FortiNet Log Reference PDF
FortiNet Log Reference PDF
VERSION 5.2.1
FORTINET DOCUMENT LIBRARY
http://docs.fortinet.com
FORTINET VIDEO GUIDE
http://video.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
CUSTOMER SERVICE & SUPPORT
https://support.fortinet.com
FORTIGATE COOKBOOK
http://cookbook.fortinet.com
FORTINET TRAINING SERVICES
http://www.fortinet.com/training
FORTIGUARD CENTER
http://www.fortiguard.com
FEEDBACK
Email: [email protected]
01-521-257022-20141104
TABLE OF CONTENTS
Change Log 5
Introduction 6
Before You Begin 7
How This Reference is Organized 7
Overview 8
Managing and Understanding Logs 9
Log Types and Sub Types 10
Type 10
Subtype 11
Priority Level 11
Log Message Format 12
Log Field Format 12
Log Schema Structure 13
Header and Body Fields 13
Log ID Numbers 16
Log ID Definitions 17
Traffic Log 21
Traffic Log Messages 28
Security Log 29
Application Control 30
Application Control Log Messages 33
AntiVirus 34
AntiVirus Log Messages 40
DLP 42
DLP Log Messages 46
Email Filter 47
Email Filter Log Messages 51
Web Filter 53
Web Filter Log Messages 58
IPS 61
IPS Log Messages 64
Event Log 65
Endpoint Control 66
Endpoint Log Messages 70
GTP 71
GTP Log Messages 80
High Availability 82
High Availability Log Messages 84
Router 86
Router Log Messages 87
System 88
System Log Messages 97
User 116
User Log Messages 119
VPN 121
VPN Log Messages 128
WAD 131
WAD Log Messages 134
Wireless 136
Wireless Log Messages 141
Change Log
This document provides information about all the log messages applicable to the FortiGate devices running FortiOS
version 5.2.1. The logs are intended for administrators to be used as reference for more information about a specific
log entry and message that is generated.
Before you begin using this reference, read the following notes:
The information in this document applies to all FortiGate units currently running FortiGate 5.2 or higher.
l Ensure that you have enabled logging for FortiGate unit. For more information, see the Logging and Reporting
chapter in the FortiGate handbook.
l Each log message is displayed in RAW format in the Log View of the web-based manager.
l Each log message is documented similar to how it appears in the log viewer table based on the RAW format. For
more information, see the Logging and Reporting chapter in the FortiGate Handbook.
NOTE: This reference contains detailed information for each log type and sub type; however, this reference contains
only information gathered at publication and, as a result, not every log message field contains detailed information.
The following sections are grouped by log type with the exception of Event and Security log types which are grouped by
sub types, for example; Security->AntiVirus and Event->System, due to the large number of sub types associated
with the security and event logs.
The log types described in this document report traffic, security, and event log information useful for system
administrators when recording, monitoring, and tracing the operation of a FortiGate device running FortiOS. The logs
provide information regarding the following:
l Firewall attacks
l Configuration changes
l Successful and unsuccessful system operations
This document is organized by log types and sub types which provide quick access to messages related to specific logs
and filters the messages into meaningful sections in the database.
It provides administrators with a comprehensive list of all the log messages that the FortiGate generates with
explanations of what the messages mean and what possible actions you might take upon receiving them. The
document is organized by log type and sub types. In each section, the log entry messages are listed by their log type
ID numbers. See, the Log Types and Sub Types section for more information about the Log ID numbering format.
FortiGate devices can record the following types and sub types of log entry information:
Log Details
Type Description Sub Type
Traffic Records traffic flow information, such as an HTTP/HTTPS request and l Local
its response, if any.
l Forward
l Multicast
l Sniffer
l Email Filter
l Web Filter
l Router
l Endpoint Control
l GTP
l WAD
l Wireless
l User
Type
Each log entry contains a Type (type) field that indicates its log type, and in which log file it is stored.
Subtype
Each log entry might also contain a Sub Type (subtype) field within a log type, based on the feature associated with
the cause of the log entry.
For example:
l In event logs, some log entries have a subtype of user, system, or other sub types.
l In security (UTM) logs, some log entries have a subtype of DLP, Web Filter, Email or other sub types.
l In traffic logs, the sub types are: local, forward, multicast, and sniffer.
Priority Level
Each log entry contains a Level (pri) field that indicates the estimated severity of the event that caused the log entry,
such as pri=warning, and therefore how high a priority it is likely to be. Level (pri) associations with the descriptions
below are not always uniform. They also may not correspond with your own definitions of how severe each event is. If
you require notification when a specific event occurs, either configure SNMP traps or alert email by administrator-
defined Severity Level (severity_level) or ID (log_id), not by Level (pri).
Priority Levels
Level (0 is Name Description
highest)
6 Information General information about system operations. Used in event logs to record con-
figuration changes.
For each location where the FortiGate device can store log files (disk, memory, Syslog or FortiAnalyzer), you can
define a severity threshold. The FortiGate stores all log messages equal to or exceeding the log severity level
selected. For example, if you select Error, FortiGate will store log messages whose log severity level is Error, Critical,
Alert, and Emergency.
For documentation purposes, all log types and sub types follow this generic table format to present the log message
entry and severity information.
2 LOG_ID_TRAFFIC_ALLOW Notice
The following table describes the standard format in which each log type is described in this document. For
documentation purposes, all log types and sub types follow this generic table format to present the log entry
information.
Example: Log Entry Information
Log Field Log Field Description Data Type Length Value(s)
l encrypt-kickout
l monitor
l pass
l reject
l reset
Each log entry consists of several fields and values. In the web-based manager, the logs are displayed in a Formatted
table view or Raw format. You can download the logs in the raw format for further analysis.
l Header - Contains the date and time the log originated, log identifier, message identifier, administrative domain
(ADOM), the log caategory, severity level, and where the log originated. These fields are common to all log types.
l Body - Describes the reason why the log was created and actions taken by the FortiGate device to address it. These
fields vary by log type.
Following is an example of traffic log entry in raw format. The body fields are highlighted in Bold.
The following table describes each possible header and body field, according to its name as it appears in the
Formatted or Raw view.
Example: Traffic Log (Raw Format)
Field Name Field Exists in Log Type Example Field - Value (raw format)
(Raw format Description
view in
parentheses)
Header
Body
• In HTTP
requests, this
is the web
browser or
other client.
• In HTTP
responses,
this is the
physical
server.
Log ID Numbers
The ID (log_id) is a 10-digit field located in the header, immediately following the time and date fields. It is a unique
identifier for that specific log and includes the following information about the log entry.
Log Type Represented by the l Traffic log IDs begin with "00".
first two digits of the l Event log IDs begin with "01".
log ID.
The log_id field is a number assigned to all permutations of the same message. It classifies a log entry by the nature
of the cause of the log message, such as administrator authentication failures or traffic. Other log messages that
share the same cause will share the same log_id.
Log ID Definitions
Following are the definitions for the log type IDs and sub type IDs applicable to FortiOS version 5.2.1 and later.
traffic:0 l forward:0
l local:1
l multicast:2
l sniffer:4
event:1 l system:0
l vpn:1
l user:2
l router:3
l wireless:4
l wad:5
l gtp:6
l endpoint:7
l ha:8
antivirus: 2 l virus:2
l suspicious:0
l analytics:1
l botnet:2
l infected:11
l filename:12
l oversize:13
l scanerror:62
l switchproto:63
webfilter:3 l content:14
l urlfilter:15
l ftgd_blk:16
l ftgd_allow:17
l ftgd_err:18
l activexfilter:35
l cookiefilter:36
l appletfilter:37
l ftgd_quota_counting:38
l ftgd_quota_expired:39
l ftgd_quota:40
l scriptfilter:41
l webfilter_command_block:43
ips:4 l signature:19
spam: 5 l msn-hotmail:5
l yahoo-mail:6
l gmail:7
l smtp:8
l pop3:9
l imap:10
l mapi:11
l carrier-endpoint-filter:
l 47 mass-mms:52
contentlog: 6 l HTTP:24
l FTP:25
l SMTP:26
l POP3:27
l IMAP:28
l HTTPS:30
l im-all:31
l NNTP:39
l VOIP:40
l SMTPS:55
l POP3S:56
l IMAPS:57
l MM1:48
l MM3:49
l MM4:50
l MM7:51
anomaly: 7 l anomaly: 20
voip: 8 l viop: 14
dlp: 9 l dlp:54
l dlp-docsource:55
app-ctrl-all: 10 l app-ctrl-all:59
netscan: 11 l discovery:0
l vulnerability:1
UTM l virus:2
l webfilter:3
l ips:4
l spam:5
l contentlog:6
l voip:8
l dlp:9
l app-ctrl:10
Traffic log messages record network traffic passing through the FortiGate unit.
l Forward
l Multicast
l Local
l Sniffer
In the log fields, the logs are defined as: type=traffic; subtypes = local , multicast, local, and sniffer.
The following table describes the log fields of the Traffic log.
NOTE: In the policyid field of traffic log messages, the number may be zero because any policy that is automatically
added by the FortiGate unit is indexed as zero. For more information, see the Fortinet Knowledge Base article, Firewall
policy=0.
Log Details
Log Field Log Field Data Length Value
Name Description Type
The following table describes the log message IDs and messages of the Traffic log.
Log Message Details
Message Message Severity
ID
2 LOG_ID_TRAFFIC_ALLOW Notice
3 LOG_ID_TRAFFIC_DENY Warning
4 LOG_ID_TRAFFIC_OTHER_START Notice
5 LOG_ID_TRAFFIC_OTHER_ICMP_ALLOW Notice
6 LOG_ID_TRAFFIC_OTHER_ICMP_DENY Warning
7 LOG_ID_TRAFFIC_OTHER_INVALID Warning
8 LOG_ID_TRAFFIC_WANOPT Notice
9 LOG_ID_TRAFFIC_WEBCACHE Notice
10 LOG_ID_TRAFFIC_EXPLICIT_PROXY Notice
11 LOG_ID_TRAFFIC_FAIL_CONN Warning
12 LOG_ID_TRAFFIC_MULTICAST Notice
13 LOG_ID_TRAFFIC_END_FORWARD Notice
14 LOG_ID_TRAFFIC_END_LOCAL Notice
15 LOG_ID_TRAFFIC_START_FORWARD Notice
16 LOG_ID_TRAFFIC_START_LOCAL Notice
17 LOG_ID_TRAFFIC_SNIFFER Notice
The following sections provide information about the different types of logs recorded under the Security log type.
In FortiOS 5.0 and previous versions, the logs were displayed under the UTM log type. In FortiOS
5.2.0 and later versions, the UTM logs are displayed under the Security log type. All logs grouped
in the security log include the log field type=utm.
Application Control 30
Application Control Log Messages 33
AntiVirus 34
AntiVirus Log Messages 40
DLP 42
DLP Log Messages 46
Email Filter 47
Email Filter Log Messages 51
Web Filter 53
Web Filter Log Messages 58
IPS 61
IPS Log Messages 64
Application Control
Application Control log messages record application control protocols and events.
In the log fields, these logs are defined as: type=utm, subtype=app-ctrl.
Log Details
Log Field Log Field Data Type Length Value
Name Description
Log Details
Log Field Log Field Data Type Length Value
Name Description
Log Details
Log Field Log Field Data Type Length Value
Name Description
The following table describes the log message IDs and messages of the Application Control log.
Log Message Details
Message Message Severity
ID
AntiVirus
AntiVirus log messages record actual viruses that are contained in an email as well as anything that appears to be
similar to a virus or suspicious, such as in a file or in an email.
In the log fields, these logs are defined as: type= utm subtype=virus.
Log Details
Log Field Log Field Description Data Type Length Value
Name
Log Details
Log Field Log Field Description Data Type Length Value
Name
Log Details
Log Field Log Field Description Data Type Length Value
Name
Log Details
Log Field Log Field Description Data Type Length Value
Name
Log Details
Log Field Log Field Description Data Type Length Value
Name
Log Details
Log Field Log Field Description Data Type Length Value
Name
The following table describes the log message IDs and messages of the Anti Virus log.
Log Message Details
Message Message Severity
ID
DLP
Data Leak Protection (DLP) log messages record data leaks. These logs provide additional information to help
administrators better analyze and detect data leaks.
In the log fields, these logs are defined as: type= utm, subtype=dlp.
Log Details
Log Field Name Log Field Description Data Length Value
Type
Log Details
Log Field Name Log Field Description Data Length Value
Type
Log Details
Log Field Name Log Field Description Data Length Value
Type
Log Details
Log Field Name Log Field Description Data Length Value
Type
dstip Destination IP IP
Address
srcip Source IP IP
Address
The following table describes the log message IDs and messages of the Data Leak Protection log.
Log Message Details
Message Message Severity
ID
Email Filter
Email filter log messages record email protocols, such as SMTP, POP3 and IMAP.
In the log fields, these logs are defined as: type= utm, subtype=emailfilter.
Log Details
Log Field Log Field Data Length Value
Name Type
Description
dstip Destination IP IP
Address
from Email address(es) from the Email Headers (IMAP/POP3/SMTP) String 512
Log Details
Log Field Log Field Data Length Value
Name Type
Description
logid A ten-digit number. The first two digits represent the log type and String 10
the following two digits represent the log subtype. The last one to
five digits are the message id
msg Explains the activity or event that the FortiGate unit recorded String 512
Log Details
Log Field Log Field Data Length Value
Name Type
Description
srcip Source IP IP
Address
subject The subject title of the email message String 256
subtype The subtype of the log message. The possible values of this field String 20 l email
depend on the log type filter
Log Details
Log Field Log Field Data Length Value
Name Type
Description
The following table describes the log message IDs and messages of the Email log.
Web Filter
Web filter log messages record URL activity as well as filters, such as a blocked URL as it is found in the URL black list.
In the log fields, these logs are defined as: type= utm, subtype=webfilter.
Log Details
Log Field Name Log Field Description Data Length Value
Type
dstip Destination IP IP
Address
Log Details
Log Field Name Log Field Description Data Length Value
Type
Log Details
Log Field Name Log Field Description Data Length Value
Type
Log Details
Log Field Name Log Field Description Data Length Value
Type
srcip Source IP IP
Address
Log Details
Log Field Name Log Field Description Data Length Value
Type
The following table describes the log message IDs and messages of the Web log.
IPS
Intrusion logs record security logs for protocols, such as ICMP and virus attacks. The IPS logs also provide additional
log details, such as the anomaly logs. The "anomaly" logs are generated from the kernel without signatures. (e.g.TCP
SYN flood etc.).
In the log fields, these logs are defined as: type= utm, subtype=ips.
Log Details
Log Field Name Log Field Description Data Type Length Value
Log Details
Log Field Name Log Field Description Data Type Length Value
Log Details
Log Field Name Log Field Description Data Type Length Value
The following table describes the log message IDs and messages of the IPS log.
The following sections provide information about the different types of logs recorded under the Event log type.
l Endpoint Control
l GTP
l High Availability
l System
l Router
l VPN
l USer
l WAD
l Wireless
In the log field, these logs are defined as: type=event; subtypes=endpoint control, gtp, vpn, user, wad, system, router,
wireless, high availability.
Endpoint Control 66
Endpoint Log Messages 70
GTP 71
GTP Log Messages 80
High Availability 82
High Availability Log Messages 84
Router 86
Router Log Messages 87
System 88
System Log Messages 97
User 116
User Log Messages 119
VPN 121
VPN Log Messages 128
WAD 131
WAD Log Messages 134
Wireless 136
Wireless Log Messages 141
Endpoint Control
In the log fields, these logs are defined as: type=event subtype=endpoint.
Log Details
Log Field Log Field Description Data Length Value
Name Type
action The action the FortiGate unit should take for this fire- string
wall policy
date The date the log event was generated on the device string
ip IP address ip
logid A ten-digit number. The first two digits represent the string
log type and the following two digits represent the log
subtype. The last one to five digits are the message id
Log Details
Log Field Log Field Description Data Length Value
Name Type
msg Explains the activity or event that the FortiGate unit string
recorded
repeat uint16 5
Log Details
Log Field Log Field Description Data Length Value
Name Type
status The status of the action the FortiGate unit took when string For event logs, the
the event occurred possible values of
this field depend on
the sub type:
l ipsec
l success
l failure
l negotiate_error
l esp_error
l dpd_failure
l sub type voip
l start
l end
l timeout
l blocked
l succeeded
l failed
l authentication-
required
l subcategory gtp
l forwarded
l prohibited
l rate-limited
l state-invalid
l tunnel-limited
l traffic-count
l user-data
subtype The subtype of the log message. The possible values string l endpoint
of this field depend on the log type
Log Details
Log Field Log Field Description Data Length Value
Name Type
The following table describes the log message IDs and messages of the Endpoint log.
Log Message Details
Message Message Severity
ID
GTP
Event-GTP log messages record GTP activity. These messages are recorded only when running FortiGate Carrier
firmware.
In the log fields, these logs are defined as: type=event subtype=gtp.
Log Details
Log Field Log Field Descrip- Data Type Length Value
Name tion
Log Details
Log Field Log Field Descrip- Data Type Length Value
Name tion
Log Details
Log Field Log Field Descrip- Data Type Length Value
Name tion
Log Details
Log Field Log Field Descrip- Data Type Length Value
Name tion
Log Details
Log Field Log Field Descrip- Data Type Length Value
Name tion
Log Details
Log Field Log Field Descrip- Data Type Length Value
Name tion
Log Details
Log Field Log Field Descrip- Data Type Length Value
Name tion
to Destination IP String 0
address
Log Details
Log Field Log Field Descrip- Data Type Length Value
Name tion
The following table describes the log message IDs and messages of the GTP log.
High Availability
Event-HA log messages are recorded when FortiGate units are in high availability mode. These log messages describe
changes in cluster unit status. The changes in status occur if a cluster unit fails or starts up, or if a link fails or is
restored. Each of these messages includes the serial number of the cluster unit reporting the message. You can use
the serial number to determine the status of cluster unit that has changed.
In the log fields, these logs are defined as: type=event subtype=ha.
Log Details
Log Field Name Log Field Description Data Length Value
Type
sn String 64
Log Details
Log Field Name Log Field Description Data Length Value
Type
The following table describes the log message IDs and messages of the HA log.
Router
Event-Router log messages record events that occur on the FortiGate network interfaces.
In the log fields, these logs are defined as: type=event subtype=router.
Log Details
Log Log Field Description Data Length Value
Field Type
Name
date The date the log event was generated on the device String
logid A ten-digit number. The first two digits represent the log String
type and the following two digits represent the log sub-
type. The last one to five digits are the message id
msg Explains the activity or event that the FortiGate unit recor- String 256
ded
subtype The subtype of the log message. The possible values of String l router
this field depend on the log type
The following table describes the log message IDs and messages of the Router log.
System
Event-System log messages record events that occur in the FortiGate system, such as administrators logging in and
out, or events occurring on the interfaces.
In the log fields, these logs are defined as: type=event subtype=system.
Log Details
Log Field Log Field Description Data Type Length Value
Name
action The action the FortiGate unit should take for this firewall policy String
bandwidth String 42
Log Details
Log Field Log Field Description Data Type Length Value
Name
cipher String
date The date the log event was generated on the device String
Log Details
Log Field Log Field Description Data Type Length Value
Name
dst_int The interface where the through traffic goes to the public or Inter- String 64
net. For incoming traffic to the firewall, it is “unknown”
dst_port The destination port number of the TCP or UDP traffic. The des- UINT16
tination port is zero for other types of traffic.
duration The duration of the interval for item counts (such as infected, UINT16
scanned, etc) in this log entry
fams_pause UINT32 10
free String 32
green String 32
Log Details
Log Field Log Field Description Data Type Length Value
Name
limit UINT32 10
logid A ten-digit number. The first two digits represent the log type and String 10
the following two digits represent the log subtype. The last one to
five digits are the message id
Log Details
Log Field Log Field Description Data Type Length Value
Name
max-minor String
min-minor String
monitor- String 32
name
monitor- String 32
type
msg Explains the activity or event that the FortiGate unit recorded String 256
Log Details
Log Field Log Field Description Data Type Length Value
Name
portbegin UINT16 5
portend UINT16 5
probeid UINT32 10
Log Details
Log Field Log Field Description Data Type Length Value
Name
profilegroup The profile group associated with the firewall policy that traffic used String 4
when the log message was recorded
profiletype The type of profile associated with the firewall policy that traffic String 0
used when the log message was recorded
recv-minor String
red String 32
repeat UINT16 5
service The service of where the activity or event occurred, whether it was String 0
on a web page using HTTP or HTTPs
Log Details
Log Field Log Field Description Data Type Length Value
Name
setuprate UNIT64
status The status of the action the FortiGate unit took when the event String
occurred
subtype The subtype of the log message. The possible values of this field String l system
depend on the log type
Log Details
Log Field Log Field Description Data Type Length Value
Name
unit UINT32 10
url The URL address of where the file was acquired String 512
used UINT32 10
user The name of the user creating the traffic String 256
The following table describes the log message IDs and messages of the System log.
User
Event-User log messages record what users are configuring on the FortiGate unit, and what is occurring on the
FortiGate unit. For example, memory storage is becoming full.
In the log fields, these logs are defined as: type=event subtype=user.
Log Details
Log Field Log Field Descrip- Data Type Length Value
Name tion
Log Details
Log Field Log Field Descrip- Data Type Length Value
Name tion
policyid UINT32 10
Log Details
Log Field Log Field Descrip- Data Type Length Value
Name tion
scope String 9
The following table describes the log message IDs and messages of the User log.
VPN
Event-VPN log messages record VPN user, administration and session events.
In the log fields, these logs are defined as: type=event subtype=vpn.
Log Details
Log Field Name Log Field Data Type Length Value
Description
Log Details
Log Field Name Log Field Data Type Length Value
Description
Log Details
Log Field Name Log Field Data Type Length Value
Description
Log Details
Log Field Name Log Field Data Type Length Value
Description
Log Details
Log Field Name Log Field Data Type Length Value
Description
INVALID-PAYLOAD-TYPE
DOI-NOT-SUPPORTED
SITUATION-NOT-SUPPORTED
INVALID-COOKIE
INVALID-MAJOR-VERSION
INVALID-MINOR-VERSION
INVALID-EXCHANGE-TYPE
INVALID-FLAGS
INVALID-MESSAGE-ID
INVALID-PROTOCOL-ID
INVALID-SPI
INVALID-TRANSFORM-ID
ATTRIBUTES-NOT-SUPPORTED
NO-PROPOSAL-CHOSEN
BAD-PROPOSAL-SYNTAX
PAYLOAD-MALFORMED
INVALID-KEY-INFORMATION
INVALID-ID-INFORMATION
INVALID-CERT-ENCODING
INVALID-CERTIFICATE
BAD-CERT-REQUEST-SYNTAX
INVALID-CERT-AUTHORITY
INVALID-HASH-INFORMATION
AUTHENTICATION-FAILED
INVALID-SIGNATURE
ADDRESS-NOTIFICATION
NOTIFY-SA-LIFETIME
CERTIFICATE-UNAVAILABLE
UNSUPPORTED-EXCHANGE-TYPE
UNEQUAL-PAYLOAD-LENGTHS
CONNECTED
Log Details
Log Field Name Log Field Data Type Length Value
Description
remip Remote IP IP 39
Address
Log Details
Log Field Name Log Field Data Type Length Value
Description
tunnelip Tunnel IP IP 39
Address
The following table describes the log message IDs and messages of the VPN log.
WAD
Event-Wad log messages record WAN optimization events, such as a user adding an WAN optimization rule as well as
web proxy events.
In the log fields, these logs are defined as: type=event subtype=wad.
Log Details
Log Field Log Field Description Data Type Length Value
Name
Log Details
Log Field Log Field Description Data Type Length Value
Name
ip IP address IP Address
Log Details
Log Field Log Field Description Data Type Length Value
Name
The following table describes the log message IDs and messages of the WAD log.
Log Message Details
Message Message Severity
ID
Wireless
Event-Wireless log messages record wireless events that occur with FortiGate units that have WiFi capabilities.
In the log fields, these logs are defined as: type=event subtype=wireless.
Log Details
Log Field Name Log Field Descrip- Data Length Value
tion Type
Log Details
Log Field Name Log Field Descrip- Data Length Value
tion Type
ip IP address IP 39
Address
Log Details
Log Field Name Log Field Descrip- Data Length Value
tion Type
Log Details
Log Field Name Log Field Descrip- Data Length Value
tion Type
Log Details
Log Field Name Log Field Descrip- Data Length Value
tion Type
The following table describes the log message IDs and messages of the Wireless log.
Log Message Details
Message Message Severity
ID