Sonicwall Log Events Ref
Sonicwall Log Events Ref
Page 1
SonicWALL Log Messages
Each log entry contains the date and time of the event and a brief message describing the event. It
is also possible to copy the log entries from the management interface and paste into a report. The
SonicWALL manages log events in the following manner:
• TCP, UDP, or ICMP packets dropped
When IP packets are dropped by the SonicWALL, dropped TCP, UDP and ICMP messages are
displayed. The messages include the source and destination IP addresses of the packet. The
TCP or UDP port number or the ICMP code follows the IP address. Log messages usually include
the name of the service in quotation marks.
• Web, FTP, Gopher, or Newsgroup blocked
When a computer attempts to connect to the blocked site or newsgroup, a log event is
displayed. Blocked is defined as a Web site, connection, or event that is denied access from the
SonicWALL. The computer’s IP address, Ethernet address, the name of the blocked Web site,
and the Content Filter List Code is displayed. Code definitions for the 12 Content Filter List
categories are shown below.
a=Violence/Profanity g=Satanic/Cult
f=Intolerance l=Alcohol/Tobacco
Page 3
Land Attack Dropped - The SonciWALL has detected and blocked SYN packets whose source IP
addresses are spoofed to be the same as the destination IP addresses.
Administrator login Failure - incorrect password - Someone attempted to log into the SonicWALL
using the wrong password.
Unknown IPSec SPI - The SonicWALL has detected and blocked an unknown IPSec SPI attempt-
ing to connect to the SonicWALL.
IPSec Authentication Failed - The parameters for an IPSec connection do not match and authen-
tication failed.
Senna Spy Attack Dropped - The SonicWALL has detected and prevented a trojan attack.
Priority Attack Dropped - The SonicWALL has detected and prevented a priority attack.
Ini Killer Attack Dropped - The SonicWALL has detected and prevented a trojan attack.
Smurf Amplification Attack Dropped - The SonicWALL has detected and prevented a Denial of
Service attack.
Possible Port Scan Dropped - A possible port scan was detected and rejected by the SonicWALL.
Probable TCP NULL scan - The SonicWALL has detected TCP frames with a sequence number of
zero and all control bits set to zero and rejected them.
IPSEC Replay Detected - An IPSec Replay was detected and rejected by the SonicWALL.
Forbidden E-Mail attachment deleted - When enabled on the SonicWALL, the logging file records
forbidden e-mail attachments received by the SonicWALL.
TCP Xmas Tree Blocked - The SonicWALL detected and blocked a TCP Xmas Tree scan.
User login failure rate exceeded - source address locked out - A user has attempted logging into
the SonicWALL with incorrect credentials.
IPSec Decryption Failed - The SonicWALL was unable to decrypt the IPSec packets.
IPSec packet to or from an illegal host - The SonicWALL detected an IPSec packet with a source
IP address that does not match any security policies configured on the SonicWALL.
Back Orifice Attack Dropped - Back Orifice is an attack that exploits the vulnerability of Microsoft
Back Office. The SonicWALL has detected and dropped this attack.
NetBus Attack Dropped - NetBus is a well-known back door Trojan attack. The SonicWALL has
detected and dropped this attack.
Net Spy Attack Dropped - The SonicWALL has detected and dropped a Net Spy attack.
Sub Seven Attack Dropped - The SonicWALL has detected and dropped the Trojan attack, Sub
Seven.
Ripper Attack Dropped - The SonicWALL has detected and dropped a Ripper Attack.
Striker Attack Dropped - The SonicWALL has detected and dropped a Striker Attack.
Page 5
Java blocked - When Java is blocked, the log message displays the source and destination IP
address of the attempted connection.
ActiveX or Java archive blocked - When ActiveX and Java archives are blocked, the log message
displays the source and destination IP address of the attempted connection.
Cookie removed - When cookies are blocked, the log message displays the source and destina-
tion IP address of the attempted connection.
Page 7
Events Logged as System Errors
Events categorized as System Errors are logged by the SonicWALL. System errors can include
hardware failures, high availability issues, expired subscription notification, and diagnostic codes.
Problem sending log email; check log settings - When configured on the SonicWALL, log files from
the SonicWALL are e-mailed to the address configured on the Log Automation page. Check the
settings on your Log Automation page if you see this error message.
NAT could not remap incoming packet - The SonicWALL cannot remap an incoming packet to the
correct destination.
License exceeded: Connection dropped because too many IP addresses are in use on your LAN -
You have too many users on your network and not enough licenses to support them.
Diagnostic Code D - Error detected during software encryption or decryption of IPSec packets.
Primary missed heartbeats from Active Backup: Primary going Active - The Backup SonicWALL
became active when the Primary failed. Now the Backup is not sending heartbeats to the Primary
causing a failback to the Primary SonicWALL.
Primary received error signal from Active Backup: Primary going Active - The Backup SonicWALL is
in an error state causing it to send error signals to the Primary SonicWALL. The Primary takes over
as the main SonicWALL.
Backup firewall being preempted by Primary - The Primary firewall is taking over as the main fire-
wall.
Error setting the IP address of the backup, please manually set to backup LAN IP - The Primary
firewall encountered a problem trying to synchronize the LAN IP settings. You must manually con-
figure the LAN IP address on the Backup SonicWALL.
Content filter subscription expired. - Your content filter subscription is no longer valid. You must
renew it on http://www.mysonicwall.com.
Primary WAN link down, Backup going Active - For the TELE3 SP, the primary WAN link is down,
and the backup (modem) is going to be the primary WAN link.
Global VPN Client License Exceeded: Connection denied. - You do not have enough licenses for
the Global VPN Clients on your network. You can get more licenses at
http://www.mysonicwall.com
Global VPN Client connection is not allowed. Appliance is not registered. - You must register your
SonicWALL appliance at http://www.mysonicwall.com in order to use your Global VPN client.
Probing failure on %s If probing is configured on the SonicWALL, probing has encountered a prob-
lem causing it to fail.
%s Ethernet Port Down - The Ethernet port is not able to send data.
Illegal LAN address in use - An IP address outside of the configured scope is in use.
The cache is full; %d open connections; some will be dropped - The SonicWALL connection cache
is full and some connections will be dropped.
Page 9
Bad CRL Format - A CRL was received in an incorrect format.
Issuer Match Failed - A CRL list was received from an unauthorized provider.
Certificate on Revoked List - A VPN connection was attempted using an unauthorized certificate.
No Certificate for - A VPN connection was attempted using an non-existent certificate.
Page 11
PPTP PAP Authentication Failed - PAP authentication failed. Check your SonicWALL network
settings.
PPTP PAP Authentication Failed. Please verify PPTP username and password - Check your
SonicWALL network settings to verify your username and password.
PPTP Max Retransmission Exceeded - Attempts to retransmit data has exceeded the number
of allowed retransmissions.
PPTP Tunnel Disconnect from Remote - The PPTP tunnel is disconnected from the remote
location.
PPTP Session Disconnect from Remote - The PPTP tunnel is disconnected from the remote
location.
PPTP LCP Down - LCP is a protocol used as part of the authentication process. LCP is unavail-
able.
PPTP LCP Up - LCP is a protocol used as part of the authentication process. LCP is available.
PPTP starting CHAP Authentication - The PPTP connection is authenticating using CHAP.
PPTP CHAP Authentication Failed. Please verify PPTP username and password - The authenti-
cation process failed. Check your network settings to verify that the information is correct.
PPTP PPP Link Finished - The PPTP PPP link is complete.
Disconnecting PPTP Tunnel due to traffic timeout - Due to inactivity on the connection, the
PPTP tunnel is disconnecting.
PPTP Session Negotiation Started - The SonicWALL is beginning to negotiate the PPTP ses-
sions.
PPTP Session Established - The PPTP session is established by the SonicWALL.
PPTP Disconnect Initiated by the User - A user has initiated a PPTP disconnect on the Son-
icWALL.
HTTP management port has changed - The HTTP management port has changed. You must
remember the port number to log into the SonicWALL.
Adminstrator name changed - The administrator name has been changed on the SonicWALL.
You need to remember the name in order to log into the SonicWALL.
VPN disabled by administrator - VPN has been disabled on the SonicWALL. No VPN SAs are in
effect and disabling VPN interrupts any current VPN connections.
Log Cleared - The Log was cleared by clicking Clear Log on the Log View page.
Restarting SonicWALL; dumping log to email - The SonicWALL is restarting either at a user’s
request or after changing settings on the SonicWALL. The log file is e-mailed to the address
configured on the Log Automation page.
Access attempt from host without Anti-Virus agent installed - Anti-Virus is required to be
installed on all computers on the network if Anti-Virus is enabled on the SonicWALL.
Page 13
User login failed - RADIUS server timeout - A user could not log in because the RADIUS server
timed out.
User login failed - User has no privileges for login from that location - The user does not have
privileges to log in from a specified location.
Administrator logged out - inactivity timer expired - The SonicWALL did not detect any activity
for specified time period and logged the Administrator out of the SonicWALL.
User logged out - max session time exceeded - A user was logged out after exceeding the spec-
ified session time established for the user.
Locked out user re-enabled - lockout period expired - A user attempted log into the SonicWALL
and failed resulting in the user becoming locked out of the SonicWALL. The time period for the
lockout has expired.
Administrator logged out from the CLI - The SonicWALL administrator logged out from the Son-
icWALL while using the CLI interface.
Page 15
IKE negotiation complete. Adding IPSec SA. (Phase 2) - The initiating and responding Son-
icWALL appliances have successfully negotiated the VPN SA.
IKE Responder: Mode %d - not tunnel mode - The responding SonicWALL is not in tunnel
mode.
IKE Responder: Proposed remote network is 0.0.0.0 but not DHCP relay nor default route - The
negotiating SonicWALL has proposed a network IP address but not the DHCP relay or default
route IP address.
IKE Responder: Default LAN gateway is set but peer is not proposing to use this SA as a
default route - The responding SonicWALL has determined that the initiating SonicWALL was
not configured to use the SA as the default route for Internet traffic.
IKE Responder: Tunnel terminates inside firewall but proposed local network is not inside fire-
wall - The initiating SonicWALL is proposing a remote IP address that is not on the local net-
work inside the remote firewall.
IKE Responder: Tunnel terminates on LAN but proposed local network is on DMZ - The initiat-
ing SonicWALL is configured to terminate the VPN tunnel on the remote LAN but the IP address
is on the remote DMZ.
IKE Responder: ESP Perfect Forward Secrecy mismatch - The responding SonicWALL has a dif-
ferent authentication configured so the authentication doesn’t match the initiating
SonicWALL.
IKE Initiator: Start Main Mode negotiation (Phase 1) - The initiating SonicWALL is starting
Phase 1 of Main Mode negotiation and sending a request to the remote SonicWALL.
IKE Initiator: Main Mode complete (Phase 1) - Phase 1 Main Mode has successfully completed
negotiations on the initiating SonicWALL.
IKE Responder: Received Main Mode request (Phase 1) - The responding SonicWALL has
received a request from the initiating SonicWALL to begin Phase 1 Main Mode negotiations.
IKE Responder: Main Mode complete (Phase 1) - The responding SonicWALL has completed
Phase 1 Main Mode negotiations.
IKE Initiator: Accepting IPSec proposal (Phase 2) - The initiating SonicWALL is in the process of
accepting Phase 2 IPSec proposal.
IKE Initiator: Received notify. NO_PROPOSAL_CHOSEN - The initiating SonicWALL has received
a notification from the responding SonicWALL that no proposal was chosen. Check the SA con-
figuration on the initiating SonicWALL.
IKE negotiation aborted due to timeout - The SonicWALL could not complete the IKE negotia-
tion because the connection timed out.
Failed payload verification after decryption. Possible preshared key mismatch - The Preshared
Secret does not match and the SonicWALL cannot properly decrypt the packet.
Received packet retransmission. Drop duplicate packet - The SonicWALL received two identi-
cal packets and dropped one of them.
Page 17
PPP Dial-Up: Trying to failover but Primary Profile is manual - The SP is attempting to failover
from the WAN port to the modem, but the Primary Dial-up profile is configured for manual dial-
ing.
PPP Dial-Up: No dialtone detected - check phone-line connection - The SP did not detect a dial-
tone when trying to dial the ISP using the modem.
PPP Dial-Up: Dialed number is busy - The phone number configured in the dial-up profile is
busy.
PPP Dial-Up: Connected at %s bps - starting PPP - The modem has successfully dialed the ISP
and connected to it. The SP is now beginning PPP negotiations.
PPP: Authentication successful - The SP successfully authenticated with the dial-up ISP. Data
can now be transmitted using this connections.
PPP: CHAP authentication failed - check username/password - The SP could not authenticate
to the dial-up ISP with the configured username and/or password. Check the dial-up profile
information.
PPP: Starting MS-CHAP authentication - The SP is beginning authentication with the dial-up
ISP.
PPP: Starting PAP authentication - The SP is beginning authentication with the dial-up ISP.
PPP Dial-Up: Idle time limit exceeded - disconnecting - No data has been transmitted for a
specified period of time, therefore, the SP is disconnecting from the ISP.
PPP Dial-Up: Received new IP address - The SP received a new IP address from the dial-up ISP.
PPP Dial-Up: PPP link down - The PPP link is down and the SP cannot connect to the ISP.
PPP Dial-Up: Initialization : %s - The modem is initializing.
PPP Dial-Up: User requested connect - A user on the SP has requested a connection via the
modem.
PPP Dial-Up: Manual intervention needed. Check Primary Profile or Profile details - Configura-
tion of the dial-up profile may be incorrect. Check the profile and verify the information.
PPP Dial-Up: Startup without Ethernet cable, will try to dial on outbound traffic - The SP is not
connect to the WAN with an Ethernet cable. The SP will dial the ISP when outbound data is
detected.
Page 19
Wireless Log Events
For the SOHO TZW, 802.11b authentication and association messages are recorded as Log Events.
802.11b Management >Disassociated - Reason: A wireless client has disassociated from the
SOHO TZW.
802.11b Management >Association Failed - Reason: The TZW has reached the maximum associ-
ated wireless clients.
802.11b Management >Associated - Reason : A wireless client is associated on the TZW.
802.11b Management >Association Failed - Reason: The wireless client attempted to use an
unsupported authentication algorithm.
802.11b Management > ACL Check Passed - Reason: The wireless client passed MAC ACL
check..
802.11b Management > ACL Check Failed - Reason: The wireless client failed MAC ACL check.
802.11b Management > Authentication Failed - Reason: Wireless client authentication failed
because client authentication packet sequence is out of order.
802.11b Management > Authentication Failed -Reason: A wireless client attempted to authenti-
cate using Open System WEP encryption which is not allowed on the TZW.
802.11b Management > Authentication Failed - Reason - A wireless client attempted to authenc-
tiate using an unknown algorithm.
802.11b Management > Deauthenticated - An authenticated user has logged out of the TZW.
© 2002 SonicWALL, Inc. SonicWALL is a registered trademark of SonicWALL, Inc. Other product and company names mentioned herein may be
trademarks and/ or registered trademarks of their respective companies. Specifications and descriptions subject to change with out notice.
P/ N 232- 000393- 00
Rev A 06/03