Appendix A Log Descriptions

Table 290 IPSec Logs

 

LOG MESSAGE

DESCRIPTION

Corrupt packet,

The device received corrupt IPsec packets and could not process

Inbound transform

them.

operation fail

 

Encapsulated packet

An outgoing packet needed to be transformed but was longer than

too big with length

65535.

Get inbound transform

When performing inbound processing for incoming IPSEC packets and

fail

ICMPs related to them, the engine cannot obtain the transform

 

context.

Get outbound transform

When outgoing packet need to be transformed, the engine cannot

fail

obtain the transform context.

Inbound transform

After encryption or hardware accelerated processing, the hardware

operation fail

accelerator dropped a packet (resource shortage, corrupt packet,

 

invalid MAC, and so on).

Outbound transform

After encryption or hardware accelerated processing, the hardware

operation fail

accelerator dropped a packet (e.g., resource overflow, corrupt packet,

 

and so on).

Packet too big with

An outgoing packet needed to be transformed, but the fragment flag

Fragment Off

was off and the packet was too big.

SPI:0x%x SEQ:0x%x

The variables represent the SPI, sequence number and the error

Execute transform step

number. When trying to perform transforming, the engine returned an

fail, ret=%d

error.

SPI:0x%x SEQ:0x%x No

The variables represent the SPI and the sequence number. The

rule found, Dropping

packet did not match the tunnel policy and was dropped.

packet

 

SPI:0x%x SEQ:0x%x

The variables represent the SPI and the sequence number. The device

Packet Anti-Replay

received a packet again (that it had already received).

detected

 

VPN connection %s was

%s is the VPN connection name. An administrator disabled the VPN

disabled.

connection.

VPN connection %s was

%s is the VPN connection name. An administrator enabled the VPN

enabled.

connection.

Due to active

%s is the VPN connection name. The number of active connections

connection allowed

exceeded the maximum allowed.

exceeded, %s was

 

deleted.

 

Table 291 Firewall Logs

LOG MESSAGE

DESCRIPTION

priority:%lu, from %s

1st variable is the global index of rule, 2nd is the from zone,

to %s, service %s, %s

3rd is the to zone, 4th is the service name, 5th is ACCEPT/DROP/

 

REJECT.

%s:%d: in %s():

Firewall is dead, trace to %s is which file, %d is which line, %s is which

 

function

Firewall has been %s.

%s is enabled/disabled

786

 

ZyWALL USG 100/200 Series User’s Guide