FortiOS 7.2.1 Log Reference
FortiOS 7.2.1 Log Reference
FortiOS 7.2.1
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
NSE INSTITUTE
https://training.fortinet.com
FORTIGUARD CENTER
https://www.fortiguard.com
FEEDBACK
Email: [email protected]
Change Log 31
Introduction 32
Before you begin 32
What's new 33
FortiOS 7.2.1 33
FortiOS 7.2.0 37
Log types and subtypes 42
Type 42
Subtype 42
List of log types and subtypes 42
UTM log subtypes 43
FortiOS priority levels 45
Log field format 46
Log schema structure 47
Log message fields 47
Log ID numbers 50
Log ID definitions 51
FortiGuard web filter categories 54
CEF support 57
FortiOS to CEF log field mapping guidelines 57
CEF priority levels 57
Examples of CEF support 58
Traffic log support for CEF 58
Event log support for CEF 60
Antivirus log support for CEF 61
Webfilter log support for CEF 62
IPS log support for CEF 63
Email Spamfilter log support for CEF 63
Anomaly log support for CEF 64
VoIP log support for CEF 64
DLP log support for CEF 65
Application log support for CEF 66
WAF log support for CEF 66
DNS log support for CEF 66
SSH log support for CEF 67
UTM extended logging 68
Enabling extended logging 68
Extended logging option in UTM profiles 68
Syslog server mode 69
Example of an extended log 69
Log Messages 70
Anomaly 71
This document provides information about all the log messages applicable to the FortiGate devices running FortiOS
version 7.2.1 or higher. The logs are intended for administrators to use as reference for more information about a specific
log entry and message generated by FortiOS.
This document also provides information about log fields when FortiOS sends log messages to remote syslog servers in
Common Event Format (CEF). See CEF support on page 57. It also describes how to enable extended logging. See
UTM extended logging on page 68.
Performance statistics are not logged to disk. Performance statistics can be received by a
syslog server or by FortiAnalyzer.
Before you begin using this reference, read the following notes:
l Information in this document applies to all FortiGate units that are currently running FortiOS 7.2.1 or higher.
l Ensure that you have enabled logging for the FortiOS unit.
l Each log message is displayed in the Log & Report pane of the GUI. You can also download the RAW format from
the Log & Report pane.
l Each log message is documented similar to how it appears in the RAW format.
This reference contains detailed information for each log type and subtype; however, this
reference contains only information gathered at publication and, as a result, not every log
message field contains detailed information.
What's new
This section identifies major changes in the Log Reference from version 7.2.0 and later. For more information about new
features, please see the FortiOS 7.2 New Features Guide.
FortiOS 7.2.1
Field Change
Event logs:
Field Change
FortiSwitch logs:
Field Change
tz Field Added
vd Field Added
GTP logs:
Field Change
Traffic logs:
Field Change
Web logs:
Field Change
Log ID changes
Event logs:
FortiSwitch logs:
SSL logs:
FortiOS 7.2.0
Field Change
AV logs:
Field Change
Field Change
DLP logs:
Field Change
Email logs:
Field Change
Event logs:
Field Change
FILE-FILTER logs:
Field Change
GTP logs:
Field Change
IPS logs:
Field Change
WAF logs:
Field Change
Web logs:
Field Change
Log ID changes
Event logs:
This section describes the log types, subtypes, and priority levels. It also describes the log field format.
Type
Each log entry contains a Type (type) or category field that indicates its log type and which log file stores the log entry.
Subtype
Each log entry contains a Sub Type (subtype) or subcategory field within a log type, based on the feature associated with
the cause of the log entry.
For example:
l In event logs, some of the subtypes are compliance check, system, and user.
l In traffic logs, the subtypes are forward, local, multicast, and sniffer.
FortiGate devices can record the following types and subtypes of log entry information:
UTM Records UTM events. See list of UTM log subtypes below
Each log entry contains a Level (level) field that indicates the estimated severity of the event that caused the log entry,
such as level=warning, and therefore how high a priority it is likely to be. Level (level) associations with the
descriptions below are not always uniform. They also may not correspond with your own definitions of how severe each
event is. If you require notification when a specific event occurs, either configure SNMP traps or alert email by
administrator-defined Severity Level (severity_level) or ID (logid), not by Level (level).
For each location where the FortiGate device can store log files (disk, memory, Syslog or FortiAnalyzer), you can define
a severity threshold. FortiOS stores all log messages equal to or exceeding the log severity level selected. For example,
if you select Error, FortiOS will store log messages whose log severity level is Error, Critical, Alert, and Emergency.
The following table describes the standard format in which each log type is described in this document. For
documentation purposes, all log types and subtypes follow this generic table format to present the log entry information.
Each log message consists of several sections of fields. In the FortiOS GUI, you can view the logs in the Log & Report
pane, which displays the formatted view. If you want to view logs in raw format, you must download the log and view it in
a text editor.
Following is an example of a traffic log message in raw format:
date=2017-11-15 time=11:44:16 logid="0000000013" type="traffic" subtype="forward"
level="notice" vd="vdom1" eventtime=1510775056 srcip=10.1.100.155 srcname="pc1"
srcport=40772 srcintf="port12" srcintfrole="undefined" dstip=35.197.51.42
dstname="fortiguard.com" dstport=443 dstintf="port11" dstintfrole="undefined"
poluuid="707a0d88-c972-51e7-bbc7-4d421660557b" sessionid=8058 proto=6 action="close"
policyid=1 policytype="policy" policymode="learn" service="HTTPS" dstcountry="United
States" srccountry="Reserved" trandisp="snat" transip=172.16.200.2 transport=40772
appid=40568 app="HTTPS.BROWSER" appcat="Web.Client" apprisk="medium" duration=2
sentbyte=1850 rcvdbyte=39898 sentpkt=25 rcvdpkt=37 utmaction="allow" countapp=1
devtype="Linux PC" osname="Linux" mastersrcmac="a2:e9:00:ec:40:01"
srcmac="a2:e9:00:ec:40:01" srcserver=0 utmref=0-220586
The following table provides an example of the log field information in the FortiOS GUI in the detailed view of the Log &
Report pane and in the downloaded, raw log file.
GUI Field Name Field Description Example Field Value in Raw Format
(Raw Field Name)
General
Date (date) Day, month, and year when the log date=2017-11-15
message was recorded.
GUI Field Name Field Description Example Field Value in Raw Format
(Raw Field Name)
Source
Master Source MAC The master MAC address for a host mastersrcmac="a2:e9:00:ec:40:01"
(mastersrcmac) that has multiple network interfaces.
Destination
GUI Field Name Field Description Example Field Value in Raw Format
(Raw Field Name)
Application
Data
Action
GUI Field Name Field Description Example Field Value in Raw Format
(Raw Field Name)
Security
Other
Event Time (eventtime) Epoch time the log was triggered by eventtime=1510775056
FortiGate. If you convert the epoch
time to human readable time, it
might not match the Date and Time
in the header owing to a small delay
between the time the log was
triggered and recorded. The Log
Time field is the same for the same
log among all log devices, but the
Date and Time might differ.
Protocol Number (proto) tcp: The protocol used by web traffic proto=6
(tcp by default)
Log ID numbers
The ID (logid) is a 10-digit field. It is a unique identifier for that specific log and includes the following information about
the log entry.
Log Type Represented by the first two digits of l Traffic log IDs begin with "00".
the log ID. l Event log IDs begin with "01".
Sub Type or Event Type Represented by the second two digits l VPN log subtype is represented with
of the log ID. "01" which belongs to the Event log type
that is represented with "01".
Therefore, all VPN related Event log IDs
will begin with the 0101 log ID series.
Message ID The last six digits of the log ID l An administrator account always has the
represent the message ID. log ID 0000003401.
The logid field is a number assigned to all permutations of the same message. It classifies a log entry by the nature of the
cause of the log message, such as administrator authentication failures or traffic. Other log messages that share the
same cause will share the same logid.
Log ID definitions
Following are the definitions for the log type IDs and subtype IDs applicable to FortiOS:
traffic: 0 l forward: 0
l local: 1
l multicast: 2
l sniffer: 4
l ztna: 5
event: 1 l system: 0
l vpn: 1
l user: 2
l router: 3
l wireless: 4
l wad: 5
l endpoint: 7
l ha: 8
l security-rating: 10
l fortiextender: 11
l connector: 12
l sdwan: 13
l cifs-auth-fails: 14
l switch-controller: 15
l rest-api: 16
voip: 2 l voip: 14
virus: 3 l analytics: 1
l filetype-executable: 3
l outbreak-prevention: 4
l content-disarm: 5
l command-blocked: 6
l malware-list: 7
l ems-threat-feed: 8
l fortindr: 9
l fortisandbox: 10
l infected: 11
l filename: 12
l oversize: 13
l mimefragmented: 61
l scanerror: 62
l switchproto: 63
webfilter: 4 l content: 14
l urlfilter: 15
l ftgd_blk: 16
l ftgd_allow: 17
l ftgd_err: 18
l urlmonitor: 19
l activexfilter: 35
l cookiefilter: 36
l appletfilter: 37
l ftgd_quota_counting: 38
l ftgd_quota_expired: 39
l ftgd_quota: 40
l scriptfilter: 41
l webfilter_command_block: 43
l http_header_change: 44
l ssl-exempt: 45
l antiphishing: 46
l videofilter-category: 47
l videofilter-channel: 48
ips: 5 l signature: 19
l malicious_url: 21
l botnet: 22
anomaly: 6 l anomaly: 20
emailfilter: 7 l email: 12
l spam: 13
l bannedword: 14
l webmail: 20
l ftgd_err: 53
dlp: 8 l dlp: 54
l dlp-docsource: 55
app-ctrl: 9 l signature: 59
l port-violation: 60
l protocol-violation: 61
waf: 10 l waf-signature: 0
l waf-custom-signature: 1
l waf-http-method: 2
l waf-http-constraint: 3
l waf-address-list: 4
l waf-url-access: 5
gtp: 11 l gtp-all: 0
l pfcp-all: 1
dns: 12 l dns-query: 0
l dns-response: 1
ssh: 13 l ssh-command: 0
l ssh-channel: 1
l ssh-hostkey: 2
ssl: 14 l ssl-anomaly: 0
l ssl-exempt: 1
l ssl-negotiation: 2
l ssl-server-cert-info: 3
l ssl-handshake: 4
file-filter: 15 l file-filter: 0
icap: 16 l icap: 0
forti-switch: 17 l fsw-flow: 0
The below details the mapping between FortiGuard Web Filter category names and numbers.
Number Category
0 Unrated
1 Drug abuse
2 Alternative beliefs
3 Hacking
4 Illegal or unethical
5 Discrimination
6 Explicit violence
7 Abortion
9 Advocacy organizations
11 Gambling
12 Extremist groups
14 Pornography
15 Dating
16 Weapons (sales)
17 Advertising
20 Games
23 Web-based email
26 Malicious websites
28 Entertainment
30 Education
Number Category
34 Job search
35 Medicine
37 Social networking
38 Political organizations
39 Reference
40 Global religion
42 Shopping
43 General organizations
46 Sports
47 Travel
48 Personal vehicles
49 Business
52 Information technology
53 Armed forces
54 Dynamic content
55 Meaningless content
56 Web hosting
57 Marijuana
58 Folklore
59 Proxy avoidance
61 Phishing
62 Plagiarism
63 Sex education
Number Category
64 Alcohol
65 Tobacco
68 Web chat
69 Instant messaging
71 Digital postcards
76 Internet telephony
77 Child education
78 Real estate
81 Secure websites
82 Content servers
83 Child abuse
84 Web-based applications
85 Domain parking
86 Spam URLs
87 Personal privacy
88 Dynamic DNS
89 Auction
92 Charitable organizations
93 Remote access
94 Web analytics
95 Online meeting
You can configure FortiOS 7.2.1 to send logs to remote syslog servers in Common Event Format (CEF) by using the
config log syslogd setting command.
When CEF is enabled, FortiOS sends logs to syslog servers in CEF. This section describes how FortiOS logs support
CEF.
You can view logs in CEF on remote syslog servers or FortiAnalyzer, but not in the FortiOS
GUI.
The SignatureId field in FortiOS logs maps to the logid field in CEF and should be last 5 digits of logid.
The Name field in CEF uses the following formula:
type:subtype + [eventtype] + [action] + [status]
Following is an example of the header and one key-value pair for extension from the Event VPN log in CEF:
#Feb 12 10:31:04 syslog-800c CEF:0|Fortinet|Fortigate|v5.6.0|37127|event:vpn negotiate
success|3|FTNTFGTlogid=0101037127
The type:subtype field in FortiOS logs maps to the cat field in CEF.
Any fields in FortiOS logs that are unmatched to fields in CEF include the FTNTFGT prefix.
Quotes ("") are removed from FortiOS logs to support CEF.
Forward slashes (//) in string values as well as the equal sign (=) and backward slashes (\) are escaped in FortiOS logs
to support CEF.
Following are the CEF priority levels. They are opposite of FortiOS priority levels. See also FortiOS priority levels on
page 45.
This section includes examples of how the different types of log message support CEF.
The following is an example of a traffic log sent in CEF format to a syslog server:
Dec 27 11:07:55 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|00013|traffic:forward
close|3|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0000000013
cat=traffic:forward FTNTFGTsubtype=forward FTNTFGTlevel=notice FTNTFGTvd=vdom1
FTNTFGTeventtime=1545937675 src=10.1.100.11 spt=54190 deviceInboundInterface=port12
FTNTFGTsrcintfrole=undefined dst=52.53.140.235 dpt=443
deviceOutboundInterface=port11 FTNTFGTdstintfrole=undefined FTNTFGTpoluuid=c2d460aa-
fe6f-51e8-9505-41b5117dfdd4 externalId=402 proto=6 act=close FTNTFGTpolicyid=1
FTNTFGTpolicytype=policy app=HTTPS FTNTFGTdstcountry=United States
FTNTFGTsrccountry=Reserved FTNTFGTtrandisp=snat sourceTranslatedAddress=172.16.200.1
sourceTranslatedPort=54190 FTNTFGTappid=40568 FTNTFGTapp=HTTPS.BROWSER
FTNTFGTappcat=Web.Client FTNTFGTapprisk=medium FTNTFGTapplist=g-default
FTNTFGTduration=2 out=3652 in=146668 FTNTFGTsentpkt=58 FTNTFGTrcvdpkt=105
FTNTFGTutmaction=allow FTNTFGTcountapp=2
The following table maps FortiOS log field names to CEF field names.
srcip src
srcport spt
srcintf deviceInboundInterface
dstip dst
dstport dpt
dstintf deviceOutboundInterface
sessionid externalID
proto proto
action act
transip sourceTranslatedAddress
transport sourceTranslatedPort
service app
sentbyte out
rcvdbyte in
Custom fields
To configure the traffic log with custom fields, enter the following CLI commands:
config log custom-field
edit 1
set name "custom_name1"
set value "HN123456"
next
edit 2
set name "custom_name2"
set value "accounting_dpt"
next
end
config firewall policy
edit 1
set name "A-v4-out"
set srcintf "port12"
set dstintf "port11"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set utm-status enable
set logtraffic all
set custom-log-fields "1" "2"
The following is an example of a traffic log with custom fields on the FortiGate disk:
date=2018-12-27 time=11:12:30 logid="0000000013" type="traffic" subtype="forward"
level="notice" vd="vdom1" eventtime=1545937950 srcip=10.1.100.11 srcport=58843
srcintf="port12" srcintfrole="undefined" dstip=172.16.200.55 dstport=53
dstintf="port11" dstintfrole="undefined" poluuid="c2d460aa-fe6f-51e8-9505-
41b5117dfdd4" sessionid=440 proto=17 action="accept" policyid=1 policytype="policy"
service="DNS" dstcountry="Reserved" srccountry="Reserved" trandisp="snat"
transip=172.16.200.1 transport=58843 appid=16195 app="DNS" appcat="Network.Service"
apprisk="elevated" applist="g-default" duration=180 sentbyte=70 rcvdbyte=528
sentpkt=1 rcvdpkt=1 custom_name1="HN123456" custom_name2="accounting_dpt"
The following is an example of a traffic log with custom fields sent in CEF format to a syslog server:
Dec 27 11:12:30 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|00013|traffic:forward
accept|3|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0000000013
cat=traffic:forward FTNTFGTsubtype=forward FTNTFGTlevel=notice FTNTFGTvd=vdom1
FTNTFGTeventtime=1545937950 src=10.1.100.11 spt=58843 deviceInboundInterface=port12
FTNTFGTsrcintfrole=undefined dst=172.16.200.55 dpt=53 deviceOutboundInterface=port11
FTNTFGTdstintfrole=undefined FTNTFGTpoluuid=c2d460aa-fe6f-51e8-9505-41b5117dfdd4
externalId=440 proto=17 act=accept FTNTFGTpolicyid=1 FTNTFGTpolicytype=policy
app=DNS FTNTFGTdstcountry=Reserved FTNTFGTsrccountry=Reserved FTNTFGTtrandisp=snat
sourceTranslatedAddress=172.16.200.1 sourceTranslatedPort=58843 FTNTFGTappid=16195
FTNTFGTapp=DNS FTNTFGTappcat=Network.Service FTNTFGTapprisk=elevated
FTNTFGTapplist=g-default FTNTFGTduration=180 out=70 in=528 FTNTFGTsentpkt=1
FTNTFGTrcvdpkt=1 FTNTFGTcustom_name1=HN123456 FTNTFGTcustom_name2=accounting_dpt
The following table maps FortiOS custom log field names to CEF field names.
custom_name1 FTNTFGTcustom_name1
custom_name2 FTNTFGTcustom_name2
The following table maps FortiOS log field names to CEF field names.
msg msg
cookies requestCookies
user duser
status outcome
role sourceServiceName
ui sproc
reason reason
action act
system subtype
The following is an example of a system subtype event log on the FortiGate disk:
date=2018-12-27 time=11:15:40 logid="0100032002" type="event" subtype="system"
level="alert" vd="vdom1" eventtime=1545938140 logdesc="Admin login failed" sn="0"
user="admin1" ui="https(172.16.200.254)" method="https" srcip=172.16.200.254
dstip=172.16.200.1 action="login" status="failed" reason="name_invalid"
msg="Administrator admin1 login failed from https(172.16.200.254) because of invalid
user name"
The following is an example of a system subtype event log sent in CEF format to a syslog server:
Dec 27 11:15:40 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|32002|event:system login
failed|7|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0100032002 cat=event:system
FTNTFGTsubtype=system FTNTFGTlevel=alert FTNTFGTvd=vdom1 FTNTFGTeventtime=1545938140
FTNTFGTlogdesc=Admin login failed FTNTFGTsn=0 duser=admin1 sproc=https
(172.16.200.254) FTNTFGTmethod=https src=172.16.200.254 dst=172.16.200.1 act=login
outcome=failed reason=name_invalid msg=Administrator admin1 login failed from https
(172.16.200.254) because of invalid user name
user subtype
The following is an example of a user subtype log sent in CEF format to a syslog server:
Dec 27 11:17:35 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|43008|event:user
authentication success|3|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0102043008
cat=event:user FTNTFGTsubtype=user FTNTFGTlevel=notice FTNTFGTvd=vdom1
FTNTFGTeventtime=1545938255 FTNTFGTlogdesc=Authentication success src=10.1.100.11
dst=172.16.200.55 FTNTFGTpolicyid=1 deviceInboundInterface=port12 duser=bob
FTNTFGTgroup=N/A FTNTFGTauthproto=TELNET(10.1.100.11) act=authentication
outcome=success reason=N/A msg=User bob succeeded in authentication
The following is an example of an antivirus log sent in CEF format to a syslog server:
Dec 27 11:20:48 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|08192|utm:virus infected
blocked|4|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0211008192 cat=utm:virus
FTNTFGTsubtype=virus FTNTFGTeventtype=infected FTNTFGTlevel=warning FTNTFGTvd=vdom1
FTNTFGTeventtime=1545938448 msg=File is infected. act=blocked app=HTTP
externalId=695 src=10.1.100.11 dst=172.16.200.55 spt=44356 dpt=80
deviceInboundInterface=port12 FTNTFGTsrcintfrole=undefined
deviceOutboundInterface=port11 FTNTFGTdstintfrole=undefined FTNTFGTpolicyid=1
proto=6 deviceDirection=0 fname=eicar.com FTNTFGTquarskip=File-was-not-quarantined.
FTNTFGTvirus=EICAR_TEST_FILE FTNTFGTdtype=Virus
FTNTFGTref=http://www.fortinet.com/ve?vn\=EICAR_TEST_FILE FTNTFGTvirusid=2172
request=http://172.16.200.55/virus/eicar.com FTNTFGTprofile=g-default duser=bob
requestClientApplication=curl/7.47.0
FTNTFGTanalyticscksum=275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd
0f FTNTFGTanalyticssubmit=false FTNTFGTcrscore=50 FTNTFGTcrlevel=critical
The following table maps FortiOS log field names to CEF field names.
filename fname
url request
agent requestClientApplication
The following is an example of a webfilter log sent in CEF format to a syslog server:
Dec 27 11:23:49 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|13056|utm:webfilter ftgd_blk
blocked|4|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0316013056
cat=utm:webfilter FTNTFGTsubtype=webfilter FTNTFGTeventtype=ftgd_blk
FTNTFGTlevel=warning FTNTFGTvd=vdom1 FTNTFGTeventtime=1545938629 FTNTFGTpolicyid=1
externalId=764 duser=bob src=10.1.100.11 spt=59194 deviceInboundInterface=port12
FTNTFGTsrcintfrole=undefined dst=185.230.61.185 dpt=80
deviceOutboundInterface=port11 FTNTFGTdstintfrole=undefined proto=6 app=HTTP
dhost=ambrishsriv.wixsite.com FTNTFGTprofile=g-default act=blocked
FTNTFGTreqtype=direct request=/bizsquads out=96 in=0 deviceDirection=1 msg=URL
The following table maps FortiOS log field names to CEF field names.
hostname dhost
catdesc requestContext
The following is an example of an email spamfilter log sent in CEF format to a syslog server:
Dec 27 11:36:58 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|20503|utm:emailfilter smtp
log-only|2|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0508020503
cat=utm:emailfilter FTNTFGTsubtype=emailfilter FTNTFGTeventtype=smtp
FTNTFGTlevel=information FTNTFGTvd=vdom1 FTNTFGTeventtime=1545939418
The following table maps FortiOS log field names to CEF field names.
from suser
to duser
The following is an example of an anomaly log sent in CEF format to a syslog server:
Dec 27 11:40:04 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|18433|utm:anomaly anomaly
clear_session|7|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0720018433
cat=utm:anomaly FTNTFGTsubtype=anomaly FTNTFGTeventtype=anomaly FTNTFGTlevel=alert
FTNTFGTvd=vdom1 FTNTFGTeventtime=1545939604 FTNTFGTseverity=critical src=10.1.100.11
FTNTFGTsrccountry=Reserved dst=172.16.200.55 deviceInboundInterface=port12
FTNTFGTsrcintfrole=undefined externalId=0 act=clear_session proto=1 app=PING cnt=1
FTNTFGTattack=icmp_flood FTNTFGTicmpid=0x3053 FTNTFGTicmptype=0x08
FTNTFGTicmpcode=0x00 FTNTFGTattackid=16777316 FTNTFGTpolicyid=1
FTNTFGTpolicytype=DoS-policy FTNTFGTref=http://www.fortinet.com/ids/VID16777316
msg=anomaly: icmp_flood, 51 > threshold 50 FTNTFGTcrscore=50 FTNTFGTcrlevel=critical
The following table maps FortiOS log field names to CEF field names.
count cnt
The following table maps FortiOS log field names to CEF field names.
status outcome
from suser
to duser
The following is an example of a DLP log sent in CEF format to a syslog server:
Dec 27 14:29:36 FGT-A-LOG CEF: 0|Fortinet|Fortigate|v6.0.3|24576|utm:dlp dlp
block|4|deviceExternalId=FGT5HD3915800610 FTNTFGTlogid=0954024576 cat=utm:dlp
FTNTFGTsubtype=dlp FTNTFGTeventtype=dlp FTNTFGTlevel=warning FTNTFGTvd=vdom1
FTNTFGTeventtime=1545949776 FTNTFGTfilteridx=1 FTNTFGTdlpextra=test-dlp3
FTNTFGTfiltertype=file-type FTNTFGTfiltercat=file FTNTFGTseverity=medium
FTNTFGTpolicyid=1 externalId=12680 FTNTFGTepoch=418303178 FTNTFGTeventid=0 duser=bob
src=10.1.100.11 spt=33638 deviceInboundInterface=port12 FTNTFGTsrcintfrole=undefined
dst=172.18.62.158 dpt=80 deviceOutboundInterface=port11 FTNTFGTdstintfrole=undefined
proto=6 app=HTTP FTNTFGTfiletype=gif deviceDirection=0 act=block dhost=172.18.62.158
request=/dlp/flower.gif requestClientApplication=curl/7.47.0 fname=flower.gif
fsize=1209 FTNTFGTprofile=test-dlp
The following table maps FortiOS log field names to CEF field names.
filename fname
FortiOS 6.0.0 and later supports extended logging for UTM log types to reliable Syslog servers over TCP. Extended
logging adds HTTP header information to the rawdata field in UTM log types. You must enable extended logging before
you can use the feature.
When extended logging is enabled, the following HTTP header information can be added to the rawdata field in
UTM logs:
l Method
l X-Forwarded-For
l Request-Content-Type | Response-Content-Type
l Referer
l User-Agent
The full rawdata field of 20KB is only sent to reliable Syslog servers. Other logging devices, such as disk, FortiAnalyzer,
and UDP Syslog servers, receive the information, but only keep a maximum of 2KB total log length, including the
rawdata field, and discard the rest of the extended log information.
You can enable extended logging for the following UTM profiles:
l antivirus
l application
l dlp
l ips
l waf
l webfilter
When you enable the extended-log option for UTM profiles, all HTTP header information for HTTP-deny traffic is
logged.
When you enable the web-extended-all-action-log-enable option for webfilter profile, all HTTP header
information for HTTP-allow traffic is logged.
The extended-log option has been added to all UTM profiles, for example:
config webfilter profile
edit "test-webfilter"
set extended-log enable
set web-extended-all-action-log enable
next
end
The Syslog server mode changed to udp, reliable, and legacy-reliable. You must set the mode to reliable to
support extended logging, for example:
config log syslogd setting
set status enable
set server "<ip address>"
set mode reliable
set facility local6
end
Following is an example extended log for a utm log type with a webfilter subtype for a reliable Syslog server. The
rawdata field contains the extended log data.
2: date=2022-03-07 time=14:15:27 eventtime=1646691327786322587 tz="-0800" logid="0316013056"
type="utm" subtype="webfilter" eventtype="ftgd_blk" level="warning" vd="vdom1" policyid=1
poluuid="fe85f37c-9dd9-51ec-904d-5af91079efbb" policytype="policy" sessionid=7284
srcip=10.1.100.18 srcport=50856 srccountry="Reserved" srcintf="port2"
srcintfrole="undefined" srcuuid="69dc4a54-9d99-51ec-16ee-395d60cceac6" dstip=142.250.69.196
dstport=443 dstcountry="United States" dstintf="port1" dstintfrole="undefined"
dstuuid="69dc4a54-9d99-51ec-16ee-395d60cceac6" proto=6 httpmethod="GET" service="HTTPS"
hostname="http://www.google.com" forwardedfor="192.168.0.99" agent="curl/7.56.0"
profile="webfilter" action="blocked" reqtype="referral" url="https://www.google.com/"
referralurl="https://example.com/referer.html" sentbyte=869 rcvdbyte=4313
direction="outgoing" msg="URL belongs to a denied category in policy" ratemethod="domain"
cat=41 catdesc="Search Engines and Portals" rawdata="x-forwarded-for=192.168.0.99"
The following sections list the FortiOS 7.2.1 log messages by log ID number.
18432 - LOGID_ATTCK_ANOMALY_TCP_UDP
dstcountry string 64
dstip Destination IP ip 39
srcip Source IP ip 39
18433 - LOGID_ATTCK_ANOMALY_ICMP
dstcountry string 64
dstip Destination IP ip 39
srcip Source IP ip 39
18434 - LOGID_ATTCK_ANOMALY_OTHERS
dstcountry string 64
dstip Destination IP ip 39
srcip Source IP ip 39
28672 - LOGID_APP_CTRL_IM_BASIC
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
dstcountry string 64
dstip Destination IP ip 39
profile string 36
srccountry string 64
srcip Source IP ip 39
tz string 5
28673 - LOGID_APP_CTRL_IM_BASIC_WITH_STATUS
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
dstcountry string 64
dstip Destination IP ip 39
profile string 36
srccountry string 64
srcip Source IP ip 39
tz string 5
28674 - LOGID_APP_CTRL_IM_BASIC_WITH_COUNT
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
dstcountry string 64
dstip Destination IP ip 39
profile string 36
srccountry string 64
srcip Source IP ip 39
tz string 5
28675 - LOGID_APP_CTRL_IM_FILE
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
dstcountry string 64
dstip Destination IP ip 39
profile string 36
srccountry string 64
srcip Source IP ip 39
tz string 5
28676 - LOGID_APP_CTRL_IM_CHAT
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
dstcountry string 64
dstip Destination IP ip 39
profile string 36
srccountry string 64
srcip Source IP ip 39
tz string 5
28677 - LOGID_APP_CTRL_IM_CHAT_BLOCK
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
dstcountry string 64
dstip Destination IP ip 39
profile string 36
srccountry string 64
srcip Source IP ip 39
tz string 5
28678 - LOGID_APP_CTRL_IM_BLOCK
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
dstcountry string 64
dstip Destination IP ip 39
profile string 36
srccountry string 64
srcip Source IP ip 39
tz string 5
28704 - LOGID_APP_CTRL_IPS_PASS
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
dstcountry string 64
dstip Destination IP ip 39
profile string 36
srccountry string 64
srcip Source IP ip 39
tz string 5
ccertissuer string 64
clouduser User login ID detected by the Deep Application Control feature string 256
dstauthserver string 64
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
psrcport uint16 5
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
rawdataid string 10
trueclntip True-Client-IP ip 39
28705 - LOGID_APP_CTRL_IPS_BLOCK
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
dstcountry string 64
dstip Destination IP ip 39
profile string 36
srccountry string 64
srcip Source IP ip 39
tz string 5
ccertissuer string 64
clouduser User login ID detected by the Deep Application Control feature string 256
dstauthserver string 64
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
psrcport uint16 5
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
rawdataid string 10
trueclntip True-Client-IP ip 39
28706 - LOGID_APP_CTRL_IPS_RESET
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
dstcountry string 64
dstip Destination IP ip 39
profile string 36
srccountry string 64
srcip Source IP ip 39
tz string 5
ccertissuer string 64
clouduser User login ID detected by the Deep Application Control feature string 256
dstauthserver string 64
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
psrcport uint16 5
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
rawdataid string 10
trueclntip True-Client-IP ip 39
28720 - LOGID_APP_CTRL_SSH_PASS
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
dstcountry string 64
dstip Destination IP ip 39
profile string 36
srccountry string 64
srcip Source IP ip 39
tz string 5
28721 - LOGID_APP_CTRL_SSH_BLOCK
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
dstcountry string 64
dstip Destination IP ip 39
profile string 36
srccountry string 64
srcip Source IP ip 39
tz string 5
28736 - LOGID_APP_CTRL_PORT_ENF
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
ccertissuer string 64
clouduser User login ID detected by the Deep Application Control feature string 256
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile string 36
psrcport uint16 5
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
rawdataid string 10
srccountry string 64
srcip Source IP ip 39
trueclntip True-Client-IP ip 39
tz string 5
28737 - LOGID_APP_CTRL_PROTO_ENF
action The status of the session: pass - Application is allowed block - string 16
Application is blocked (silent) reject - Quarantine reset -
Application is blocked and Reset was sent Sometimes, there is
a block page for blocking
ccertissuer string 64
clouduser User login ID detected by the Deep Application Control feature string 256
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile string 36
psrcport uint16 5
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
rawdataid string 10
srccountry string 64
srcip Source IP ip 39
trueclntip True-Client-IP ip 39
tz string 5
8192 - MESGID_INFECT_WARNING
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8193 - MESGID_INFECT_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8195 - MESGID_INFECT_MIME_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8200 - MESGID_MIME_FILETYPE_EXE_WARNING
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8201 - MESGID_MIME_FILETYPE_EXE_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8203 - MESGID_AVQUERY_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8204 - MESGID_MIME_AVQUERY_WARNING
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8205 - MESGID_MIME_AVQUERY_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8212 - MESGID_MALWARE_LIST_WARNING
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8213 - MESGID_MALWARE_LIST_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8214 - MESGID_MIME_MALWARE_LIST_WARNING
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8215 - MESGID_MIME_MALWARE_LIST_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8216 - MESGID_FILE_HASH_EMS_WARNING
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
8218 - MESGID_MIME_FILE_HASH_EMS_WARNING
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
8219 - MESGID_MIME_FILE_HASH_EMS_NOTIF
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
8221 - MESGID_ICB_FAI_NOTIF
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
8222 - MESGID_MIME_ICB_FAI_WARNING
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
8224 - MESGID_ICB_FAI_TIMEOUT_WARNING
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
8225 - MESGID_ICB_FAI_TIMEOUT_NOTIF
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
8227 - MESGID_MIME_ICB_FAI_TIMEOUT_NOTIF
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
8228 - MESGID_ICB_FAI_ERROR_WARNING
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
8230 - MESGID_MIME_ICB_FAI_ERROR_WARNING
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
8231 - MESGID_MIME_ICB_FAI_ERROR_NOTIF
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
8233 - MESGID_ICB_FSA_NOTIF
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
8234 - MESGID_MIME_ICB_FSA_WARNING
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
8236 - MESGID_ICB_FSA_TIMEOUT_WARNING
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
8237 - MESGID_ICB_FSA_TIMEOUT_NOTIF
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
8239 - MESGID_MIME_ICB_FSA_TIMEOUT_NOTIF
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
8240 - MESGID_ICB_FSA_ERROR_WARNING
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
8242 - MESGID_MIME_ICB_FSA_ERROR_WARNING
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
8243 - MESGID_MIME_ICB_FSA_ERROR_NOTIF
action string 18
analyticscksum string 64
analyticssubmit string 10
attachment string 3
authserver string 64
cc string 512
checksum string 16
contentdisarmed string 13
craction uint32 10
crlevel string 10
crscore uint32 10
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
dtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
filehash string 64
filehashsrc string 32
filetype string 16
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
level string 11
logid string 10
pdstport uint16 5
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
psrcport uint16 5
quarskip string 46
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
viruscat string 32
virusid uint32 10
vrf uint8 3
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
httpmethod string 20
pdstport uint16 5
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
srccountry string 64
srcuuid string 37
subservice string 16
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8450 - MESGID_BLOCK_MIME_WARNING
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
httpmethod string 20
pdstport uint16 5
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
srccountry string 64
srcuuid string 37
subservice string 16
unauthuser string 66
unauthusersource string 66
vrf uint8 3
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
httpmethod string 20
pdstport uint16 5
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
srccountry string 64
srcuuid string 37
subservice string 16
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8452 - MESGID_BLOCK_COMMAND
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
command string 16
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
httpmethod string 20
pdstport uint16 5
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
srccountry string 64
srcuuid string 37
subservice string 16
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8704 - MESGID_OVERSIZE_WARNING
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8705 - MESGID_OVERSIZE_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8708 - MESGID_OVERSIZE_STREAM_UNCOMP_WARNING
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8709 - MESGID_OVERSIZE_STREAM_UNCOMP_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8720 - MESGID_SWITCH_PROTO_WARNING
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
httpmethod string 20
pdstport uint16 5
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
srccountry string 64
srcuuid string 37
subservice string 16
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8721 - MESGID_SWITCH_PROTO_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
httpmethod string 20
pdstport uint16 5
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
srccountry string 64
srcuuid string 37
subservice string 16
unauthuser string 66
unauthusersource string 66
vrf uint8 3
8960 - MESGID_SCAN_UNCOMPSIZELIMIT_WARNING
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8961 - MESGID_SCAN_UNCOMPSIZELIMIT_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8962 - MESGID_SCAN_ARCHIVE_ENCRYPTED_WARNING
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8963 - MESGID_SCAN_ARCHIVE_ENCRYPTED_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8964 - MESGID_SCAN_ARCHIVE_CORRUPTED_WARNING
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8965 - MESGID_SCAN_ARCHIVE_CORRUPTED_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8966 - MESGID_SCAN_ARCHIVE_MULTIPART_WARNING
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8967 - MESGID_SCAN_ARCHIVE_MULTIPART_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8968 - MESGID_SCAN_ARCHIVE_NESTED_WARNING
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8969 - MESGID_SCAN_ARCHIVE_NESTED_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8970 - MESGID_SCAN_ARCHIVE_OVERSIZE_WARNING
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8971 - MESGID_SCAN_ARCHIVE_OVERSIZE_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8972 - MESGID_SCAN_ARCHIVE_UNHANDLED_WARNING
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8973 - MESGID_SCAN_ARCHIVE_UNHANDLED_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8974 - MESGID_SCAN_AV_ENGINE_LOAD_FAILED_ERROR
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8975 - MESGID_SCAN_ARCHIVE_PARTIALLYCORRUPTED_WARNING
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8976 - MESGID_SCAN_ARCHIVE_PARTIALLYCORRUPTED_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8979 - MESGID_SCAN_ARCHIVE_TIMEOUT_WARNING
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8980 - MESGID_SCAN_ARCHIVE_TIMEOUT_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
8981 - MESGID_SCAN_AV_CDR_INTERNAL_ERROR
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
9233 - MESGID_ANALYTICS_SUBMITTED
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
9234 - MESGID_ANALYTICS_INFECT_WARNING
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
9235 - MESGID_ANALYTICS_INFECT_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
9236 - MESGID_ANALYTICS_INFECT_MIME_WARNING
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
9237 - MESGID_ANALYTICS_INFECT_MIME_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
fndraction string 7
fndrconfidence string 6
fndrfileid uint64 20
fndrfiletype string 10
fndrseverity string 8
fndrverdict string 5
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
fsaaction string 7
fsafileid uint64 20
fsafiletype string 10
fsaseverity string 11
fsaverdict string 32
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
ref The URL of the FortiGuard IPS database entry for the attack string 512
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
viruscat string 32
vrf uint8 3
9238 - MESGID_ANALYTICS_FSA_RESULT
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
devid string 16
unauthuser string 66
unauthusersource string 66
9239 - MESGID_CONTENT_DISARM_NOTIF
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
epoch uint32 10
eventid uint32 10
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
pdstport uint16 5
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
action The status of the session: blocked - Blocked infected file by AV string 18
engine passthrough - Allowed by AV engine monitored - Log,
but do NOT block infected file analytics - Submitted to
Sandbox for analysis
attachment string 3
cc string 512
devid string 16
dstauthserver string 64
dstcountry string 64
dstuuid string 37
epoch uint32 10
eventid uint32 10
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
pdstport uint16 5
policytype string 24
poluuid string 37
profile The name of the profile that was used to detect and take action string 64
psrcport uint16 5
srccountry string 64
srcuuid string 37
subservice string 16
trueclntip ip 39
unauthuser string 66
unauthusersource string 66
vrf uint8 3
24576 - LOG_ID_DLP_WARN
action The status of the session: log-only - DLP event is detected , string 20
but NOT blocked (similar to monitor action) block - Blocked
exempt - Allowed ban - blocked (Not in used since FortiOS
5.0, replaced by blocked) ban-sender - blocks all data being
sent by an ip or user (Not in used since FortiOS 5.0, replaced
by quarantine) quarantine-ip - Blocked and band the source ip
(Not in used since FortiOS 5.0) quarantine-interface - Blocked
and band the source interface (Not in used since FortiOS 5.0)
attachment string 3
cc string 512
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
eventid The serial number of the dlparchive file in the same epoch uint32 10
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
psrcport uint16 5
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
subservice string 16
tz string 5
action The status of the session: log-only - DLP event is detected , string 20
but NOT blocked (similar to monitor action) block - Blocked
exempt - Allowed ban - blocked (Not in used since FortiOS
5.0, replaced by blocked) ban-sender - blocks all data being
sent by an ip or user (Not in used since FortiOS 5.0, replaced
by quarantine) quarantine-ip - Blocked and band the source ip
(Not in used since FortiOS 5.0) quarantine-interface - Blocked
and band the source interface (Not in used since FortiOS 5.0)
attachment string 3
cc string 512
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
eventid The serial number of the dlparchive file in the same epoch uint32 10
from Email address from the Email Headers (IMAP/POP3/SMTP) string 128
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
psrcport uint16 5
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
subservice string 16
tz string 5
54000 - LOG_ID_DNS_QUERY
dstcountry string 64
dstip Destination IP ip 39
policytype string 24
poluuid string 37
srccountry string 64
srcip Source IP ip 39
54200 - LOG_ID_DNS_RESOLV_ERROR
dstcountry string 64
dstip Destination IP ip 39
exchange Mail Exchanges from DNS response answer section string 256
policytype string 24
poluuid string 37
rcode uint8 3
srccountry string 64
srcip Source IP ip 39
translationid uint32 10
54400 - LOG_ID_DNS_URL_FILTER_BLOCK
dstcountry string 64
dstip Destination IP ip 39
exchange Mail Exchanges from DNS response answer section string 256
policytype string 24
poluuid string 37
rcode uint8 3
srccountry string 64
srcip Source IP ip 39
translationid uint32 10
54401 - LOG_ID_DNS_URL_FILTER_ALLOW
dstcountry string 64
dstip Destination IP ip 39
exchange Mail Exchanges from DNS response answer section string 256
policytype string 24
poluuid string 37
rcode uint8 3
srccountry string 64
srcip Source IP ip 39
translationid uint32 10
54600 - LOG_ID_DNS_BOTNET_IP
dstcountry string 64
dstip Destination IP ip 39
exchange Mail Exchanges from DNS response answer section string 256
policytype string 24
poluuid string 37
rcode uint8 3
srccountry string 64
srcip Source IP ip 39
translationid uint32 10
54601 - LOG_ID_DNS_BOTNET_DOMAIN
dstcountry string 64
dstip Destination IP ip 39
exchange Mail Exchanges from DNS response answer section string 256
policytype string 24
poluuid string 37
rcode uint8 3
srccountry string 64
srcip Source IP ip 39
translationid uint32 10
54800 - LOG_ID_DNS_FTGD_WARNING
dstcountry string 64
dstip Destination IP ip 39
exchange Mail Exchanges from DNS response answer section string 256
policytype string 24
poluuid string 37
rcode uint8 3
srccountry string 64
srcip Source IP ip 39
translationid uint32 10
54801 - LOG_ID_DNS_FTGD_ERROR
dstcountry string 64
dstip Destination IP ip 39
exchange Mail Exchanges from DNS response answer section string 256
policytype string 24
poluuid string 37
rcode uint8 3
srccountry string 64
srcip Source IP ip 39
translationid uint32 10
54802 - LOG_ID_DNS_FTGD_CAT_ALLOW
dstcountry string 64
dstip Destination IP ip 39
exchange Mail Exchanges from DNS response answer section string 256
policytype string 24
poluuid string 37
rcode uint8 3
srccountry string 64
srcip Source IP ip 39
translationid uint32 10
54803 - LOG_ID_DNS_FTGD_CAT_BLOCK
dstcountry string 64
dstip Destination IP ip 39
exchange Mail Exchanges from DNS response answer section string 256
policytype string 24
poluuid string 37
rcode uint8 3
srccountry string 64
srcip Source IP ip 39
translationid uint32 10
54804 - LOG_ID_DNS_SAFE_SEARCH
dstcountry string 64
dstip Destination IP ip 39
exchange Mail Exchanges from DNS response answer section string 256
policytype string 24
poluuid string 37
rcode uint8 3
srccountry string 64
srcip Source IP ip 39
translationid uint32 10
54805 - LOG_ID_DNS_LOCAL
dstcountry string 64
dstip Destination IP ip 39
exchange Mail Exchanges from DNS response answer section string 256
policytype string 24
poluuid string 37
rcode uint8 3
srccountry string 64
srcip Source IP ip 39
translationid uint32 10
20480 - LOGID_ANTISPAM_EMAIL_NOTIF
action Security action of the email filter. Eg. blocked, tagged, allow string 8
authserver string 64
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
policymode string 8
policytype string 24
poluuid string 37
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
tz string 5
unauthuser string 66
unauthusersource string 66
webmailprovider string 32
20481 - LOGID_EMAIL_GENERAL_NOTIF
action Security action of the email filter. Eg. blocked, tagged, allow string 8
authserver string 64
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
policymode string 8
policytype string 24
poluuid string 37
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
tz string 5
unauthuser string 66
unauthusersource string 66
webmailprovider string 32
20482 - LOGID_ANTISPAM_EMAIL_BWORD_NOTIF
action Security action of the email filter. Eg. blocked, tagged, allow string 8
authserver string 64
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
policymode string 8
policytype string 24
poluuid string 37
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
tz string 5
unauthuser string 66
unauthusersource string 66
webmailprovider string 32
20509 - LOGID_ANTISPAM_FTGD_ERR
action Security action of the email filter. Eg. blocked, tagged, allow string 8
authserver string 64
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
policymode string 8
policytype string 24
poluuid string 37
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
tz string 5
unauthuser string 66
unauthusersource string 66
webmailprovider string 32
20510 - LOGID_ANTISPAM_EMAIL_WEBMAIL_NOTIF
action Security action of the email filter. Eg. blocked, tagged, allow string 8
authserver string 64
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
policymode string 8
policytype string 24
poluuid string 37
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
tz string 5
unauthuser string 66
unauthusersource string 66
webmailprovider string 32
20002 - LOG_ID_DOMAIN_UNRESOLVABLE
20003 - LOG_ID_MAIL_SENT_FAIL
20004 - LOG_ID_POLICY_TOO_BIG
20005 - LOG_ID_PPP_LINK_UP
20006 - LOG_ID_PPP_LINK_DOWN
20007 - LOG_ID_SOCKET_EXHAUSTED
vrf uint8 3
srcip Source IP ip 39
dstip Destination IP ip 39
20008 - LOG_ID_POLICY6_TOO_BIG
20010 - LOG_ID_KERNEL_ERROR
20016 - LOG_ID_MODEM_EXCEED_REDIAL_COUNT
20017 - LOG_ID_MODEM_FAIL_TO_OPEN
20020 - LOG_ID_MODEM_USB_DETECTED
20021 - LOG_ID_MAIL_RESENT
20022 - LOG_ID_MODEM_USB_REMOVED
20023 - LOG_ID_MODEM_USBLTE_DETECTED
20024 - LOG_ID_MODEM_USBLTE_REMOVED
20025 - LOG_ID_REPORTD_REPORT_SUCCESS
20028 - LOG_ID_REPORT_RECREATE_DB
20031 - LOG_ID_RAD_OUT_OF_MEM
20033 - LOG_ID_RAD_MOBILE_IPV6
20034 - LOG_ID_RAD_IPV6_OUT_OF_RANGE
20036 - LOG_ID_RAD_MAX_OUT_OF_RANGE
20037 - LOG_ID_RAD_MAX_ADV_OUT_OF_RANGE
20040 - LOG_ID_RAD_TIME_TOO_SMALL
20041 - LOG_ID_RAD_HOP_OUT_OF_RANGE
20043 - LOG_ID_RAD_AGENT_OUT_OF_RANGE
20044 - LOG_ID_RAD_AGENT_FLAG_NOT_SET
20046 - LOG_ID_RAD_PREF_TIME_TOO_SMALL
20061 - LOG_ID_RAD_INV_ICMPV6_TYPE
20063 - LOG_ID_RAD_ICMPV6_NO_SRC_ADDR
20064 - LOG_ID_RAD_INV_ICMPV6_RS_LEN
20066 - LOG_ID_RAD_INV_ICMPV6_HOP
20067 - LOG_ID_RAD_MISMATCH_HOP
20069 - LOG_ID_RAD_MISMATCH_OTH_FLAG
20070 - LOG_ID_RAD_MISMATCH_TIME
20072 - LOG_ID_RAD_EXTRA_DATA
20073 - LOG_ID_RAD_NO_OPT_DATA
20075 - LOG_ID_RAD_MISMATCH_MTU
20077 - LOG_ID_RAD_MISMATCH_PREF_TIME
20080 - LOG_ID_RAD_FAIL_TO_RCV
20081 - LOG_ID_RAD_INV_HOP
20083 - LOG_ID_RAD_FAIL_TO_CHECK
20084 - LOG_ID_RAD_FAIL_TO_SEND
trace_id string 32
20090 - LOG_ID_INTF_LINK_STA_CHG
20099 - LOG_ID_INTF_STA_CHG
20100 - LOG_ID_WEB_CAT_UPDATED
20101 - LOG_ID_WEB_LIC_EXPIRE
20102 - LOG_ID_SPAM_LIC_EXPIRE
20103 - LOG_ID_AV_LIC_EXPIRE
20107 - LOG_ID_LOG_UPLOAD_ERR
20108 - LOG_ID_LOG_UPLOAD_DONE
20109 - LOG_ID_WEB_LIC_EXPIRED
20113 - LOG_ID_IPSA_DOWNLOAD_FAIL
20114 - LOG_ID_IPSA_SELFTEST_FAIL
20115 - LOG_ID_IPSA_STATUSUPD_FAIL
20116 - LOG_ID_SPAM_LIC_EXPIRED
20117 - LOG_ID_AV_LIC_EXPIRED
20118 - LOG_ID_WEBF_STATUS_REACH
20119 - LOG_ID_WEBF_STATUS_UNREACH
20120 - LOG_ID_FMGC_LIC_EXPIRE
20121 - LOG_ID_FAZC_LIC_EXPIRE
20122 - LOG_ID_SWNO_LIC_EXPIRE
20123 - LOG_ID_SWNM_LIC_EXPIRE
20124 - LOG_ID_VMLS_LIC_EXPIRE
20125 - LOG_ID_SFAS_LIC_EXPIRE
20126 - LOG_ID_IPMC_LIC_EXPIRE
20127 - LOG_ID_IOTH_LIC_EXPIRE
20128 - LOG_ID_FSAC_LIC_EXPIRE
20129 - LOG_ID_AFAC_LIC_EXPIRE
20130 - LOG_ID_EMSC_ACC_LIC_EXPIRE
20131 - LOG_ID_FMGC_ACC_LIC_EXPIRE
20132 - LOG_ID_FSAP_ACC_LIC_EXPIRE
20133 - LOG_ID_FIREWALL_POLICY_EXPIRE
20134 - LOG_ID_FIREWALL_POLICY_EXPIRED
20135 - LOG_ID_FAIS_LIC_EXPIRE
20200 - LOG_ID_FIPS_SELF_TEST
20201 - LOG_ID_FIPS_SELF_ALL_TEST
20203 - LOG_ID_DAEMON_SHUTDOWN
20204 - LOG_ID_DAEMON_START
20205 - LOG_ID_DISK_FORMAT_REQ
20207 - LOG_ID_RAD_MISMATCH_VALID_TIME
20208 - LOG_ID_ZOMBIE_DAEMON_CLEANUP
20209 - LOG_ID_DISK_UNAVAIL
20210 - LOG_ID_DISK_TRIM_START
20211 - LOG_ID_DISK_TRIM_END
20212 - LOG_ID_DISK_SCAN_NEEDED
20213 - LOG_ID_DISK_LOG_CORRUPTED
20214 - LOG_ID_LOCAL_OUT_IOC
srcip Source IP ip 39
dstip Destination IP ip 39
20220 - LOGID_EVENT_SHAPER_OUTBOUND_MAXED_OUT
20221 - LOGID_EVENT_SHAPER_INBOUND_MAXED_OUT
20300 - LOG_ID_BGP_NB_STAT_CHG
20301 - LOG_ID_VZ_LOG_INFO
20302 - LOG_ID_OSPF_NB_STAT_CHG
20303 - LOG_ID_OSPF6_NB_STAT_CHG
20304 - LOG_ID_VZ_LOG_WARNING
20305 - LOG_ID_VZ_LOG_CRITICAL
20306 - LOG_ID_VZ_LOG_ERROR
20401 - LOG_ID_ROUTER_CLEAR
22000 - LOG_ID_INV_PKT_LEN
22001 - LOG_ID_UNSUPPORTED_PROT_VER
22002 - LOG_ID_INV_REQ_TYPE
22003 - LOG_ID_FAIL_SET_SIG_HANDLER
22004 - LOG_ID_FAIL_CREATE_SOCKET
22005 - LOG_ID_FAIL_CREATE_SOCKET_RETRY
22006 - LOG_ID_FAIL_REG_CMDB_EVENT
22009 - LOG_ID_FAIL_FIND_AV_PROFILE
22011 - LOG_ID_ENTER_MEM_CONSERVE_MODE
red string 32
22012 - LOG_ID_LEAVE_MEM_CONSERVE_MODE
red string 32
22013 - LOG_ID_IPPOOLPBA_BLOCK_EXHAUSTED
22014 - LOG_ID_IPPOOLPBA_NATIP_EXHAUSTED
22015 - LOG_ID_IPPOOLPBA_CREATE
22017 - LOG_ID_EXCEED_GLOB_RES_LIMIT
22018 - LOG_ID_EXCEED_VD_RES_LIMIT
22019 - LOG_ID_LOGRATE_OVER_LIMIT
22021 - LOG_ID_FAIL_CREATE_HA_SOCKET_RETRY
22031 - LOG_ID_SUCCESS_CSF_LOG_SYNC_CONFIG_CHANGED
22032 - LOG_ID_CSF_LOOP_FOUND
ip ip 39
22036 - LOG_ID_CSF_FGT_CONNECTED
ip ip 39
direction string 16
22037 - LOG_ID_CSF_FGT_DISCONNECTED
ip ip 39
direction string 16
22038 - LOG_ID_CSF_GLOBAL_SYNC_FAILED
22039 - LOG_ID_CSF_GLOBAL_SYNC_REPORT
scope string 16
22041 - LOG_ID_CSF_DEVICE_LEAVE
scope string 16
22042 - LOG_ID_CSF_DEVICE_UPDATE
scope string 16
22043 - LOG_ID_CSF_NEW_AUTH_REQ
22045 - LOG_ID_CSF_REMOVE_AUTH_REQ
22046 - LOG_ID_CSF_ROLE_CHANGE
22050 - LOG_ID_IPAMD_ADDRESS_ALLOCATED
ip ip 39
22051 - LOG_ID_IPAMD_ADDRESS_SET_FAILED
ip ip 39
22052 - LOG_ID_IPAMD_ADDRESS_INVALIDATED
22053 - LOG_ID_IPAMD_VALIDATION_COMPLETE
22060 - LOG_ID_IPAMSD_ADD_ENTRY
22061 - LOG_ID_IPAMSD_DELETE_ENTRY
22062 - LOG_ID_IPAMSD_FLAG_CONFLICT
22063 - LOG_ID_IPAMSD_UNFLAG_CONFLICT
upgradedevice string 80
22081 - LOG_ID_PROVISION_LATEST_FAILED
upgradedevice string 80
22090 - LOG_ID_FEDERATED_UPGRADE_CANCELLED
localdevcount uint32 5
failuredev string 80
22091 - LOG_ID_FEDERATED_UPGRADE_SUCCEEDED
localdevcount uint32 5
22092 - LOG_ID_FEDERATED_UPGRADE_FAILED
localdevcount uint32 5
failuredev string 80
22093 - LOG_ID_FEDERATED_UPGRADE_STEP_COMPLETE
22100 - LOG_ID_QUAR_DROP_TRAN_JOB
22101 - LOG_ID_QUAR_DROP_TLL_JOB
22102 - LOG_ID_LOG_DISK_FAILURE
22103 - LOG_ID_QUAR_LIMIT_REACHED
22104 - LOG_ID_POWER_RESTORE
22105 - LOG_ID_POWER_FAILURE
22106 - LOG_ID_POWER_OPTIONAL_NOT_DETECTED
22107 - LOG_ID_VOLT_ANOM
22109 - LOG_ID_TEMP_TOO_HIGH
22110 - LOG_ID_SPARE_BLOCK_LOW
22113 - LOG_ID_FNBAM_FAILURE
22114 - LOG_ID_POWER_FAILURE_WARNING
22115 - LOG_ID_POWER_RESTORE_NOTIF
22116 - LOG_ID_POWER_REDUNDANCY_DEGRADE
22117 - LOG_ID_POWER_REDUNDANCY_FAILURE
22150 - LOG_ID_VOLT_NOM
22151 - LOG_ID_FAN_NOM
22152 - LOG_ID_TEMP_TOO_LOW
22153 - LOG_ID_TEMP_NORM
22200 - LOG_ID_AUTO_UPT_CERT
22201 - LOG_ID_AUTO_GEN_CERT
22203 - LOG_ID_AUTO_GEN_CERT_FAIL
22204 - LOG_ID_AUTO_GEN_CERT_PENDING
22205 - LOG_ID_AUTO_GEN_CERT_SUCC
22207 - LOG_ID_CERT_EXPIRE_WARNING
22220 - LOG_ID_EXT_RESOURCE
22221 - LOG_ID_EXT_RESOURCE_FAIL
22222 - LOG_ID_EXT_RESOURCE_LOAD
22700 - LOG_ID_IPS_FAIL_OPEN
22701 - LOG_ID_IPS_FAIL_OPEN_END
22800 - LOG_ID_SCAN_SERV_FAIL
22802 - LOG_ID_ENTER_FD_CONSERVE_MODE
red string 32
red string 32
22804 - LOG_ID_LIC_STATUS_CHG
22805 - LOG_ID_FAIL_TO_VALIDATE_LIC
22806 - LOG_ID_DUP_LIC
22807 - LOG_ID_VDOM_LIC
22808 - LOG_ID_LIC_EXPIRE
22809 - LOG_ID_LIC_WILL_EXPIRE
22810 - LOG_ID_SCANUNIT_ERROR_BLOCK
srcip Source IP ip 39
dstip Destination IP ip 39
22811 - LOG_ID_SCANUNIT_ERROR_PASS
srcip Source IP ip 39
dstip Destination IP ip 39
22812 - LOG_ID_SCANUNIT_AVENG_RELOAD
22813 - LOG_ID_SCANUNIT_AVDB_RELOAD
22814 - LOG_ID_SCANUNIT_AVDB_RELOAD_ERROR
22815 - LOG_ID_SCANUNIT_AVDB_LOAD
22816 - LOG_ID_SCANUNIT_AVDB_LOAD_ERROR
22850 - LOG_ID_USER_QUARANTINE_MAC_ADD
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
action string 65
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
action string 65
22852 - LOG_ID_USER_QUARANTINE_MAC_BOUNCE_PORT_HIT
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
action string 65
sn string 64
22853 - LOG_ID_USER_QUARANTINE_MAC_BOUNCE_PORT_MISS
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
action string 65
sn string 64
22861 - LOG_ID_FLPOLD_NAC_ADD
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
action string 65
sn string 64
22862 - LOG_ID_FLPOLD_NAC_DELETE
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
action string 65
sn string 64
22863 - LOG_ID_FLPOLD_NAC_MODIFY
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
action string 65
sn string 64
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
action string 65
sn string 64
22865 - LOG_ID_FLPOLD_DPP_DELETE
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
action string 65
sn string 64
22866 - LOG_ID_FLPOLD_DPP_MODIFY
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
action string 65
sn string 64
22867 - LOG_ID_FLPOLD_DPP_INTF_TAGS_ADD
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
action string 65
sn string 64
22868 - LOG_ID_FLPOLD_DPP_INTF_TAGS_DELETE
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
action string 65
sn string 64
22869 - LOG_ID_FLPOLD_NAC_DYNAMIC_ADDRESS_ADD
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
action string 65
sn string 64
22870 - LOG_ID_FLPOLD_NAC_DYNAMIC_ADDRESS_DELETE
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
action string 65
sn string 64
22871 - LOG_ID_FLPOLD_NAC_MAC_CACHE_SYNC
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
action string 65
sn string 64
22890 - LOG_ID_FORTILINKD
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
22891 - LOG_ID_FLCFGD_SYNC_ERROR
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
22892 - LOG_ID_FLCFGD_SYNC_COMPLETE
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
22893 - LOG_ID_FLCFGD_SYNC_STATE
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
22895 - LOG_ID_FLCFGD_UPGRADE_STATUS
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
22896 - LOG_ID_FORTILINKD_CRITICAL
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
22897 - LOG_ID_FORTILINKD_SPLIT_PORT_INFO
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
22900 - LOG_ID_CAPUTP_SESSION
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
22901 - LOG_ID_FAZ_CON
22902 - LOG_ID_FAZ_DISCON
22903 - LOG_ID_FAZ_CON_ERR
22904 - LOG_ID_CAPUTP_SESSION_NOTIF
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
action string 65
sn string 64
srcip ip 39
22912 - LOG_ID_FDS_SRV_ERRCON
22913 - LOG_ID_FDS_SRV_DISCON
22915 - LOG_ID_FDS_SRV_CON
22916 - LOG_ID_FDS_STATUS
22917 - LOG_ID_FDS_SMS_QUOTA
22918 - LOG_ID_FDS_CTRL_STATUS
22919 - LOG_ID_SVR_LOG_STATUS_CHANGED
22921 - LOG_ID_EVENT_ROUTE_INFO_CHANGED
22923 - LOG_ID_EVENT_VWL_LQTY_STATUS
eventtype string 32
healthcheck string 64
slatargetid uint32 10
oldvalue string 32
newvalue string 32
serviceid uint32 10
numpassmember uint32 10
22924 - LOG_ID_EVENT_VWL_VOLUME_STATUS
eventtype string 32
22925 - LOG_ID_EVENT_VWL_SLA_INFO
eventtype string 32
healthcheck string 64
slatargetid uint32 10
latency string 24
jitter string 24
packetloss string 24
moscodec string 24
mosvalue string 24
inbandwidthavailable string 24
outbandwidthavailable string 24
bibandwidthavailable string 24
inbandwidthused string 24
outbandwidthused string 24
bibandwidthused string 24
slamap string 24
22926 - LOG_ID_EVENT_VWL_NEIGHBOR_STATUS
eventtype string 32
neighbor string 46
22927 - LOG_ID_EVENT_VWL_NEIGHBOR_STANDALONE
eventtype string 32
oldvalue string 32
newvalue string 32
22928 - LOG_ID_EVENT_VWL_NEIGHBOR_PRIMARY
eventtype string 32
oldvalue string 32
newvalue string 32
22929 - LOG_ID_EVENT_VWL_NEIGHBOR_SECONDARY
eventtype string 32
oldvalue string 32
newvalue string 32
22930 - LOG_ID_EVENT_VWL_LQTY_STATUS_WARNING
eventtype string 32
serviceid uint32 10
22931 - LOG_ID_EVENT_VWL_SLA_INFO_WARNING
eventtype string 32
healthcheck string 64
oldvalue string 32
newvalue string 32
22932 - LOG_ID_EVENT_LINK_MONITOR_STATUS_WARNING
22933 - LOG_ID_EVENT_VWL_SLA_INFO_NOTIF
eventtype string 32
healthcheck string 64
slatargetid uint32 10
oldvalue string 32
newvalue string 32
latency string 24
jitter string 24
packetloss string 24
moscodec string 24
mosvalue string 24
inbandwidthavailable string 24
outbandwidthavailable string 24
bibandwidthavailable string 24
inbandwidthused string 24
outbandwidthused string 24
bibandwidthused string 24
slamap string 24
22934 - LOG_ID_EVENT_VWL_LQTY_STATUS_INFO
eventtype string 32
healthcheck string 64
slatargetid uint32 10
22935 - LOG_ID_EVENT_VWL_LQTY_STATUS_DEBUG
eventtype string 32
serviceid uint32 10
22936 - LOG_ID_EVENT_VWL_INET_SVC_PQTY_STATUS_INFO
eventtype string 32
serviceid uint32 10
latency string 24
jitter string 24
packetloss string 24
inbandwidthused string 24
outbandwidthused string 24
bibandwidthused string 24
22949 - LOG_ID_FDS_JOIN
22950 - LOG_ID_FDS_LOGIN_SUCC
22951 - LOG_ID_FDS_LOGOUT
22952 - LOG_ID_FDS_LOGIN_FAIL
22954 - LOG_ID_INET_SVC_OBSOLETE
22955 - LOG_ID_INET_SVC_NAME_FAILURE
22956 - LOG_ID_INET_SVC_NAME_UPDATE
23101 - LOG_ID_IPSEC_TUNNEL_UP
23102 - LOG_ID_IPSEC_TUNNEL_DOWN
23103 - LOG_ID_IPSEC_TUNNEL_STAT
26001 - LOG_ID_DHCP_ACK
ip ip 39
26002 - LOG_ID_DHCP_RELEASE
ip ip 39
26004 - LOG_ID_DHCP_CLIENT_LEASE
26005 - LOG_ID_DHCP_LEASE_USAGE_HIGH
26006 - LOG_ID_DHCP_LEASE_USAGE_FULL
26007 - LOG_ID_DHCP_BLOCKED_MAC
26008 - LOG_ID_DHCP_DDNS_ADD
ip ip 39
26009 - LOG_ID_DHCP_DDNS_DELETE
ip ip 39
26010 - LOG_ID_DHCP_DDNS_COMPLETED
ip ip 39
26011 - LOG_ID_DHCPV6_REPLY
ip ip 39
ip ip 39
27001 - LOG_ID_VRRP_STATE_CHG
29001 - LOG_ID_PPPD_MSG
29002 - LOG_ID_PPPD_AUTH_SUC
29003 - LOG_ID_PPPD_AUTH_FAIL
29005 - LOG_ID_PPPD_MSG_DEBUG
29010 - LOG_ID_PPPOE_STATUS_REPORT_NOTIF
29011 - LOG_ID_PPPD_FAIL_TO_EXEC
29013 - LOG_ID_PPPD_START
29014 - LOG_ID_PPPD_EXIT
29015 - LOG_ID_PPP_RCV_BAD_PEER_IP
29016 - LOG_ID_PPP_RCV_BAD_LOCAL_IP
29021 - LOG_ID_EVENT_AUTH_SNMP_QUERY_FAILED
srcip Source IP ip 39
dstip Destination IP ip 39
29022 - LOG_ID_DDNS_UPDATE_FAIL
32001 - LOG_ID_ADMIN_LOGIN_SUCC
srcip Source IP ip 39
dstip Destination IP ip 39
32002 - LOG_ID_ADMIN_LOGIN_FAIL
srcip Source IP ip 39
dstip Destination IP ip 39
32003 - LOG_ID_ADMIN_LOGOUT
srcip Source IP ip 39
dstip Destination IP ip 39
32005 - LOG_ID_ADMIN_OVERIDE_VDOM
32006 - LOG_ID_ADMIN_ENTER_VDOM
32007 - LOG_ID_ADMIN_LEFT_VDOM
32008 - LOG_ID_VIEW_DISK_LOG_FAIL
32009 - LOG_ID_SYSTEM_START
32010 - LOG_ID_DISK_LOG_FULL
32011 - LOG_ID_LOG_ROLL
32014 - LOG_ID_CS_LIC_EXPIRE
32015 - LOG_ID_DISK_LOG_USAGE
32017 - LOG_ID_FDS_DAILY_QUOTA_FULL
32019 - LOG_ID_CC_ENTER_ERR_MOD
32020 - LOG_ID_SSH_CORRPUT_MAC
32021 - LOG_ID_ADMIN_LOGIN_DISABLE
32023 - LOG_ID_MEM_LOG_FIRST_FULL
32024 - LOG_ID_ADMIN_PASSWD_EXPIRE
32025 - LOG_ID_SSH_REKEY
32026 - LOG_ID_SSH_BAD_PACKET_LENGTH
32027 - LOG_ID_VIEW_DISK_LOG_SUCC
32028 - LOG_ID_LOG_DEL_DIR
32029 - LOG_ID_LOG_DEL_FILE
32030 - LOG_ID_SEND_FDS_STAT
32031 - LOG_ID_VIEW_MEM_LOG_FAIL
32032 - LOG_ID_DISK_DLP_ARCH_FULL
32034 - LOG_ID_DISK_REPORT_FULL
32035 - LOG_ID_VDOM_DISABLED
32036 - LOG_ID_DISK_IPS_ARCH_FULL
32037 - LOG_ID_DISK_LOG_FIRST_FULL
32038 - LOG_ID_LOG_ROLL_FORTICRON
32039 - LOG_ID_VIEW_MEM_LOG_SUCC
32041 - LOG_ID_REPORT_DELETED_GUI
32042 - LOG_ID_MEM_LOG_SECOND_FULL
32043 - LOG_ID_MEM_LOG_FINAL_FULL
32044 - LOG_ID_LOG_DELETE
32045 - LOG_ID_MGR_LIC_EXPIRE
32048 - LOG_ID_SCHEDULE_EXPIRE
32050 - LOG_ID_POL_PKT_CAPTURE_FULL
32051 - LOG_ID_LOG_UPLOAD
32052 - LOG_ID_UPLOAD_RUN_SCRIPT
32053 - LOG_ID_ADMIN_MTNER_LOGIN_SUCC
srcip Source IP ip 39
dstip Destination IP ip 39
32054 - LOG_ID_ADMIN_MTNER_LOGOUT
srcip Source IP ip 39
dstip Destination IP ip 39
32057 - LOG_ID_VIEW_FAZ_LOG_FAIL
32058 - LOG_ID_VIEW_FAZ_LOG_SUCC
32095 - LOG_ID_GUI_CHG_SUB_MODULE
32096 - LOG_ID_GUI_DOWNLOAD_LOG
32097 - LOG_ID_DELETE_CAPTURE_PKT
32099 - LOG_ID_CHG_CONFIG_INFO
32100 - LOG_ID_FORTI_TOKEN_SYNC
32102 - LOG_ID_CHG_CONFIG
32104 - LOG_ID_CHG_CONFIG_GUI
32105 - LOG_ID_NTP_SVR_STAUS_CHG_REACHABLE
32106 - LOG_ID_NTP_SVR_STAUS_CHG_RESOLVABLE
32107 - LOG_ID_NTP_SVR_STAUS_CHG_UNRESOLVABLE
32108 - LOG_ID_NTP_SVR_STAUS_CHG_UNREACHABLE
32109 - LOG_ID_UPD_SIGN_AV_DB
32110 - LOG_ID_UPD_SIGN_IPS_DB
32111 - LOG_ID_UPD_SIGN_AVIPS_DB
32113 - LOG_ID_UPD_SIGN_SRCVIS_DB
32114 - LOG_ID_UPD_SIGN_GEOIP_DB
32116 - LOG_ID_UPD_SIGN_AVPKG_FAILURE
32117 - LOG_ID_UPD_SIGN_AVPKG_SUCCESS
32118 - LOG_ID_UPD_ADMIN_AV_DB
32119 - LOG_ID_UPD_SCANUNIT_AV_DB
32129 - LOG_ID_ADD_GUEST
32130 - LOG_ID_CHG_USER
32131 - LOG_ID_DEL_GUEST
32132 - LOG_ID_ADD_USER
32138 - LOG_ID_REBOOT
32139 - LOG_ID_WAKE_ON_LAN
32140 - LOG_ID_TIME_USER_SETTING_CHG
srcip Source IP ip 39
32141 - LOG_ID_TIME_NTP_SETTING_CHG
32142 - LOG_ID_BACKUP_CONF
32143 - LOG_ID_BACKUP_CONF_BY_SCP
32144 - LOG_ID_BACKUP_CONF_ERROR
32145 - LOG_ID_BACKUP_CONF_ALERT
32146 - LOG_ID_TIME_PTP_SETTING_CHG
32148 - LOG_ID_GET_CRL
32151 - LOG_ID_ADD_IP6_LOCAL_POL
32152 - LOG_ID_CHG_IP6_LOCAL_POL
32153 - LOG_ID_DEL_IP6_LOCAL_POL
32155 - LOG_ID_ACT_FTOKEN_REQ
32156 - LOG_ID_ACT_FTOKEN_SUCC
32157 - LOG_ID_SYNC_FTOKEN_SUCC
32158 - LOG_ID_SYNC_FTOKEN_FAIL
32159 - LOG_ID_ACT_FTOKEN_FAIL
32160 - LOG_ID_FTM_PUSH_SUCC
32161 - LOG_ID_FTM_PUSH_FAIL
32168 - LOG_ID_REACH_VDOM_LIMIT
32170 - LOG_ID_ALARM_MSG
32171 - LOG_ID_ALARM_ACK
32172 - LOG_ID_ADD_IP4_LOCAL_POL
32173 - LOG_ID_CHG_IP4_LOCAL_POL
32174 - LOG_ID_DEL_IP4_LOCAL_POL
32180 - LOG_ID_GEOIP_DB_INIT_FAIL
32191 - LOG_ID_UPT_INVALID_IMG_CC
32192 - LOG_ID_UPT_INVALID_IMG_RSA
32193 - LOG_ID_UPT_IMG_RSA
32194 - LOG_ID_UPT_IMG_FAIL
32200 - LOG_ID_SHUTDOWN
32201 - LOG_ID_LOAD_IMG_SUCC
32202 - LOG_ID_RESTORE_IMG
32203 - LOG_ID_RESTORE_CONF
32204 - LOG_ID_RESTORE_FGD_SVR
32205 - LOG_ID_RESTORE_VDOM_LIC
32206 - LOG_ID_RESTORE_SCRIPT
32207 - LOG_ID_RETRIEVE_CONF_LIST
32208 - LOG_ID_IMP_PKCS12_CERT
32210 - LOG_ID_BACKUP_IMG_SUCC
32211 - LOG_ID_UPLOAD_REVISION
32212 - LOG_ID_DEL_REVISION
32213 - LOG_ID_RESTORE_TEMPLATE
32215 - LOG_ID_UPT_IMG
32217 - LOG_ID_UPD_IPS
32218 - LOG_ID_UPD_DLP
32220 - LOG_ID_BACKUP_COMMAND
32221 - LOG_ID_UPD_VDOM_LIC
32222 - LOG_ID_GLB_SETTING_CHG
32223 - LOG_ID_BACKUP_USER_DEF_IPS
32225 - LOG_ID_DEL_ALL_REVISION
32226 - LOG_ID_LOAD_IMG_FAIL
32227 - LOG_ID_UPD_DLP_FAIL
32228 - LOG_ID_LOAD_IMG_FAIL_WRONG_IMG
32229 - LOG_ID_LOAD_IMG_FAIL_NO_RSA
32230 - LOG_ID_LOAD_IMG_FAIL_INVALID_RSA
32231 - LOG_ID_RESTORE_FGD_SVR_FAIL
32232 - LOG_ID_RESTORE_VDOM_LIC_FAIL
32234 - LOG_ID_RESTORE_IMG_INVALID_CC
32235 - LOG_ID_RESTORE_IMG_FORTIGUARD
32236 - LOG_ID_BACKUP_MEM_LOG
32238 - LOG_ID_BACKUP_DISK_LOG_FAIL
32239 - LOG_ID_BACKUP_DISK_LOG_USB
32240 - LOG_ID_SYS_USB_MODE
32241 - LOG_ID_BACKUP_DISK_LOG_USB_FAIL
32242 - LOG_ID_UPD_VDOM_LIC_FAIL
32243 - LOG_ID_UPD_IPS_SCP
32244 - LOG_ID_UPD_IPS_SCP_FAIL
32245 - LOG_ID_BACKUP_USER_DEF_IPS_FAIL
32247 - LOG_ID_SSH_NEGOTIATION_FAILURE
32252 - LOG_ID_FACTORY_RESET
32253 - LOG_ID_FORMAT_RAID
32254 - LOG_ID_ENABLE_RAID
32255 - LOG_ID_DISABLE_RAID
32260 - LOG_ID_RESTORE_IMG_FORTIGUARD_NOTIF
32261 - LOG_ID_RESTORE_SCRIPT_NOTIF
32262 - LOG_ID_RESTORE_IMG_CONFIRM
32300 - LOG_ID_UPLOAD_RPT_IMG
32301 - LOG_ID_ADD_VDOM
32302 - LOG_ID_DEL_VDOM
32545 - LOG_ID_SYS_RESTART
32546 - LOG_ID_APPLICATION_CRASH
32547 - LOG_ID_AUTOSCRIPT_START
32548 - LOG_ID_AUTOSCRIPT_STOP
32549 - LOG_ID_AUTOSCRIPT_STOP_AUTO
32550 - LOG_ID_AUTOSCRIPT_DELETE_RSLT
32551 - LOG_ID_AUTOSCRIPT_BACKUP_RSLT
32552 - LOG_ID_AUTOSCRIPT_CHECK_STATUS
32553 - LOG_ID_AUTOSCRIPT_STOP_REACH_LIMIT
32554 - LOG_ID_UPD_ADMIN_DB
32561 - LOG_ID_ADMIN_LOGOUT_DISCONNECT
srcip Source IP ip 39
dstip Destination IP ip 39
32562 - LOG_ID_STORE_CONF_FAIL_SPACE
32564 - LOG_ID_RESTORE_CONF_FAIL
32565 - LOG_ID_RESTORE_CONF_BY_MGMT
32568 - LOG_ID_DEL_REVISION_DB
32569 - LOG_ID_FSW_SWITCH_LOG_EVENT
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
cfgtid uint32 10
32570 - LOG_ID_ADMIN_MTNER_LOGOUT_DISCONNECT
srcip Source IP ip 39
dstip Destination IP ip 39
32571 - LOG_ID_RESTORE_CONF_FAIL_WARNING
32601 - LOG_ID_FGT_SWITCH_LOG_DISCOVER
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
32602 - LOG_ID_FGT_SWITCH_LOG_AUTH
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
32604 - LOG_ID_FGT_SWITCH_LOG_DELETE
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
32605 - LOG_ID_FGT_SWITCH_LOG_TUNNEL_UP
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
32606 - LOG_ID_FGT_SWITCH_LOG_TUNNEL_DOWN
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
32607 - LOG_ID_FGT_SWITCH_PUSH_IMAGE
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
32609 - LOG_ID_FGT_SWITCH_DISABLE_DISCOVERY
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
32610 - LOG_ID_FGT_SWITCH_LOG_WARNING
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
32611 - LOG_ID_FGT_SWITCH_EXPORT_POOL
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
32612 - LOG_ID_FGT_SWITCH_EXPORT_VDOM
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
32613 - LOG_ID_FGT_SWITCH_REQUEST_PORT
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
32614 - LOG_ID_FGT_SWITCH_RETURN_PORT
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
32615 - LOG_ID_FGT_SWITCH_MAC_ADD
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
32616 - LOG_ID_FGT_SWITCH_MAC_DEL
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
32693 - LOG_ID_FGT_SWITCH_GROUP_SWC
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
cfgtid uint32 10
32694 - LOG_ID_FGT_SWITCH_GROUP_POE
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
cfgtid uint32 10
32695 - LOG_ID_FGT_SWITCH_GROUP_LINK
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
cfgtid uint32 10
32696 - LOG_ID_FGT_SWITCH_GROUP_STP
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
cfgtid uint32 10
32697 - LOG_ID_FGT_SWITCH_GROUP_SWITCH
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
cfgtid uint32 10
32698 - LOG_ID_FGT_SWITCH_GROUP_ROUTER
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
cfgtid uint32 10
32699 - LOG_ID_FGT_SWITCH_GROUP_SYSTEM
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
ui string 64
sn string 64
cfgtid uint32 10
34415 - LOG_ID_NP6_IPSEC_ENGINE_BUSY
34416 - LOG_ID_NP6_IPSEC_ENGINE_POSSIBLY_LOCKUP
34417 - LOG_ID_NP6_IPSEC_ENGINE_LOCKUP
34418 - LOG_ID_NP6_HPE_PACKET_DROP
34419 - LOG_ID_NP6_HPE_PACKET_FLOOD
34428 - LOG_ID_NP7_HPE_PACKET_DROP
34430 - LOG_ID_NP7_HPE_PACKET_FLOOD
35001 - LOG_ID_HA_SYNC_VIRDB
35002 - LOG_ID_HA_SYNC_ETDB
35003 - LOG_ID_HA_SYNC_EXDB
35004 - LOG_ID_HA_SYNC_FLDB
35007 - LOG_ID_HA_SYNC_AV
35009 - LOG_ID_HA_SYNC_CID
35012 - LOG_ID_CONF_SYNC_FAIL
35013 - LOG_ID_HA_FAILOVER_FAIL
35015 - LOG_ID_HA_CLEAR_HISTORY
35016 - LOG_ID_HA_FAILOVER_SUCCESS
36881 - LOG_ID_EVENT_SYSTEM_CFG_REVERT
36882 - LOG_ID_EVENT_SYSTEM_CFG_MANUALLY_SAVED
36883 - LOG_ID_EVENT_SYSTEM_CLEAR_ACTIVE_SESSION
37120 - MESGID_NEG_GENERIC_P1_NOTIF
advpnsc uint8 3
37121 - MESGID_NEG_GENERIC_P1_ERROR
advpnsc uint8 3
advpnsc uint8 3
37123 - MESGID_NEG_GENERIC_P2_ERROR
advpnsc uint8 3
37124 - MESGID_NEG_I_P1_ERROR
advpnsc uint8 3
37125 - MESGID_NEG_I_P2_ERROR
advpnsc uint8 3
37126 - MESGID_NEG_NO_STATE_ERROR
advpnsc uint8 3
37127 - MESGID_NEG_PROGRESS_P1_NOTIF
advpnsc uint8 3
init string 6
stage uint8 3
37128 - MESGID_NEG_PROGRESS_P1_ERROR
advpnsc uint8 3
init string 6
stage uint8 3
37129 - MESGID_NEG_PROGRESS_P2_NOTIF
advpnsc uint8 3
init string 6
stage uint8 3
37130 - MESGID_NEG_PROGRESS_P2_ERROR
advpnsc uint8 3
init string 6
stage uint8 3
37131 - MESGID_ESP_ERROR
advpnsc uint8 3
37132 - MESGID_ESP_CRITICAL
advpnsc uint8 3
37133 - MESGID_INSTALL_SA
advpnsc uint8 3
37134 - MESGID_DELETE_P1_SA
advpnsc uint8 3
37135 - MESGID_DELETE_P2_SA
advpnsc uint8 3
37136 - MESGID_DPD_FAILURE
advpnsc uint8 3
37137 - MESGID_CONN_FAILURE
advpnsc uint8 3
37138 - MESGID_CONN_UPDOWN
advpnsc uint8 3
37139 - MESGID_P2_UPDOWN
advpnsc uint8 3
37141 - MESGID_CONN_STATS
advpnsc uint8 3
37889 - MESGID_VC_DELETE
37890 - MESGID_VC_MOVE_VDOM
37891 - MESGID_VC_ADD_VDOM
37892 - MESGID_VC_MOVE_MEMB_STATE
37893 - MESGID_VC_DETECT_MEMB_DEAD
37894 - MESGID_VC_DETECT_MEMB_JOIN
37895 - MESGID_VC_ADD_HADEV
37896 - MESGID_VC_DEL_HADEV
37897 - MESGID_HADEV_READY
37898 - MESGID_HADEV_FAIL
37899 - MESGID_HADEV_PEERINFO
37900 - MESGID_HBDEV_DELETE
37901 - MESGID_HBDEV_DOWN
37902 - MESGID_HBDEV_UP
37903 - MESGID_SYNC_STATUS
37904 - MESGID_HA_ACTIVITY
37907 - MESGID_VLAN_HB_UP
37908 - MESGID_VLAN_HB_DOWN
37909 - MESGID_VLAN_HB_DOWN_SUM
37910 - MESGID_HB_PACKET_LOST
37911 - MESGID_HA_ACTIVITY_INFO
ip ip 39
37912 - MESGID_FGSP_MEMBER_JOIN
37913 - MESGID_FGSP_MEMBER_LEAVE
38011 - LOG_ID_FIPS_DECRY_FAIL
38012 - LOG_ID_ENTROPY_TOKEN
38031 - LOG_ID_FSSO_LOGON
srcip Source IP ip 39
38032 - LOG_ID_FSSO_LOGOFF
srcip Source IP ip 39
38033 - LOG_ID_FSSO_SVR_STATUS
38403 - LOGID_EVENT_NOTIF_INSUFFICIENT_RESOURCE
38404 - LOGID_EVENT_NOTIF_HOSTNAME_ERROR
38405 - LOGID_NOTIF_CODE_SENDTO_SMS_PHONE
38407 - LOGID_NOTIF_CODE_SENDTO_EMAIL
38408 - LOGID_EVENT_OFTP_SSL_CONNECTED
dstip Destination IP ip 39
38409 - LOGID_EVENT_OFTP_SSL_DISCONNECTED
dstip Destination IP ip 39
38410 - LOGID_EVENT_OFTP_SSL_FAILED
dstip Destination IP ip 39
38412 - LOGID_EVENT_TOKEN_CODE_SENDTO
38656 - LOGID_EVENT_RAD_RPT_PROTO_ERROR
38657 - LOGID_EVENT_RAD_RPT_PROF_NOT_FOUND
38659 - LOGID_EVENT_RAD_RPT_ACCT_STOP_MISSED
38660 - LOGID_EVENT_RAD_RPT_ACCT_EVENT
38661 - LOGID_EVENT_RAD_RPT_OTHER
srcip Source IP ip 39
38663 - LOGID_EVENT_RAD_STAT_PROF_NOT_FOUND
srcip Source IP ip 39
38665 - LOGID_EVENT_RAD_STAT_ACCT_STOP_MISSED
srcip Source IP ip 39
38666 - LOGID_EVENT_RAD_STAT_ACCT_EVENT
srcip Source IP ip 39
38667 - LOGID_EVENT_RAD_STAT_OTHER
srcip Source IP ip 39
38668 - LOGID_EVENT_RAD_STAT_EP_BLK
srcip Source IP ip 39
39424 - LOG_ID_EVENT_SSL_VPN_USER_TUNNEL_UP
39936 - LOG_ID_EVENT_SSL_VPN_SESSION_WEB_TUNNEL_STATS
39937 - LOG_ID_EVENT_SSL_VPN_SESSION_WEBAPP_DENY
39938 - LOG_ID_EVENT_SSL_VPN_SESSION_WEBAPP_PASS
39939 - LOG_ID_EVENT_SSL_VPN_SESSION_WEBAPP_TIMEOUT
39940 - LOG_ID_EVENT_SSL_VPN_SESSION_WEBAPP_CLOSE
39941 - LOG_ID_EVENT_SSL_VPN_SESSION_SYS_BUSY
39942 - LOG_ID_EVENT_SSL_VPN_SESSION_CERT_OK
39943 - LOG_ID_EVENT_SSL_VPN_SESSION_NEW_CON
39944 - LOG_ID_EVENT_SSL_VPN_SESSION_ALERT
39945 - LOG_ID_EVENT_SSL_VPN_SESSION_EXIT_FAIL
39946 - LOG_ID_EVENT_SSL_VPN_SESSION_EXIT_ERR
39947 - LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_UP
39948 - LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_DOWN
39949 - LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_STATS
39950 - LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_UNKNOWNTAG
39951 - LOG_ID_EVENT_SSL_VPN_SESSION_TUNNEL_ERROR
39952 - LOG_ID_EVENT_SSL_VPN_SESSION_ENTER_CONSERVE_MODE
39953 - LOG_ID_EVENT_SSL_VPN_SESSION_LEAVE_CONSERVE_MODE
40001 - LOG_ID_PPTP_TUNNEL_UP
40002 - LOG_ID_PPTP_TUNNEL_DOWN
40003 - LOG_ID_PPTP_TUNNEL_STAT
40014 - LOG_ID_PPTP_REACH_MAX_CON
40019 - LOG_ID_L2TPD_CLIENT_DISCON
40021 - LOG_ID_PPTP_NOT_CONIG
40022 - LOG_ID_PPTP_NO_IP_AVAIL
40034 - LOG_ID_PPTP_START
40035 - LOG_ID_PPTP_START_FAIL
40036 - LOG_ID_PPTP_EXIT
40038 - LOG_ID_PPTPD_CLIENT_CON
40039 - LOG_ID_PPTPD_CLIENT_DISCON
40101 - LOG_ID_L2TP_TUNNEL_UP
40102 - LOG_ID_L2TP_TUNNEL_DOWN
40103 - LOG_ID_L2TP_TUNNEL_STAT
40115 - LOG_ID_L2TPD_EXIT
40118 - LOG_ID_L2TPD_CLIENT_CON
40704 - LOG_ID_EVENT_SYS_PERF
freediskstorage uint32 10
sysuptime uint32 10
This log message is only sent to remote FortiAnalyzer and memory, but not to disk.
40705 - LOG_ID_EVENT_SYS_CPU_USAGE
40706 - LOG_ID_EVENT_SYS_BROKEN_SYMBOLIC_LINK
ip ip 39
41000 - LOG_ID_UPD_FGT_SUCC
41001 - LOG_ID_UPD_FGT_FAIL
41002 - LOG_ID_UPD_SRC_VIS
41006 - LOG_ID_UPD_FSA_VIRDB
41007 - LOG_ID_UPD_MANUAL_LICENSE_SUCC
41008 - LOG_ID_UPD_MANUAL_LICENSE_FAIL
41009 - LOG_ID_UPD_DB_SIGN_INVALID
41984 - LOG_ID_EVENT_VPN_CERT_LOAD
41985 - LOG_ID_EVENT_VPN_CERT_REMOVAL
41986 - LOG_ID_EVENT_VPN_CERT_REGEN
41987 - LOG_ID_EVENT_VPN_CERT_UPDATE
41988 - LOG_ID_EVENT_SSL_VPN_SETTING_UPDATE
41989 - LOG_ID_EVENT_VPN_CERT_ERR
41990 - LOG_ID_EVENT_VPN_CERT_UPDATE_FAILED
41991 - LOG_ID_EVENT_VPN_CERT_EXPORT
41992 - LOG_ID_EVENT_VPN_CERT_CRL_EXPIRED
42201 - LOG_ID_NETX_VMX_ATTACH
42202 - LOG_ID_NETX_VMX_DETACH
42203 - LOG_ID_NETX_VMX_DENIED
43008 - LOG_ID_EVENT_AUTH_SUCCESS
srcip Source IP ip 39
dstip Destination IP ip 39
43009 - LOG_ID_EVENT_AUTH_FAILED
srcip Source IP ip 39
dstip Destination IP ip 39
43010 - LOG_ID_EVENT_AUTH_LOCKOUT
srcip Source IP ip 39
dstip Destination IP ip 39
authid string 36
43011 - LOG_ID_EVENT_AUTH_TIME_OUT
srcip Source IP ip 39
dstip Destination IP ip 39
43014 - LOG_ID_EVENT_AUTH_FSAE_LOGON
srcip Source IP ip 39
43015 - LOG_ID_EVENT_AUTH_FSAE_LOGOFF
srcip Source IP ip 39
43016 - LOG_ID_EVENT_AUTH_NTLM_AUTH_SUCCESS
srcip Source IP ip 39
dstip Destination IP ip 39
43017 - LOG_ID_EVENT_AUTH_NTLM_AUTH_FAIL
srcip Source IP ip 39
dstip Destination IP ip 39
43018 - LOG_ID_EVENT_AUTH_FGOVRD_FAIL
srcip Source IP ip 39
dstip Destination IP ip 39
43020 - LOG_ID_EVENT_AUTH_FGOVRD_SUCCESS
srcip Source IP ip 39
dstip Destination IP ip 39
43025 - LOG_ID_EVENT_AUTH_PROXY_SUCCESS
srcip Source IP ip 39
dstip Destination IP ip 39
authid string 36
43026 - LOG_ID_EVENT_AUTH_PROXY_FAILED
srcip Source IP ip 39
dstip Destination IP ip 39
authid string 36
43027 - LOG_ID_EVENT_AUTH_PROXY_TIME_OUT
srcip Source IP ip 39
dstip Destination IP ip 39
43028 - LOG_ID_EVENT_AUTH_PROXY_GROUP_INFO_FAILED
srcip Source IP ip 39
dstip Destination IP ip 39
authid string 36
43029 - LOG_ID_EVENT_AUTH_WARNING_SUCCESS
srcip Source IP ip 39
dstip Destination IP ip 39
43030 - LOG_ID_EVENT_AUTH_WARNING_TBL_FULL
srcip Source IP ip 39
dstip Destination IP ip 39
43032 - LOG_ID_EVENT_AUTH_PROXY_USER_LIMIT_REACHED
srcip Source IP ip 39
dstip Destination IP ip 39
authid string 36
43033 - LOG_ID_EVENT_AUTH_PROXY_MULTIPLE_LOGIN
srcip Source IP ip 39
dstip Destination IP ip 39
authid string 36
43034 - LOG_ID_EVENT_AUTH_PROXY_NO_RESP
srcip Source IP ip 39
dstip Destination IP ip 39
43038 - LOG_ID_EVENT_AUTH_IPV6_FLUSH
43039 - LOG_ID_EVENT_AUTH_LOGON
srcip Source IP ip 39
43040 - LOG_ID_EVENT_AUTH_LOGOUT
srcip Source IP ip 39
43041 - LOG_ID_EVENT_AUTH_DISCLAIMER_ACCEPT
srcip Source IP ip 39
dstip Destination IP ip 39
43042 - LOG_ID_EVENT_AUTH_DISCLAIMER_DECLINE
srcip Source IP ip 39
dstip Destination IP ip 39
43043 - LOG_ID_EVENT_AUTH_EMAIL_COLLECTING_SUCCESS
srcip Source IP ip 39
dstip Destination IP ip 39
43044 - LOG_ID_EVENT_AUTH_EMAIL_COLLECTING_FAIL
srcip Source IP ip 39
dstip Destination IP ip 39
43045 - LOG_ID_EVENT_AUTH_8021X_SUCCESS
43046 - LOG_ID_EVENT_AUTH_8021X_FAIL
43050 - LOG_ID_EVENT_AUTH_FSAE_CONNECT
43051 - LOG_ID_EVENT_AUTH_FSAE_DISCONNECT
43520 - LOG_ID_EVENT_WIRELESS_SYS
43521 - LOG_ID_EVENT_WIRELESS_ROGUE
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43522 - LOG_ID_EVENT_WIRELESS_WTP
ip ip 39
43524 - LOG_ID_EVENT_WIRELESS_STA
srcip Source IP ip 39
snr int8 4
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43526 - LOG_ID_EVENT_WIRELESS_WTPR
ip ip 39
slctdrmamode string 10
operdrmamode string 10
43527 - LOG_ID_EVENT_WIRELESS_ROGUE_CFG
43528 - LOG_ID_EVENT_WIRELESS_WTPR_ERROR
ip ip 39
slctdrmamode string 10
operdrmamode string 10
43529 - LOG_ID_EVENT_WIRELESS_CLB
43530 - LOG_ID_EVENT_WIRELESS_WIDS_WL_BRIDGE
43531 - LOG_ID_EVENT_WIRELESS_WIDS_BR_DEAUTH
43532 - LOG_ID_EVENT_WIRELESS_WIDS_NL_PBRESP
43534 - LOG_ID_EVENT_WIRELESS_WIDS_LONG_DUR
43535 - LOG_ID_EVENT_WIRELESS_WIDS_WEP_IV
43542 - LOG_ID_EVENT_WIRELESS_WIDS_EAPOL_FLOOD
43544 - LOG_ID_EVENT_WIRELESS_WIDS_MGMT_FLOOD
43546 - LOG_ID_EVENT_WIRELESS_WIDS_SPOOF_DEAUTH
43548 - LOG_ID_EVENT_WIRELESS_WIDS_ASLEAP
43551 - LOG_ID_EVENT_WIRELESS_WTP_JOIN
ip ip 39
43552 - LOG_ID_EVENT_WIRELESS_WTP_LEAVE
ip ip 39
43553 - LOG_ID_EVENT_WIRELESS_WTP_FAIL
ip ip 39
43554 - LOG_ID_EVENT_WIRELESS_WTP_UPDATE
ip ip 39
43555 - LOG_ID_EVENT_WIRELESS_WTP_RESET
ip ip 39
43556 - LOG_ID_EVENT_WIRELESS_WTP_KICK
ip ip 39
43557 - LOG_ID_EVENT_WIRELESS_WTP_ADD_FAILURE
ip ip 39
43558 - LOG_ID_EVENT_WIRELESS_WTP_CFG_ERR
ip ip 39
43559 - LOG_ID_EVENT_WIRELESS_WTP_SN_MISMATCH
ip ip 39
43560 - LOG_ID_EVENT_WIRELESS_SYS_AC_RESTARTED
43561 - LOG_ID_EVENT_WIRELESS_SYS_AC_HOSTAPD_UP
43562 - LOG_ID_EVENT_WIRELESS_SYS_AC_HOSTAPD_DOWN
43563 - LOG_ID_EVENT_WIRELESS_ROGUE_DETECT
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43564 - LOG_ID_EVENT_WIRELESS_ROGUE_OFFAIR
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43565 - LOG_ID_EVENT_WIRELESS_ROGUE_ONAIR
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43566 - LOG_ID_EVENT_WIRELESS_ROGUE_OFFWIRE
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43567 - LOG_ID_EVENT_WIRELESS_FAKEAP_DETECT
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43568 - LOG_ID_EVENT_WIRELESS_FAKEAP_ONAIR
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43569 - LOG_ID_EVENT_WIRELESS_ROGUE_SUPPRESSED
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43570 - LOG_ID_EVENT_WIRELESS_ROGUE_UNSUPPRESSED
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43571 - LOG_ID_EVENT_WIRELESS_ROGUE_DETECT_CHG
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43572 - LOG_ID_EVENT_WIRELESS_STA_ASSO
srcip Source IP ip 39
snr int8 4
43573 - LOG_ID_EVENT_WIRELESS_STA_AUTH
srcip Source IP ip 39
snr int8 4
43574 - LOG_ID_EVENT_WIRELESS_STA_DASS
srcip Source IP ip 39
snr int8 4
43575 - LOG_ID_EVENT_WIRELESS_STA_DAUT
srcip Source IP ip 39
snr int8 4
43576 - LOG_ID_EVENT_WIRELESS_STA_IDLE
srcip Source IP ip 39
snr int8 4
43577 - LOG_ID_EVENT_WIRELESS_STA_DENY
srcip Source IP ip 39
snr int8 4
43578 - LOG_ID_EVENT_WIRELESS_STA_KICK
srcip Source IP ip 39
snr int8 4
43579 - LOG_ID_EVENT_WIRELESS_STA_IP
srcip Source IP ip 39
snr int8 4
43580 - LOG_ID_EVENT_WIRELESS_STA_LEAVE_WTP
srcip Source IP ip 39
snr int8 4
srcip Source IP ip 39
snr int8 4
43582 - LOG_ID_EVENT_WIRELESS_ROGUE_CFG_UNCLASSIFIED
43583 - LOG_ID_EVENT_WIRELESS_ROGUE_CFG_ACCEPTED
43585 - LOG_ID_EVENT_WIRELESS_ROGUE_CFG_SUPPRESSED
43586 - LOG_ID_EVENT_WIRELESS_WTPR_DARRP_CHAN
ip ip 39
slctdrmamode string 10
operdrmamode string 10
43587 - LOG_ID_EVENT_WIRELESS_WTPR_DARRP_START
ip ip 39
slctdrmamode string 10
operdrmamode string 10
43588 - LOG_ID_EVENT_WIRELESS_WTPR_OPER_CHAN
ip ip 39
slctdrmamode string 10
operdrmamode string 10
ip ip 39
slctdrmamode string 10
operdrmamode string 10
43590 - LOG_ID_EVENT_WIRELESS_WTPR_NOL
ip ip 39
slctdrmamode string 10
operdrmamode string 10
43591 - LOG_ID_EVENT_WIRELESS_WTPR_COUNTRY_CFG_SUCCESS
ip ip 39
slctdrmamode string 10
operdrmamode string 10
43592 - LOG_ID_EVENT_WIRELESS_WTPR_OPER_COUNTRY
ip ip 39
slctdrmamode string 10
operdrmamode string 10
43593 - LOG_ID_EVENT_WIRELESS_WTPR_CFG_TXPOWER
ip ip 39
slctdrmamode string 10
operdrmamode string 10
43594 - LOG_ID_EVENT_WIRELESS_WTPR_OPER_TXPOWER
ip ip 39
slctdrmamode string 10
operdrmamode string 10
43595 - LOG_ID_EVENT_WIRELESS_CLB_DENY
43596 - LOG_ID_EVENT_WIRELESS_CLB_RETRY
43597 - LOG_ID_EVENT_WIRELESS_WTP_ADD
ip ip 39
43598 - LOG_ID_EVENT_WIRELESS_WTP_ADD_XSS
ip ip 39
43599 - LOG_ID_EVENT_WIRELESS_WTP_DEL
ip ip 39
43600 - LOG_ID_EVENT_WIRELESS_WTPR_DARRP_STOP
ip ip 39
slctdrmamode string 10
operdrmamode string 10
43601 - LOG_ID_EVENT_WIRELESS_STA_CAP_SIGNON
srcip Source IP ip 39
snr int8 4
srcip Source IP ip 39
snr int8 4
43603 - LOG_ID_EVENT_WIRELESS_STA_CAP_SIGNON_FAILURE
srcip Source IP ip 39
snr int8 4
43604 - LOG_ID_EVENT_WIRELESS_STA_CAP_EMAIL_REQUEST
srcip Source IP ip 39
snr int8 4
43605 - LOG_ID_EVENT_WIRELESS_STA_CAP_EMAIL_SUCCESS
srcip Source IP ip 39
snr int8 4
43606 - LOG_ID_EVENT_WIRELESS_STA_CAP_EMAIL_FAILURE
srcip Source IP ip 39
snr int8 4
43607 - LOG_ID_EVENT_WIRELESS_STA_CAP_DISCLAIMER_CHECK
srcip Source IP ip 39
snr int8 4
43608 - LOG_ID_EVENT_WIRELESS_STA_CAP_DISCLAIMER_DECLINE
srcip Source IP ip 39
snr int8 4
ip ip 39
slctdrmamode string 10
operdrmamode string 10
43610 - LOG_ID_EVENT_WIRELESS_WTPR_DARRP_OPTIMIZATION_STOP
ip ip 39
slctdrmamode string 10
operdrmamode string 10
43611 - LOG_ID_EVENT_WIRELESS_SYS_AC_UP
43613 - LOG_ID_EVENT_WIRELESS_WTP_ERR
ip ip 39
43614 - LOG_ID_EVENT_WIRELESS_DHCP_STAVATION
xid uint32 10
43615 - LOG_ID_EVENT_WIRELESS_SYS_AC_IPSEC_FAIL
43616 - LOG_ID_EVENT_WIRELESS_WTPR_NOL_ADD
ip ip 39
slctdrmamode string 10
operdrmamode string 10
43618 - LOG_ID_EVENT_WIRELESS_WTP_IMAGE_RC_SUCCESS
ip ip 39
43619 - LOG_ID_EVENT_WIRELESS_OFFENDINGAP_DETECT
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
radioidclosest The radio ID on the AP closest with the detected rogue ap uint8 3
43621 - LOG_ID_EVENT_WIRELESS_WTP_DATA_CHAN_CHG
ip ip 39
43622 - LOG_ID_EVENT_WIRELESS_WTP_VLAN_PROBE
ip ip 39
43623 - LOG_ID_EVENT_WIRELESS_WTP_VLAN_MISSING
ip ip 39
43624 - LOG_ID_EVENT_WIRELESS_WTP_VLAN_DETECTED
ip ip 39
43625 - LOG_ID_EVENT_WIRELESS_STA_CAP_CMCC_SUCCESS
srcip Source IP ip 39
snr int8 4
43626 - LOG_ID_EVENT_WIRELESS_STA_CAP_CMCC_FAILURE
srcip Source IP ip 39
snr int8 4
srcip Source IP ip 39
snr int8 4
43628 - LOG_ID_EVENT_WIRELESS_STA_CAP_CMCC_MAC_AUTH_SUCCESS
srcip Source IP ip 39
snr int8 4
43629 - LOG_ID_EVENT_WIRELESS_STA_RADIUS_AUTH_FAILURE
43630 - LOG_ID_EVENT_WIRELESS_STA_RADIUS_AUTH_SUCCESS
43631 - LOG_ID_EVENT_WIRELESS_STA_RADIUS_AUTH_NO_RESP
43633 - LOG_ID_EVENT_WIRELESS_STA_RADIUS_MAC_AUTH_SUCCESS
43634 - LOG_ID_EVENT_WIRELESS_STA_RADIUS_MAC_AUTH_NO_RESP
43635 - LOG_ID_EVENT_WIRELESS_STA_OKC_NO_MATCH
43636 - LOG_ID_EVENT_WIRELESS_STA_OKC_LOCAL_MATCH
43637 - LOG_ID_EVENT_WIRELESS_STA_OKC_INTER_AC_MATCH
43638 - LOG_ID_EVENT_WIRELESS_STA_OKC_INTER_AP_MATCH
43640 - LOG_ID_EVENT_WIRELESS_STA_FT_INVALID_AUTH_REQ
43641 - LOG_ID_EVENT_WIRELESS_STA_FT_INVALID_REASSOC_REQ
43642 - LOG_ID_EVENT_WIRELESS_STA_FT_ACTION_REQ
43643 - LOG_ID_EVENT_WIRELESS_STA_FT_ACTION_RESP
43644 - LOG_ID_EVENT_WIRELESS_STA_FT_AUTH_REQ
43645 - LOG_ID_EVENT_WIRELESS_STA_FT_AUTH_RESP
43647 - LOG_ID_EVENT_WIRELESS_STA_FT_REASSOC_RESP
43648 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_INVALID_SECOND_MSG
43649 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_INVALID_FOURTH_MSG
43650 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_FIRST_MSG
43651 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_SECOND_MSG
43652 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_THIRD_MSG
43654 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_FIRST_GROUP_MSG
43655 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_SECOND_GROUP_MSG
43656 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_MAX_STA_CNT
43657 - LOG_ID_EVENT_WIRELESS_STA_ASSOC_FAIL
43658 - LOG_ID_EVENT_WIRELESS_STA_DHCP_NO_RESP
43659 - LOG_ID_EVENT_WIRELESS_STA_DHCP_DIFF_OFFER
43660 - LOG_ID_EVENT_WIRELESS_STA_DHCP_NO_ACK
43661 - LOG_ID_EVENT_WIRELESS_STA_DHCP_NAK
43662 - LOG_ID_EVENT_WIRELESS_STA_DHCP_DUP_IP
43663 - LOG_ID_EVENT_WIRELESS_STA_DHCP_DISCOVER
43664 - LOG_ID_EVENT_WIRELESS_STA_DHCP_OFFER
43665 - LOG_ID_EVENT_WIRELESS_STA_DHCP_DECLINE
43666 - LOG_ID_EVENT_WIRELESS_STA_DHCP_REQUEST
43667 - LOG_ID_EVENT_WIRELESS_STA_DHCP_ACK
43668 - LOG_ID_EVENT_WIRELESS_STA_DHCP_RELEASE
43669 - LOG_ID_EVENT_WIRELESS_STA_DHCP_INFORM
43670 - LOG_ID_EVENT_WIRELESS_STA_DHCP_SELF_ASSIGNED
43671 - LOG_ID_EVENT_WIRELESS_STA_DNS_NO_RESP
43672 - LOG_ID_EVENT_WIRELESS_STA_DNS_SERVER_FAILURE
43673 - LOG_ID_EVENT_WIRELESS_STA_DNS_NO_DOMAIN
43674 - LOG_ID_EVENT_WIRELESS_STA_WPA_KRACK_FT_REASSOC
43675 - LOG_ID_EVENT_WIRELESS_STA_AUTH_REQ
43677 - LOG_ID_EVENT_WIRELESS_STA_ASSOC_REQ
43678 - LOG_ID_EVENT_WIRELESS_STA_REASSOC_REQ
43679 - LOG_ID_EVENT_WIRELESS_STA_ASSOC_RESP
43680 - LOG_ID_EVENT_WIRELESS_STA_REASSOC_RESP
43681 - LOG_ID_EVENT_WIRELESS_STA_PROBE_REQ
43682 - LOG_ID_EVENT_WIRELESS_STA_PROBE_RESP
43684 - LOG_ID_EVENT_WIRELESS_ADDRGRP_DUPLICATE_MAC
addrgrp string 36
43685 - LOG_ID_EVENT_WIRELESS_ADDRGRP_ADDR_APPLY
addrgrp string 36
43686 - LOG_ID_EVENT_WIRELESS_STA_WPA_MSG_INVALID_SCHEDULE
43687 - LOG_ID_EVENT_WIRELESS_STA_WL_BRIDGE_TRAFFIC_STATS
srcip Source IP ip 39
snr int8 4
43688 - LOG_ID_EVENT_WIRELESS_APCFG_RECEIVE
43689 - LOG_ID_EVENT_WIRELESS_APCFG_VALIDATING
43690 - LOG_ID_EVENT_WIRELESS_APCFG_APPLY
43691 - LOG_ID_EVENT_WIRELESS_APCFG_REJECT
43692 - LOG_ID_EVENT_WIRELESS_WTPR_ANTENNA_DEFECT_DETECT
ip ip 39
slctdrmamode string 10
operdrmamode string 10
43694 - LOG_ID_EVENT_WIRELESS_STA_WNM_ACTION_BSTM_RESP_ACCEPT
43695 - LOG_ID_EVENT_WIRELESS_STA_WNM_ACTION_BSTM_RESP_REJECT
43696 - LOG_ID_EVENT_WIRELESS_WTPR_DRMA_START
ip ip 39
slctdrmamode string 10
operdrmamode string 10
43697 - LOG_ID_EVENT_WIRELESS_WTPR_DRMA_STOP
ip ip 39
slctdrmamode string 10
operdrmamode string 10
43698 - LOG_ID_EVENT_WIRELESS_WTPR_DRMA_MODE
ip ip 39
slctdrmamode string 10
operdrmamode string 10
43699 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_SOLICIT
43700 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_ADVERTISE
43701 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_REQUEST
43702 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_CONFIRM
43703 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_RENEW
43704 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_REPLY
43705 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_RELEASE
43706 - LOG_ID_EVENT_WIRELESS_STA_DHCP6_RECONFIGURE
43707 - LOG_ID_EVENT_WIRELESS_WTPR_SSID_UP
ip ip 39
slctdrmamode string 10
operdrmamode string 10
ip ip 39
slctdrmamode string 10
operdrmamode string 10
43709 - LOG_ID_EVENT_WIRELESS_STA_DHCP_ENFORCEMENT
43710 - LOG_ID_EVENT_WIRELESS_SAM_IPERF
43711 - LOG_ID_EVENT_WIRELESS_SAM_PING
43712 - LOG_ID_EVENT_WIRELESS_SAM_AUTH_FAILED
43713 - LOG_ID_EVENT_WIRELESS_SAM_CWP_AUTH_FAILED
43714 - LOG_ID_EVENT_WIRELESS_WTP_PARTIAL_PASSWD
ip ip 39
43715 - LOG_ID_EVENT_WIRELESS_WTPR_BSS_COLOR_COLLISION
ip ip 39
slctdrmamode string 10
operdrmamode string 10
43716 - LOG_ID_EVENT_WIRELESS_ADDRGRP_MAX_FW_ADDR
addrgrp string 36
43717 - LOG_ID_EVENT_WIRELESS_STA_L3R_REHOME
srcip Source IP ip 39
snr int8 4
43719 - LOG_ID_EVENT_WIRELESS_STA_PROBE_LOW_RSSI
43776 - LOG_ID_EVENT_NAC_QUARANTINE
srcip Source IP ip 39
dstip Destination IP ip 39
srcip Source IP ip 39
dstip Destination IP ip 39
43800 - LOG_ID_EVENT_ELBC_BLADE_JOIN
43802 - LOG_ID_EVENT_ELBC_MASTER_BLADE_FOUND
43803 - LOG_ID_EVENT_ELBC_MASTER_BLADE_LOST
43804 - LOG_ID_EVENT_ELBC_MASTER_BLADE_CHANGE
43805 - LOG_ID_EVENT_ELBC_ACTIVE_CHANNEL_FOUND
43806 - LOG_ID_EVENT_ELBC_ACTIVE_CHANNEL_LOST
43808 - LOG_ID_EVENT_ELBC_CHASSIS_ACTIVE
43809 - LOG_ID_EVENT_ELBC_CHASSIS_INACTIVE
44544 - LOGID_EVENT_CONFIG_PATH
44545 - LOGID_EVENT_CONFIG_OBJ
44546 - LOGID_EVENT_CONFIG_ATTR
44548 - LOGID_EVENT_CONFIG_EXEC
44549 - LOGID_EVENT_CONFIG_OBJATTR_MTNER
44550 - LOGID_EVENT_CONFIG_OBJ_MTNER
44551 - LOGID_EVENT_CONFIG_ATTR_MTNER
44552 - LOGID_EVENT_CONFIG_PATH_MTNER
44555 - LOGID_EVENT_CMDB_DEADLOCK_DETECTED
45057 - LOG_ID_FCC_ADD
ip Source IP ip 39
45058 - LOG_ID_FCC_CLOSE
ip Source IP ip 39
45061 - LOG_ID_FCC_CLOSE_BY_TYPE
ip Source IP ip 39
45071 - LOG_ID_FCC_VULN_SCAN
scantime uint64 20
srcip Source IP ip 39
45114 - LOG_ID_EC_REG_QUARANTINE
ip Source IP ip 39
fctemssn string 16
45115 - LOG_ID_EC_REG_UNQUARANTINE
ip Source IP ip 39
fctemssn string 16
45121 - LOG_ID_EC_EMS_WS_NOTIFICATION
fctemssn string 16
fctemsname string 36
45122 - LOG_ID_EC_EMS_REST_API_ERROR
fctemssn string 16
fctemsname string 36
httpcode uint16 3
45123 - LOG_ID_EC_EMS_WS_CONN_ERROR
fctemssn string 16
fctemsname string 36
wscode uint16 4
45124 - LOG_ID_EC_VPND_CONNECT
ip Source IP ip 39
45125 - LOG_ID_EC_VPND_DISCONNECT
ip Source IP ip 39
45126 - LOG_ID_EC_CLOUD_ENTITLEMENT_LOST
45128 - LOG_ID_EC_EMS_REST_API_NEW_SUCCESS
fctemssn string 16
fctemsname string 36
httpcode uint16 3
45129 - LOG_ID_EC_EMS_EMS_VERIFY
fctemsname string 36
45130 - LOG_ID_EC_EMS_EMS_VERIFY_FAILED
fctemsname string 36
45131 - LOG_ID_EC_EMS_EMS_UNVERIFY
fctemsname string 36
46000 - LOG_ID_VIP_REAL_SVR_ENA
46001 - LOG_ID_VIP_REAL_SVR_DISA
46002 - LOG_ID_VIP_REAL_SVR_UP
46003 - LOG_ID_VIP_REAL_SVR_DOWN
46004 - LOG_ID_VIP_REAL_SVR_ENT_HOLDDOWN
46005 - LOG_ID_VIP_REAL_SVR_FAIL_HOLDDOWN
46006 - LOG_ID_VIP_REAL_SVR_FAIL
46400 - LOG_ID_EVENT_EXT_SYS
46401 - LOG_ID_EVENT_EXT_LOCAL
version string 64
ip ip 39
action string 65
46402 - LOG_ID_EVENT_EXT_LOCAL_ERROR
version string 64
ip ip 39
action string 65
46403 - LOG_ID_EVENT_EXT_REMOTE_EMERG
ip ip 39
46404 - LOG_ID_EVENT_EXT_REMOTE_ALERT
ip ip 39
46405 - LOG_ID_EVENT_EXT_REMOTE_CRITICAL
ip ip 39
46406 - LOG_ID_EVENT_EXT_REMOTE_ERROR
ip ip 39
46407 - LOG_ID_EVENT_EXT_REMOTE_WARNING
ip ip 39
46408 - LOG_ID_EVENT_EXT_REMOTE_NOTIF
ip ip 39
ip ip 39
46410 - LOG_ID_EVENT_EXT_REMOTE_DEBUG
ip ip 39
46501 - LOG_ID_INTERNAL_LTE_MODEM_DETECTION
46502 - LOG_ID_INTERNAL_LTE_MODEM_GPSD
46503 - LOG_ID_INTERNAL_LTE_MODEM_GPS_LOC_ACQUISITION
46504 - LOG_ID_INTERNAL_LTE_MODEM_BILLD
46505 - LOG_ID_INTERNAL_LTE_MODEM_BILLING_PURGED
46506 - LOG_ID_INTERNAL_LTE_MODEM_BILLING_DAILY_LOG
46507 - LOG_ID_INTERNAL_LTE_MODEM_FW_UPGRADE
46508 - LOG_ID_INTERNAL_LTE_MODEM_QDL_DETECTION
46509 - LOG_ID_INTERNAL_LTE_MODEM_REBOOT
46510 - LOG_ID_INTERNAL_LTE_MODEM_OP_MODE
46511 - LOG_ID_INTERNAL_LTE_MODEM_POWER_ON_OFF
46513 - LOG_ID_INTERNAL_LTE_MODEM_LINK_CONNECTION
46514 - LOG_ID_INTERNAL_LTE_MODEM_MANUAL_HANDOVER
46516 - LOG_ID_INTERNAL_LTE_MODEM_BEARER_TECH_CHANGE
46517 - LOG_ID_INTERNAL_LTE_MODEM_WRONG_PIN
46900 - LOG_ID_POE_STATUS_REPORT
47000 - LOG_ID_MALWARE_LIST_TRUNCATED_ENTER
47001 - LOG_ID_MALWARE_LIST_TRUNCATED_EXIT
47002 - LOG_ID_FILE_HASH_EMS_LIST_TRUNCATED_ENTER
47003 - LOG_ID_FILE_HASH_EMS_LIST_TRUNCATED_EXIT
47004 - LOG_ID_FILE_HASH_EMS_LIST_LOAD
47203 - LOG_ID_ENTER_BYPASS
47204 - LOG_ID_EXIT_BYPASS
47301 - LOG_ID_EVENT_REST_API_OK
47302 - LOG_ID_EVENT_REST_API_ERR
srcip Source IP ip 39
dstip Destination IP ip 39
48041 - LOG_ID_WAD_WANOPT_TUNNEL_CLOSED
srcip Source IP ip 39
dstip Destination IP ip 39
remotetunnelid uint32 10
wanout uint64 20
wanin uint64 20
48101 - LOG_ID_WAD_AUTH_FAIL_PSK
srcip Source IP ip 39
dstip Destination IP ip 39
48102 - LOG_ID_WAD_AUTH_FAIL_OTH
srcip Source IP ip 39
dstip Destination IP ip 39
48301 - LOG_ID_UNEXP_APP_TYPE
srcip Source IP ip 39
dstip Destination IP ip 39
49002 - LOG_ID_VNP_DPDK_PRIMARY_RESTART
49004 - LOGID_EVENT_HYPERV_SRIOV_SHOW_UP
51000 - LOG_ID_NB_TBL_CHG
srcip Source IP ip 39
52000 - LOG_ID_EVENT_SECURITY_AUDIT_FABRIC_SUMMARY
highcount Security Rating result failed count for high severity int32 10
mediumcount Security Rating result failed count for medium severity int32 10
lowcount Security Rating result failed count for low severity int32 10
52001 - LOG_ID_EVENT_SECURITY_AUDIT_FABRIC_CHANGE
highcount Security Rating result failed count for high severity int32 10
mediumcount Security Rating result failed count for medium severity int32 10
lowcount Security Rating result failed count for low severity int32 10
53000 - LOG_ID_SDNC_CONNECTED
53001 - LOG_ID_SDNC_DISCONNECTED
53003 - LOG_ID_SDNC_UNSUBSCRIBE
53100 - LOG_ID_VPN_OCVPN_REGISTERED
53101 - LOG_ID_VPN_OCVPN_UNREGISTERED
53102 - LOG_ID_VPN_OCVPN_COMM_ESTABLISHED
53103 - LOG_ID_VPN_OCVPN_COMM_ERROR
53104 - LOG_ID_VPN_OCVPN_DNS_ERROR
53105 - LOG_ID_VPN_OCVPN_ROUTE_ERROR
53200 - LOG_ID_CONNECTOR_OBJECT_ADD
53201 - LOG_ID_CONNECTOR_OBJECT_REMOVE
53202 - LOG_ID_CONNECTOR_API_FAILED
fctemssn string 16
53203 - LOG_ID_CONNECTOR_OBJECT_UPDATE
fctemssn string 16
53205 - LOG_ID_CONNECTOR_OBJECT_CANT_REMOVE
fctemssn string 16
53300 - LOG_ID_VNE_PRO_UPDATE_COMPLETED
53301 - LOG_ID_VNE_PRO_UPDATE_FAILED
53312 - LOG_ID_NPD_INFO
53313 - LOG_ID_NPD_WARNING
53315 - LOG_ID_LPM_ERROR
53316 - LOG_ID_LPM_INFO
53401 - LOG_ID_FMG_TUNNEL_DOWN
63002 - LOG_ID_CIFS_CONN_FAIL
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
srcintfrole string 10
dstintfrole string 10
srcip ip 39
dstip ip 39
srcport uint16 5
dstport uint16 5
src_int string 64
dst_int string 64
policyid uint32 10
profile string 64
domainctrlip ip 39
domainctrlname string 64
domainctrldomain string 80
domainctrlusername string 65
domainctrlauthstate uint32 5
domainctrlauthtype uint32 5
domainctrlprotocoltype uint32 5
63003 - LOG_ID_CIFS_AUTH_FAIL
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
srcintfrole string 10
dstintfrole string 10
srcip ip 39
dstip ip 39
srcport uint16 5
dstport uint16 5
src_int string 64
dst_int string 64
policyid uint32 10
profile string 64
domainctrlip ip 39
domainctrlname string 64
domainctrldomain string 80
domainctrlusername string 65
domainctrlauthstate uint32 5
domainctrlauthtype uint32 5
domainctrlprotocoltype uint32 5
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
srcintfrole string 10
dstintfrole string 10
srcip ip 39
dstip ip 39
srcport uint16 5
dstport uint16 5
src_int string 64
dst_int string 64
policyid uint32 10
profile string 64
domainctrlip ip 39
domainctrlname string 64
domainctrldomain string 80
domainctrlusername string 65
domainctrlauthstate uint32 5
domainctrlauthtype uint32 5
domainctrlprotocoltype uint32 5
63005 - LOG_ID_CIFS_AUTH_KRB_ERROR
date string 10
time string 8
logid string 10
type string 16
subtype string 20
level string 11
devid string 16
vd string 32
eventtime uint64 20
tz string 5
srcintfrole string 10
dstintfrole string 10
srcip ip 39
dstip ip 39
srcport uint16 5
dstport uint16 5
src_int string 64
dst_int string 64
policyid uint32 10
profile string 64
domainctrlip ip 39
domainctrlname string 64
domainctrldomain string 80
domainctrlusername string 65
domainctrlauthstate uint32 5
domainctrlauthtype uint32 5
domainctrlprotocoltype uint32 5
64000 - LOG_ID_FILE_FILTER_BLOCK
action string 20
attachment string 3
authserver string 64
cc string 512
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
eventtime uint64 20
eventtype string 32
fctuid string 32
filesize uint64 10
filetype string 23
filtername string 36
httpmethod string 20
level string 11
logid string 10
matchfiletype string 23
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
service string 36
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
64001 - LOG_ID_FILE_FILTER_LOG
action string 20
attachment string 3
authserver string 64
cc string 512
date string 10
devid string 16
direction string 8
dstauthserver string 64
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
eventtime uint64 20
eventtype string 32
fctuid string 32
filesize uint64 10
filetype string 23
filtername string 36
httpmethod string 20
level string 11
logid string 10
matchfiletype string 23
policyid uint32 10
policymode string 8
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
service string 36
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subservice string 16
subtype string 20
time string 8
to string 512
trueclntip ip 39
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
56001 - LOG_ID_FSW_FLOW
date string 10
devid string 16
dstip ip 39
duration uint32 10
eventtime uint64 20
ftlkintf string 32
level string 11
logid string 10
proto uint8 3
rcvdbyte uint32 10
rcvdpkt uint32 10
srcip ip 39
subtype string 20
switchid string 32
time string 8
type string 16
tz string 5
vd string 32
41216 - LOGID_GTP_FORWARD
cgsn6 ip 39
endusraddress6 ip 39
from6 ip 39
timeoutdelete uint8 3
to To ip 512
to6 ip 39
ugsn6 ip 39
ulimcc uint16 3
ulimnc uint16 3
upteid uint32 10
41217 - LOGID_GTP_DENY
cgsn6 ip 39
endusraddress6 ip 39
from6 ip 39
timeoutdelete uint8 3
to To ip 512
to6 ip 39
ugsn6 ip 39
ulimcc uint16 3
ulimnc uint16 3
upteid uint32 10
41218 - LOGID_GTP_RATE_LIMIT
cgsn6 ip 39
endusraddress6 ip 39
from6 ip 39
timeoutdelete uint8 3
to To ip 512
to6 ip 39
ugsn6 ip 39
ulimcc uint16 3
ulimnc uint16 3
upteid uint32 10
41219 - LOGID_GTP_STATE_INVALID
cgsn6 ip 39
endusraddress6 ip 39
from6 ip 39
timeoutdelete uint8 3
to To ip 512
to6 ip 39
ugsn6 ip 39
ulimcc uint16 3
ulimnc uint16 3
upteid uint32 10
41220 - LOGID_GTP_TUNNEL_LIMIT
cgsn6 ip 39
endusraddress6 ip 39
from6 ip 39
timeoutdelete uint8 3
to To ip 512
to6 ip 39
ugsn6 ip 39
ulimcc uint16 3
ulimnc uint16 3
upteid uint32 10
41221 - LOGID_GTP_TRAFFIC_COUNT
endusraddress6 ip 39
timeoutdelete uint8 3
ulimcc uint16 3
ulimnc uint16 3
cggsn6 ip 39
clashtunnelidx uint32 10
csgsn6 ip 39
uggsn6 ip 39
usgsn6 ip 39
41222 - LOGID_GTP_USER_DATA
endusraddress6 ip 39
from6 ip 39
to To ip 512
to6 ip 39
41223 - LOGID_GTPV2_FORWARD
endusraddress6 ip 39
from6 ip 39
timeoutdelete uint8 3
to To ip 512
to6 ip 39
ulimcc uint16 3
ulimnc uint16 3
cpaddr6 ip 39
41224 - LOGID_GTPV2_DENY
endusraddress6 ip 39
from6 ip 39
timeoutdelete uint8 3
to To ip 512
to6 ip 39
ulimcc uint16 3
ulimnc uint16 3
cpaddr6 ip 39
41225 - LOGID_GTPV2_RATE_LIMIT
endusraddress6 ip 39
from6 ip 39
timeoutdelete uint8 3
to To ip 512
to6 ip 39
ulimcc uint16 3
ulimnc uint16 3
cpaddr6 ip 39
41226 - LOGID_GTPV2_STATE_INVALID
endusraddress6 ip 39
from6 ip 39
timeoutdelete uint8 3
to To ip 512
to6 ip 39
ulimcc uint16 3
ulimnc uint16 3
cpaddr6 ip 39
41227 - LOGID_GTPV2_TUNNEL_LIMIT
endusraddress6 ip 39
from6 ip 39
timeoutdelete uint8 3
to To ip 512
to6 ip 39
ulimcc uint16 3
ulimnc uint16 3
cpaddr6 ip 39
41228 - LOGID_GTPV2_TRAFFIC_COUNT
endusraddress6 ip 39
timeoutdelete uint8 3
ulimcc uint16 3
ulimnc uint16 3
clashtunnelidx uint32 10
cpdladdr6 ip 39
cpdlisraddr6 ip 39
cpuladdr6 ip 39
41229 - LOGID_GTPU_FORWARD
from6 ip 39
to To ip 512
to6 ip 39
41230 - LOGID_GTPU_DENY
from6 ip 39
to To ip 512
to6 ip 39
41231 - LOGID_PFCP_FORWARD
cfseid string 20
cfseidaddr ip 39
from6 ip 39
hseid string 20
to To ip 512
to6 ip 39
ufseid string 20
ufseidaddr ip 39
41232 - LOGID_PFCP_DENY
cfseid string 20
cfseidaddr ip 39
from6 ip 39
hseid string 20
to To ip 512
to6 ip 39
ufseid string 20
ufseidaddr ip 39
41233 - LOGID_PFCP_TRAFFIC_COUNT
cfseid string 20
cfseidaddr ip 39
ufseid string 20
ufseidaddr ip 39
sessionid uint32 10
60000 - LOG_ID_ICAP_SERVER_ERROR
action string 17
date string 10
devid string 16
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
eventtime uint64 20
eventtype string 32
infection string 96
level string 11
logid string 10
policyid uint32 10
policytype string 24
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subtype string 20
time string 8
type string 16
tz string 5
vd string 32
virusid string 64
vrf uint8 3
60001 - LOG_ID_ICAP_INFECTION_BLOCK
action string 17
date string 10
devid string 16
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
eventtime uint64 20
eventtype string 32
infection string 96
level string 11
logid string 10
policyid uint32 10
policytype string 24
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subtype string 20
time string 8
type string 16
tz string 5
vd string 32
virusid string 64
vrf uint8 3
action string 17
date string 10
devid string 16
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
eventtime uint64 20
eventtype string 32
infection string 96
level string 11
logid string 10
policyid uint32 10
policytype string 24
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subtype string 20
time string 8
type string 16
tz string 5
vd string 32
virusid string 64
vrf uint8 3
16384 - LOGID_ATTCK_SIGNATURE_TCP_UDP
attackcontext The trigger patterns and the packet data with base64 encoding string 2048
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
httpmethod string 20
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
psrcport uint16 5
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
rawdataid string 10
ref URL of the FortiGuard IPS database entry for the attack. string 4096
srcip Source IP ip 39
tz string 5
16385 - LOGID_ATTCK_SIGNATURE_ICMP
attackcontext The trigger patterns and the packet data with base64 encoding string 2048
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
psrcport uint16 5
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
rawdataid string 10
ref URL of the FortiGuard IPS database entry for the attack. string 4096
srcip Source IP ip 39
tz string 5
16386 - LOGID_ATTCK_SIGNATURE_OTHERS
attackcontext The trigger patterns and the packet data with base64 encoding string 2048
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
pdstport uint16 5
policymode string 8
policytype string 24
poluuid string 37
psrcport uint16 5
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
rawdataid string 10
ref URL of the FortiGuard IPS database entry for the attack. string 4096
srcip Source IP ip 39
tz string 5
16399 - LOGID_ATTACK_MALICIOUS_URL
attackcontext The trigger patterns and the packet data with base64 encoding string 2048
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
rawdataid string 10
srcip Source IP ip 39
tz string 5
16400 - LOGID_ATTACK_BOTNET_WARNING
attackcontext The trigger patterns and the packet data with base64 encoding string 2048
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
rawdataid string 10
ref URL of the FortiGuard IPS database entry for the attack. string 4096
srcip Source IP ip 39
tz string 5
attackcontext The trigger patterns and the packet data with base64 encoding string 2048
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
rawdataid string 10
ref URL of the FortiGuard IPS database entry for the attack. string 4096
srcip Source IP ip 39
tz string 5
61000 - LOG_ID_SSH_COMMAND_BLOCK
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
hostkeystatus string 15
policytype string 24
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
61001 - LOG_ID_SSH_COMMAND_BLOCK_ALERT
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
hostkeystatus string 15
policytype string 24
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
61002 - LOG_ID_SSH_COMMAND_PASS
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
hostkeystatus string 15
policytype string 24
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
61003 - LOG_ID_SSH_COMMAND_PASS_ALERT
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
hostkeystatus string 15
policytype string 24
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
61010 - LOG_ID_SSH_CHANNEL_BLOCK
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
hostkeystatus string 15
policytype string 24
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
61011 - LOG_ID_SSH_CHANNEL_PASS
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
hostkeystatus string 15
policytype string 24
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
61012 - LOG_ID_SSH_HOST_KEY_WARNING
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
hostkeystatus string 15
policytype string 24
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
hostkeystatus string 15
policytype string 24
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
62004 - LOG_ID_SSL_EXEMPT_ADDR
action string 20
authalgo string 7
cat uint8 3
catdesc string 64
cipher string 6
date string 10
devid string 16
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
kxcurve string 32
kxproto string 7
level string 11
logid string 10
policyid uint32 10
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subtype string 20
time string 8
tlsver string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
action string 20
authalgo string 7
cat uint8 3
catdesc string 64
cipher string 6
date string 10
devid string 16
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
kxcurve string 32
kxproto string 7
level string 11
logid string 10
policyid uint32 10
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subtype string 20
time string 8
tlsver string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62007 - LOG_ID_SSL_EXEMPT_FTGD_CATEGORY
action string 20
authalgo string 7
cat uint8 3
catdesc string 64
cipher string 6
date string 10
devid string 16
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
kxcurve string 32
kxproto string 7
level string 11
logid string 10
policyid uint32 10
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subtype string 20
time string 8
tlsver string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62008 - LOG_ID_SSL_EXEMPT_LOCAL_CATEGORY
action string 20
authalgo string 7
cat uint8 3
catdesc string 64
cipher string 6
date string 10
devid string 16
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
kxcurve string 32
kxproto string 7
level string 11
logid string 10
policyid uint32 10
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subtype string 20
time string 8
tlsver string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62009 - LOG_ID_SSL_EXEMPT_USER_CATEGORY
action string 20
authalgo string 7
cat uint8 3
catdesc string 64
cipher string 6
date string 10
devid string 16
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
kxcurve string 32
kxproto string 7
level string 11
logid string 10
policyid uint32 10
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subtype string 20
time string 8
tlsver string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62100 - LOG_ID_SSL_NEGOTIATION_INSPECT
action string 20
authalgo string 7
certhash string 40
cipher string 6
cn string 64
date string 10
devid string 16
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
issuer string 64
keyalgo string 8
keysize uint16 4
kxcurve string 32
kxproto string 7
level string 11
logid string 10
notafter string 20
notbefore string 20
policyid uint32 10
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
ski string 64
sn string 40
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subtype string 20
time string 8
tlsver string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62101 - LOG_ID_SSL_NEGOTIATION_BLOCK
action string 20
authalgo string 7
certhash string 40
cipher string 6
cn string 64
date string 10
devid string 16
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
issuer string 64
keyalgo string 8
keysize uint16 4
kxcurve string 32
kxproto string 7
level string 11
logid string 10
notafter string 20
notbefore string 20
policyid uint32 10
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
ski string 64
sn string 40
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subtype string 20
time string 8
tlsver string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
action string 20
authalgo string 7
certhash string 40
cipher string 6
cn string 64
date string 10
devid string 16
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
issuer string 64
keyalgo string 8
keysize uint16 4
kxcurve string 32
kxproto string 7
level string 11
logid string 10
notafter string 20
notbefore string 20
policyid uint32 10
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
ski string 64
sn string 40
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subtype string 20
time string 8
tlsver string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62103 - LOG_ID_SSL_NEGOTIATION_INFO
action string 20
authalgo string 7
certhash string 40
cipher string 6
cn string 64
date string 10
devid string 16
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
issuer string 64
keyalgo string 8
keysize uint16 4
kxcurve string 32
kxproto string 7
level string 11
logid string 10
notafter string 20
notbefore string 20
policyid uint32 10
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
ski string 64
sn string 40
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subtype string 20
time string 8
tlsver string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62200 - LOG_ID_SSL_SERVER_CERT_INFO
action string 20
authalgo string 7
certhash string 40
cipher string 6
cn string 64
date string 10
devid string 16
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
issuer string 64
keyalgo string 8
keysize uint16 4
kxcurve string 32
kxproto string 7
level string 11
logid string 10
notafter string 20
notbefore string 20
policyid uint32 10
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
ski string 64
sn string 40
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subtype string 20
time string 8
tlsver string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62220 - LOG_ID_SSL_HANDSHAKE_INFO
action string 20
authalgo string 7
certhash string 40
cipher string 6
cn string 64
date string 10
devid string 16
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
handshake string 11
issuer string 64
keyalgo string 8
keysize uint16 4
kxcurve string 32
kxproto string 7
level string 11
logid string 10
mitm string 3
notafter string 20
notbefore string 20
policyid uint32 10
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
ski string 64
sn string 40
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subtype string 20
time string 8
tlsver string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62300 - LOG_ID_SSL_ANOMALY_CERT_BLOCKLISTED
action string 20
authalgo string 7
certdesc string 64
certhash string 40
cipher string 6
date string 10
devid string 16
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
kxcurve string 32
kxproto string 7
level string 11
logid string 10
policyid uint32 10
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subtype string 20
time string 8
tlsver string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62301 - LOG_ID_SSL_ANOMALY_CERT_RESIGN_TRUSTED
action string 20
authalgo string 7
certdesc string 64
certhash string 40
cipher string 6
date string 10
devid string 16
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
kxcurve string 32
kxproto string 7
level string 11
logid string 10
policyid uint32 10
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subtype string 20
time string 8
tlsver string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62302 - LOG_ID_SSL_ANOMALY_CERT_RESIGN_UNTRUSTED
action string 20
authalgo string 7
certdesc string 64
certhash string 40
cipher string 6
date string 10
devid string 16
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
kxcurve string 32
kxproto string 7
level string 11
logid string 10
policyid uint32 10
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subtype string 20
time string 8
tlsver string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62303 - LOG_ID_SSL_ANOMALY_CERT_BLOCKED
action string 20
authalgo string 7
certdesc string 64
certhash string 40
cipher string 6
date string 10
devid string 16
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
kxcurve string 32
kxproto string 7
level string 11
logid string 10
policyid uint32 10
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subtype string 20
time string 8
tlsver string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62304 - LOG_ID_SSL_ANOMALY_CERT_SNI_MISMATCHED
action string 20
authalgo string 7
certdesc string 64
certhash string 40
cipher string 6
date string 10
devid string 16
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
kxcurve string 32
kxproto string 7
level string 11
logid string 10
policyid uint32 10
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subtype string 20
time string 8
tlsver string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62305 - LOG_ID_SSL_ANOMALY_CERT_PROBE_FAILURE_BLOCK
action string 20
authalgo string 7
certdesc string 64
certhash string 40
cipher string 6
date string 10
devid string 16
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
kxcurve string 32
kxproto string 7
level string 11
logid string 10
policyid uint32 10
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subtype string 20
time string 8
tlsver string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62306 - LOG_ID_SSL_ANOMALY_CERT_PROBE_FAILURE_PASS
action string 20
authalgo string 7
certdesc string 64
certhash string 40
cipher string 6
date string 10
devid string 16
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
kxcurve string 32
kxproto string 7
level string 11
logid string 10
policyid uint32 10
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subtype string 20
time string 8
tlsver string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
62307 - LOG_ID_SSL_ANOMALY_CERT_SNI_MISMATCHED_INFO
action string 20
authalgo string 7
certdesc string 64
certhash string 40
cipher string 6
date string 10
devid string 16
dstcountry string 64
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
dstuuid string 37
eventsubtype string 32
eventtime uint64 20
eventtype string 32
fctuid string 32
kxcurve string 32
kxproto string 7
level string 11
logid string 10
policyid uint32 10
policytype string 24
poluuid string 37
profile string 64
proto uint8 3
service string 5
sessionid uint32 10
srccountry string 64
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
srcuuid string 37
subtype string 20
time string 8
tlsver string 8
type string 16
tz string 5
unauthuser string 66
unauthusersource string 66
vd string 32
vrf uint8 3
2 - LOG_ID_TRAFFIC_ALLOW
Message ID: 2
Message Description: LOG_ID_TRAFFIC_ALLOW
Message Meaning: Allowed traffic
Type: Traffic
Category: FORWARD
Severity: Notice
accessproxy string 80
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
clientdeviceid string 80
clientdeviceowner string 80
dstauthserver string 64
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstreputation uint32 10
dstswversion string 66
dstthreatfeed string 36
dstunauthuser string 66
dstunauthusersource string 66
gatewayid uint32 10
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
pdstport uint16 5
policymode string 8
psrcport uint16 5
saasname string 80
shapingpolicyname string 36
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcmacvendor string 66
srcregion string 64
srcreputation uint32 10
srcswversion string 66
srcthreatfeed string 36
tunnelid uint32 10
vip string 64
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
3 - LOG_ID_TRAFFIC_DENY
Message ID: 3
Message Description: LOG_ID_TRAFFIC_DENY
Message Meaning: Traffic violation
Type: Traffic
Category: FORWARD
Severity: Warning
accessproxy string 80
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
clientdeviceid string 80
clientdeviceowner string 80
dstauthserver string 64
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstreputation uint32 10
dstswversion string 66
dstthreatfeed string 36
dstunauthuser string 66
dstunauthusersource string 66
gatewayid uint32 10
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
pdstport uint16 5
policymode string 8
psrcport uint16 5
saasname string 80
shapingpolicyname string 36
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcmacvendor string 66
srcregion string 64
srcreputation uint32 10
srcswversion string 66
srcthreatfeed string 36
tunnelid uint32 10
vip string 64
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
4 - LOG_ID_TRAFFIC_OTHER_START
Message ID: 4
Message Description: LOG_ID_TRAFFIC_OTHER_START
Message Meaning: Traffic other session start
Type: Traffic
Category: FORWARD
Severity: Notice
accessproxy string 80
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
clientdeviceid string 80
clientdeviceowner string 80
dstauthserver string 64
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstreputation uint32 10
dstswversion string 66
dstthreatfeed string 36
dstunauthuser string 66
dstunauthusersource string 66
gatewayid uint32 10
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
pdstport uint16 5
policymode string 8
psrcport uint16 5
saasname string 80
shapingpolicyname string 36
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcmacvendor string 66
srcregion string 64
srcreputation uint32 10
srcswversion string 66
srcthreatfeed string 36
tunnelid uint32 10
vip string 64
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
5 - LOG_ID_TRAFFIC_OTHER_ICMP_ALLOW
Message ID: 5
Message Description: LOG_ID_TRAFFIC_OTHER_ICMP_ALLOW
Message Meaning: Traffic allowed ICMP
Type: Traffic
Category: FORWARD
Severity: Notice
accessproxy string 80
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
clientdeviceid string 80
clientdeviceowner string 80
dstauthserver string 64
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstreputation uint32 10
dstswversion string 66
dstthreatfeed string 36
dstunauthuser string 66
dstunauthusersource string 66
gatewayid uint32 10
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
pdstport uint16 5
policymode string 8
psrcport uint16 5
saasname string 80
shapingpolicyname string 36
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcmacvendor string 66
srcregion string 64
srcreputation uint32 10
srcswversion string 66
srcthreatfeed string 36
tunnelid uint32 10
vip string 64
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
6 - LOG_ID_TRAFFIC_OTHER_ICMP_DENY
Message ID: 6
Message Description: LOG_ID_TRAFFIC_OTHER_ICMP_DENY
Message Meaning: Traffic denied ICMP
Type: Traffic
Category: FORWARD
Severity: Warning
accessproxy string 80
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
clientdeviceid string 80
clientdeviceowner string 80
dstauthserver string 64
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstreputation uint32 10
dstswversion string 66
dstthreatfeed string 36
dstunauthuser string 66
dstunauthusersource string 66
gatewayid uint32 10
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
pdstport uint16 5
policymode string 8
psrcport uint16 5
saasname string 80
shapingpolicyname string 36
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcmacvendor string 66
srcregion string 64
srcreputation uint32 10
srcswversion string 66
srcthreatfeed string 36
tunnelid uint32 10
vip string 64
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
7 - LOG_ID_TRAFFIC_OTHER_INVALID
Message ID: 7
Message Description: LOG_ID_TRAFFIC_OTHER_INVALID
Message Meaning: Traffic other invalid
Type: Traffic
Category: FORWARD
Severity: Warning
accessproxy string 80
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
clientdeviceid string 80
clientdeviceowner string 80
dstauthserver string 64
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstreputation uint32 10
dstswversion string 66
dstthreatfeed string 36
dstunauthuser string 66
dstunauthusersource string 66
gatewayid uint32 10
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
pdstport uint16 5
policymode string 8
psrcport uint16 5
saasname string 80
shapingpolicyname string 36
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcmacvendor string 66
srcregion string 64
srcreputation uint32 10
srcswversion string 66
srcthreatfeed string 36
tunnelid uint32 10
vip string 64
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
8 - LOG_ID_TRAFFIC_WANOPT
Message ID: 8
Message Description: LOG_ID_TRAFFIC_WANOPT
Message Meaning: WAN optimization traffic
Type: Traffic
Category: FORWARD
Severity: Notice
accessproxy string 80
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
clientdeviceid string 80
clientdeviceowner string 80
dstauthserver string 64
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstreputation uint32 10
dstswversion string 66
dstthreatfeed string 36
dstunauthuser string 66
dstunauthusersource string 66
gatewayid uint32 10
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
pdstport uint16 5
policymode string 8
psrcport uint16 5
saasname string 80
shapingpolicyname string 36
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcmacvendor string 66
srcregion string 64
srcreputation uint32 10
srcswversion string 66
srcthreatfeed string 36
tunnelid uint32 10
vip string 64
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
countapp Number of App Ctrl logs associated with the session uint32 10
countcifs uint32 10
countdns Number of DNS Query logs associated with the session uint32 10
countff uint32 10
counticap uint32 10
countsctpf uint32 10
countssl uint32 10
countweb Number of Web Filter logs associated with the session uint32 10
9 - LOG_ID_TRAFFIC_WEBCACHE
Message ID: 9
Message Description: LOG_ID_TRAFFIC_WEBCACHE
Message Meaning: Web cache traffic
Type: Traffic
Category: FORWARD
Severity: Notice
accessproxy string 80
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
clientdeviceid string 80
clientdeviceowner string 80
dstauthserver string 64
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstreputation uint32 10
dstswversion string 66
dstthreatfeed string 36
dstunauthuser string 66
dstunauthusersource string 66
gatewayid uint32 10
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
pdstport uint16 5
policymode string 8
psrcport uint16 5
saasname string 80
shapingpolicyname string 36
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcmacvendor string 66
srcregion string 64
srcreputation uint32 10
srcswversion string 66
srcthreatfeed string 36
tunnelid uint32 10
vip string 64
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
countapp Number of App Ctrl logs associated with the session uint32 10
countcifs uint32 10
countdns Number of DNS Query logs associated with the session uint32 10
countff uint32 10
counticap uint32 10
countsctpf uint32 10
countssl uint32 10
countweb Number of Web Filter logs associated with the session uint32 10
10 - LOG_ID_TRAFFIC_EXPLICIT_PROXY
Message ID: 10
Message Description: LOG_ID_TRAFFIC_EXPLICIT_PROXY
Message Meaning: Explicit proxy traffic
Type: Traffic
accessproxy string 80
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
clientdeviceid string 80
clientdeviceowner string 80
dstauthserver string 64
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstreputation uint32 10
dstswversion string 66
dstthreatfeed string 36
dstunauthuser string 66
dstunauthusersource string 66
gatewayid uint32 10
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
pdstport uint16 5
policymode string 8
psrcport uint16 5
saasname string 80
shapingpolicyname string 36
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcmacvendor string 66
srcregion string 64
srcreputation uint32 10
srcswversion string 66
srcthreatfeed string 36
tunnelid uint32 10
vip string 64
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
countapp Number of App Ctrl logs associated with the session uint32 10
countcifs uint32 10
countdns Number of DNS Query logs associated with the session uint32 10
countff uint32 10
counticap uint32 10
countsctpf uint32 10
countssl uint32 10
countweb Number of Web Filter logs associated with the session uint32 10
11 - LOG_ID_TRAFFIC_FAIL_CONN
Message ID: 11
Message Description: LOG_ID_TRAFFIC_FAIL_CONN
Message Meaning: Failed connection attempts
Type: Traffic
Category: FORWARD
Severity: Warning
accessproxy string 80
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
clientdeviceid string 80
clientdeviceowner string 80
dstauthserver string 64
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstreputation uint32 10
dstswversion string 66
dstthreatfeed string 36
dstunauthuser string 66
dstunauthusersource string 66
gatewayid uint32 10
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
pdstport uint16 5
policymode string 8
psrcport uint16 5
saasname string 80
shapingpolicyname string 36
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcmacvendor string 66
srcregion string 64
srcreputation uint32 10
srcswversion string 66
srcthreatfeed string 36
tunnelid uint32 10
vip string 64
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
12 - LOG_ID_TRAFFIC_MULTICAST
Message ID: 12
Message Description: LOG_ID_TRAFFIC_MULTICAST
Message Meaning: Multicast traffic
Type: Traffic
Category: MULTICAST
Severity: Notice
accessproxy string 80
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
clientdeviceid string 80
clientdeviceowner string 80
dstauthserver string 64
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstreputation uint32 10
dstswversion string 66
dstthreatfeed string 36
dstunauthuser string 66
dstunauthusersource string 66
gatewayid uint32 10
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
pdstport uint16 5
policymode string 8
psrcport uint16 5
saasname string 80
shapingpolicyname string 36
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcmacvendor string 66
srcregion string 64
srcreputation uint32 10
srcswversion string 66
srcthreatfeed string 36
tunnelid uint32 10
vip string 64
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
13 - LOG_ID_TRAFFIC_END_FORWARD
Message ID: 13
Message Description: LOG_ID_TRAFFIC_END_FORWARD
Message Meaning: Forward traffic
Type: Traffic
Category: FORWARD
Severity: Notice
accessproxy string 80
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
clientdeviceid string 80
clientdeviceowner string 80
dstauthserver string 64
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstreputation uint32 10
dstswversion string 66
dstthreatfeed string 36
dstunauthuser string 66
dstunauthusersource string 66
gatewayid uint32 10
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
pdstport uint16 5
policymode string 8
psrcport uint16 5
saasname string 80
shapingpolicyname string 36
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcmacvendor string 66
srcregion string 64
srcreputation uint32 10
srcswversion string 66
srcthreatfeed string 36
tunnelid uint32 10
vip string 64
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
countapp Number of App Ctrl logs associated with the session uint32 10
countcifs uint32 10
countdns Number of DNS Query logs associated with the session uint32 10
countff uint32 10
counticap uint32 10
countsctpf uint32 10
countssl uint32 10
countweb Number of Web Filter logs associated with the session uint32 10
14 - LOG_ID_TRAFFIC_END_LOCAL
Message ID: 14
Message Description: LOG_ID_TRAFFIC_END_LOCAL
Message Meaning: Local traffic
Type: Traffic
Category: LOCAL
Severity: Notice
accessproxy string 80
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
clientdeviceid string 80
clientdeviceowner string 80
dstauthserver string 64
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstreputation uint32 10
dstswversion string 66
dstthreatfeed string 36
dstunauthuser string 66
dstunauthusersource string 66
gatewayid uint32 10
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
pdstport uint16 5
policymode string 8
psrcport uint16 5
saasname string 80
shapingpolicyname string 36
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcmacvendor string 66
srcregion string 64
srcreputation uint32 10
srcswversion string 66
srcthreatfeed string 36
tunnelid uint32 10
vip string 64
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
15 - LOG_ID_TRAFFIC_START_FORWARD
Message ID: 15
Message Description: LOG_ID_TRAFFIC_START_FORWARD
Message Meaning: Forward traffic session start
Type: Traffic
Category: FORWARD
Severity: Notice
accessproxy string 80
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
clientdeviceid string 80
clientdeviceowner string 80
dstauthserver string 64
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstreputation uint32 10
dstswversion string 66
dstthreatfeed string 36
dstunauthuser string 66
dstunauthusersource string 66
gatewayid uint32 10
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
pdstport uint16 5
policymode string 8
psrcport uint16 5
saasname string 80
shapingpolicyname string 36
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcmacvendor string 66
srcregion string 64
srcreputation uint32 10
srcswversion string 66
srcthreatfeed string 36
tunnelid uint32 10
vip string 64
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
16 - LOG_ID_TRAFFIC_START_LOCAL
Message ID: 16
Message Description: LOG_ID_TRAFFIC_START_LOCAL
Message Meaning: Local traffic session start
Type: Traffic
Category: LOCAL
Severity: Notice
accessproxy string 80
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
clientdeviceid string 80
clientdeviceowner string 80
dstauthserver string 64
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstreputation uint32 10
dstswversion string 66
dstthreatfeed string 36
dstunauthuser string 66
dstunauthusersource string 66
gatewayid uint32 10
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
pdstport uint16 5
policymode string 8
psrcport uint16 5
saasname string 80
shapingpolicyname string 36
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcmacvendor string 66
srcregion string 64
srcreputation uint32 10
srcswversion string 66
srcthreatfeed string 36
tunnelid uint32 10
vip string 64
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
17 - LOG_ID_TRAFFIC_SNIFFER
Message ID: 17
Message Description: LOG_ID_TRAFFIC_SNIFFER
Message Meaning: Sniffer traffic
Type: Traffic
Category: SNIFFER
Severity: Notice
accessproxy string 80
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
clientdeviceid string 80
clientdeviceowner string 80
countapp Number of App Ctrl logs associated with the session uint32 10
countcifs uint32 10
countdns Number of DNS Query logs associated with the session uint32 10
countff uint32 10
counticap uint32 10
countsctpf uint32 10
countssl uint32 10
countweb Number of Web Filter logs associated with the session uint32 10
dstauthserver string 64
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstreputation uint32 10
dstswversion string 66
dstthreatfeed string 36
dstunauthuser string 66
dstunauthusersource string 66
gatewayid uint32 10
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
pdstport uint16 5
policymode string 8
psrcport uint16 5
saasname string 80
shapingpolicyname string 36
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcmacvendor string 66
srcregion string 64
srcreputation uint32 10
srcswversion string 66
srcthreatfeed string 36
tunnelid uint32 10
vip string 64
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
19 - LOG_ID_TRAFFIC_BROADCAST
Message ID: 19
accessproxy string 80
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
clientdeviceid string 80
clientdeviceowner string 80
dstauthserver string 64
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstreputation uint32 10
dstswversion string 66
dstthreatfeed string 36
dstunauthuser string 66
dstunauthusersource string 66
gatewayid uint32 10
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
pdstport uint16 5
policymode string 8
psrcport uint16 5
saasname string 80
shapingpolicyname string 36
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcmacvendor string 66
srcregion string 64
srcreputation uint32 10
srcswversion string 66
srcthreatfeed string 36
tunnelid uint32 10
vip string 64
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
20 - LOG_ID_TRAFFIC_STAT
Message ID: 20
accessproxy string 80
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
clientdeviceid string 80
clientdeviceowner string 80
dstauthserver string 64
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstreputation uint32 10
dstswversion string 66
dstthreatfeed string 36
dstunauthuser string 66
dstunauthusersource string 66
gatewayid uint32 10
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
pdstport uint16 5
policymode string 8
psrcport uint16 5
saasname string 80
shapingpolicyname string 36
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcmacvendor string 66
srcregion string 64
srcreputation uint32 10
srcswversion string 66
srcthreatfeed string 36
tunnelid uint32 10
vip string 64
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
21 - LOG_ID_TRAFFIC_SNIFFER_STAT
Message ID: 21
accessproxy string 80
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
clientdeviceid string 80
clientdeviceowner string 80
dstauthserver string 64
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstreputation uint32 10
dstswversion string 66
dstthreatfeed string 36
dstunauthuser string 66
dstunauthusersource string 66
gatewayid uint32 10
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
pdstport uint16 5
policymode string 8
psrcport uint16 5
saasname string 80
shapingpolicyname string 36
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcmacvendor string 66
srcregion string 64
srcreputation uint32 10
srcswversion string 66
srcthreatfeed string 36
tunnelid uint32 10
vip string 64
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
22 - LOG_ID_TRAFFIC_UTM_CORRELATION
Message ID: 22
accessproxy string 80
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
clientdeviceid string 80
clientdeviceowner string 80
dstauthserver string 64
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstreputation uint32 10
dstswversion string 66
dstthreatfeed string 36
dstunauthuser string 66
dstunauthusersource string 66
gatewayid uint32 10
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
pdstport uint16 5
policymode string 8
psrcport uint16 5
saasname string 80
shapingpolicyname string 36
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcmacvendor string 66
srcregion string 64
srcreputation uint32 10
srcswversion string 66
srcthreatfeed string 36
tunnelid uint32 10
vip string 64
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
countapp Number of App Ctrl logs associated with the session uint32 10
countcifs uint32 10
countdns Number of DNS Query logs associated with the session uint32 10
countff uint32 10
counticap uint32 10
countsctpf uint32 10
countssl uint32 10
countweb Number of Web Filter logs associated with the session uint32 10
24 - LOG_ID_TRAFFIC_ZTNA
Message ID: 24
Message Description: LOG_ID_TRAFFIC_ZTNA
Message Meaning: ZTNA traffic
Type: Traffic
Category: ZTNA
Severity: Notice
accessproxy string 80
action The status of the session: deny - Session was denied string 16
accept - Allowed Forward session start - Session starts (log
message was created when the session was created) dns -
DNS query return error ip-conn - Failed connection attempts
close - Local-traffic session allowed timeout - Allowed
session was timeout client-rst - Session reset by client
server-rst - Session reset by server
clientdeviceid string 80
clientdeviceowner string 80
dstauthserver string 64
dstcity string 64
dstfamily string 66
dsthwvendor string 66
dsthwversion string 66
dstregion string 64
dstreputation uint32 10
dstswversion string 66
dstthreatfeed string 36
dstunauthuser string 66
dstunauthusersource string 66
gatewayid uint32 10
identifier uint16 5
mastersrcmac The master MAC address for a host that has multiple string 17
network interfaces
pdstport uint16 5
policymode string 8
psrcport uint16 5
saasname string 80
shapingpolicyname string 36
signal int8 4
snr int8 4
srccity string 64
srcfamily string 66
srchwvendor string 66
srchwversion string 66
srcmacvendor string 66
srcregion string 64
srcreputation uint32 10
srcswversion string 66
srcthreatfeed string 36
tunnelid uint32 10
vip string 64
vwlname string 36
vwlquality Quality info of the service rule that is matched by traffic string 320
25 - LOG_ID_TRAFFIC_SFLOW
Message ID: 25
Message Description: LOG_ID_TRAFFIC_SFLOW
Message Meaning: Sflow sample
Type: Traffic
Category: FORWARD
Severity: Notice
44032 - LOGID_EVENT_VOIP_SIP
date Day, month, and year when the log message was recorded. string 10
time Hour clock when the log message was recorded. string 8
devid Serial number of the device for the traffic's origin. string 16
vd Name of the virtual domain in which the log message was string 32
recorded.
dstip Destination IP ip 39
policy_id Name of the firewall policy governing the traffic which caused uint32 10
the log message.
44033 - LOGID_EVENT_VOIP_SIP_BLOCK
date Day, month, and year when the log message was recorded. string 10
time Hour clock when the log message was recorded. string 8
devid Serial number of the device for the traffic's origin. string 16
vd Name of the virtual domain in which the log message was string 32
recorded.
dstip Destination IP ip 39
policy_id Name of the firewall policy governing the traffic which caused uint32 10
the log message.
44034 - LOGID_EVENT_VOIP_SIP_FUZZING
date Day, month, and year when the log message was recorded. string 10
time Hour clock when the log message was recorded. string 8
devid Serial number of the device for the traffic's origin. string 16
vd Name of the virtual domain in which the log message was string 32
recorded.
dstip Destination IP ip 39
policy_id Name of the firewall policy governing the traffic which caused uint32 10
the log message.
44035 - LOGID_EVENT_VOIP_SCCP_REGISTER
date Day, month, and year when the log message was recorded. string 10
time Hour clock when the log message was recorded. string 8
devid Serial number of the device for the traffic's origin. string 16
vd Name of the virtual domain in which the log message was string 32
recorded.
dstip Destination IP ip 39
policy_id Name of the firewall policy governing the traffic which caused uint32 10
the log message.
locip Local IP ip 39
44036 - LOGID_EVENT_VOIP_SCCP_UNREGISTER
date Day, month, and year when the log message was recorded. string 10
time Hour clock when the log message was recorded. string 8
devid Serial number of the device for the traffic's origin. string 16
vd Name of the virtual domain in which the log message was string 32
recorded.
dstip Destination IP ip 39
policy_id Name of the firewall policy governing the traffic which caused uint32 10
the log message.
locip Local IP ip 39
44037 - LOGID_EVENT_VOIP_SCCP_CALL_BLOCK
date Day, month, and year when the log message was recorded. string 10
time Hour clock when the log message was recorded. string 8
devid Serial number of the device for the traffic's origin. string 16
vd Name of the virtual domain in which the log message was string 32
recorded.
dstip Destination IP ip 39
policy_id Name of the firewall policy governing the traffic which caused uint32 10
the log message.
locip Local IP ip 39
date Day, month, and year when the log message was recorded. string 10
time Hour clock when the log message was recorded. string 8
devid Serial number of the device for the traffic's origin. string 16
vd Name of the virtual domain in which the log message was string 32
recorded.
dstip Destination IP ip 39
policy_id Name of the firewall policy governing the traffic which caused uint32 10
the log message.
locip Local IP ip 39
remip Remote IP ip 39
30248 - LOGID_WAF_SIGNATURE_BLOCK
dstauthserver string 64
dstcountry string 64
dstuuid string 37
httpmethod string 20
policytype string 24
poluuid string 37
srccountry string 64
srcuuid string 37
30249 - LOGID_WAF_SIGNATURE_PASS
dstauthserver string 64
dstcountry string 64
dstuuid string 37
httpmethod string 20
policytype string 24
poluuid string 37
srccountry string 64
srcuuid string 37
30250 - LOGID_WAF_SIGNATURE_ERASE
dstauthserver string 64
dstcountry string 64
dstuuid string 37
httpmethod string 20
policytype string 24
poluuid string 37
srccountry string 64
srcuuid string 37
30251 - LOGID_WAF_CUSTOM_SIGNATURE_BLOCK
dstauthserver string 64
dstcountry string 64
dstuuid string 37
httpmethod string 20
policytype string 24
poluuid string 37
srccountry string 64
srcuuid string 37
30252 - LOGID_WAF_CUSTOM_SIGNATURE_PASS
dstauthserver string 64
dstcountry string 64
dstuuid string 37
httpmethod string 20
policytype string 24
poluuid string 37
srccountry string 64
srcuuid string 37
30253 - LOGID_WAF_METHOD_BLOCK
dstauthserver string 64
dstcountry string 64
dstuuid string 37
httpmethod string 20
policytype string 24
poluuid string 37
srccountry string 64
srcuuid string 37
30255 - LOGID_WAF_ADDRESS_LIST_BLOCK
dstauthserver string 64
dstcountry string 64
dstuuid string 37
httpmethod string 20
policytype string 24
poluuid string 37
srccountry string 64
srcuuid string 37
30257 - LOGID_WAF_CONSTRAINTS_BLOCK
dstauthserver string 64
dstcountry string 64
dstuuid string 37
httpmethod string 20
policytype string 24
poluuid string 37
srccountry string 64
srcuuid string 37
30258 - LOGID_WAF_CONSTRAINTS_PASS
dstauthserver string 64
dstcountry string 64
dstuuid string 37
httpmethod string 20
policytype string 24
poluuid string 37
srccountry string 64
srcuuid string 37
30259 - LOGID_WAF_URL_ACCESS_PERMIT
dstauthserver string 64
dstcountry string 64
dstuuid string 37
httpmethod string 20
policytype string 24
poluuid string 37
srccountry string 64
srcuuid string 37
30260 - LOGID_WAF_URL_ACCESS_BYPASS
dstauthserver string 64
dstcountry string 64
dstuuid string 37
httpmethod string 20
policytype string 24
poluuid string 37
srccountry string 64
srcuuid string 37
30261 - LOGID_WAF_URL_ACCESS_BLOCK
dstauthserver string 64
dstcountry string 64
dstuuid string 37
httpmethod string 20
policytype string 24
poluuid string 37
srccountry string 64
srcuuid string 37
12288 - LOG_ID_WEB_CONTENT_BANWORD
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
12290 - LOG_ID_WEB_CONTENT_EXEMPTWORD
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
12293 - LOG_ID_WEB_CONTENT_SEARCH
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
12544 - LOG_ID_URL_FILTER_BLOCK
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
12545 - LOG_ID_URL_FILTER_EXEMPT
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
12546 - LOG_ID_URL_FILTER_ALLOW
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
12548 - LOG_ID_URL_FILTER_INVALID_HOSTNAME_HTTPS_BLK
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
12549 - LOG_ID_URL_FILTER_INVALID_HOSTNAME_HTTP_PASS
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
12550 - LOG_ID_URL_FILTER_INVALID_HOSTNAME_HTTPS_PASS
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
12552 - LOG_ID_URL_FILTER_INVALID_HOSTNAME_SNI_PASS
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
12553 - LOG_ID_URL_FILTER_INVALID_CERT
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
12554 - LOG_ID_URL_FILTER_INVALID_SESSION
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
12556 - LOG_ID_URL_FILTER_SRV_CERT_ERR_PASS
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
12557 - LOG_ID_URL_FILTER_FAMS_NOT_ACTIVE
12558 - LOG_ID_URL_FILTER_RATING_ERR
dstip Destination IP ip 39
srcip Source IP ip 39
12559 - LOG_ID_URL_FILTER_PASS
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
12560 - LOG_ID_URL_WISP_BLOCK
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
12561 - LOG_ID_URL_WISP_REDIR
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
12562 - LOG_ID_URL_WISP_ALLOW
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
12688 - LOG_ID_WEB_SSL_EXEMPT
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
ratemethod string 6
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
12800 - LOG_ID_WEB_FTGD_ERR
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
12801 - LOG_ID_WEB_FTGD_WARNING
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
12802 - LOG_ID_WEB_FTGD_QUOTA
13056 - LOG_ID_WEB_FTGD_CAT_BLK
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
ratemethod string 6
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
13057 - LOG_ID_WEB_FTGD_CAT_WARN
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
ratemethod string 6
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
13312 - LOG_ID_WEB_FTGD_CAT_ALLOW
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
ratemethod string 6
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
13315 - LOG_ID_WEB_FTGD_QUOTA_COUNTING
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
ratemethod string 6
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
13317 - LOG_ID_WEB_URL
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
ratemethod string 6
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
13568 - LOG_ID_WEB_SCRIPTFILTER_ACTIVEX
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
13573 - LOG_ID_WEB_SCRIPTFILTER_COOKIE
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
13600 - LOG_ID_WEB_SCRIPTFILTER_OTHER
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
13601 - LOG_ID_WEB_WF_COOKIE
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
13602 - LOG_ID_WEB_WF_REFERER
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
13603 - LOG_ID_WEB_WF_COMMAND_BLOCK
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
proto uint8 3
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
13616 - LOG_ID_CONTENT_TYPE_BLOCK
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
13632 - LOGID_HTTP_HDR_CHG_REQ
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policytype string 24
poluuid string 37
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
13633 - LOGID_HTTP_HDR_CHG_RESP
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policytype string 24
poluuid string 37
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
13648 - LOG_ID_WEB_WF_ANTIPHISH_MATCH_URL_ALLOW
antiphishdc string 64
antiphishrule string 64
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
ratemethod string 6
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
13649 - LOG_ID_WEB_WF_ANTIPHISH_MATCH_FTGD_ALLOW
antiphishdc string 64
antiphishrule string 64
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
ratemethod string 6
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
13650 - LOG_ID_WEB_WF_ANTIPHISH_MATCH_DEFAULT_ALLOW
antiphishdc string 64
antiphishrule string 64
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
ratemethod string 6
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
13651 - LOG_ID_WEB_WF_ANTIPHISH_MATCH_URL_BLOCK
antiphishdc string 64
antiphishrule string 64
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
ratemethod string 6
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
antiphishdc string 64
antiphishrule string 64
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
ratemethod string 6
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
13653 - LOG_ID_WEB_WF_ANTIPHISH_MATCH_DEFAULT_BLOCK
antiphishdc string 64
antiphishrule string 64
dstauthserver string 64
dstcountry string 64
dstip Destination IP ip 39
dstuuid string 37
httpmethod string 20
policymode string 8
policytype string 24
poluuid string 37
ratemethod string 6
rawdata Extended logging data including HTTP method, URL, client string 1024
content type, server content type, user agent, referer, x-
forwarded-for
srccountry string 64
srcip Source IP ip 39
srcuuid string 37
13664 - LOG_ID_VIDEOFILTER_CATEGORY_BLOCK
action string 11
date string 10
devid string 16
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
eventtime uint64 20
eventtype string 32
httpmethod string 20
level string 11
logid string 10
policyid uint32 10
profile string 64
proto uint8 3
service string 36
sessionid uint32 10
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
vd string 32
videocategoryid uint32 10
videoinfosource string 10
vrf uint8 3
13665 - LOG_ID_VIDEOFILTER_CATEGORY_MONITOR
action string 11
date string 10
devid string 16
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
eventtime uint64 20
eventtype string 32
httpmethod string 20
level string 11
logid string 10
policyid uint32 10
profile string 64
proto uint8 3
service string 36
sessionid uint32 10
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
vd string 32
videocategoryid uint32 10
videoinfosource string 10
vrf uint8 3
action string 11
date string 10
devid string 16
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
eventtime uint64 20
eventtype string 32
httpmethod string 20
level string 11
logid string 10
policyid uint32 10
profile string 64
proto uint8 3
service string 36
sessionid uint32 10
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
vd string 32
videocategoryid uint32 10
videoinfosource string 10
vrf uint8 3
13680 - LOG_ID_VIDEOFILTER_CHANNEL_BLOCK
action string 11
date string 10
devid string 16
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
eventtime uint64 20
eventtype string 32
httpmethod string 20
level string 11
logid string 10
policyid uint32 10
profile string 64
proto uint8 3
service string 36
sessionid uint32 10
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
vd string 32
videocategoryid uint32 10
videoinfosource string 10
vrf uint8 3
13681 - LOG_ID_VIDEOFILTER_CHANNEL_MONITOR
action string 11
date string 10
devid string 16
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
eventtime uint64 20
eventtype string 32
httpmethod string 20
level string 11
logid string 10
policyid uint32 10
profile string 64
proto uint8 3
service string 36
sessionid uint32 10
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
vd string 32
videocategoryid uint32 10
videoinfosource string 10
vrf uint8 3
13682 - LOG_ID_VIDEOFILTER_CHANNEL_ALLOW
action string 11
date string 10
devid string 16
dstintf string 32
dstintfrole string 10
dstip ip 39
dstport uint16 5
eventtime uint64 20
eventtype string 32
httpmethod string 20
level string 11
logid string 10
policyid uint32 10
profile string 64
proto uint8 3
service string 36
sessionid uint32 10
srcintf string 32
srcintfrole string 10
srcip ip 39
srcport uint16 5
subtype string 20
time string 8
type string 16
tz string 5
vd string 32
videocategoryid uint32 10
videoinfosource string 10
vrf uint8 3
Copyright© 2023 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein
may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were
attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance
results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract,
signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only
the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal
conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change,
modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.