Firewall Log Format
Firewall Log Format
Log Structure
Log ID
Log ID is a Unique 12 characters code (c1c2c3c4c5c6c7c8c9c10c11c12) e.g. 0101011, 0102011
Where:
c1c2 - Log Type ID
c3c4 - Log Component ID
c5c6 - Log Sub Type ID
c7 - Priority
c8c9c10c11c12 - Message ID
Log Type
Log Type ID
01
02
03
04
05
06
07
Log Type
Firewall
IPS
Anti Virus
Anti Spam
Content Filtering
Event
WAF
Log Component
Log Component ID
01
02
03
Log Component
Firewall Rule
Invalid Traffic
Appliance Access
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
DoS Attack
ICMP Redirection
Source Routed
Anomaly
Signatures
HTTP
FTP
SMTP
POP3
IMAP4
Fragmented Traffic
Invalid Fragmented Traffic
HA
Foreign Host
IPMAC Filter
IP Spoof
GUI
CLI
LCD
CCC
IM
IPSec
L2TP
PPTP
SSLVPN
Firewall Authentication
VPN Authentication
SSL VPN Authentication
My AccountAuthentication
Appliance
DHCP server
Interface
Gateway
DDNS
WebCat
IPS
AV
Dial-In Authentication
Dial-In
Quarantine
Application filter
Landing Page
WLAN
ARP Flood
HTTPS
Guest User
WAF
Virtual Host
52
53
CTA
NTLM
Log Subtype
Log Subtype ID
01
02
03
04
05
06
07
08
09
10
11
Sub Type
Allowed
Denied
Detect
Drop
Clean
Virus
Spam
Probable Spam
Admin
Authentication
System
Priority
Priority
0
1
2
3
4
5
6
7
Description
Emergency
Alert
Critical
Error
Warning
Notification
Information
Debug
Message ID
Message ID
Message
Log Component
00001
Firewall Rule
00002
Firewall Rule
01001
Invalid Traffic
01301
Fragmented Traffic
01601
02001
Local ACL
02002
Local ACL
03001
DoS Attack
04001
ICMP Redirection
05001
05051
Source Routed
Foreign Host
05101
IPMAC Filter
05151
IP Spoof denied
IP Spoof
05201
SSL VPN
05301
ARP Flood
05401
Virtual Host
Sample Logs
Event: Firewall Traffic Allowed
Component: Firewall Rule
Sample Log:
date=2013-08-07 time=15:00:38 timezone="IST" device_name="CR500ia"
device_id=C070123456-ABCDEF log_id=010101600001 log_type="Firewall"
log_component="Firewall Rule" log_subtype="Allowed" status="Allow"
priority=Information duration=0 fw_rule_id=4 user_name="john.smith"
user_gp="Cyberoam General Department_grp" iap=7 ips_policy_id=0
appfilter_policy_id=16 application="Skype Services" in_interface="PortG.5"
out_interface="PortB" src_mac=00: 0:00: 0:00: 0 src_ip=172.16.16.79
src_country_code= dst_ip=192.168.2.4 dst_country_code=USA protocol="UDP"
src_port=20796 dst_port=40025 sent_pkts=0 recv_pkts=0 sent_bytes=0 recv_bytes=0
tran_src_ip=203.88.165.23 tran_src_port=0 tran_dst_ip= tran_dst_port=0
srczonetype="" dstzonetype="" dir_disp="" connevent="Start" connid="2254113600"
vconnid=""
Event: Firewall Traffic Denied
Component: Firewall Rule
Sample Log:
date=2013-08-07 time=13:25:27 timezone="IST" device_name="CR500ia" device_id=
C070123456-ABCDEF log_id=010102600002 log_type="Firewall"
log_component="Firewall Rule" log_subtype="Denied" status="Deny"
priority=Information duration=0 fw_rule_id=3 user_name="" user_gp="" iap=2
ips_policy_id=0 appfilter_policy_id=0 application="" in_interface="PortG.16"
out_interface="PortB" src_mac=00:0d:48:0a:05:45 src_ip=172.16.16.95
src_country_code= dst_ip=192.168.5.2 dst_country_code= protocol="UDP"
src_port=42288 dst_port=53 sent_pkts=0 recv_pkts=0 sent_bytes=0 recv_bytes=0
tran_src_ip= tran_src_port=0 tran_dst_ip= tran_dst_port=0 srczonetype=""
dstzonetype="" dir_disp="" connid="" vconnid=""
Event: Local ACL traffic allowed
Component: Local ACL
Sample Log:
date=2013-08-07 time=13:24:57 timezone="IST" device_name="CR500ia" device_id=
C070123456-ABCDEF log_id=010301602001 log_type="Firewall"
log_component="Appliance Access" log_subtype="Allowed" status="Allow"
priority=Information duration=30 fw_rule_id=0 user_name="" user_gp="" iap=0
ips_policy_id=0 appfilter_policy_id=0 application="" in_interface="PortG.2"
out_interface="" src_mac=00: 0:00: 0:00: 0 src_ip=172.16.16.54 src_country_code=
dst_ip=192.168.52.31 dst_country_code= protocol="ICMP" icmp_type=8 icmp_code=0
sent_pkts=1 recv_pkts=1 sent_bytes=212 recv_bytes=212 tran_src_ip=
TYPE
date
time
string
string
string
string
log_type
log_component
log_subtype
status
string
string
string
string
DESCRIPTION
Date (yyyy-mm-dd) when the event occurred
Time (hh:mm:ss) when the event occurred
Time zone set on the appliance e.g. IST
Model Number of the Appliance
Unique Identifier of the Appliance
Unique 12 characters code (c1c2c3c4c5c6c7c8c9c10c11)
e.g. 0101011, 0102011
c1c2 - Log Type e.g. 01 for firewall log
c3c4 - Log Component i.e. firewall/local ACL/ DoS Attack
etc.
c5c6 - Log Sub Type i.e. allow/violation
c7 - Priority e.g. 0 for Emergency
c8c9c10c11 - Message ID e.g. 00001 for traffic allowed by
firewall
Type of event e.g. firewall event
Component responsible for logging e.g. Firewall rule
Sub type of event
Ultimate status of traffic allowed or denied
priority
duration
firewall_rule_id
string
integer
integer
user_name
user_group
iap
ips_policy_id
appfilter_policy_id
application
in_interface
string
string
integer
integer
Integer
string
string
out_interface
string
src_ip
src_mac
src_country_code
dst_ip
dst_country_code
protocol
src_port
dst_port
icmp_type
icmp_code
sent_pkts
received_pkts
sent_bytes
recv_bytes
trans_src_ ip
string
string
string
string
string
integer
integer
integer
integer
integer
integer
integer
integer
integer
integer
trans_src_port
trans_dst_ip
trans_dst_port
integer
integer
integer
srczonetype
dstzonetype
dir_disp
connection_event
conn_id
vconn_id
string
string
string
Possible values:
"N/A" When appliance is deployed in Bridge mode or
destination port translation is not done
Port Port with which the original port is translated
Type of source zone e.g. LAN
Type of destination zone e.g. WAN
Packet direction
integer
integer
Possible values:
org, reply,
Event on which this log is generated
Unique identifier of connection
Connection ID of the master connection