Fortigate Fortios Log Message Reference
Fortigate Fortios Log Message Reference
VERSION 5.2.4
FORTINET DOCUMENT LIBRARY
http://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
FORTIGATE COOKBOOK
http://cookbook.fortinet.com
FORTIGUARD CENTER
http://www.fortiguard.com
FEEDBACK
Email: [email protected]
01-524-262694-20150904
TABLE OF CONTENTS
Change Log 5
Introduction 6
Before You Begin 7
How This Reference is Organized 7
Overview 8
Managing and Understanding Logs 9
Log Types and Sub Types 10
Type 10
Subtype 11
Priority Level 11
Log Message Format 12
Log Field Format 12
Log Schema Structure 13
Header and Body Fields 13
Log ID Numbers 16
Log ID Definitions 17
Traffic Log 21
Traffic Log Messages 30
Security Log 31
Application Control 32
Application Control Log Messages 36
AntiVirus 37
AntiVirus Log Messages 43
DLP 46
Email Filter 52
Email Filter Log Messages 56
IPS 58
IPS Log Messages 62
Anomaly 63
Anomaly Log Messages 66
Web Filter 67
Web Filter Log Messages 72
Event Log 75
Endpoint Control 76
Endpoint Log Messages 80
GTP 82
GTP Log Messages 90
High Availability 92
High Availability Log Messages 95
Router 97
Router Log Messages 99
System 100
System Log Messages 111
User 137
User Log Messages 141
VPN 144
VPN Log Messages 151
WAD 157
WAD Log Messages 160
Wireless 162
Wireless Log Messages 169
Other Logs 171
VOIP 172
VOIP Log Messages 175
NetScan 176
NetScan Log Messages 180
Appendix A: Log field diff - 5.2.3 and 5.2.4 181
Change Log
2015-11-09 Updated for version 5.2.4 to remove info from the appendix.
5 Log Reference
Fortinet Technologies Inc.
Introduction
This document provides information about all the log messages applicable to the FortiGate devices running FortiOS
version 5.2.0 or higher. The logs are intended for administrators to be used as reference for more information about a
specific log entry and message that is generated.
6 Log Reference
Fortinet Technologies Inc.
Before You Begin
Before you begin using this reference, read the following notes:
The information in this document applies to all FortiGate units currently running FortiGate 5.2.0 or higher.
l Ensure that you have enabled logging for FortiGate unit. For more information, see the Logging and Reporting
chapter in the FortiGate handbook.
l Each log message is displayed in RAW format in the Log View of the web-based manager.
l Each log message is documented similar to how it appears in the log viewer table based on the RAW format. For
more information, see the Logging and Reporting chapter in the FortiGate Handbook.
NOTE: This reference contains detailed information for each log type and sub type; however, this reference contains
only information gathered at publication and, as a result, not every log message field contains detailed information.
The following sections are grouped by log type with the exception of Event and Security log types which are grouped by
sub types, for example; Security->AntiVirus and Event->System, due to the large number of sub types associated
with the security and event logs.
7 Log Reference
Fortinet Technologies Inc.
Overview
The log types described in this document report traffic, security, and event log information useful for system
administrators when recording, monitoring, and tracing the operation of a FortiGate device running FortiOS. The logs
provide information regarding the following:
l Firewall attacks
l Configuration changes
l Successful and unsuccessful system operations
8 Log Reference
Fortinet Technologies Inc.
Managing and Understanding Logs
This document is organized by log types and sub types which provide quick access to messages related to specific logs
and filters the messages into meaningful sections in the database.
It provides administrators with a comprehensive list of all the log messages that the FortiGate generates with
explanations of what the messages mean and what possible actions you might take upon receiving them. The
document is organized by log type and sub types. In each section, the log entry messages are listed by their log type
ID numbers. See, the Log Types and Sub Types section for more information about the Log ID numbering format.
9 Log Reference
Fortinet Technologies Inc.
Log Types and Sub Types
FortiGate devices can record the following types and sub types of log entry information:
Log Details
Type Description Sub Type
Traffic Records traffic flow information, such as an HTTP/HTTPS request and l Local
its response, if any.
l Forward
l Multicast
l Sniffer
l Email Filter
l Web Filter
l Router
l Endpoint Control
l GTP
l WAD
l Wireless
l User
Type
Each log entry contains a Type (type) field that indicates its log type, and in which log file it is stored.
10 Log Reference
Fortinet Technologies Inc.
Log Types and Sub Types
Subtype
Each log entry might also contain a Sub Type (subtype) field within a log type, based on the feature associated with
the cause of the log entry.
For example:
l In event logs, some log entries have a subtype of user, system, or other sub types.
l In security (UTM) logs, some log entries have a subtype of DLP, Web Filter, Email or other sub types.
l In traffic logs, the sub types are: local, forward, multicast, and sniffer.
Priority Level
Each log entry contains a Level (pri) field that indicates the estimated severity of the event that caused the log entry,
such as pri=warning, and therefore how high a priority it is likely to be. Level (pri) associations with the descriptions
below are not always uniform. They also may not correspond with your own definitions of how severe each event is. If
you require notification when a specific event occurs, either configure SNMP traps or alert email by administrator-
defined Severity Level (severity_level) or ID (log_id), not by Level (pri).
Priority Levels
Level (0 is Name Description
highest)
6 Information General information about system operations. Used in event logs to record con-
figuration changes.
For each location where the FortiGate device can store log files (disk, memory, Syslog or FortiAnalyzer), you can
define a severity threshold. The FortiGate stores all log messages equal to or exceeding the log severity level
selected. For example, if you select Error, FortiGate will store log messages whose log severity level is Error, Critical,
Alert, and Emergency.
Log Reference 11
Fortinet Technologies Inc.
Log Types and Sub Types
For documentation purposes, all log types and sub types follow this generic table format to present the log message
entry and severity information.
2 LOG_ID_TRAFFIC_ALLOW Notice
The following table describes the standard format in which each log type is described in this document. For
documentation purposes, all log types and sub types follow this generic table format to present the log entry
information.
Example: Log Entry Information
Log Field Log Field Description Data Type Length Value(s)
l encrypt-kickout
l monitor
l pass
l reject
l reset
12 Log Reference
Fortinet Technologies Inc.
Log Schema Structure
Each log entry consists of several fields and values. In the web-based manager, the logs are displayed in a Formatted
table view or Raw format. You can download the logs in the raw format for further analysis.
l Header - Contains the date and time the log originated, log identifier, message identifier, administrative domain
(ADOM), the log caategory, severity level, and where the log originated. These fields are common to all log types.
l Body - Describes the reason why the log was created and actions taken by the FortiGate device to address it. These
fields vary by log type.
Following is an example of traffic log entry in raw format. The body fields are highlighted in Bold.
Log Reference 13
Fortinet Technologies Inc.
Log Schema Structure
The following table describes each possible header and body field, according to its name as it appears in the
Formatted or Raw view.
Example: Traffic Log (Raw Format)
Field Name Field Exists in Log Type Example Field - Value (raw format)
(Raw format Description
view in
parentheses)
Header
Body
14 Log Reference
Fortinet Technologies Inc.
Log Schema Structure
• In HTTP
requests, this
is the web
browser or
other client.
• In HTTP
responses,
this is the
physical
server.
Log Reference 15
Fortinet Technologies Inc.
Log Schema Structure Log ID Numbers
Log ID Numbers
The ID (log_id) is a 10-digit field located in the header, immediately following the time and date fields. It is a unique
identifier for that specific log and includes the following information about the log entry.
16 Log Reference
Fortinet Technologies Inc.
Log ID Numbers Log Schema Structure
Log Type Represented by the l Traffic log IDs begin with "00".
first two digits of the l Event log IDs begin with "01".
log ID.
The log_id field is a number assigned to all permutations of the same message. It classifies a log entry by the nature
of the cause of the log message, such as administrator authentication failures or traffic. Other log messages that
share the same cause will share the same log_id.
Log ID Definitions
Following are the definitions for the log type IDs and sub type IDs applicable to FortiOS version 5.2.1 and later.
traffic:0 l forward:0
l local:1
l multicast:2
l sniffer:4
Log Reference 17
Fortinet Technologies Inc.
Log Schema Structure Log ID Numbers
event:1 l system:0
l vpn:1
l user:2
l router:3
l wireless:4
l wad:5
l gtp:6
l endpoint:7
l ha:8
antivirus: 2 l virus:2
l suspicious:0
l analytics:1
l botnet:2
l infected:11
l filename:12
l oversize:13
l scanerror:62
l switchproto:63
webfilter:3 l content:14
l urlfilter:15
l ftgd_blk:16
l ftgd_allow:17
l ftgd_err:18
l activexfilter:35
l cookiefilter:36
l appletfilter:37
l ftgd_quota_counting:38
l ftgd_quota_expired:39
l ftgd_quota:40
l scriptfilter:41
l webfilter_command_block:43
ips:4 l signature:19
18 Log Reference
Fortinet Technologies Inc.
Log ID Numbers Log Schema Structure
spam: 5 l msn-hotmail:5
l yahoo-mail:6
l gmail:7
l smtp:8
l pop3:9
l imap:10
l mapi:11
l carrier-endpoint-filter:
l 47 mass-mms:52
contentlog: 6 l HTTP:24
l FTP:25
l SMTP:26
l POP3:27
l IMAP:28
l HTTPS:30
l im-all:31
l NNTP:39
l VOIP:40
l SMTPS:55
l POP3S:56
l IMAPS:57
l MM1:48
l MM3:49
l MM4:50
l MM7:51
anomaly: 7 l anomaly: 20
voip: 8 l viop: 14
dlp: 9 l dlp:54
l dlp-docsource:55
app-ctrl-all: 10 l app-ctrl-all:59
Log Reference 19
Fortinet Technologies Inc.
Log Schema Structure Log ID Numbers
netscan: 11 l discovery:0
l vulnerability:1
UTM l virus:2
l webfilter:3
l ips:4
l spam:5
l contentlog:6
l voip:8
l dlp:9
l app-ctrl:10
20 Log Reference
Fortinet Technologies Inc.
Traffic Log
Traffic log messages record network traffic passing through the FortiGate unit.
l Forward
l Multicast
l Local
l Sniffer
The following table describes the log fields of the Traffic log.
NOTE: In the policyid field of traffic log messages, the number may be zero because any policy that is automatically
added by the FortiGate unit is indexed as zero. For more information, see the Fortinet Knowledge Base article, Firewall
policy=0.
Log Field Name Log Field Descrip- Data Type Length Value
tion
- All Others =
allowed by Firewall
Policy and the
status indicates
how it was closed.
21 Log Reference
Fortinet Technologies Inc.
Traffic Log
Log Field Name Log Field Descrip- Data Type Length Value
tion
Log Reference 22
Fortinet Technologies Inc.
Traffic Log
Log Field Name Log Field Descrip- Data Type Length Value
tion
23 Log Reference
Fortinet Technologies Inc.
Traffic Log
Log Field Name Log Field Descrip- Data Type Length Value
tion
Log Reference 24
Fortinet Technologies Inc.
Traffic Log
Log Field Name Log Field Descrip- Data Type Length Value
tion
25 Log Reference
Fortinet Technologies Inc.
Traffic Log
Log Field Name Log Field Descrip- Data Type Length Value
tion
Log Reference 26
Fortinet Technologies Inc.
Traffic Log
Log Field Name Log Field Descrip- Data Type Length Value
tion
27 Log Reference
Fortinet Technologies Inc.
Traffic Log
Log Field Name Log Field Descrip- Data Type Length Value
tion
Log Reference 28
Fortinet Technologies Inc.
Traffic Log
Log Field Name Log Field Descrip- Data Type Length Value
tion
29 Log Reference
Fortinet Technologies Inc.
Traffic Log Messages
The following table describes the log message IDs and messages of the Traffic log.
2 LOG_ID_TRAFFIC_ALLOW Notice
3 LOG_ID_TRAFFIC_DENY Warning
4 LOG_ID_TRAFFIC_OTHER_START Notice
5 LOG_ID_TRAFFIC_OTHER_ICMP_ALLOW Notice
6 LOG_ID_TRAFFIC_OTHER_ICMP_DENY Warning
7 LOG_ID_TRAFFIC_OTHER_INVALID Warning
8 LOG_ID_TRAFFIC_WANOPT Notice
9 LOG_ID_TRAFFIC_WEBCACHE Notice
10 LOG_ID_TRAFFIC_EXPLICIT_PROXY Notice
11 LOG_ID_TRAFFIC_FAIL_CONN Warning
12 LOG_ID_TRAFFIC_MULTICAST Notice
13 LOG_ID_TRAFFIC_END_FORWARD Notice
14 LOG_ID_TRAFFIC_END_LOCAL Notice
15 LOG_ID_TRAFFIC_START_FORWARD Notice
16 LOG_ID_TRAFFIC_START_LOCAL Notice
17 LOG_ID_TRAFFIC_SNIFFER Notice
30 Log Reference
Fortinet Technologies Inc.
Security Log
Security Log
The following sections provide information about the different types of logs recorded under the Security log type.
In FortiOS 5.0 and previous versions, the logs were displayed under the UTM log type. In FortiOS
5.2.0 and later versions, the UTM logs are displayed under the Security log type. All logs grouped
in the security log include the log field type=utm.
Application Control 32
Application Control Log Messages 36
AntiVirus 37
AntiVirus Log Messages 43
DLP 46
Email Filter 52
Email Filter Log Messages 56
IPS 58
IPS Log Messages 62
Anomaly 63
Anomaly Log Messages 66
Web Filter 67
Web Filter Log Messages 72
Log Reference 31
Fortinet Technologies Inc.
Application Control
Application Control log messages record application control protocols and events.
In the log fields, these logs are defined as: type=utm; subtype=app-ctrl.
32 Log Reference
Fortinet Technologies Inc.
Application Control Security Log
Log Reference 33
Fortinet Technologies Inc.
Security Log Application Control
34 Log Reference
Fortinet Technologies Inc.
Application Control Security Log
Log Reference 35
Fortinet Technologies Inc.
Application Control Log Messages
The following table describes the log message IDs and messages of the Application Control log.
36 Log Reference
Fortinet Technologies Inc.
AntiVirus
AntiVirus log messages record actual viruses that are contained in an email as well as anything that appears to be
similar to a virus or suspicious, such as in a file or in an email.
In the log fields, these logs are defined as: type=utm; subtype=virus.
Log Field Name Log Field Description Data Type Length Value
37 Log Reference
Fortinet Technologies Inc.
AntiVirus Security Log
Log Field Name Log Field Description Data Type Length Value
• file type
Log Reference 38
Fortinet Technologies Inc.
Security Log AntiVirus
Log Field Name Log Field Description Data Type Length Value
39 Log Reference
Fortinet Technologies Inc.
AntiVirus Security Log
Log Field Name Log Field Description Data Type Length Value
l No-quarantine-
for- HTTP-GET-
filepattern-
block
l No-quarantine-
foroversized-
files
l No-skip
Log Reference 40
Fortinet Technologies Inc.
Security Log AntiVirus
Log Field Name Log Field Description Data Type Length Value
41 Log Reference
Fortinet Technologies Inc.
AntiVirus Security Log
Log Field Name Log Field Description Data Type Length Value
Log Reference 42
Fortinet Technologies Inc.
AntiVirus Log Messages
The following table describes the log message IDs and messages of the Anti Virus log.
43 Log Reference
Fortinet Technologies Inc.
AntiVirus Security Log
Log Reference 44
Fortinet Technologies Inc.
Security Log AntiVirus
45 Log Reference
Fortinet Technologies Inc.
DLP
Data Leak Protection (DLP) log messages record data leaks. These logs provide additional information to help
administrators better analyze and detect data leaks.
In the log fields, these logs are defined as: type=utm; subtype=dlp.
Log Field Name Log Field Description Data Type Length Value
46 Log Reference
Fortinet Technologies Inc.
DLP Security Log
Log Field Name Log Field Description Data Type Length Value
Log Reference 47
Fortinet Technologies Inc.
Security Log DLP
Log Field Name Log Field Description Data Type Length Value
mmsdir String 3
48 Log Reference
Fortinet Technologies Inc.
DLP Security Log
Log Field Name Log Field Description Data Type Length Value
Log Reference 49
Fortinet Technologies Inc.
Security Log DLP
Log Field Name Log Field Description Data Type Length Value
50 Log Reference
Fortinet Technologies Inc.
Security Log DLP
The following table describes the log message IDs and messages of the Data Leak Protection log.
51 Log Reference
Fortinet Technologies Inc.
Email Filter
Email filter log messages record email protocols, such as SMTP, POP3 and IMAP.
In the log fields, these logs are defined as: type=utm; subtype=emailfilter.
Log Field Name Log Field Description Data Type Length Value
52 Log Reference
Fortinet Technologies Inc.
Email Filter Security Log
Log Field Name Log Field Description Data Type Length Value
Log Reference 53
Fortinet Technologies Inc.
Security Log Email Filter
Log Field Name Log Field Description Data Type Length Value
54 Log Reference
Fortinet Technologies Inc.
Email Filter Security Log
Log Field Name Log Field Description Data Type Length Value
Log Reference 55
Fortinet Technologies Inc.
Email Filter Log Messages
The following table describes the log message IDs and messages of the Email log.
56 Log Reference
Fortinet Technologies Inc.
Email Filter Security Log
Log Reference 57
Fortinet Technologies Inc.
IPS
Intrusion logs record security logs for protocols, such as ICMP and virus attacks. The IPS logs also provide additional
log details, such as the anomaly logs. The "anomaly" logs are generated from the kernel without signatures. (e.g.TCP
SYN flood etc.).
In the log fields, these logs are defined as: type=utm; subtype= ips.
Log Field Name Log Field Descrip- Data Type Length Value
tion
58 Log Reference
Fortinet Technologies Inc.
IPS Security Log
Log Field Name Log Field Descrip- Data Type Length Value
tion
Log Reference 59
Fortinet Technologies Inc.
Security Log IPS
Log Field Name Log Field Descrip- Data Type Length Value
tion
60 Log Reference
Fortinet Technologies Inc.
IPS Security Log
Log Field Name Log Field Descrip- Data Type Length Value
tion
Log Reference 61
Fortinet Technologies Inc.
IPS Log Messages
The following table describes the log message IDs and messages of the IPS log.
62 Log Reference
Fortinet Technologies Inc.
Anomaly
In the log fields, these logs are defined as: type=utm; subtype= anomaly.
Log Field Name Log Field Description Data Type Length Value
63 Log Reference
Fortinet Technologies Inc.
Anomaly Security Log
Log Field Name Log Field Description Data Type Length Value
ref String
Log Reference 64
Fortinet Technologies Inc.
Security Log Anomaly
Log Field Name Log Field Description Data Type Length Value
severity String 8
65 Log Reference
Fortinet Technologies Inc.
Anomaly Log Messages
The following table describes the log message IDs and messages of the Anomaly log.
66 Log Reference
Fortinet Technologies Inc.
Web Filter
Web filter log messages record URL activity as well as filters, such as a blocked URL as it is found in the URL black list.
In the log fields, these logs are defined as: type=utm; subtype= webfilter.
Log Field Name Log Field Description Data Type Length Value
67 Log Reference
Fortinet Technologies Inc.
Web Filter Security Log
Log Field Name Log Field Description Data Type Length Value
Log Reference 68
Fortinet Technologies Inc.
Security Log Web Filter
Log Field Name Log Field Description Data Type Length Value
address.
69 Log Reference
Fortinet Technologies Inc.
Web Filter Security Log
Log Field Name Log Field Description Data Type Length Value
Log Reference 70
Fortinet Technologies Inc.
Security Log Web Filter
Log Field Name Log Field Description Data Type Length Value
71 Log Reference
Fortinet Technologies Inc.
Web Filter Log Messages
The following table describes the log message IDs and messages of the Web log.
72 Log Reference
Fortinet Technologies Inc.
Web Filter Security Log
Log Reference 73
Fortinet Technologies Inc.
Security Log Web Filter
74 Log Reference
Fortinet Technologies Inc.
Event Log
Event Log
The following sections provide information about the different types of logs recorded under the Event log type.
l Endpoint Control
l GTP
l High Availability
l System
l Router
l VPN
l USer
l WAD
l Wireless
In the log field, these logs are defined as: type=event; subtypes=endpoint control, gtp, vpn, user, wad, system, router,
wireless, high availability.
Endpoint Control 76
Endpoint Log Messages 80
GTP 82
GTP Log Messages 90
High Availability 92
High Availability Log Messages 95
Router 97
Router Log Messages 99
System 100
System Log Messages 111
User 137
User Log Messages 141
VPN 144
VPN Log Messages 151
WAD 157
WAD Log Messages 160
Wireless 162
Wireless Log Messages 169
Log Reference 75
Fortinet Technologies Inc.
Endpoint Control
Following are the log details for the events generated for Endpoint control logs.
In the log fields, these logs are defined as: type=event; subtype= endpoint.
76 Log Reference
Fortinet Technologies Inc.
EndpointControl Event Log
repeat UINT16 5
Log Reference 77
Fortinet Technologies Inc.
Event Log EndpointControl
used_for_ UINT16 5
type
78 Log Reference
Fortinet Technologies Inc.
EndpointControl Event Log
Log Reference 79
Fortinet Technologies Inc.
Endpoint Log Messages
The following table describes the log message IDs and messages of the Endpoint log.
80 Log Reference
Fortinet Technologies Inc.
EndpointControl Event Log
Log Reference 81
Fortinet Technologies Inc.
GTP
Event-GTP log messages record GTP activity. These messages are recorded only when running FortiGate Carrier
firmware.
In the log fields, these logs are defined as: type=event; subtype= gtp.
82 Log Reference
Fortinet Technologies Inc.
GTP Event Log
Log Reference 83
Fortinet Technologies Inc.
Event Log GTP
84 Log Reference
Fortinet Technologies Inc.
GTP Event Log
Log Reference 85
Fortinet Technologies Inc.
Event Log GTP
86 Log Reference
Fortinet Technologies Inc.
GTP Event Log
Log Reference 87
Fortinet Technologies Inc.
Event Log GTP
88 Log Reference
Fortinet Technologies Inc.
GTP Event Log
Log Reference 89
Fortinet Technologies Inc.
GTP Log Messages
The following table describes the log message IDs and messages of the GTP log.
90 Log Reference
Fortinet Technologies Inc.
GTP Event Log
Log Reference 91
Fortinet Technologies Inc.
High Availability
Event-HA log messages are recorded when FortiGate units are in high availability mode. These log messages describe
changes in cluster unit status. The changes in status occur if a cluster unit fails or starts up, or if a link fails or is
restored. Each of these messages includes the serial number of the cluster unit reporting the message. You can use
the serial number to determine the status of cluster unit that has changed.
In the log fields, these logs are defined as: type=event; subtype= ha.
92 Log Reference
Fortinet Technologies Inc.
High Availability Event Log
cluster.
ip The IP address. IP 39
Address
sn String 64
Log Reference 93
Fortinet Technologies Inc.
Event Log High Availability
94 Log Reference
Fortinet Technologies Inc.
High Availability Log Messages
The following table describes the log message IDs and messages of the HA log.
95 Log Reference
Fortinet Technologies Inc.
High Availability Event Log
Log Reference 96
Fortinet Technologies Inc.
Router
Event-Router log messages record events that occur on the FortiGate network interfaces.
In the log fields, these logs are defined as: type=event; subtype= router.
97 Log Reference
Fortinet Technologies Inc.
Router Event Log
Log Reference 98
Fortinet Technologies Inc.
Router Log Messages
The following table describes the log message IDs and messages of the Router log.
99 Log Reference
Fortinet Technologies Inc.
System
Event-System log messages record events that occur in the FortiGatesystem, such as administrators logging in and
out, or events occurring on the interfaces.
In the log fields, these logs are defined as: type=event; subtype= system.
Log Field Name Log Field Description Data Type Length Value
Log Field Name Log Field Description Data Type Length Value
cipher UINT16
community String 36
created String 64
crl String
Log Field Name Log Field Description Data Type Length Value
dir String 8
disk UINT8 3
encryption
Log Field Name Log Field Description Data Type Length Value
fams_pause UINT32 10
free String 32
green String 32
Log Field Name Log Field Description Data Type Length Value
len UINT32 10
limit UINT32 10
Log Field Name Log Field Description Data Type Length Value
newchannel UINT8
newchassisid UINT8
newslot UINT8
Log Field Name Log Field Description Data Type Length Value
• file_block
• carrier_ep_bwl
• flood
• dupe
• alert
• mms_checksum
• virus
oldchannel UINT8
oldchassisid UINT8
oldslot UINT8
portbegin UINT16 5
portend UINT16 5
probeproto String 16
process String
Log Field Name Log Field Description Data Type Length Value
red String 32
Log Field Name Log Field Description Data Type Length Value
setuprate UINT64 20
slot UINT8
sn String 64
state String 64
Log Field Name Log Field Description Data Type Length Value
unit UINT32 10
used UINT32 10
Log Field Name Log Field Description Data Type Length Value
The following table describes the log message IDs and messages of the System log.
Event-User log messages record what users are configuring on the FortiGate unit, and what is occurring on the
FortiGate unit. For example, memory storage is becoming full.
In the log fields, these logs are defined as: type=event; subtype= user.
count UINT32 10
portbegin UINT16 5
portend UINT16 5
rsso_key String 64
scope String 16
server String 64
The following table describes the log message IDs and messages of the User log.
Event-VPN log messages record VPN user, administration and session events.
In the log fields, these logs are defined as: type=event; subtype= vpn.
• HMAC_SHA256
• ESP_3DES
• ESP_AES
• CREATE_CHILD
• main
• quick
• xauth
• xauth_client
fication. • INVALID-PAYLOAD-TYPE
• DOI-NOT-SUPPORTED
• SITUATION-NOT-SUPPORTED
• INVALID-COOKIE
• INVALID-MAJOR-VERSION
• INVALID-MINOR-VERSION
• INVALID-EXCHANGE-TYPE
• INVALID-FLAGS
• INVALID-MESSAGE-ID
• INVALID-PROTOCOL-ID
• INVALID-SPI • INVALID-TRANSFORM-ID
• ATTRIBUTES-NOT-SUPPORTED
• NO-PROPOSAL-CHOSEN
• BAD-PROPOSAL-SYNTAX
• PAYLOAD-MALFORMED
• INVALID-KEY-INFORMATION
• INVALID-ID-INFORMATION
• INVALID-CERT-ENCODING
• INVALID-CERTIFICATE
• BAD-CERT-REQUEST-SYNTAX
• INVALID-CERT-AUTHORITY
• INVALID-HASH-INFORMATION
• AUTHENTICATION-FAILED
• INVALID-SIGNATURE
• ADDRESS-NOTIFICATION
• NOTIFY-SA-LIFETIME
• CERTIFICATE-UNAVAILABLE
• UNSUPPORTED-EXCHANGE-TYPE
• UNEQUAL-PAYLOAD-LENGTHS
• CONNECTED
• RESPONDER-LIFETIME
• REPLAY-STATUS
148 Log Reference
Fortinet
• INITIAL-CONTACT Technologies Inc.
• R-U-THERE
VPN Event Log
• DONE
• PENDING
role String 9
stage UINT8 3
status String 23
The following table describes the log message IDs and messages of the VPN log.
Event-Wad log messages record WAN optimization events, such as a user adding an WAN optimization rule as well as
web proxy events.
In the log fields, these logs are defined as: type=event; subtype= wad.
The following table describes the log message IDs and messages of the WAD log.
Event-Wireless log messages record wireless events that occur with FortiGate units that have WiFi capabilities.
In the log fields, these logs are defined as: type=event; subtype= wireless.
• wep128
• wpa-psk
• wpa-radius
• wpa
• wpa2
• wpa2-auto
seq String 16
sn String 64
The following table describes the log message IDs and messages of the Wireless log.
Other Logs
VOIP 172
VOIP Log Messages 175
NetScan 176
NetScan Log Messages 180
VOIP log messages record VOIP activities that include the SIP and SCCP protocols.
Log Field Name Log Field Description Data Type Length Value
call_id String 64
column UINT32 10
count UINT32 10
dir String 8
duration UINT32 10
epoch UINT32 10
Log Field Name Log Field Description Data Type Length Value
kind String 10
line String 64
malform_data UINT32 10
malform_desc String 47
phone String 64
request_name String 64
Log Field Name Log Field Description Data Type Length Value
to String 512
The following table describes the log message IDs and messages of the VOIP log.
Netscan logs record network scanning activities preformed by the FortiGate unit.
Log Field Name Log Field Descrip- Data Type Length Value
tion
agent String 64
end UINT32 10
Log Field Name Log Field Descrip- Data Type Length Value
tion
engine String 32
osfamily String 64
osgen String 64
plugin String 32
Log Field Name Log Field Descrip- Data Type Length Value
tion
start UINT32 10
Log Field Name Log Field Descrip- Data Type Length Value
tion
vulnref String
The following table describes the log message IDs and messages of the NetScan log.
There are no changes between versions 5.2.3 and 5.2.4. Refer to the FortiOS Log Reference Guide Version 5.2.3 for
a complete list of log field details related to version 5.2.3.