HTTP protocol restrictions string 4096

date Date string 10

devid Device ID string 16

direction Direction string 4096

dstauthserver string 64

dstcountry string 64

FortiOS 7.2.1 Log Reference 1506


Fortinet Inc.
Log Field Name Description Data Type Length

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventid Event ID uint32 10

eventtime Event Time, Time when WAF event detected uint64 20

eventtype Event Type string 32

fctuid FortiClient UID string 32

group User Group Name string 512

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log Message string 4096

name Method or custom signature name string 64

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile Full profile name string 64

proto Protocol uint8 3

ratemethod string 4096

rawdata Raw Data string 1024

referralurl string 512

service Service name string 5

sessionid Session ID uint32 10

severity Severity string 6

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

FortiOS 7.2.1 Log Reference 1507


Fortinet Inc.
Log Field Name Description Data Type Length

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log Subtype string 20

time Time string 8

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url URL string 512

user User Name string 256

vd Virtual Domain Name string 32

30252 - LOGID_WAF_CUSTOM_SIGNATURE_PASS

Message ID: 30252


Message Description: LOGID_WAF_CUSTOM_SIGNATURE_PASS
Message Meaning: Web application firewall allowed application by custom signature
Type: WAF
Category: WAF-CUSTOM-SIGNATURE
Severity: Warning

Log Field Name Description Data Type Length

action Status of the session. Uses following definition: - Deny = string 17


blocked by firewall policy. - Start = session start log (special
option to enable logging at start of a session). This means
firewall allowed. - All Others = allowed by Firewall Policy and
the status indicates how it was closed.

agent Agent string 1024

authserver Authentication Server string 64

constraint WAF HTTP protocol restrictions string 4096

date Date string 10

devid Device ID string 16

FortiOS 7.2.1 Log Reference 1508


Fortinet Inc.
Log Field Name Description Data Type Length

direction Direction string 4096

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventid Event ID uint32 10

eventtime Event Time, Time when WAF event detected uint64 20

eventtype Event Type string 32

fctuid FortiClient UID string 32

group User Group Name string 512

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log Message string 4096

name Method or custom signature name string 64

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile Full profile name string 64

proto Protocol uint8 3

ratemethod string 4096

rawdata Raw Data string 1024

referralurl string 512

service Service name string 5

sessionid Session ID uint32 10

severity Severity string 6

FortiOS 7.2.1 Log Reference 1509


Fortinet Inc.
Log Field Name Description Data Type Length

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log Subtype string 20

time Time string 8

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url URL string 512

user User Name string 256

vd Virtual Domain Name string 32

30253 - LOGID_WAF_METHOD_BLOCK

Message ID: 30253


Message Description: LOGID_WAF_METHOD_BLOCK
Message Meaning: Web application firewall blocked application by HTTP method
Type: WAF
Category: WAF-HTTP-METHOD
Severity: Warning

Log Field Name Description Data Type Length

action Status of the session. Uses following definition: - Deny = string 17


blocked by firewall policy. - Start = session start log (special
option to enable logging at start of a session). This means
firewall allowed. - All Others = allowed by Firewall Policy and
the status indicates how it was closed.

agent Agent string 1024

authserver Authentication Server string 64

FortiOS 7.2.1 Log Reference 1510


Fortinet Inc.
Log Field Name Description Data Type Length

constraint WAF HTTP protocol restrictions string 4096

date Date string 10

devid Device ID string 16

direction Direction string 4096

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventid Event ID uint32 10

eventtime Event Time, Time when WAF event detected uint64 20

eventtype Event Type string 32

fctuid FortiClient UID string 32

group User Group Name string 512

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log Message string 4096

name Method or custom signature name string 64

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile Full profile name string 64

proto Protocol uint8 3

ratemethod string 4096

rawdata Raw Data string 1024

referralurl string 512

FortiOS 7.2.1 Log Reference 1511


Fortinet Inc.
Log Field Name Description Data Type Length

service Service name string 5

sessionid Session ID uint32 10

severity Severity string 6

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log Subtype string 20

time Time string 8

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url URL string 512

user User Name string 256

vd Virtual Domain Name string 32

30255 - LOGID_WAF_ADDRESS_LIST_BLOCK

Message ID: 30255


Message Description: LOGID_WAF_ADDRESS_LIST_BLOCK
Message Meaning: Web application firewall blocked application by address list
Type: WAF
Category: WAF-ADDRESS-LIST
Severity: Warning

FortiOS 7.2.1 Log Reference 1512


Fortinet Inc.
Log Field Name Description Data Type Length

action Status of the session. Uses following definition: - Deny = string 17


blocked by firewall policy. - Start = session start log (special
option to enable logging at start of a session). This means
firewall allowed. - All Others = allowed by Firewall Policy and
the status indicates how it was closed.

agent Agent string 1024

authserver Authentication Server string 64

constraint WAF HTTP protocol restrictions string 4096

date Date string 10

devid Device ID string 16

direction Direction string 4096

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventid Event ID uint32 10

eventtime Event Time, Time when WAF event detected uint64 20

eventtype Event Type string 32

fctuid FortiClient UID string 32

group User Group Name string 512

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log Message string 4096

name Method or custom signature name string 64

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

FortiOS 7.2.1 Log Reference 1513


Fortinet Inc.
Log Field Name Description Data Type Length

profile Full profile name string 64

proto Protocol uint8 3

ratemethod string 4096

rawdata Raw Data string 1024

referralurl string 512

service Service name string 5

sessionid Session ID uint32 10

severity Severity string 6

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log Subtype string 20

time Time string 8

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url URL string 512

user User Name string 256

vd Virtual Domain Name string 32

30257 - LOGID_WAF_CONSTRAINTS_BLOCK

Message ID: 30257


Message Description: LOGID_WAF_CONSTRAINTS_BLOCK
Message Meaning: Web application firewall blocked application by HTTP constraints
Type: WAF
Category: WAF-HTTP-CONSTRAINT
Severity: Warning

FortiOS 7.2.1 Log Reference 1514


Fortinet Inc.
Log Field Name Description Data Type Length

action Status of the session. Uses following definition: - Deny = string 17


blocked by firewall policy. - Start = session start log (special
option to enable logging at start of a session). This means
firewall allowed. - All Others = allowed by Firewall Policy and
the status indicates how it was closed.

agent Agent string 1024

authserver Authentication Server string 64

constraint WAF HTTP protocol restrictions string 4096

date Date string 10

devid Device ID string 16

direction Direction string 4096

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventid Event ID uint32 10

eventtime Event Time, Time when WAF event detected uint64 20

eventtype Event Type string 32

fctuid FortiClient UID string 32

group User Group Name string 512

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log Message string 4096

name Method or custom signature name string 64

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

FortiOS 7.2.1 Log Reference 1515


Fortinet Inc.
Log Field Name Description Data Type Length

profile Full profile name string 64

proto Protocol uint8 3

ratemethod string 4096

rawdata Raw Data string 1024

referralurl string 512

service Service name string 5

sessionid Session ID uint32 10

severity Severity string 6

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log Subtype string 20

time Time string 8

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url URL string 512

user User Name string 256

vd Virtual Domain Name string 32

30258 - LOGID_WAF_CONSTRAINTS_PASS

Message ID: 30258


Message Description: LOGID_WAF_CONSTRAINTS_PASS
Message Meaning: Web application firewall allowed application by HTTP constraints
Type: WAF
Category: WAF-HTTP-CONSTRAINT
Severity: Warning

FortiOS 7.2.1 Log Reference 1516


Fortinet Inc.
Log Field Name Description Data Type Length

action Status of the session. Uses following definition: - Deny = string 17


blocked by firewall policy. - Start = session start log (special
option to enable logging at start of a session). This means
firewall allowed. - All Others = allowed by Firewall Policy and
the status indicates how it was closed.

agent Agent string 1024

authserver Authentication Server string 64

constraint WAF HTTP protocol restrictions string 4096

date Date string 10

devid Device ID string 16

direction Direction string 4096

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventid Event ID uint32 10

eventtime Event Time, Time when WAF event detected uint64 20

eventtype Event Type string 32

fctuid FortiClient UID string 32

group User Group Name string 512

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log Message string 4096

name Method or custom signature name string 64

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

FortiOS 7.2.1 Log Reference 1517


Fortinet Inc.
Log Field Name Description Data Type Length

profile Full profile name string 64

proto Protocol uint8 3

ratemethod string 4096

rawdata Raw Data string 1024

referralurl string 512

service Service name string 5

sessionid Session ID uint32 10

severity Severity string 6

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log Subtype string 20

time Time string 8

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url URL string 512

user User Name string 256

vd Virtual Domain Name string 32

30259 - LOGID_WAF_URL_ACCESS_PERMIT

Message ID: 30259


Message Description: LOGID_WAF_URL_ACCESS_PERMIT
Message Meaning: Web application firewall allowed application by URL access permit
Type: WAF
Category: WAF-URL-ACCESS
Severity: Warning

FortiOS 7.2.1 Log Reference 1518


Fortinet Inc.
Log Field Name Description Data Type Length

action Status of the session. Uses following definition: - Deny = string 17


blocked by firewall policy. - Start = session start log (special
option to enable logging at start of a session). This means
firewall allowed. - All Others = allowed by Firewall Policy and
the status indicates how it was closed.

agent Agent string 1024

authserver Authentication Server string 64

constraint WAF HTTP protocol restrictions string 4096

date Date string 10

devid Device ID string 16

direction Direction string 4096

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventid Event ID uint32 10

eventtime Event Time, Time when WAF event detected uint64 20

eventtype Event Type string 32

fctuid FortiClient UID string 32

group User Group Name string 512

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log Message string 4096

name Method or custom signature name string 64

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

FortiOS 7.2.1 Log Reference 1519


Fortinet Inc.
Log Field Name Description Data Type Length

profile Full profile name string 64

proto Protocol uint8 3

ratemethod string 4096

rawdata Raw Data string 1024

referralurl string 512

service Service name string 5

sessionid Session ID uint32 10

severity Severity string 6

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log Subtype string 20

time Time string 8

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url URL string 512

user User Name string 256

vd Virtual Domain Name string 32

30260 - LOGID_WAF_URL_ACCESS_BYPASS

Message ID: 30260


Message Description: LOGID_WAF_URL_ACCESS_BYPASS
Message Meaning: Web application firewall allowed application by URL access bypass
Type: WAF
Category: WAF-URL-ACCESS
Severity: Warning

FortiOS 7.2.1 Log Reference 1520


Fortinet Inc.
Log Field Name Description Data Type Length

action Status of the session. Uses following definition: - Deny = string 17


blocked by firewall policy. - Start = session start log (special
option to enable logging at start of a session). This means
firewall allowed. - All Others = allowed by Firewall Policy and
the status indicates how it was closed.

agent Agent string 1024

authserver Authentication Server string 64

constraint WAF HTTP protocol restrictions string 4096

date Date string 10

devid Device ID string 16

direction Direction string 4096

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventid Event ID uint32 10

eventtime Event Time, Time when WAF event detected uint64 20

eventtype Event Type string 32

fctuid FortiClient UID string 32

group User Group Name string 512

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log Message string 4096

name Method or custom signature name string 64

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

FortiOS 7.2.1 Log Reference 1521


Fortinet Inc.
Log Field Name Description Data Type Length

profile Full profile name string 64

proto Protocol uint8 3

ratemethod string 4096

rawdata Raw Data string 1024

referralurl string 512

service Service name string 5

sessionid Session ID uint32 10

severity Severity string 6

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log Subtype string 20

time Time string 8

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url URL string 512

user User Name string 256

vd Virtual Domain Name string 32

30261 - LOGID_WAF_URL_ACCESS_BLOCK

Message ID: 30261


Message Description: LOGID_WAF_URL_ACCESS_BLOCK
Message Meaning: Web application firewall blocked application by URL access
Type: WAF
Category: WAF-URL-ACCESS
Severity: Warning

FortiOS 7.2.1 Log Reference 1522


Fortinet Inc.
Log Field Name Description Data Type Length

action Status of the session. Uses following definition: - Deny = string 17


blocked by firewall policy. - Start = session start log (special
option to enable logging at start of a session). This means
firewall allowed. - All Others = allowed by Firewall Policy and
the status indicates how it was closed.

agent Agent string 1024

authserver Authentication Server string 64

constraint WAF HTTP protocol restrictions string 4096

date Date string 10

devid Device ID string 16

direction Direction string 4096

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP Address ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventid Event ID uint32 10

eventtime Event Time, Time when WAF event detected uint64 20

eventtype Event Type string 32

fctuid FortiClient UID string 32

group User Group Name string 512

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log Message string 4096

name Method or custom signature name string 64

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

FortiOS 7.2.1 Log Reference 1523


Fortinet Inc.
Log Field Name Description Data Type Length

profile Full profile name string 64

proto Protocol uint8 3

ratemethod string 4096

rawdata Raw Data string 1024

referralurl string 512

service Service name string 5

sessionid Session ID uint32 10

severity Severity string 6

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP Address ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log Subtype string 20

time Time string 8

type Log Type string 16

tz Time zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url URL string 512

user User Name string 256

vd Virtual Domain Name string 32

FortiOS 7.2.1 Log Reference 1524


Fortinet Inc.
Web

12288 - LOG_ID_WEB_CONTENT_BANWORD

Message ID: 12288


Message Description: LOG_ID_WEB_CONTENT_BANWORD
Message Meaning: Web content banned word found
Type: Web
Category: CONTENT
Severity: Warning

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

banword Banned word string 128

contenttype Content Type from HTTP header string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

FortiOS 7.2.1 Log Reference 1525


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

from MMS-only - From/To headers from the email string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

keyword Keyword used for search string 512

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

FortiOS 7.2.1 Log Reference 1526


Fortinet Inc.
Log Field Name Description Data Type Length

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

to MMS-only - From/To headers from the email string 512

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

12290 - LOG_ID_WEB_CONTENT_EXEMPTWORD

Message ID: 12290


Message Description: LOG_ID_WEB_CONTENT_EXEMPTWORD
Message Meaning: Web content exempt word found
Type: Web
Category: CONTENT
Severity: Notice

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

banword Banned word string 128

contenttype Content Type from HTTP header string 64

FortiOS 7.2.1 Log Reference 1527


Fortinet Inc.
Log Field Name Description Data Type Length

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

from MMS-only - From/To headers from the email string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

keyword Keyword used for search string 512

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

FortiOS 7.2.1 Log Reference 1528


Fortinet Inc.
Log Field Name Description Data Type Length

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

to MMS-only - From/To headers from the email string 512

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

FortiOS 7.2.1 Log Reference 1529


Fortinet Inc.
12292 - LOG_ID_WEB_CONTENT_KEYWORD

Message ID: 12292


Message Description: LOG_ID_WEB_CONTENT_KEYWORD
Message Meaning: Message contained a key word in the profile list
Type: Web
Category: CONTENT
Severity: Notice

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

banword Banned word string 128

contenttype Content Type from HTTP header string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

FortiOS 7.2.1 Log Reference 1530


Fortinet Inc.
Log Field Name Description Data Type Length

from MMS-only - From/To headers from the email string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

keyword Keyword used for search string 512

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

FortiOS 7.2.1 Log Reference 1531


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log subtype string 20

time Time string 8

to MMS-only - From/To headers from the email string 512

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

12293 - LOG_ID_WEB_CONTENT_SEARCH

Message ID: 12293


Message Description: LOG_ID_WEB_CONTENT_SEARCH
Message Meaning: Search phrase detected
Type: Web
Category: CONTENT
Severity: Notice

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

banword Banned word string 128

contenttype Content Type from HTTP header string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

FortiOS 7.2.1 Log Reference 1532


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

from MMS-only - From/To headers from the email string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

keyword Keyword used for search string 512

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

FortiOS 7.2.1 Log Reference 1533


Fortinet Inc.
Log Field Name Description Data Type Length

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

to MMS-only - From/To headers from the email string 512

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

12544 - LOG_ID_URL_FILTER_BLOCK

Message ID: 12544


Message Description: LOG_ID_URL_FILTER_BLOCK

FortiOS 7.2.1 Log Reference 1534


Fortinet Inc.
Message Meaning: URL address was blocked because it was found in the URL filter list
Type: Web
Category: URLFILTER
Severity: Warning

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

level Log Level string 11

FortiOS 7.2.1 Log Reference 1535


Fortinet Inc.
Log Field Name Description Data Type Length

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

FortiOS 7.2.1 Log Reference 1536


Fortinet Inc.
Log Field Name Description Data Type Length

url The URL address string 512

urlfilteridx URL filter ID uint32 10

urlfilterlist URL filter list string 64

urlsource URL source string 64

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

12545 - LOG_ID_URL_FILTER_EXEMPT

Message ID: 12545


Message Description: LOG_ID_URL_FILTER_EXEMPT
Message Meaning: URL address was exempted because it was found in the URL filter list
Type: Web
Category: URLFILTER
Severity: Information

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

FortiOS 7.2.1 Log Reference 1537


Fortinet Inc.
Log Field Name Description Data Type Length

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

FortiOS 7.2.1 Log Reference 1538


Fortinet Inc.
Log Field Name Description Data Type Length

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

urlfilteridx URL filter ID uint32 10

urlfilterlist URL filter list string 64

urlsource URL source string 64

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

12546 - LOG_ID_URL_FILTER_ALLOW

Message ID: 12546


Message Description: LOG_ID_URL_FILTER_ALLOW
Message Meaning: URL address was allowed because it was found in the URL filter list
Type: Web
Category: URLFILTER
Severity: Information

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

FortiOS 7.2.1 Log Reference 1539


Fortinet Inc.
Log Field Name Description Data Type Length

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

FortiOS 7.2.1 Log Reference 1540


Fortinet Inc.
Log Field Name Description Data Type Length

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

urlfilteridx URL filter ID uint32 10

urlfilterlist URL filter list string 64

urlsource URL source string 64

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

FortiOS 7.2.1 Log Reference 1541


Fortinet Inc.
12547 - LOG_ID_URL_FILTER_INVALID_HOSTNAME_HTTP_BLK

Message ID: 12547


Message Description: LOG_ID_URL_FILTER_INVALID_HOSTNAME_HTTP_BLK
Message Meaning: The request contained an invalid domain name
Type: Web
Category: URLFILTER
Severity: Notice

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

FortiOS 7.2.1 Log Reference 1542


Fortinet Inc.
Log Field Name Description Data Type Length

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

FortiOS 7.2.1 Log Reference 1543


Fortinet Inc.
Log Field Name Description Data Type Length

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

12548 - LOG_ID_URL_FILTER_INVALID_HOSTNAME_HTTPS_BLK

Message ID: 12548


Message Description: LOG_ID_URL_FILTER_INVALID_HOSTNAME_HTTPS_BLK
Message Meaning: HTTP certificate request contained an invalid domain name
Type: Web
Category: URLFILTER
Severity: Notice

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

FortiOS 7.2.1 Log Reference 1544


Fortinet Inc.
Log Field Name Description Data Type Length

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

FortiOS 7.2.1 Log Reference 1545


Fortinet Inc.
Log Field Name Description Data Type Length

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

12549 - LOG_ID_URL_FILTER_INVALID_HOSTNAME_HTTP_PASS

Message ID: 12549


Message Description: LOG_ID_URL_FILTER_INVALID_HOSTNAME_HTTP_PASS
Message Meaning: HTTP request contained an invalid name so the session has been filtered by IP only
Type: Web
Category: URLFILTER
Severity: Information

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

FortiOS 7.2.1 Log Reference 1546


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

FortiOS 7.2.1 Log Reference 1547


Fortinet Inc.
Log Field Name Description Data Type Length

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

12550 - LOG_ID_URL_FILTER_INVALID_HOSTNAME_HTTPS_PASS

Message ID: 12550


Message Description: LOG_ID_URL_FILTER_INVALID_HOSTNAME_HTTPS_PASS
Message Meaning: HTTPS request contained an invalid name so the session has been filtered by IP only
Type: Web
Category: URLFILTER
Severity: Information

FortiOS 7.2.1 Log Reference 1548


Fortinet Inc.
Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

FortiOS 7.2.1 Log Reference 1549


Fortinet Inc.
Log Field Name Description Data Type Length

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

FortiOS 7.2.1 Log Reference 1550


Fortinet Inc.
12551 - LOG_ID_URL_FILTER_INVALID_HOSTNAME_SNI_BLK

Message ID: 12551


Message Description: LOG_ID_URL_FILTER_INVALID_HOSTNAME_SNI_BLK
Message Meaning: Insufficient resources
Type: Web
Category: URLFILTER
Severity: Notice

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

FortiOS 7.2.1 Log Reference 1551


Fortinet Inc.
Log Field Name Description Data Type Length

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

FortiOS 7.2.1 Log Reference 1552


Fortinet Inc.
Log Field Name Description Data Type Length

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

12552 - LOG_ID_URL_FILTER_INVALID_HOSTNAME_SNI_PASS

Message ID: 12552


Message Description: LOG_ID_URL_FILTER_INVALID_HOSTNAME_SNI_PASS
Message Meaning: Getting the host name failed
Type: Web
Category: URLFILTER
Severity: Information

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

FortiOS 7.2.1 Log Reference 1553


Fortinet Inc.
Log Field Name Description Data Type Length

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

FortiOS 7.2.1 Log Reference 1554


Fortinet Inc.
Log Field Name Description Data Type Length

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

12553 - LOG_ID_URL_FILTER_INVALID_CERT

Message ID: 12553


Message Description: LOG_ID_URL_FILTER_INVALID_CERT
Message Meaning: Server certificate validation failed
Type: Web
Category: URLFILTER
Severity: Notice

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

FortiOS 7.2.1 Log Reference 1555


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

FortiOS 7.2.1 Log Reference 1556


Fortinet Inc.
Log Field Name Description Data Type Length

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

12554 - LOG_ID_URL_FILTER_INVALID_SESSION

Message ID: 12554


Message Description: LOG_ID_URL_FILTER_INVALID_SESSION
Message Meaning: SSL session blocked because its identification number was unknown
Type: Web
Category: URLFILTER
Severity: Notice

FortiOS 7.2.1 Log Reference 1557


Fortinet Inc.
Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

FortiOS 7.2.1 Log Reference 1558


Fortinet Inc.
Log Field Name Description Data Type Length

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

FortiOS 7.2.1 Log Reference 1559


Fortinet Inc.
12555 - LOG_ID_URL_FILTER_SRV_CERT_ERR_BLK

Message ID: 12555


Message Description: LOG_ID_URL_FILTER_SRV_CERT_ERR_BLK
Message Meaning: SSL session blocked
Type: Web
Category: URLFILTER
Severity: Notice

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

FortiOS 7.2.1 Log Reference 1560


Fortinet Inc.
Log Field Name Description Data Type Length

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

FortiOS 7.2.1 Log Reference 1561


Fortinet Inc.
Log Field Name Description Data Type Length

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

12556 - LOG_ID_URL_FILTER_SRV_CERT_ERR_PASS

Message ID: 12556


Message Description: LOG_ID_URL_FILTER_SRV_CERT_ERR_PASS
Message Meaning: SSL session ignored
Type: Web
Category: URLFILTER
Severity: Notice

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

FortiOS 7.2.1 Log Reference 1562


Fortinet Inc.
Log Field Name Description Data Type Length

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

FortiOS 7.2.1 Log Reference 1563


Fortinet Inc.
Log Field Name Description Data Type Length

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

12557 - LOG_ID_URL_FILTER_FAMS_NOT_ACTIVE

Message ID: 12557


Message Description: LOG_ID_URL_FILTER_FAMS_NOT_ACTIVE
Message Meaning: The FortiGuard Analysis and Management Service is not active. You must enable this service
Type: Web
Category: URLFILTER
Severity: Critical

Log Field Name Description Data Type Length

date Date string 10

devid Device ID string 16

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

level Log Level string 11

logid Log ID string 10

msg Log message string 512

FortiOS 7.2.1 Log Reference 1564


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log subtype string 20

time Time string 8

type Log type string 16

tz Time Zone string 5

vd Virtual domain name string 32

12558 - LOG_ID_URL_FILTER_RATING_ERR

Message ID: 12558


Message Description: LOG_ID_URL_FILTER_RATING_ERR
Message Meaning: Rating error occurred
Type: Web
Category: URLFILTER
Severity: Information

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

hostname The host name of a URL string 256

level Log Level string 11

logid Log ID string 10

msg Log message string 512

FortiOS 7.2.1 Log Reference 1565


Fortinet Inc.
Log Field Name Description Data Type Length

srcdomain string 255

srcip Source IP ip 39

srcport Source Port uint16 5

subtype Log subtype string 20

time Time string 8

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

error URL rating error message string 256

urltype URL filter type string 8

12559 - LOG_ID_URL_FILTER_PASS

Message ID: 12559


Message Description: LOG_ID_URL_FILTER_PASS
Message Meaning: URL passed because it was in the URL filter list
Type: Web
Category: URLFILTER
Severity: Information

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

FortiOS 7.2.1 Log Reference 1566


Fortinet Inc.
Log Field Name Description Data Type Length

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

FortiOS 7.2.1 Log Reference 1567


Fortinet Inc.
Log Field Name Description Data Type Length

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

urlfilteridx URL filter ID uint32 10

urlfilterlist URL filter list string 64

urlsource URL source string 64

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

12560 - LOG_ID_URL_WISP_BLOCK

Message ID: 12560


Message Description: LOG_ID_URL_WISP_BLOCK
Message Meaning: URL blocked by Websense service

FortiOS 7.2.1 Log Reference 1568


Fortinet Inc.
Type: Web
Category: URLFILTER
Severity: Warning

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log message string 512

FortiOS 7.2.1 Log Reference 1569


Fortinet Inc.
Log Field Name Description Data Type Length

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

FortiOS 7.2.1 Log Reference 1570


Fortinet Inc.
Log Field Name Description Data Type Length

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

12561 - LOG_ID_URL_WISP_REDIR

Message ID: 12561


Message Description: LOG_ID_URL_WISP_REDIR
Message Meaning: URL blocked with redirect message by Websense service
Type: Web
Category: URLFILTER
Severity: Warning

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

FortiOS 7.2.1 Log Reference 1571


Fortinet Inc.
Log Field Name Description Data Type Length

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

FortiOS 7.2.1 Log Reference 1572


Fortinet Inc.
Log Field Name Description Data Type Length

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

12562 - LOG_ID_URL_WISP_ALLOW

Message ID: 12562


Message Description: LOG_ID_URL_WISP_ALLOW
Message Meaning: URL allowed by Websense service
Type: Web
Category: URLFILTER
Severity: Information

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

FortiOS 7.2.1 Log Reference 1573


Fortinet Inc.
Log Field Name Description Data Type Length

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

FortiOS 7.2.1 Log Reference 1574


Fortinet Inc.
Log Field Name Description Data Type Length

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

12688 - LOG_ID_WEB_SSL_EXEMPT

Message ID: 12688


Message Description: LOG_ID_WEB_SSL_EXEMPT
Message Meaning: URL address was exempted because it was found in the ssl-exempt
Type: Web
Category: SSL-EXEMPT
Severity: Information

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

FortiOS 7.2.1 Log Reference 1575


Fortinet Inc.
Log Field Name Description Data Type Length

cat Web category ID uint8 3

catdesc Web category description string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

FortiOS 7.2.1 Log Reference 1576


Fortinet Inc.
Log Field Name Description Data Type Length

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

quotamax Maximum quota allowed - in seconds if time-based - in bytes if uint64 20


traffic-based

quotatype Quota type string 16

quotaused Quota used - in seconds if time-based - in bytes if traffic-based uint64 20

ratemethod string 6

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

FortiOS 7.2.1 Log Reference 1577


Fortinet Inc.
Log Field Name Description Data Type Length

url The URL address string 512

urlsource URL source string 64

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

12800 - LOG_ID_WEB_FTGD_ERR

Message ID: 12800


Message Description: LOG_ID_WEB_FTGD_ERR
Message Meaning: Rating error occurred (error)
Type: Web
Category: FTGD_ERR
Severity: Error

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

FortiOS 7.2.1 Log Reference 1578


Fortinet Inc.
Log Field Name Description Data Type Length

dstuuid string 37

error URL rating error message string 256

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

FortiOS 7.2.1 Log Reference 1579


Fortinet Inc.
Log Field Name Description Data Type Length

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

12801 - LOG_ID_WEB_FTGD_WARNING

Message ID: 12801


Message Description: LOG_ID_WEB_FTGD_WARNING
Message Meaning: Rating error occurred (warning)
Type: Web
Category: FTGD_ERR
Severity: Warning

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

FortiOS 7.2.1 Log Reference 1580


Fortinet Inc.
Log Field Name Description Data Type Length

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

error URL rating error message string 256

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

FortiOS 7.2.1 Log Reference 1581


Fortinet Inc.
Log Field Name Description Data Type Length

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

12802 - LOG_ID_WEB_FTGD_QUOTA

Message ID: 12802


Message Description: LOG_ID_WEB_FTGD_QUOTA
Message Meaning: Daily FortiGuard quota status

FortiOS 7.2.1 Log Reference 1582


Fortinet Inc.
Type: Web
Category: FTGD_QUOTA
Severity: Information

Log Field Name Description Data Type Length

catdesc Web category description string 64

date Date string 10

devid Device ID string 16

dstuser string 256

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

level Log Level string 11

logid Log ID string 10

profile Web Filter profile name string 64

quotaexceeded Quota has been exceeded string 3

quotamax Maximum quota allowed - in seconds if time-based - in bytes if uint64 20


traffic-based

quotatype Quota type string 16

quotaused Quota used - in seconds if time-based - in bytes if traffic-based uint64 20

subtype Log subtype string 20

time Time string 8

type Log type string 16

tz Time Zone string 5

user User name string 256

vd Virtual domain name string 32

13056 - LOG_ID_WEB_FTGD_CAT_BLK

Message ID: 13056


Message Description: LOG_ID_WEB_FTGD_CAT_BLK
Message Meaning: URL belongs to an blocked category within the firewall policy
Type: Web
Category: FTGD_BLK
Severity: Warning

FortiOS 7.2.1 Log Reference 1583


Fortinet Inc.
Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

cat Web category ID uint8 3

catdesc Web category description string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

level Log Level string 11

logid Log ID string 10

msg Log message string 512

FortiOS 7.2.1 Log Reference 1584


Fortinet Inc.
Log Field Name Description Data Type Length

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

quotamax Maximum quota allowed - in seconds if time-based - in bytes if uint64 20


traffic-based

quotatype Quota type string 16

quotaused Quota used - in seconds if time-based - in bytes if traffic-based uint64 20

ratemethod string 6

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

FortiOS 7.2.1 Log Reference 1585


Fortinet Inc.
Log Field Name Description Data Type Length

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

urlsource URL source string 64

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

13057 - LOG_ID_WEB_FTGD_CAT_WARN

Message ID: 13057


Message Description: LOG_ID_WEB_FTGD_CAT_WARN
Message Meaning: URL belongs to a category with warnings enabled
Type: Web
Category: FTGD_BLK
Severity: Warning

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

cat Web category ID uint8 3

catdesc Web category description string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

FortiOS 7.2.1 Log Reference 1586


Fortinet Inc.
Log Field Name Description Data Type Length

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

quotamax Maximum quota allowed - in seconds if time-based - in bytes if uint64 20


traffic-based

quotatype Quota type string 16

quotaused Quota used - in seconds if time-based - in bytes if traffic-based uint64 20

ratemethod string 6

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

FortiOS 7.2.1 Log Reference 1587


Fortinet Inc.
Log Field Name Description Data Type Length

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

urlsource URL source string 64

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

13312 - LOG_ID_WEB_FTGD_CAT_ALLOW

Message ID: 13312


Message Description: LOG_ID_WEB_FTGD_CAT_ALLOW
Message Meaning: URL belongs to an allowed category within the firewall policy
Type: Web
Category: FTGD_ALLOW

FortiOS 7.2.1 Log Reference 1588


Fortinet Inc.
Severity: Notice

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

cat Web category ID uint8 3

catdesc Web category description string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

level Log Level string 11

logid Log ID string 10

FortiOS 7.2.1 Log Reference 1589


Fortinet Inc.
Log Field Name Description Data Type Length

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

quotamax Maximum quota allowed - in seconds if time-based - in bytes if uint64 20


traffic-based

quotatype Quota type string 16

quotaused Quota used - in seconds if time-based - in bytes if traffic-based uint64 20

ratemethod string 6

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

FortiOS 7.2.1 Log Reference 1590


Fortinet Inc.
Log Field Name Description Data Type Length

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

urlsource URL source string 64

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

13315 - LOG_ID_WEB_FTGD_QUOTA_COUNTING

Message ID: 13315


Message Description: LOG_ID_WEB_FTGD_QUOTA_COUNTING
Message Meaning: FortiGuard web filter category quota counting log message
Type: Web
Category: FTGD_QUOTA_COUNTING
Severity: Notice

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

cat Web category ID uint8 3

catdesc Web category description string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

FortiOS 7.2.1 Log Reference 1591


Fortinet Inc.
Log Field Name Description Data Type Length

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

quotamax Maximum quota allowed - in seconds if time-based - in bytes if uint64 20


traffic-based

quotatype Quota type string 16

quotaused Quota used - in seconds if time-based - in bytes if traffic-based uint64 20

ratemethod string 6

FortiOS 7.2.1 Log Reference 1592


Fortinet Inc.
Log Field Name Description Data Type Length

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

urlsource URL source string 64

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

13317 - LOG_ID_WEB_URL

Message ID: 13317


Message Description: LOG_ID_WEB_URL

FortiOS 7.2.1 Log Reference 1593


Fortinet Inc.
Message Meaning: URL has been visited
Type: Web
Category: URLMONITOR
Severity: Notice

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

cat Web category ID uint8 3

catdesc Web category description string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

FortiOS 7.2.1 Log Reference 1594


Fortinet Inc.
Log Field Name Description Data Type Length

initiator The initiator user for override string 64

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

quotamax Maximum quota allowed - in seconds if time-based - in bytes if uint64 20


traffic-based

quotatype Quota type string 16

quotaused Quota used - in seconds if time-based - in bytes if traffic-based uint64 20

ratemethod string 6

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

FortiOS 7.2.1 Log Reference 1595


Fortinet Inc.
Log Field Name Description Data Type Length

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

urlsource URL source string 64

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

13568 - LOG_ID_WEB_SCRIPTFILTER_ACTIVEX

Message ID: 13568


Message Description: LOG_ID_WEB_SCRIPTFILTER_ACTIVEX
Message Meaning: ActiveX script removed
Type: Web
Category: ACTIVEXFILTER
Severity: Notice

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

FortiOS 7.2.1 Log Reference 1596


Fortinet Inc.
Log Field Name Description Data Type Length

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

filtertype Filter type string 10

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

FortiOS 7.2.1 Log Reference 1597


Fortinet Inc.
Log Field Name Description Data Type Length

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

13573 - LOG_ID_WEB_SCRIPTFILTER_COOKIE

Message ID: 13573


Message Description: LOG_ID_WEB_SCRIPTFILTER_COOKIE
Message Meaning: Cookie removed
Type: Web
Category: COOKIEFILTER
Severity: Notice

FortiOS 7.2.1 Log Reference 1598


Fortinet Inc.
Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

filtertype Filter type string 10

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

FortiOS 7.2.1 Log Reference 1599


Fortinet Inc.
Log Field Name Description Data Type Length

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

FortiOS 7.2.1 Log Reference 1600


Fortinet Inc.
13584 - LOG_ID_WEB_SCRIPTFILTER_APPLET

Message ID: 13584


Message Description: LOG_ID_WEB_SCRIPTFILTER_APPLET
Message Meaning: Java applet removed
Type: Web
Category: APPLETFILTER
Severity: Notice

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

filtertype Filter type string 10

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

FortiOS 7.2.1 Log Reference 1601


Fortinet Inc.
Log Field Name Description Data Type Length

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

FortiOS 7.2.1 Log Reference 1602


Fortinet Inc.
Log Field Name Description Data Type Length

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

13600 - LOG_ID_WEB_SCRIPTFILTER_OTHER

Message ID: 13600


Message Description: LOG_ID_WEB_SCRIPTFILTER_OTHER
Message Meaning: Script entity removed
Type: Web
Category: SCRIPTFILTER
Severity: Notice

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

FortiOS 7.2.1 Log Reference 1603


Fortinet Inc.
Log Field Name Description Data Type Length

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

filtertype Filter type string 10

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

FortiOS 7.2.1 Log Reference 1604


Fortinet Inc.
Log Field Name Description Data Type Length

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

13601 - LOG_ID_WEB_WF_COOKIE

Message ID: 13601


Message Description: LOG_ID_WEB_WF_COOKIE
Message Meaning: Cookie removed entirely
Type: Web
Category: COOKIEFILTER
Severity: Notice

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

FortiOS 7.2.1 Log Reference 1605


Fortinet Inc.
Log Field Name Description Data Type Length

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

filtertype Filter type string 10

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

FortiOS 7.2.1 Log Reference 1606


Fortinet Inc.
Log Field Name Description Data Type Length

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

13602 - LOG_ID_WEB_WF_REFERER

Message ID: 13602

FortiOS 7.2.1 Log Reference 1607


Fortinet Inc.
Message Description: LOG_ID_WEB_WF_REFERER
Message Meaning: Referrer removed from request
Type: Web
Category: COOKIEFILTER
Severity: Notice

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

filtertype Filter type string 10

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

FortiOS 7.2.1 Log Reference 1608


Fortinet Inc.
Log Field Name Description Data Type Length

initiator The initiator user for override string 64

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

FortiOS 7.2.1 Log Reference 1609


Fortinet Inc.
Log Field Name Description Data Type Length

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

13603 - LOG_ID_WEB_WF_COMMAND_BLOCK

Message ID: 13603


Message Description: LOG_ID_WEB_WF_COMMAND_BLOCK
Message Meaning: Command blocked
Type: Web
Category: WEBFILTER_COMMAND_BLOCK
Severity: Warning

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

FortiOS 7.2.1 Log Reference 1610


Fortinet Inc.
Log Field Name Description Data Type Length

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

FortiOS 7.2.1 Log Reference 1611


Fortinet Inc.
Log Field Name Description Data Type Length

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

13616 - LOG_ID_CONTENT_TYPE_BLOCK

Message ID: 13616


Message Description: LOG_ID_CONTENT_TYPE_BLOCK
Message Meaning: Blocked by HTTP header content type
Type: Web
Category: CONTENT
Severity: Warning

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

banword Banned word string 128

contenttype Content Type from HTTP header string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

FortiOS 7.2.1 Log Reference 1612


Fortinet Inc.
Log Field Name Description Data Type Length

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

from MMS-only - From/To headers from the email string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

keyword Keyword used for search string 512

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

FortiOS 7.2.1 Log Reference 1613


Fortinet Inc.
Log Field Name Description Data Type Length

proto Protocol number uint8 3

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

to MMS-only - From/To headers from the email string 512

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

13632 - LOGID_HTTP_HDR_CHG_REQ

Message ID: 13632

FortiOS 7.2.1 Log Reference 1614


Fortinet Inc.
Message Description: LOGID_HTTP_HDR_CHG_REQ
Message Meaning: Depends on info in msg field
Type: Web
Category: HTTP_HEADER_CHANGE
Severity: Notice

Log Field Name Description Data Type Length

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

chgheaders Change headers string 1024

date Date string 10

devid Device ID string 16

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

group User group name string 512

httpmethod string 20

level Log Level string 11

logid Log ID string 10

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

referralurl Referrer URI string 512

service Service name string 36

FortiOS 7.2.1 Log Reference 1615


Fortinet Inc.
Log Field Name Description Data Type Length

sessionid Session ID uint32 10

srccountry string 64

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

transid Transaction ID uint32 10

type Log type string 16

tz Time Zone string 5

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

13633 - LOGID_HTTP_HDR_CHG_RESP

Message ID: 13633


Message Description: LOGID_HTTP_HDR_CHG_RESP
Message Meaning: Depends on info in msg field
Type: Web
Category: HTTP_HEADER_CHANGE
Severity: Notice

Log Field Name Description Data Type Length

agent User agent - eg. agent="Mozilla/5.0" string 1024

authserver Authentication server for the user string 64

chgheaders Change headers string 1024

date Date string 10

devid Device ID string 16

dstauthserver string 64

FortiOS 7.2.1 Log Reference 1616


Fortinet Inc.
Log Field Name Description Data Type Length

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

group User group name string 512

httpmethod string 20

level Log Level string 11

logid Log ID string 10

policyid Policy ID uint32 10

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

referralurl Referrer URI string 512

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

transid Transaction ID uint32 10

FortiOS 7.2.1 Log Reference 1617


Fortinet Inc.
Log Field Name Description Data Type Length

type Log type string 16

tz Time Zone string 5

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

13648 - LOG_ID_WEB_WF_ANTIPHISH_MATCH_URL_ALLOW

Message ID: 13648


Message Description: LOG_ID_WEB_WF_ANTIPHISH_MATCH_URL_ALLOW
Message Meaning: Antiphishing matched a URL filter rule without blocking the request.
Type: Web
Category: ANTIPHISHING
Severity: Warning

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

antiphishdc string 64

antiphishrule string 64

authserver Authentication server for the user string 64

cat Web category ID uint8 3

catdesc Web category description string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

FortiOS 7.2.1 Log Reference 1618


Fortinet Inc.
Log Field Name Description Data Type Length

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

ratemethod string 6

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

FortiOS 7.2.1 Log Reference 1619


Fortinet Inc.
Log Field Name Description Data Type Length

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

13649 - LOG_ID_WEB_WF_ANTIPHISH_MATCH_FTGD_ALLOW

Message ID: 13649


Message Description: LOG_ID_WEB_WF_ANTIPHISH_MATCH_FTGD_ALLOW
Message Meaning: Antiphishing matched a Fortiguard category rule without blocking the request.
Type: Web
Category: ANTIPHISHING
Severity: Warning

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

FortiOS 7.2.1 Log Reference 1620


Fortinet Inc.
Log Field Name Description Data Type Length

antiphishdc string 64

antiphishrule string 64

authserver Authentication server for the user string 64

cat Web category ID uint8 3

catdesc Web category description string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

level Log Level string 11

logid Log ID string 10

msg Log message string 512

FortiOS 7.2.1 Log Reference 1621


Fortinet Inc.
Log Field Name Description Data Type Length

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

ratemethod string 6

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

FortiOS 7.2.1 Log Reference 1622


Fortinet Inc.
Log Field Name Description Data Type Length

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

13650 - LOG_ID_WEB_WF_ANTIPHISH_MATCH_DEFAULT_ALLOW

Message ID: 13650


Message Description: LOG_ID_WEB_WF_ANTIPHISH_MATCH_DEFAULT_ALLOW
Message Meaning: Antiphishing reached default action without blocking the request.
Type: Web
Category: ANTIPHISHING
Severity: Warning

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

antiphishdc string 64

antiphishrule string 64

authserver Authentication server for the user string 64

cat Web category ID uint8 3

catdesc Web category description string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

FortiOS 7.2.1 Log Reference 1623


Fortinet Inc.
Log Field Name Description Data Type Length

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

ratemethod string 6

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

FortiOS 7.2.1 Log Reference 1624


Fortinet Inc.
Log Field Name Description Data Type Length

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

13651 - LOG_ID_WEB_WF_ANTIPHISH_MATCH_URL_BLOCK

Message ID: 13651


Message Description: LOG_ID_WEB_WF_ANTIPHISH_MATCH_URL_BLOCK
Message Meaning: Antiphishing matched a URL filter rule and blocked the request.
Type: Web
Category: ANTIPHISHING
Severity: Warning

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

antiphishdc string 64

antiphishrule string 64

FortiOS 7.2.1 Log Reference 1625


Fortinet Inc.
Log Field Name Description Data Type Length

authserver Authentication server for the user string 64

cat Web category ID uint8 3

catdesc Web category description string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

FortiOS 7.2.1 Log Reference 1626


Fortinet Inc.
Log Field Name Description Data Type Length

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

ratemethod string 6

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

FortiOS 7.2.1 Log Reference 1627


Fortinet Inc.
13652 - LOG_ID_WEB_WF_ANTIPHISH_MATCH_FTGD_BLOCK

Message ID: 13652


Message Description: LOG_ID_WEB_WF_ANTIPHISH_MATCH_FTGD_BLOCK
Message Meaning: Antiphishing matched a Fortiguard category rule and blocked the request.
Type: Web
Category: ANTIPHISHING
Severity: Warning

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

antiphishdc string 64

antiphishrule string 64

authserver Authentication server for the user string 64

cat Web category ID uint8 3

catdesc Web category description string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

FortiOS 7.2.1 Log Reference 1628


Fortinet Inc.
Log Field Name Description Data Type Length

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

ratemethod string 6

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

FortiOS 7.2.1 Log Reference 1629


Fortinet Inc.
Log Field Name Description Data Type Length

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

13653 - LOG_ID_WEB_WF_ANTIPHISH_MATCH_DEFAULT_BLOCK

Message ID: 13653


Message Description: LOG_ID_WEB_WF_ANTIPHISH_MATCH_DEFAULT_BLOCK
Message Meaning: Antiphishing reached default action and blocked the request.
Type: Web
Category: ANTIPHISHING
Severity: Warning

Log Field Name Description Data Type Length

action Security action performed by WF: blocked - url is blocked by string 11


webfilter passthrough - url is allowed by webfilter

agent User agent - eg. agent="Mozilla/5.0" string 1024

antiphishdc string 64

antiphishrule string 64

authserver Authentication server for the user string 64

cat Web category ID uint8 3

catdesc Web category description string 64

craction Client Reputation Action uint32 10

crlevel Client Reputation level string 10

FortiOS 7.2.1 Log Reference 1630


Fortinet Inc.
Log Field Name Description Data Type Length

crscore Client Reputation Score uint32 10

date Date string 10

devid Device ID string 16

direction Direction of the web traffic string 8

dstauthserver string 64

dstcountry string 64

dstintf Destination Interface string 32

dstintfrole Destination Interface's assigned role (LAN, WAN, etc.) string 10

dstip Destination IP ip 39

dstport Destination Port uint16 5

dstuser string 256

dstuuid string 37

eventtime Web Filter event time uint64 20

eventtype Web Filter event type string 32

fctuid FortiClient UID string 32

forwardedfor X-Forwarded-For HTTP header string 128

group User group name string 512

hostname The host name of a URL string 256

httpmethod string 20

initiator The initiator user for override string 64

level Log Level string 11

logid Log ID string 10

msg Log message string 512

policyid Policy ID uint32 10

policymode string 8

policytype string 24

poluuid string 37

profile Web Filter profile name string 64

proto Protocol number uint8 3

ratemethod string 6

FortiOS 7.2.1 Log Reference 1631


Fortinet Inc.
Log Field Name Description Data Type Length

rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for

rcvdbyte Received Bytes uint64 20

referralurl Referrer URI string 512

reqtype Request type string 8

sentbyte Sent Bytes uint64 20

service Service name string 36

sessionid Session ID uint32 10

srccountry string 64

srcdomain string 255

srcintf Source Interface string 32

srcintfrole Source Interface's assigned role (LAN, WAN, etc.) string 10

srcip Source IP ip 39

srcport Source Port uint16 5

srcuuid string 37

subtype Log subtype string 20

time Time string 8

trueclntip True-Client-IP HTTP header ip 39

type Log type string 16

tz Time Zone string 5

unauthuser Unauthenticated user string 66

unauthusersource Unauthenticated user source string 66

url The URL address string 512

user User name string 256

vd Virtual domain name string 32

vrf Virtual router forwarding uint8 3

13664 - LOG_ID_VIDEOFILTER_CATEGORY_BLOCK

Message ID: 13664


Message Description: LOG_ID_VIDEOFILTER_CATEGORY_BLOCK
Message Meaning: Video category is blocked.

FortiOS 7.2.1 Log Reference 1632


Fortinet Inc.
Type: Web
Category: VIDEOFILTER-CATEGORY
Severity: Warning

Log Field Name Description Data Type Length

action string 11

agent User agent - eg. agent="Mozilla/5.0" string 1024

date string 10

devid string 16

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

eventtime uint64 20

eventtype string 32

group string 512

hostname string 256

httpmethod string 20

level string 11

logid string 10

msg string 512

policyid uint32 10

profile string 64

proto uint8 3

referralurl Referrer URI string 512

service string 36

sessionid uint32 10

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

subtype string 20

FortiOS 7.2.1 Log Reference 1633


Fortinet Inc.
Log Field Name Description Data Type Length

time string 8

type string 16

tz string 5

url string 512

user string 256

vd string 32

videocategoryid uint32 10

videocategoryname string 256

videochannelid string 512

videoid string 512

videoinfosource string 10

vrf uint8 3

13665 - LOG_ID_VIDEOFILTER_CATEGORY_MONITOR

Message ID: 13665


Message Description: LOG_ID_VIDEOFILTER_CATEGORY_MONITOR
Message Meaning: Video category is monitored
Type: Web
Category: VIDEOFILTER-CATEGORY
Severity: Notice

Log Field Name Description Data Type Length

action string 11

agent User agent - eg. agent="Mozilla/5.0" string 1024

date string 10

devid string 16

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

FortiOS 7.2.1 Log Reference 1634


Fortinet Inc.
Log Field Name Description Data Type Length

eventtime uint64 20

eventtype string 32

group string 512

hostname string 256

httpmethod string 20

level string 11

logid string 10

msg string 512

policyid uint32 10

profile string 64

proto uint8 3

referralurl Referrer URI string 512

service string 36

sessionid uint32 10

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

subtype string 20

time string 8

type string 16

tz string 5

url string 512

user string 256

vd string 32

videocategoryid uint32 10

videocategoryname string 256

videochannelid string 512

videoid string 512

videoinfosource string 10

vrf uint8 3

FortiOS 7.2.1 Log Reference 1635


Fortinet Inc.
13666 - LOG_ID_VIDEOFILTER_CATEGORY_ALLOW

Message ID: 13666


Message Description: LOG_ID_VIDEOFILTER_CATEGORY_ALLOW
Message Meaning: Video category is allowed
Type: Web
Category: VIDEOFILTER-CATEGORY
Severity: Notice

Log Field Name Description Data Type Length

action string 11

agent User agent - eg. agent="Mozilla/5.0" string 1024

date string 10

devid string 16

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

eventtime uint64 20

eventtype string 32

group string 512

hostname string 256

httpmethod string 20

level string 11

logid string 10

msg string 512

policyid uint32 10

profile string 64

proto uint8 3

referralurl Referrer URI string 512

service string 36

sessionid uint32 10

FortiOS 7.2.1 Log Reference 1636


Fortinet Inc.
Log Field Name Description Data Type Length

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

subtype string 20

time string 8

type string 16

tz string 5

url string 512

user string 256

vd string 32

videocategoryid uint32 10

videocategoryname string 256

videochannelid string 512

videoid string 512

videoinfosource string 10

vrf uint8 3

13680 - LOG_ID_VIDEOFILTER_CHANNEL_BLOCK

Message ID: 13680


Message Description: LOG_ID_VIDEOFILTER_CHANNEL_BLOCK
Message Meaning: Video channel is blocked.
Type: Web
Category: VIDEOFILTER-CHANNEL
Severity: Warning

Log Field Name Description Data Type Length

action string 11

agent User agent - eg. agent="Mozilla/5.0" string 1024

date string 10

devid string 16

FortiOS 7.2.1 Log Reference 1637


Fortinet Inc.
Log Field Name Description Data Type Length

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

eventtime uint64 20

eventtype string 32

group string 512

hostname string 256

httpmethod string 20

level string 11

logid string 10

msg string 512

policyid uint32 10

profile string 64

proto uint8 3

referralurl Referrer URI string 512

service string 36

sessionid uint32 10

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

subtype string 20

time string 8

type string 16

tz string 5

url string 512

user string 256

vd string 32

FortiOS 7.2.1 Log Reference 1638


Fortinet Inc.
Log Field Name Description Data Type Length

videocategoryid uint32 10

videocategoryname string 256

videochannelid string 512

videoid string 512

videoinfosource string 10

vrf uint8 3

13681 - LOG_ID_VIDEOFILTER_CHANNEL_MONITOR

Message ID: 13681


Message Description: LOG_ID_VIDEOFILTER_CHANNEL_MONITOR
Message Meaning: Video channel is monitored
Type: Web
Category: VIDEOFILTER-CHANNEL
Severity: Notice

Log Field Name Description Data Type Length

action string 11

agent User agent - eg. agent="Mozilla/5.0" string 1024

date string 10

devid string 16

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

eventtime uint64 20

eventtype string 32

group string 512

hostname string 256

httpmethod string 20

level string 11

FortiOS 7.2.1 Log Reference 1639


Fortinet Inc.
Log Field Name Description Data Type Length

logid string 10

msg string 512

policyid uint32 10

profile string 64

proto uint8 3

referralurl Referrer URI string 512

service string 36

sessionid uint32 10

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

subtype string 20

time string 8

type string 16

tz string 5

url string 512

user string 256

vd string 32

videocategoryid uint32 10

videocategoryname string 256

videochannelid string 512

videoid string 512

videoinfosource string 10

vrf uint8 3

13682 - LOG_ID_VIDEOFILTER_CHANNEL_ALLOW

Message ID: 13682


Message Description: LOG_ID_VIDEOFILTER_CHANNEL_ALLOW
Message Meaning: Video channel is allowed
Type: Web
Category: VIDEOFILTER-CHANNEL

FortiOS 7.2.1 Log Reference 1640


Fortinet Inc.
Severity: Notice

Log Field Name Description Data Type Length

action string 11

agent User agent - eg. agent="Mozilla/5.0" string 1024

date string 10

devid string 16

dstintf string 32

dstintfrole string 10

dstip ip 39

dstport uint16 5

dstuser string 256

eventtime uint64 20

eventtype string 32

group string 512

hostname string 256

httpmethod string 20

level string 11

logid string 10

msg string 512

policyid uint32 10

profile string 64

proto uint8 3

referralurl Referrer URI string 512

service string 36

sessionid uint32 10

srcintf string 32

srcintfrole string 10

srcip ip 39

srcport uint16 5

subtype string 20

time string 8

type string 16

FortiOS 7.2.1 Log Reference 1641


Fortinet Inc.
Log Field Name Description Data Type Length

tz string 5

url string 512

user string 256

vd string 32

videocategoryid uint32 10

videocategoryname string 256

videochannelid string 512

videoid string 512

videoinfosource string 10

vrf uint8 3

FortiOS 7.2.1 Log Reference 1642


Fortinet Inc.
www.fortinet.com

Copyright© 2023 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein
may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were
attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance
results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract,
signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only
the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal
conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change,
modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.

You might also like