0
|
FW_EXT_LOG_NONE
|
No specific extended event.
|
1
|
FW_EXT_FW_DROP_L4_TYPE_INVALID_HDR
|
Small datagram that cannot contain the Layer 4 ICMP, TCP, or UDP headers.
|
2
|
FW_EXT_FW_DROP_L4_TYPE_INVALID_ACK_FLAG
|
Did not contain an ACK flag, or a RST flag was set in the SYN/ACK packet during the TCP three-way handshake and the packet
had an invalid sequence number.
|
3
|
FW_EXT_FW_DROP_L4_TYPE_INVALID_ACK_NUM
|
Occurs due to one of the following reasons:
-
When a packet’s ACK value is less than the
connection’s oldest
unacknowledged sequence
number.
-
When a packet’s ACK value
is greater than the connection’s next sequence number.
-
For SYN/ACK or ACK packets received during
the three-way handshake, the sequence number is not equal to the
initial sequence number plus 1.
|
4
|
FW_EXT_FW_DROP_L4_TYPE_INVALID _TCP_INITIATOR
|
The first packet of a flow was not a SYN packet.
|
5
|
FW_EXT_FW_DROP_L4_TYPE_SYN _WITH_DATA
|
The SYN packet contains the payload and these SYN packet is not supported.
|
6
|
FW_EXT_FW_DROP_L4_TYPE_INVALI D_TCP_WIN_SCALE_OPTION
|
Invalid length for the TCP window-scale option.
|
7
|
FW_EXT_FW_DROP_L4_TYPE_INVALID _SEG_SYNSENT_STATE
|
An invalid TCP segment was received in the SYNSENT
state.
Occurs due to one of the following reasons:
-
SYN/ACK has
a payload.
-
SYN/ACK has other flags
(push [PSH], urgent [URG], finish [FIN]) set.
-
Retransmit SYN
message with a payload or invalid
TCP flags (ACK, PSH, URG, FIN, RST) was received.
-
A non-SYN packet was received from the
initiator.
|
8
|
FW_EXT_FW_DROP_L4_TYPE_INVALID _SEG_SYNRCVD_STATE
|
A retransmitted SYN packet contains a payload or received a packet from the responder.
|
9
|
FW_EXT_FW_DROP_L4_TYPE_INVALID _SEG_PKT_TOO_OLD
|
Packet is older (lesser than) than the receiver’s current TCP window.
|
10
|
FW_EXT_FW_DROP_L4_TYPE_INVALID _SEG_PKT_WIN_OVERFLOW
|
The sequence number of the packet is outside (greater than) the receiver’s TCP window.
|
11
|
FW_EXT_FW_DROP_L4_TYPE_INVALID _SEG_PYLD_AFTER_FIN_SEND
|
A packet containing a payload was received from the sender after a FIN message was received.
|
12
|
FW_EXT_FW_DROP_L4_TYPE_INVALID _FLAGS
|
TCP flags associated with the packet are not
valid. This may occur for the following reasons:
|
13
|
FW_EXT_FW_DROP_L4_TYPE_INVALID_SEQ
|
Invalid sequence number.
Occurs due to one of the following reasons:
-
The sequence number is less
than the ISN 9.
-
The sequence number is equal to the
ISN but not equal to a SYN packet.
-
If the receive window size is
zero and the packet contains data, or if the sequence number is greater than the
last ACK number.
-
Sequence number falls beyond the TCP
window.
|
14
|
FW_EXT_FW_DROP_L4_TYPE_RETRANS _INVALID_FLAGS
|
A retransmitted packet was already acknowledged by the receiver.
|
15
|
FW_EXT_FW_DROP_L4_TYPE_L7_OOO _SEG
|
The packet contains a TCP segment that arrived prior to the expected next segment.
|
16
|
FW_EXT_FW_DROP_L4_TYPE_SYN _FLOOD_DROP
|
Maximum-incomplete sessions configured for the policy have been exceeded and the host is in block time.
|
17
|
FW_EXT_FW_DROP_L4_TYPE_MAX _HALFSESSION
|
Exceeded the number of allowed half-open sessions.
|
18
|
FW_EXT_FW_DROP_L4_TYPE_ TOO_MANY_PKTS
|
Exceeded the maximum number of simultaneous inspectable packets allowed per flow. The number is currently set to allow 25
simultaneous packets to be inspected. The simultaneous inspection prevents any one flow from monopolizing more than its share
of processor resources.
|
19
|
FW_EXT_FW_DROP_L4_TYPE_TOO _MANY_ICMP_ERR_PKTS
|
Exceeded the maximum number of ICMP error packets allowed per flow. This log is triggered by the firewall base inspection.
|
20
|
FW_EXT_FW_DROP_L4_TYPE_UNEXPECT _TCP_PYLD
|
Retransmitted SYN/ACK from the responder included a payload. Payloads are not allowed during a TCP three-way handshake negotiation.
|
21
|
FW_EXT_FW_DROP_L4_TYPE_INTERNAL _ERR_UNDEFINED_DIR
|
Packet direction is undefined.
|
22
|
FW_EXT_FW_DROP_L4_TYPE_SYN _IN_WIN
|
A TCP packet of an established session arrived with the SYN flag set. A SYN flag is not allowed after the initial two packets
of the three-way handshake.
|
23
|
FW_EXT_FW_DROP_L4_TYPE_RST _IN_WIN
|
A TCP packet with the RST flag set was received with a sequence number that is outside the last received acknowledgment.
The packet may be sent out of order.
|
24
|
FW_EXT_FW_DROP_L4_TYPE_ STRAY_SEG
|
An unexpected packet was received after the flow was torn down, or a packet was received from the responder before the initiator
sent a valid SYN flag.
|
25
|
FW_EXT_FW_DROP_L4_TYPE_ RST_TO_RESP
|
A SYN/ACK flag was expected from the responder. However, a packet with an invalid sequence number was received. The zone-based
firewall sent a RST flag to the responder.
|
26
|
FW_EXT_FW_DROP_L4_TYPE _I NTERNAL_ERR_ICMP_NO_NAT
|
The ICMP packet is NAT 10 translated; but internal NAT information is missing. An internal error.
|
27
|
FW_EXT_FW_DROP_L4_TYPE _ INTERNAL_ERR_ICMP_ALLOC_FAIL
|
Failed to allocate an ICMP error packet during an ICMP inspection.
|
28
|
FW_EXT_FW_DROP_L4_TYPE _INTERNAL_ERR_ICMP_GET_STAT_BLK_FAIL
|
The classification result did not have the required statistics memory. The policy information was not properly downloaded
to the data plane.
|
29
|
FW_EXT_FW_DROP_L4_TYPE _INTERNAL_ERR_ICMP_DIR_NOT_IDENTIFIED
|
Packet direction is not defined.
|
30
|
FW_EXT_FW_DROP_L4_TYPE_ ICMP_SCB_CLOSE
|
Received an ICMP packet while the session is being torn down.
|
31
|
FW_EXT_FW_DROP_L4_TYPE_ ICMP_PKT_NO_IP_HDR
|
No IP header in the payload of the ICMP error packet.
|
32
|
FW_EXT_FW_DROP_L4_TYPE_ ICMP_ERROR_NO _IP_NO_ICMP
|
The ICMP error packet has no IP or ICMP, which is probably due to a malformed packet.
|
33
|
FW_EXT_FW_DROP_L4_TYPE_ ICMP_ERROR _PKTS_BURST
|
The ICMP error packet exceeded the burst limit of 10
|
34
|
FW_EXT_FW_DROP_L4_TYPE_ ICMP_ERROR _MULTIPLE_UNREACH
|
The ICMP error packet exceeded the “Unreachable” limit. Only the first unreachable packet is allowed to pass.
|
35
|
FW_EXT_FW_DROP_L4_TYPE_ ICMP_ERROR _L4_INVALID_SEQ
|
The sequence number of the embedded packet does not match the sequence number of the TCP packet that triggers the ICMP error
packet.
|
36
|
FW_EXT_FW_DROP_L4_TYPE_ ICMP_ERROR _L4_INVALID_ACK
|
The TCP packet contained in an ICMP error packet payload has an ACK flag that was not seen before.
|
37
|
FW_EXT_FW_DROP_L4_TYPE_ ICMP_PKT_TOO _SHORT
|
The ICMP error packet length is less than the IP header length plus the ICMP header length.
|
38
|
FW_EXT_FW_DROP_L4_TYPE_ SESSION_LIMIT
|
Resources exceeded the session limit while promoting for an imprecise channel.
|
39
|
FW_EXT_FW_DROP_L4_TYPE_ SCB_CLOSE
|
A TCP packet was received on a closed session.
|
40
|
FW_EXT_FW_DROP_INSP_TYPE_ POLICY_NOT_PRESENT
|
A policy is not present in a zone pair.
|
41
|
FW_EXT_FW_DROP_INSP_TYPE_ SESS_MISS_POLICY _NOT_PRESENT
|
A zone pair is configured in the same zone, but the zone does not have any policies.
|
44
|
FW_EXT_FW_DROP_INSP_TYPE_ CLASS_ACTION_DROP
|
The classification action is to drop the non-ICMP, TCP, and UDP packets.
|
45
|
FW_EXT_FW_DROP_INSP_TYPE_ PAM_LOOKUP_FAIL
|
The classification action is to drop the PAM entry.
|
48
|
FW_EXT_FW_DROP_INSP_TYPE_ INTERNAL_ERR_ GET_STAT_BLK_FAIL
|
Failed to get the statistic block from the classification result bytes.
|
49
|
FW_EXT_FW_DROP_SYNCOOKIE_ TYPE_SYNCOOKIE _MAX_DST
|
The maximum entry limit for SYN flood packets is reached.
|
50
|
FW_EXT_FW_DROP_SYNCOOKIE_ TYPE_INTERNAL _ERR_ALLOC_FAIL
|
Cannot allocate memory for the destination table entry.
|
51
|
FW_EXT_FW_DROP_SYNCOOKIE_ TYPE_SYN_COOKIE _TRIGGER
|
The SYN cookie logic is triggered. Indicates that the SYN/ACK with the SYN cookie was sent and the original SYN packet was
dropped.
|
52
|
FW_EXT_FW_DROP_POLICY_ TYPE_FRAG_DROP
|
The first fragment of a VFR 11 packet is dropped and all associated remaining fragments will be dropped.
|
53
|
FW_EXT_FW_DROP_POLICY_ TYPE_ACTION_DROP
|
The classification action is to drop the packet.
|
54
|
FW_EXT_FW_DROP_POLICY_ TYPE_ICMP_ACTION_DROP
|
The policy action of the ICMP embedded packet is DROP.
|
55
|
FW_EXT_FW_DROP_L7_TYPE_ NO_SEG
|
Layer 7 ALG 12 does not inspect inspect-segmented packets.
|
56
|
FW_EXT_FW_DROP_L7_TYPE_ NO_FRAG
|
Layer 7 ALG does not inspect fragmented packets.
|
57
|
FW_EXT_FW_DROP_L7_TYPE_ UNKNOWN_PROTO
|
Unknown application protocol type.
|
58
|
FW_EXT_FW_DROP_L7_TYPE_ ALG_RET_DROP
|
Layer 7 ALG inspection resulted in a packet drop.
|
59
|
FW_EXT_FW_DROP_NONSESSION _TYPE
|
Session creation has failed.
|
60
|
FW_EXT_FW_DROP_NO_NEW _SESSION_TYPE
|
During initial HA 13 states, a new session is not allowed.
|
61
|
FW_EXT_FW_DROP_NOT_ INITIATOR_TYPE
|
Not a session initiator packet.
|
62
|
FW_EXT_FW_DROP_INVALID _ZONE_TYPE
|
When default zones are not enabled, traffic is only allowed between interfaces that are associated with security zones.
|
64
|
FW_EXT_FW_DROP_NO_ FORWARDING_TYPE
|
The firewall is not configured.
|
65
|
FW_EXT_FW_DROP_ BACKPRESSURE_TYPE
|
The firewall backpressure can be enabled if HSL 14 is enabled, and the HSL logger was unable to send a log message. Backpressure will remain enabled until HSL is able to send
a log.
|
66
|
FW_EXT_FW_DROP_L4_TYPE_INTERNAL _ERR _SYNFLOOD_ALLOC_HOSTDB_FAIL
|
During SYN processing, host rate limits are tracked. The host entry could not be allocated.
|
67
|
FW_EXT_FW_DROP_L4_TYPE_ SYNFLOOD_BLACKOUT_DROP
|
If the configured half-open connection limit is exceeded and blackout time is configured, all new connections to the specified
IP address are dropped.
|
68
|
FW_EXT_FW_DROP_L7_TYPE_ PROMOTE_FAIL_NO_ZONE_PAIR
|
A failed policy. When an ALG attempts to promote a session because no zone pairs are configured, the policy fails.
|
69
|
FW_EXT_FW_DROP_L7_TYPE_ PROMOTE_FAIL_NO_POLICY
|
A failed policy. When an ALG attempts to promote a session due to no policy, the policy fails.
|
|
FW_EXT_FW_DROP_L4_TYPE_ONEFW _SCB_CLOSE
|
A packet is received after the Context-Aware firewall (CXSC) requested a
teardown.
|
|
FW_EXT_FW_DROP_L4_TYPE_ONEFW _FAIL_CLOSE
|
CXSC is not running.
|