Cisco Reader Comment Card

Size: px
Start display at page:

Download "Cisco Reader Comment Card"

Transcription

1 General Information Cisco Reader Comment Card 1 Years of networking experience: Years of experience with Cisco products: 2 I have these network types: LAN Backbone WAN Other: 3 I have these Cisco products: Switches Routers Other (specify models): 4 I perform these types of tasks: H/W installation and/or maintenance S/W configuration Network management Other: 5 I use these types of documentation: H/W installation H/W configuration S/W configuration Command reference Quick reference Release notes Online help Other: 6 I access this information through: % Cisco.com (CCO) % CD-ROM % Printed docs % Other: 7 I prefer this access method: 8 I use the following three product features the most: Document Information Document Title: Part Number: S/W Release (if applicable): Version 6.3 On a scale of 1 5 (5 being the best), please let us know how we rate in the following areas: The document is written at my technical level of understanding. The document is complete. The information is well organized. The information is accurate. The information I wanted was easy to find. The information I found was useful to my job. Please comment on our lowest scores: Mailing Information Company Name Contact Name Mailing Address Job Title Date City State/Province ZIP/Postal Code Country Phone ( ) Extension Fax ( ) Can we contact you further concerning our documentation? Yes No You can also send us your comments by to [email protected], or by fax to

2 BUSINESS REPLY MAIL FIRST-CLASS MAIL PERMIT NO SAN JOSE CA POSTAGE WILL BE PAID BY ADDRESSEE ATTN DOCUMENT RESOURCE CONNECTION CISCO SYSTEMS INC 170 WEST TASMAN DRIVE SAN JOSE CA NO POSTAGE NECESSARY IF MAILED IN THE UNITED STATES

3 Version 6.3 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA USA Tel: NETS (6387) Fax: Customer Order Number: DOC = Text Part Number:

4 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB s public domain version of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. g y g y g Scorecard, Networking Academy, and ScriptShare are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, The Fastest Way to Increase Your Internet Quotient, and iquick Study are service marks of Cisco Systems, Inc.; and Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, the Cisco IOS logo, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherSwitch, Fast Step, GigaStack, Internet Quotient, IOS, IP/TV, iq Expertise, the iq logo, LightStream, MGX, MICA, the Networkers logo, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, RateMUX, Registrar, SlideCast, SMARTnet, StrataView Plus, Stratm, SwitchProbe, TeleRouter, TransPath, and VCO are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. All other trademarks mentioned in this document or Web site are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0303R) Copyright 2003 Cisco Systems, Inc. All rights reserved.

5 CONTENTS About This Guide xiii Document Objectives xiii Audience xiii Document Organization xiv Document Conventions xiv Related Documentation xiv Obtaining Documentation xiv Cisco.com xv Documentation CD-ROM xv Ordering Documentation xv Documentation Feedback xvi Obtaining Technical Assistance xvi Cisco.com xvi Technical Assistance Center xvi Obtaining Additional Publications and Information xviii CHAPTER 1 Introduction 1-1 New and Deleted Messages 1-1 EMBLEM Format Option in Version New and Deleted Messages in Version New and Changed Messages in Version Logging Command Overview 1-6 Enabling Logging 1-9 Testing the Logging Output 1-9 Setting the Syslog Output Location 1-10 Sending Syslog Messages to the Buffer 1-10 Sending Syslog Messages to a Telnet Console Session 1-11 Sending Syslog Messages to a Syslog Server 1-12 Sending Syslog Messages to an SNMP Management Station 1-13 Disabling and Enabling Specific Syslog Messages 1-14 Disabling Specific Syslog Messages 1-14 Viewing a List of Disabled Syslog Messages 1-14 Reenabling Specific Disabled Syslog Messages 1-14 Reenabling All Disabled Syslog Messages 1-14 iii

6 Contents Understanding Log Messages 1-15 Log Message Format 1-15 Severity Levels 1-16 Variables 1-16 Other Remote Management and Monitoring Tools 1-19 Cisco PIX Device Manager 1-19 Cisco Secure Policy Manager 1-19 SNMP Traps 1-20 Telnet 1-20 CHAPTER Messages to , , , iv

7 Contents v

8 Contents Messages to vi

9 Contents Messages to vii

10 Contents Messages to nn viii

11 Contents d ix

12 Contents Messages to Messages to Messages to Messages to x

13 Contents xi

14 Contents Messages to , APPENDIX A Messages Listed by Severity Level A- 1 Alert Messages, User-Defined Severity A- 1 Alert Messages, Severity 1 A- 1 Critical Messages, Severity 2 A- 3 s, Severity 3 A- 4 Warning Messages, Severity 4 A- 6 Notification Messages, Severity 5 A- 8 Informational Messages, Severity 6 A- 9 Debugging Messages, Severity 7 A- 13 I NDEX xii

15 About This Guide This preface describes: Document Objectives, page xiii Audience, page xiii Document Organization, page xiv Document Conventions, page xiv Related Documentation, page xiv Obtaining Documentation, page xiv Obtaining Technical Assistance, page xvi Document Objectives This guide describes the system log (syslog) messages generated by the Cisco PIX Firewall software Version 6.3. Messages that display on the console from non-syslog errors are not listed. See the New and Deleted Messages section on page 1-1 for a list of new and deleted messages in recent versions of the software. Audience This guide is intended for network managers who perform any of the following tasks: Managing network security Configuring, administering, and troubleshooting firewalls This guide assumes that you are familiar with the commands and configuration options described in the Cisco PIX Firewall Command Reference. In addition, you should be familiar with the network within which the PIX Firewall operates. xiii

16 Document Organization About This Guide Document Organization This guide is organized as follows: Chapter 1, Introduction describes the system log message function, and explains the format of log messages. Chapter 2, lists the system log messages, indicates the probable cause of each message, and provides instructions for resolving the condition that caused the log message. Appendix A, Messages Listed by Severity Level lists message numbers and text by each severity level. Document Conventions This guide uses the following conventions: Filenames, directory names, and arguments for which you supply values are in italics. The symbol ^ represents the key labeled Ctrl (control). To enter a control key; for example, ^z, hold down the Ctrl key while you press the z key. Command names, keys, buttons, and keywords in text are shown in boldface. The PIX Firewall commands are described in detail in the Cisco PIX Firewall Command Reference. Variables in command syntax descriptions are shown in italics. Command options in square brackets [ ] can be optionally entered, and parameters separated by a vertical bar ( ) require you to enter one parameter, but not the other(s). Examples depict screen displays and the command line in screen font. Information you need to enter in examples is shown in boldface screen font. Variables that require you to supply a value are shown in italic screen font. Selecting a menu item (or screen) is indicated by the following convention: Click screen1>screen2>screen3. Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the manual. Related Documentation Use this document with the PIX Firewall documentation set, which is available online at the following website: Obtaining Documentation Cisco provides several ways to obtain documentation, technical assistance, and other technical resources. These sections explain how to obtain technical information from Cisco Systems. xiv

17 About This Guide Obtaining Documentation Cisco.com You can access the most current Cisco documentation on the World Wide Web at this URL: You can access the Cisco website at this URL: International Cisco web sites can be accessed from this URL: Documentation CD-ROM Cisco documentation and additional literature are available in a Cisco Documentation CD-ROM package, which may have shipped with your product. The Documentation CD-ROM is updated monthly and may be more current than printed documentation. The CD-ROM package is available as a single unit or through an annual subscription. Registered Cisco.com users can order the Documentation CD-ROM (product number DOC-CONDOCCD=) through the online Subscription Store: Ordering Documentation You can find instructions for ordering documentation at this URL: You can order Cisco documentation in these ways: Registered Cisco.com users (Cisco direct customers) can order Cisco product documentation from the Networking Products MarketPlace: Registered Cisco.com users can order the Documentation CD-ROM (Customer Order Number DOC-CONDOCCD=) through the online Subscription Store: Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco Systems Corporate Headquarters (California, U.S.A.) at or, elsewhere in North America, by calling NETS (6387). xv

18 Obtaining Technical Assistance About This Guide Documentation Feedback You can submit comments electronically on Cisco.com. On the Cisco Documentation home page, click Feedback at the top of the page. You can your comments to You can submit your comments by mail by using the response card behind the front cover of your document or by writing to the following address: Cisco Systems Attn: Customer Document Ordering 170 West Tasman Drive San Jose, CA We appreciate your comments. Obtaining Technical Assistance Cisco provides Cisco.com, which includes the Cisco Technical Assistance Center (TAC) Website, as a starting point for all technical assistance. Customers and partners can obtain online documentation, troubleshooting tips, and sample configurations from the Cisco TAC website. Cisco.com registered users have complete access to the technical support resources on the Cisco TAC website, including TAC tools and utilities. Cisco.com Cisco.com offers a suite of interactive, networked services that let you access Cisco information, networking solutions, services, programs, and resources at any time, from anywhere in the world. Cisco.com provides a broad range of features and services to help you with these tasks: Streamline business processes and improve productivity Resolve technical issues with online support Download and test software packages Order Cisco learning materials and merchandise Register for online skill assessment, training, and certification programs To obtain customized information and service, you can self-register on Cisco.com at this URL: Technical Assistance Center The Cisco TAC is available to all customers who need technical assistance with a Cisco product, technology, or solution. Two levels of support are available: the Cisco TAC website and the Cisco TAC Escalation Center. The avenue of support that you choose depends on the priority of the problem and the conditions stated in service contracts, when applicable. xvi

19 About This Guide Obtaining Technical Assistance Cisco TAC Website Cisco TAC Escalation Center We categorize Cisco TAC inquiries according to urgency: Priority level 4 (P4) You need information or assistance concerning Cisco product capabilities, product installation, or basic product configuration. Priority level 3 (P3) Your network performance is degraded. Network functionality is noticeably impaired, but most business operations continue. Priority level 2 (P2) Your production network is severely degraded, affecting significant aspects of business operations. No workaround is available. Priority level 1 (P1) Your production network is down, and a critical impact to business operations will occur if service is not restored quickly. No workaround is available. You can use the Cisco TAC website to resolve P3 and P4 issues yourself, saving both cost and time. The site provides around-the-clock access to online tools, knowledge bases, and software. To access the Cisco TAC website, go to this URL: All customers, partners, and resellers who have a valid Cisco service contract have complete access to the technical support resources on the Cisco TAC website. Some services on the Cisco TAC website require a Cisco.com login ID and password. If you have a valid service contract but do not have a login ID or password, go to this URL to register: If you are a Cisco.com registered user, and you cannot resolve your technical issues by using the Cisco TAC website, you can open a case online at this URL: If you have Internet access, we recommend that you open P3 and P4 cases through the Cisco TAC website so that you can describe the situation in your own words and attach any necessary files. The Cisco TAC Escalation Center addresses priority level 1 or priority level 2 issues. These classifications are assigned when severe network degradation significantly impacts business operations. When you contact the TAC Escalation Center with a P1 or P2 problem, a Cisco TAC engineer automatically opens a case. To obtain a directory of toll-free Cisco TAC telephone numbers for your country, go to this URL: Before calling, please check with your network operations center to determine the level of Cisco support services to which your company is entitled: for example, SMARTnet, SMARTnet Onsite, or Network Supported Accounts (NSA). When you call the center, please have available your service agreement number and your product serial number. xvii

20 Obtaining Additional Publications and Information About This Guide Obtaining Additional Publications and Information Information about Cisco products, technologies, and network solutions is available from various online and printed sources. The Cisco Product Catalog describes the networking products offered by Cisco Systems as well as ordering and customer support services. Access the Cisco Product Catalog at this URL: Cisco Press publishes a wide range of networking publications. Cisco suggests these titles for new and experienced users: Internetworking Terms and Acronyms Dictionary, Internetworking Technology Handbook, Internetworking Troubleshooting Guide, and the Internetworking Design Guide. For current Cisco Press titles and other information, go to Cisco Press online at this URL: Packet magazine is the Cisco monthly periodical that provides industry professionals with the latest information about the field of networking. You can access Packet magazine at this URL: iq Magazine is the Cisco monthly periodical that provides business leaders and decision makers with the latest information about the networking industry. You can access iq Magazine at this URL: Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering professionals involved in the design, development, and operation of public and private internets and intranets. You can access the Internet Protocol Journal at this URL: Training Cisco offers world-class networking training, with current offerings in network training listed at this URL: xviii

21 CHAPTER 1 Introduction This chapter lists new and deleted messages in recent versions of the PIX Firewall software. It also describes how to view and manage syslog messages, how to understand the messages, and which other remote management and monitoring tools are available. Note Not all system log messages represent error conditions. Some messages simply report normal events. This chapter includes the following sections: New and Deleted Messages, page 1-1 Logging Command Overview, page 1-6 Enabling Logging, page 1-9 Setting the Syslog Output Location, page 1-10 Disabling and Enabling Specific Syslog Messages, page 1-14 Understanding Log Messages, page 1-15 Other Remote Management and Monitoring Tools, page 1-19 New and Deleted Messages This section lists new and deleted messages for each software release: EMBLEM Format Option in Version 6.3.1, page 1-1 New and Deleted Messages in Version 6.3.1, page 1-2 New and Changed Messages in Version 6.3.2, page 1-5 EMBLEM Format Option in Version This feature enables you to log messages to a syslog server in Cisco EMBLEM format. EMBLEM syslog format is designed to be consistent with the Cisco IOS format and is more compatible with CiscoWorks management applications. Example: [no] logging host [in_if_name] ip_address [protocol/port] [format emblem] 1-1

22 New and Deleted Messages Chapter 1 Introduction UDP only EMBLEM format logging is available for UDP syslog messages only (because the RME syslog analyzer only supports UDP syslog messages). If you use the option with TCP/port# an error is generated. If EMBLEM format logging is enabled for a particular syslog host, then EMBLEM format messages are sent to that host. logging host The logging host ip_address format emblem command enables EMBLEM format logging on a per-syslog-server basis. timestamp The EMBLEM format is available for both messages with and without timestamp. If the logging timestamp option is also enabled, then EMBLEM format messages with a time stamp are sent. device-id The logging device-id command displays a unique device ID in non-emblem format syslog messages that are sent to the syslog server. This command is available in PIX Firewall software Version and higher. If enabled, the PIX Firewall displays the device ID in all non-emblem-formatted syslog messages. However, it does not affect the syslog message text that is in EMBLEM format. New and Deleted Messages in Version New Messages in Version The following sections list messages that were added or deleted in Version 6.3.1: New Messages in Version 6.3.1, page 1-2 Deleted Messages in Version 6.3.1, page 1-5 The following messages were added in Version %PIX-n : access-list acl_id {permitted denied est-allowed} protocol interface_name/source_address(source_port) -> interface_name/dest_address(dest_port) hit-cnt number ({first hit number-second interval}) %PIX The number of ACL log deny-flows has reached limit (number). %PIX : Uauth null proxy error %PIX : exceeded HTTPS proxy process limit %PIX :Bad route_compress() call, sdb= number %PIX : H.323 library_name ASN Library failed to initialize, error code number %PIX : No memory available for limit_slow %PIX : Bad path index of number for IP_address, number max %PIX : IP routing table creation failure - reason %PIX : IP routing table limit warning %PIX : IP routing table limit exceeded - reason, IP_address netmask %PIX : Internal error: reason %PIX : Flagged as being an ABR without a backbone area %PIX : Reached unknown state in neighbor state machine %PIX : area string lsid IP_address mask netmask adv IP_address type number 1-2

23 Chapter 1 Introduction New and Deleted Messages %PIX : lsid IP_address adv IP_address type number gateway gateway_address metric number network IP_address mask netmask protocol hex attr hex net-metric number %PIX : if interface_name if_state number %PIX : OSPF is enabled on interface_name during idb initialization %PIX : OSPF process number is changing router-id. Reconfigure virtual link neighbors with our new router-id %PIX : The subject name of the peer cert is not allowed for connection %PIX : Received ARP {request response} collision from IP_address/mac_address on interface interface_name, page 2-61 %PIX : Received mac mismatch collision from IP_address/mac_address for authenticated host, page 2-62 %PIX : IP route counter negative - reason, IP_address Attempt: number %PIX : Database scanner: external LSA IP_address netmask is lost, reinstalls %PIX : db_free: external LSA IP_address netmask %PIX : Received invalid packet: reason from IP_address, interface_name %PIX : Received reason from unknown neighbor IP_address %PIX : Invalid length number in OSPF packet from IP_address (ID IP_address), interface_name %PIX : Invalid lsa: reason Type number, LSID IP_address from IP_address, IP_address, interface_name %PIX : Found LSA with the same host bit set but using different mask LSA ID IP_address netmask New: Destination IP_address netmask %PIX : Found generating default LSA with non-zero mask LSA type : number Mask : IP_address metric : number area : string %PIX : OSPF process number cannot start. There must be at least one up IP interface, for OSPF to use as router ID %PIX : Virtual link information found in non-backbone area: string %PIX : OSPF detected duplicate router-id IP_address from IP_address on interface interface_name %PIX : Detected router with duplicate router ID IP_address in area string %PIX : Detected router with duplicate router ID IP_address in Type-4 LSA advertised by IP_address %PIX : UDP DNS packet dropped due to domainname length check of 255 bytes: actual length:<n> bytes, page 2-68 %PIX : Process number, Nbr IP_address on interface_name from string to string, reason %PIX : Serial console idle timeout exceeded %PIX : Login denied from {source_address/source_port serial} to {interface_name:dest_address/service console} for user "user" %PIX : Login permitted from {source_address/source_port serial} to {interface_name:dest_address/service console} for user "user" %PIX : VPNClient: Backup Server List: reason %PIX : VPNClient: Backup Server List Error: reason 1-3

24 New and Deleted Messages Chapter 1 Introduction %PIX : VPNClient: Load Balancing Cluster with Virtual IP: IP_address has redirected the PIX to server IP_address %PIX : VPNClient: Disconnecting from Load Balancing Cluster member IP_address %PIX : VPNClient: Secure Unit Authentication Enabled %PIX : VPNClient: Secure Unit Authentication Disabled %PIX : VPNClient: User Authentication Enabled: Auth Server IP: IP_address Auth Server Port: port Idle Timeout: time %PIX : VPNClient: User Authentication Disabled %PIX : VPNClient: Device Pass Thru Enabled %PIX : VPNClient: Device Pass Thru Disabled %PIX : VPNClient: Extended XAUTH conversation initiated when SUA disabled %PIX : VPNClient: Duplicate split nw entry %PIX : Checksum Failure in database in area string Link State Id IP_address Old Checksum number New Checksum number %PIX : interface interface_name has zero bandwidth %PIX : IP_address netmask changed from area string to area string %PIX : Pre-allocate CTIQBE {RTP RTCP} secondary channel for interface_name:outside_address[/outside_port] to interface_name:inside_address[/inside_port] from CTIQBE_message_name message %PIX : Unsupported CTIQBE version: hex: from interface_name:ip_address/port to interface_name:ip_address/port %PIX : H.225 message received from interface_name:ip_address/port to interface_name:ip_address/port is using an unsupported version number %PIX : Received H.225 Release Complete with newconnectionneeded for interface_name:ip_address to interface_name:ip_address/port %PIX : TCP access requested from source_address/source_port to interface_name:dest_address/service %PIX : {TCP UDP} access permitted from source_address/source_port to interface_name:dest_address/service %PIX : {TCP UDP} access denied by ACL from source_address/source_port to interface_name:dest_address/service %PIX : TCP connection limit exceeded from source_address/source_port to interface_name:dest_address/service %PIX : {TCP UDP} request discarded from source_address/source_port to interface_name:dest_address/service %PIX : protocol request discarded from source_address to interface_name:dest_address 1-4

25 Chapter 1 Introduction New and Deleted Messages Deleted Messages in Version Table 1-1 lists messages that were deleted from Version 6.3.1: Table 1-1 Deleted Messages from Version Message Reason Deleted %PIX : Console Login from user at IP_addr Replaced by message number %PIX : Denied Telnet login session from Replaced by message number IP_addr on interface int_name %PIX : Permitted Telnet login session from Replaced by message number IP_addr %PIX : telnet login session failed from Replaced by message number IP_addr (num attempts) on interface int_name %PIX : Telnet session limit exceeded. Replaced by message number Connection request from IP_addr on interface int_name %PIX : Denied manager connection from Replaced by message number IP_addr. %PIX : Manager session limit exceeded. Replaced by message number Connection request from IP_addr on interface int_name %PIX : Denied SSH session from IP_addr on Replaced by message number interface int_name %PIX : Permitted SSH session from IP_addr on Replaced by message number interface int_name for user user_id %PIX : SSH login session failed from IP_addr Replaced by message number on (num attempts) on interface int_name by user user_id %PIX : SSH session limit exceeded. Connection Replaced by message number request from IP_addr on interface int_name %PIX : HTTP daemon interface interface_name: Replaced by message number connection denied from IP_address %PIX : HTTP daemon connection limit exceeded Replaced by message number %PIX : HTTP daemon: Login failed from IP_address for user user Replaced by message number New and Changed Messages in Version New Messages in Version The following sections list messages that were added or deleted in Version 6.3.2: New Messages in Version 6.3.2, page 1-5 Changed Messages in Version 6.3.2, page 1-6 The following messages were added in Version 6.3.2: %PIX :Line protocol on interface interface_name changed state to up %PIX :Line protocol on interface interface_name changed state to down 1-5

26 Logging Command Overview Chapter 1 Introduction Changed Messages in Version The following messages were changed in Version 6.3.2: %PIX : Built {dynamic static} translation from interface_name [(<acl-name>)]:real_address to interface_name:mapped_address %PIX : Teardown {dynamic static} translation from interface_name [(<acl-name>)]:real_address to interface_name:mapped_address duration time %PIX : Built {dynamic static} {TCP UDP ICMP} translation from interface_name [(<acl-name>)]:real_address/real_port to interface_name:mapped_address/mapped_port %PIX : Teardown {dynamic static} {TCP UDP ICMP} translation from interface_name [(<acl-name>)]:real_address/{real_port real_icmp_id}to interface_name:mapped_address/{mapped_port mapped_icmp_id} duration time Logging Command Overview Table 1-2 lists the PIX Firewall logging commands that you can use to configure and manage logging. See the Cisco PIX Firewall Command Reference for detailed descriptions and additional logging commands. To use the logging command, access the configuration mode on the PIX Firewall by entering the configure terminal command. Many of the logging commands require that you specify a severity level threshold to indicate which syslog messages can be sent to the output locations. The lower the level number, the more severe the error. The default severity level is 3. Specify the severity level as either a number or a keyword as described in Table 1-3. The level you specify causes PIX Firewall to send messages of that level or lower to the output location; for example, if you specify severity level 3, PIX Firewall sends severity level 1, 2, and 3 messages to the output location. PIX Firewall has a fixed number of blocks in memory that can be allocated for buffering syslog messages. The number of blocks required depends on the length of the message queue and the number of syslog hosts specified. If the available memory is exceeded, the following message appears: Warning: failed to register nnn blocks for logging Where nnn is the number of 256-byte blocks that could not be allocated. To resolve this problem, reduce the number of buffered messages using the logging queue command or reduce the number of syslog hosts specified. Some commands support the format emblem option. EMBLEM syslog format is designed to be consistent with the Cisco IOS format and is more compatible with CiscoWorks management applications. Note Syslog does not generate level 0 emergency messages. This level is provided in the logging command for compatibility with the UNIX syslog feature, but is not used by PIX Firewall. 1-6

27 Chapter 1 Introduction Logging Command Overview Table 1-2 PIX Firewall Logging Commands Type Command Description Enabling Logging logging on Enables transmission of syslog messages to all output locations. You can disable sending syslog messages with the no logging on command. You must also set a logging output location to see any logs. show logging Lists the current syslog messages and which logging command options are enabled. Setting the Message Level or Disabling Messages logging message message_number level severity_level no logging message message_number show logging disabled clear logging disabled Sets the severity level of a specific syslog message. Use the no logging message message_number level severity_level command to use the default level. Disables specific syslog messages. Use the logging message message_number command to resume logging of specific disabled messages. Displays a complete list of disabled syslog messages. Reenables all disabled syslog messages. 1-7

28 Logging Command Overview Chapter 1 Introduction Table 1-2 PIX Firewall Logging Commands (continued) Type Command Description Specifying and Managing Output Locations logging buffered severity_level clear logging logging console severity_level logging monitor severity_level logging trap severity_level logging host [interface_name] ip_address [tcp[/port] udp[/port]] [format emblem] Stores syslog messages in the PIX Firewall so you can view them with the show logging command. Clears the message buffer created with the logging buffered command. Enables syslog messages to display on the PIX Firewall console as they occur. Set the severity_level from 1 to 7. You can also enter the level name. See Table 1-3 for more information. Use this command when you are debugging problems or when there is minimal load on the network. Do not use this command when the network is busy, as it can reduce PIX Firewall performance. Enables syslog messages to display as they occur when accessing the PIX Firewall console with Telnet. Set the severity_level from 1 to 7. You can also enter the level name. See Table 1-3 for more information. You must also enter the terminal monitor command to enable logging for each Telnet session. Enables syslog messages to be sent to a syslog server (see the logging host command to identify the server). Set the severity_level from 1 to 7. You can also enter the level name. See Table 1-3 for more information. Specifies a host that receives the syslog messages (a syslog server). The PIX Firewall can send messages across UDP or TCP. The default protocol and port are UDP/514. The default TCP port (if specified) is The format emblem option enables EMBLEM formatting (UDP only). logging facility number Sets the logging facility for a syslog server. The default is 20. logging history severity_level Enables syslog messages for SNMP. Set the severity_level from 1 to 7. You can also enter the level name. See Table 1-3 for more information. Logging Options logging device-id {hostname ipaddress if_name string text} logging queue msg_count If enabled, the PIX Firewall displays the device ID in all syslog messages sent to a syslog server. The device ID does not appear in EMBLEM-formatted messages, SNMP traps, or on the firewall console, management session, or buffer. If you use the ipaddress option, the device ID becomes the specified PIX Firewall interface IP address, regardless of the interface from which the message is sent. This option provides a single consistent device ID for all messages sent from the device. Specifies the number of syslog messages that can appear in the message queue while awaiting processing. The default is 512 messages; set to 0 (zero) to specify unlimited messages. Use the show logging queue command to view queue statistics. 1-8

29 Chapter 1 Introduction Enabling Logging Enabling Logging To enable logging, follow these steps. These steps enable logging; however, you must also set an output location to view the log messages. See the Setting the Syslog Output Location section on page 1-10 for more information. Step 1 Step 2 Step 3 To enable logging, enter: logging on By default, the logging level is set to 3 (error). To change the logging level, enter: logging trap severity_level (1-7) To view your logging settings, enter: show logging Testing the Logging Output To test the logging output, follow these steps: Step 1 To initiate a log message to be sent to the console, enter: logging console 7 quit This test generates the following syslog message: : nobody End configuration: OK Step 2 This message states that you exited configuration mode is the message identifier number (see Chapter 2,, for more information about this message). The term nobody indicates you are accessing the PIX Firewall console from the serial console port. To disable logging to the console, enter: no logging console 7 quit You should only use the logging console command for testing. When the PIX Firewall is in production, only use the logging buffered command to store messages, the show logging command to view messages, and the clear logging command to clear the messages displayed by the logging buffered command. 1-9

30 Setting the Syslog Output Location Chapter 1 Introduction Setting the Syslog Output Location This section includes the following topics: Sending Syslog Messages to the Buffer, page 1-10 Sending Syslog Messages to a Telnet Console Session, page 1-11 Sending Syslog Messages to a Syslog Server, page 1-12 Sending Syslog Messages to an SNMP Management Station, page 1-13 You can configure the PIX Firewall system software to send syslog messages to the output location of your choice. The PIX Firewall provides several output locations for sending syslog messages: The console We recommend sending syslog messages directly to the console only during testing. See the Testing the Logging Output section. The buffer A Telnet connection A host running a syslog server An SNMP management station. Note You can also view syslog messages using the Monitoring tab within the Cisco PIX Device Manager (PDM). Refer to the PDM online Help for additional information. Sending Syslog Messages to the Buffer Follow these steps to send syslog messages to the logging buffer, and then view the buffer on the PIX Firewall console: Step 1 Step 2 Step 3 Step 4 To store messages for display, enter the following command: logging buffered severity_level (1-7) To view the messages on the console, enter the following command: show logging To clear the buffer so that viewing new messages is easier, enter: clear logging To disable message logging, enter: no logging buffered New messages append to the end of the listing. 1-10

31 Chapter 1 Introduction Setting the Syslog Output Location Sending Syslog Messages to a Telnet Console Session Follow these steps to view syslog messages in a Telnet console session: Step 1 If you have not done so already, configure the PIX Firewall to let a host on the inside interface access the PIX Firewall. a. Enter: telnet ip_address [subnet_mask] [if_name] For example, if a host has the IP address , the command is: telnet b. You should also set the duration that a Telnet session can be idle before PIX Firewall disconnects the session to a value greater than the default of 5 minutes. A good value is at least 15 minutes, which you can set as follows: telnet timeout 15 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Start Telnet on your host and specify the inside interface of the PIX Firewall. When Telnet connects, the PIX Firewall prompts you with PIX passwd:. Enter the Telnet password, which is cisco by default. To enable configuration mode, enter: enable (Enter your password at the prompt) configure terminal To start message logging, enter: logging monitor severity_level (1-7) To send logs to this Telnet session, enter: terminal monitor This command enables logging only for the current Telnet session. The logging monitor command sets the logging preferences for all Telnet sessions, while the terminal monitor (and terminal no monitor) commands control logging for each individual Telnet session. Trigger some events by pinging a host or starting a web browser. The syslog messages then appear in the Telnet session window. When done, disable this feature with the following commands: terminal no monitor no logging monitor 1-11

32 Setting the Syslog Output Location Chapter 1 Introduction Sending Syslog Messages to a Syslog Server If you send messages to a host, they are sent using either UDP or TCP. The host must run a program (known as a server) called syslogd. UNIX provides a syslog server as part of its operating system. For Windows 95 or Windows 98, obtain a syslog server from another vendor. See the Cisco PIX Firewall and VPN Configuration Guide for the procedure to configure syslogd. On the logging server, you can specify actions to execute when certain types of messages are logged; for example, sending , saving records to a log file, or displaying messages on a workstation. Follow these steps to configure the firewall to send messages to a syslog server: Step 1 To designate a host to receive the messages, enter: logging host [interface] ip_address [tcp[/port] udp[/port]] [format emblem] For example: logging host dmz Step 2 Step 3 Step 4 You can enter this command multiple times to specify additional servers so that if one goes offline, another is available to receive messages. To set the logging level, enter: logging trap severity_level (1-7) We recommend that you use the debugging (7) level during initial setup and during testing. Thereafter, set the level from debugging to errors (3) for production use. If you want to include the device ID in each message, enter: logging device-id {hostname ipaddress if_name string text} The message includes the specified device ID (either the hostname, and IP address of the specified interface (even if the message comes from another interface), or a string) in messages sent to a syslog server. The device ID does not appear in EMBLEM-formatted messages, SNMP traps, or on the firewall console, management session, or buffer. If needed, set the logging facility to a value other than its default of 20. Most UNIX systems expect the messages to arrive at facility 20: logging facility number In the event that all syslog servers are offline, PIX Firewall stores up to 100 messages in its memory. Subsequent messages that arrive overwrite the buffer starting from the first line. 1-12

33 Chapter 1 Introduction Setting the Syslog Output Location Sending Syslog Messages to an SNMP Management Station Receiving SNMP Requests To receive Syslog messages on an SNMP management station, complete the following procedures: Receiving SNMP Requests, page 1-13 Sending SNMP Traps, page 1-13 Follow these steps for the PIX Firewall to receive requests from an SNMP management station: Step 1 Step 2 To set the IP address of the SNMP management station, enter: snmp-server host [if_name] ip_addr Set other snmp server settings as required: snmp-server location text snmp-server contact text snmp-server community key See the Cisco PIX Firewall Command Reference for more information. Sending SNMP Traps Follow these steps to send log messages as traps from the PIX Firewall to an SNMP management station (cold start, link up, and link down generic traps are already enabled by the Receiving SNMP Requests procedure): Step 1 Step 2 Step 3 Enter: snmp-server enable traps To set the logging level, enter: logging history severity_level (1-7) We recommend that you use the debugging (7) level during initial setup and during testing. Thereafter, set the level from debugging to a lower value for production use. To disable sending syslog traps, enter: no snmp-server enable traps 1-13

34 Disabling and Enabling Specific Syslog Messages Chapter 1 Introduction Disabling and Enabling Specific Syslog Messages The following sections describe how to disable, reenable, or view disabled syslog messages: Disabling Specific Syslog Messages, page 1-14 Viewing a List of Disabled Syslog Messages, page 1-14 Reenabling Specific Disabled Syslog Messages, page 1-14 Reenabling All Disabled Syslog Messages, page 1-14 Disabling Specific Syslog Messages Enter the following command to disable specific syslog messages: no logging message message_number where message_number is the specific message you want to disable. Note The following message cannot be disabled: %PIX : PIX startup completed. Beginning operation. Viewing a List of Disabled Syslog Messages To view a list of disabled syslog messages, enter the following command: show logging disabled Reenabling Specific Disabled Syslog Messages To reenable disabled syslog messages, enter the following command: logging message message_number where message_number is the specific message you want to reenable. Reenabling All Disabled Syslog Messages To reenable all disabled syslog messages, enter the following command: clear logging message 1-14

35 Chapter 1 Introduction Understanding Log Messages Understanding Log Messages This section includes the following topics: Log Message Format, page 1-15 Severity Levels, page 1-16 Variables, page 1-16 Log Message Format System log messages begin with a percent sign (%) and are structured as follows: %PIX-Level-Message_number: Message_text See the following descriptions: PIX Level Message_number Message_text Identifies the message facility code for messages generated by the PIX Firewall. This value is always PIX The level reflects the severity of the condition described by the message. The lower the number, the more severe the condition. See Table 1-3 for more information. A unique 6-digit number that identifies the message. A text string describing the condition. This portion of the message sometimes includes IP addresses, port numbers, or usernames. Table 1-4 lists the variable fields and the type of information in them. Note Syslog messages received at the PIX Firewall serial console contain only the code portion of the message. When you view the message description in Chapter 2,, the description also provides the severity level. 1-15

36 Understanding Log Messages Chapter 1 Introduction Severity Levels Table 1-3 lists the severity levels. Logging is set to level 3 (error) by default. Note Syslog does not generate level 0 emergency messages. This level is provided in the logging command for compatibility with the UNIX syslog feature, but is not used by PIX Firewall. Table 1-3 Log Message Severity Levels Level Number Level Keyword Description 0 emergency System unusable. 1 alert Immediate action needed. 2 critical Critical condition. 3 error Error condition. 4 warning Warning condition. 5 notification Normal but significant condition. 6 informational Informational message only. 7 debugging Appears during debugging only. Appendix A, Messages Listed by Severity Level lists which messages occur at each severity level. Variables Log messages often contain variables. Table 1-4 lists most variables that are used in this guide to describe log messages. Some variables that appear in only one log message are not listed. 1-16

37 Chapter 1 Introduction Understanding Log Messages Table 1-4 Variable Fields in Syslog Messages Type Variable Type of Information Misc. acl_id An ACL name. command A command name. command_modifier The command_modifier is one of the following strings: connection_type device filename privilege_level reason string tcp_flags url user cmd (this string means the command has no modifier) clear no show The connection type: SIGNALLING UDP SIGNALLING TCP SUBSCRIBE UDP SUBSCRIBE TCP Via UDP Route RTP RTCP The memory storage device. For example, the floppy disk, Flash memory, TFTP, the failover standby unit, or the console terminal. A filename of the type PIX Firewall image, PDM file, or configuration. The user privilege level. A text string describing the reason for the message. Text string (for example, a username). Flags in the TCP header such as: ACK FIN PSH RST SYN URG A URL. A username. 1-17

38 Understanding Log Messages Chapter 1 Introduction Table 1-4 Variable Fields in Syslog Messages (continued) Type Variable Type of Information Numbers number A number. The exact form depends on the log message. bytes The number of bytes. code A decimal number returned by the message to indicate the cause or source of the error, depending on the message. connections The number of connections. elimit Number of embryonic connections specified in the static or nat command. econns Number of embryonic connections. nconns Number of connections permitted for the static or xlate table. time Duration, in the format hh:mm:ss. dec Decimal number. hex Hexadecimal number. octal Octal number. Addresses IP_address IP address in the form n.n.n.n, where n is an integer from 1 to 255. MAC_address The MAC address. outside_address Outside (or foreign) IP address, an address of a host typically on a lower security level interface in a network beyond the outside router. inside_address Inside (or local) IP address, an address on a higher security level interface. global_address Global IP address, an address on a lower security level interface. source_address The source address of a packet. dest_address The destination address of a packet. real_address The real IP address, before Network Address Translation (NAT). mapped_address The translated IP address. gateway_address The network gateway IP address. netmask The subnet mask. Interfaces interface_number The interface number, 1 to n, where the number is determined by the order the interfaces load in the PIX Firewall. For example, see the sample show nameif command output: show nameif nameif ethernet0 outside security0 nameif ethernet1 inside security100 nameif token0 outside security20 nameif ethernet2 inside security30 interface_name In this example, ethernet0 would appear in a syslog message as interface 0, ethernet1 would be interface 1, token0 would be interface 2, and ethernet2 would be interface 3. The name assigned to the interface. Use the show nameif command to view the interfaces and their names. 1-18

39 Chapter 1 Introduction Other Remote Management and Monitoring Tools Table 1-4 Variable Fields in Syslog Messages (continued) Type Variable Type of Information Ports, Services, and Protocols port outside_port inside_port source_port dest_port real_port mapped_port global_port protocol service The TCP or UDP port number. The outside port number. The inside port number. The source port number. The destination port number. The real port number, before NAT. The translated port number. The global port number. The protocol of the packet, for example, ICMP, TCP, or UDP. The service specified by the packet, for example, SNMP or Telnet. Other Remote Management and Monitoring Tools In addition to the system log function, you can remotely monitor the PIX Firewall using other tools, which are described in the following topics: Cisco PIX Device Manager, page 1-19 Cisco Secure Policy Manager, page 1-19 SNMP Traps, page 1-20 Telnet, page 1-20 Cisco PIX Device Manager The Cisco PIX Device Manager (PDM) is a browser-based configuration tool designed to help you set up, configure, and monitor your PIX Firewall graphically, without requiring an extensive knowledge of the PIX Firewall command-line interface (CLI). PDM ships with every PIX Firewall running software Version 6.0(1) and higher. Refer to the Cisco PIX Device Manager Installation Guide for more information. Cisco Secure Policy Manager Cisco Secure Policy Manager (CSPM) is a security policy management system that enables you to define, distribute, enforce, and audit network-wide security policies from a central location. CSPM streamlines the tasks of managing complicated network security events, such as perimeter access control, Network Address Translation (NAT), IDS, and IPSec-based VPNs. CSPM provides system-auditing functions, including monitoring, event notification, and web-based reporting. CSPM can receive syslog messages from the PIX Firewall and provide notifications including , paging, and scripting for designated syslogs. CSPM also provides reports of PIX Firewall syslogs, including the top ten users and top ten websites. These reports can be provided both on-demand and by schedule. Reports can be ed or viewed remotely from an SSL-enabled web browser. 1-19

40 Other Remote Management and Monitoring Tools Chapter 1 Introduction Refer to the following websites for more information: SNMP Traps The PIX Firewall events can be reported using SNMP. This feature requires loading the Cisco SYSLOG MIB and the Cisco SMI MIB onto the SNMP management station. Telnet You can log in to the PIX Firewall console using Telnet from an internal host and monitor system status. If IPSec is enabled, you can also access the console from an external host. You can use the debug icmp trace and debug sqlnet commands from Telnet to view ICMP (ping) traces and SQL*Net accesses. The Telnet console session also lets you use the logging monitor and terminal monitor commands to view syslog messages, as described in the Sending Syslog Messages to a Telnet Console Session section. 1-20

41 CHAPTER 2 This chapter lists the Cisco PIX Firewall system log messages. The messages are listed numerically by message code. Note The messages shown in this guide apply to Cisco PIX Firewall Version 6.3 and higher. When a number is skipped from a sequence, the message is no longer in the PIX Firewall code. This chapter includes the following sections: Messages to , page 2-1 Messages to , page 2-25 Messages to , page 2-35 Messages to , page 2-52 Messages to , page 2-68 Messages to , page 2-69 Messages to , page 2-72 Messages to , page 2-89 Messages to This section contains messages from to %PIX : (Primary) Failover cable OK. This is a failover message. This message reports that the failover cable is present and functioning correctly. (Primary) can also be listed as (Secondary) for the secondary unit. 2-1

42 Messages to Chapter %PIX : (Primary) Bad failover cable. This is a failover message. This message reports that the failover cable is present but not functioning correctly. (Primary) can also be listed as (Secondary) for the secondary unit. Replace the failover cable , %PIX : (Primary) Failover cable not connected (this unit). %PIX : (Primary) Failover cable not connected (other unit). Both instances are failover messages. These messages are logged when failover mode is enabled, but the failover cable is not connected to one unit of the failover pair. (Primary) can also be listed as (Secondary) for the secondary unit. Connect the failover cable to both units of the failover pair %PIX : (Primary) Error reading failover cable status. This is a failover message. This message is logged if the failover cable is connected, but the primary unit is unable to determine its status. Replace the cable %PIX : (Primary) Power failure/system reload other side. This is a failover message. This message is logged if the primary unit detects a power failure on the other unit. (Primary) can also be listed as (Secondary) for the secondary unit. connected. Verify that the secondary unit is powered on and that power cables are properly 2-2

43 Chapter 2 Messages to %PIX : (Primary) No response from other firewall (reason code = code). This is a failover message. This message is logged if the primary unit is unable to communicate with the secondary unit over the failover cable. (Primary) can also be listed as (Secondary) for the secondary unit. Table 2-1 lists the Reason Codes and the descriptions to determine why the failover occurred. Table 2-1 Reason Codes Reason Code Description 1 No failover hello seen on Serial cable for 30 + seconds. This ensures that failover is running properly on the other firewall unit. 2 An interface did not pass one of the 4 failover tests. The 4 tests are: 1) Link Up, 2) Monitor for Network Traffic, 3) ARP test, 4) Broadcast Ping test. 3 No proper ACK for 15+ seconds after a command was sent on the serial cable. Verify the failover cable is connected properly and both units have the same hardware, software, and configuration; otherwise contact Cisco TAC %PIX : (Primary) Other firewall network interface interface_number OK. This is a failover message. This message is logged when the primary unit detects that the network interface on the secondary unit is okay. (Primary) can also be listed as (Secondary) for the secondary unit. Refer to Table 1-4 in Chapter 1, Introduction, for possible values for the interface_number variable %PIX : (Primary) Other firewall network interface interface_number failed. This is a failover message. This message is logged if the primary unit detects a bad network interface on the secondary unit. (Primary) can also be listed as (Secondary) for the secondary unit. Refer to Table 1-4 on page 1-17 for possible values for the interface_number variable. Check the network connections on the secondary unit. Also, check the network hub connection. If necessary, replace the failed network interface. 2-3

44 Messages to Chapter %PIX : (Primary) Other firewall reports this firewall failed. This is a failover message. This message is logged if the primary unit receives a message from the secondary unit indicating that the primary has failed. (Primary) can also be listed as (Secondary) for the secondary unit. Verify the status of the primary unit %PIX : (Primary) Other firewall reporting failure. This is a failover message. This message is logged if the secondary unit reports a failure to the primary unit. (Primary) can also be listed as (Secondary) for the secondary unit. Verify the status of the secondary unit , %PIX : (Primary) Switching to ACTIVE (cause: string). %PIX : (Primary) Switching to STNDBY (cause: string). Both instances are failover messages. These messages usually are logged when you force the pair to switch roles, either by entering the failover active command on the secondary unit, or the no failover active command on the primary unit. (Primary) can also be listed as (Secondary) for the secondary unit. Possible values for the string variable are as follows: state check bad/incompleted config ifc [interface] check, mate is healthier the otherside want me standby in failed state, cannot be active switch to failed state If the message occurs because of manual intervention, no action is required. Otherwise, use the cause reported by the secondary unit to verify the status of both units of the pair. 2-4

45 Chapter 2 Messages to %PIX : (Primary) Switching to FAILED. This is a failover message. This message is logged when the primary unit fails. Check the system log messages for the primary unit for an indication of the nature of the problem (see message ). (Primary) can also be listed as (Secondary) for the secondary unit %PIX : (Primary) Switching to OK. This is a failover message. This message is logged when a previously failed unit now reports that it is operating again. (Primary) can also be listed as (Secondary) for the secondary unit %PIX : (Primary) Disabling failover. This is a failover message. This message is logged when you enter the no failover command on the console. (Primary) can also be listed as (Secondary) for the secondary unit %PIX : (Primary) Enabling failover. This is a failover message. This message is logged when you enter the failover command with no arguments on the console, after having previously disabled failover. (Primary) can also be listed as (Secondary) for the secondary unit. 2-5

46 Messages to Chapter waiting %PIX : (Primary) Monitoring on interface interface_name This is a failover message. The firewall is testing the specified network interface with the other unit of the failover pair. (Primary) can also be listed as (Secondary) for the secondary unit. normal operations. The firewall monitors its network interfaces frequently during %PIX : (Primary) Monitoring on interface interface_name normal This is a failover message. The test of the specified network interface was successful. (Primary) can also be listed as (Secondary) for the secondary unit %PIX : (Primary) Lost Failover communications with mate on interface interface_name. This is a failover message. This message is logged if this unit of the failover pair can no longer communicate with the other unit of the pair. (Primary) can also be listed as (Secondary) for the secondary unit. correctly. Verify that the network connected to the specified interface is functioning , %PIX : (Primary) Link status Up on interface interface_name. %PIX : (Primary) Link status Down on interface interface_name. Both instances are failover messages. These messages report the results of monitoring the link status of the specified interface. (Primary) can also be listed as (Secondary) for the secondary unit. If the link status is down, verify that the network connected to the specified interface is operating correctly. 2-6

47 Chapter 2 Messages to %PIX : (Primary) Testing interface interface_name. This is a failover message. This message is logged when the firewall tests a specified network interface. This testing is performed only if the firewall fails to receive a message from the standby unit on that interface after the expected interval. (Primary) can also be listed as (Secondary) for the secondary unit %PIX : (Primary) Testing on interface interface_name {Passed Failed}. This is a failover message. This message reports the result (either Passed or Failed ) of a previous interface test. (Primary) can also be listed as (Secondary) for the secondary unit. None required if the result is Passed. If the result is Failed, you should check the network cable connection to both failover units, that the network itself is functioning correctly, and verify the status of the standby unit %PIX : (Primary) Failover message block alloc failed Block memory was depleted. This is a transient message and the firewall should recover. (Primary) can also be listed as (Secondary) for the secondary unit. Use the show blocks command to monitor the current block memory %PIX : (Primary) Failover cable communication failure The failover cable is not permitting communication between the primary and secondary units. (Primary) can also be listed as (Secondary) for the secondary unit. Ensure that the cable is properly connected. 2-7

48 Messages to Chapter %PIX : (Primary) Incomplete/slow config replication When a failover occurs, the active PIX Firewall detects a partial configuration in memory. Normally, this is caused by an interruption in the replication service. (Primary) can also be listed as (Secondary) for the secondary unit. Once the failover is detected by the PIX Firewall, the PIX Firewall automatically reloads itself and loads configuration from Flash memory and/or resyncs with another PIX Firewall. If failovers happen continuously, check the failover configuration and make sure both PIX Firewall units can communicate with each other %PIX : Failover LAN interface is up LAN failover interface link is up %PIX : LAN Failover interface is down LAN failover interface link is down. Check the connectivity of the LAN failover interface. Make sure the speed/duplex setting is correct %PIX : Receive a LAN_FAILOVER_UP message from peer. The peer has just booted and sent the initial contact message. 2-8

49 Chapter 2 Messages to %PIX : Receive a LAN failover interface down msg from peer. The peer LAN failover interface link is down. The unit switches to active mode if it is in standby mode. Check the connectivity of the peer s LAN failover interface %PIX : PIX dropped a LAN Failover command message. The firewall dropped an unacknowledged LAN failover command message, indicating a connectivity problem on the LAN failover interface. Check that the LAN interface cable is connected %PIX : The primary and standby units are switching back and forth as the active unit. The primary and standby units are switching back and forth as the active unit, indicating a LAN failover connectivity problem or software bug. Check that the LAN interface cable is connected %PIX : Inbound TCP connection denied from IP_address/port to IP_address/port flags tcp_flags on interface interface_name This is a connection-related message. This message occurs when an attempt to connect to an inside address is denied by your security policy. Possible tcp_flags values correspond to the flags in the TCP header that were present when the connection was denied. For example, a TCP packet arrived for which no connection state exists in the PIX Firewall, and it was dropped. The tcp_flags in this packet are FIN and ACK. The tcp_flags are as follows: ACK The acknowledgment number was received. FIN Data was sent. PSH The receiver passed data to the application. RST The connection was reset. 2-9

50 Messages to Chapter 2 SYN Sequence numbers were synchronized to start a connection. URG The urgent pointer was declared valid %PIX : protocol Connection denied by outbound list acl_id src inside_address dest outside_address This is a connection-related message. This message is logged if the specified connection fails because of an outbound deny command statement. The protocol variable can be ICMP, TCP, or UDP. Use the show outbound command to check outbound lists %PIX : Deny inbound UDP from outside_address/outside_port to inside_address/inside_port on interface interface_name. This is a connection-related message. This message is logged if an inbound UDP packet is denied by your security policy %PIX : Deny inbound UDP from outside_address/outside_port to inside_address/inside_port due to DNS {Response Query}. This is a connection-related message. This message is logged if a UDP packet containing a DNS query or response is denied. If the inside port number is 53, it is likely that the inside host is set up as a caching nameserver. Add an access-list command statement to permit traffic on UDP port 53. If the outside port number is 53, the most likely cause is that a DNS server was too slow to respond, and the query was answered by another server. 2-10

51 Chapter 2 Messages to %PIX : Deny inbound protocol src interface_name:dest_address/dest_port dst interface_name:source_address/source_port This is a connection-related message. This message is logged if an inbound connection is denied by your security policy. Modify the security policy if traffic should be permitted. If the message occurs at regular intervals, contact the remote peer administrator %PIX : Deny inbound (No xlate) string The message will appear under normal traffic conditions if there are internal users that are accessing the Internet via a web browser. Anytime a connection is reset, when the host at the end of the connection sends a packet after the firewall receives the reset, this message will appear. It can typically be ignored. Disable this syslog message from getting logged to the syslog server by entering the no logging message command %PIX : Deny IP from IP_address to IP_address, IP options hex. This is a packet integrity check message. An IP packet was seen with IP options. Because IP options are considered a security risk, the packet was discarded. Contact the remote host system administrator to determine the problem. Check the local site for loose source or strict source routing IP_address %PIX : Dropping echo request from IP_address to PAT address This message is logged when the firewall discards an inbound ICMP Echo Request packet with a destination address that corresponds to a PAT global address. It is discarded because the inbound packet cannot specify which PAT host should receive the packet. 2-11

52 Messages to Chapter %PIX : Deny inbound icmp src interface_name: IP_address dst interface_name: IP_address (type dec, code dec) This message is logged when the firewall denies any inbound ICMP packet access. By default, all ICMP packets are denied access unless specifically permitted using the conduit permit icmp command %PIX : Deny TCP (no connection) from IP_address/port to IP_address/port flags tcp_flags on interface interface_name. This message is logged when the firewall discards a TCP packet that has no associated connection in the firewall unit s connection table. The firewall looks for a SYN flag in the packet, which indicates a request to establish a new connection. If the SYN flag is not set, and there is not an existing connection, the firewall discards the packet. None required unless the firewall receives a large volume of these invalid TCP packets. If this is the case, trace the packets to the source and determine the reason these packets were sent %PIX : Deny IP spoof from (IP_address) to IP_address on interface interface_name. This message is logged when the firewall discards a packet with an invalid source address. Invalid source addresses are those addresses belonging to the following: Loopback network ( ) Broadcast (limited, net-directed, subnet-directed, and all-subnets-directed) The destination host (land.c) Furthermore, if the sysopt connection enforcesubnet command is enabled, PIX Firewall discards packets with a source address belonging to the destination subnet from traversing the firewall and logs this message. To further enhance spoof packet detection, use the conduit command to configure the firewall to discard packets with source addresses belonging to the internal network. Determine if an external user is trying to compromise the protected network. Check for misconfigured clients. 2-12

53 Chapter 2 Messages to %PIX : Deny IP due to Land Attack from IP_address to IP_address This message appears when the firewall receives a packet with the IP source address equal to the IP destination, and the destination port equal to the source port. This indicates a spoofed packet designed to attack systems. This attack is referred to as a Land Attack. If this message persists, an attack may be in progress. The packet does not provide enough information to determine where the attack originates %PIX : ICMP packet type ICMP_type denied by outbound list acl_id src inside_address dest outside_address This message is logged because the outgoing ICMP packet with type ICMP_type from local host inside_address to foreign host outside_address is denied by outbound list acl_id %PIX : Deny IP teardrop fragment (size = number, offset = number) from IP_address to IP_address The firewall discarded an IP packet with a teardrop signature containing either a small offset or fragment overlapping. This is a hostile event to circumvent the firewall or an Intrusion Detection System. security policy. Contact the remote peer administrator or escalate this issue according to your %PIX : Deny protocol reverse path check from source_address to dest_address on interface interface_name Someone is attempting to spoof an IP address on an inbound connection. Unicast Reverse Path Forwarding (Unicast RPF), also known as reverse route lookup, detected a packet that does not have a source address represented by a route and assumes that it is part of an attack on your firewall. This message appears when you have enabled Unicast Reverse Path Forwarding with the ip verify reverse-path command. This feature works on packets input to an interface; if it is configured on the outside, then the firewall checks packets arriving from the outside. 2-13

54 Messages to Chapter 2 The firewall looks up a route based on the source_address. If an entry is not found and a route is not defined, then this syslog message appears and the connection is dropped. If there is a route, the firewall checks which interface it corresponds to. If the packet arrived on another interface, it is either a spoof or there is an asymmetric routing environment that has more than one path to a destination. The firewall does not support asymmetric routing. If configured on an internal interface, the firewall checks static route command statements or RIP and if the source_address is not found, then an internal user is spoofing their address. An attack is in progress. With this feature enabled, no user action is required. The firewall repels the attack %PIX : Deny protocol connection spoof from source_address to dest_address on interface interface_name This message only appears if a connection exists and a packet matching the connection arrives on a different interface than the interface the connection began on. For example, if a user starts a connection on the inside interface, but the firewall detects the same connection arriving on a perimeter interface, the firewall has more than one path to a destination. This is known as asymmetric routing and is not supported on the firewall. Alternately, an attacker is attempting to append packets from one connection to another as a way to break into the firewall. In either case, the firewall displays this message and drops the connection. This message appears when the ip verify reverse-path command is not configured. Ensure routing is not asymmetric %PIX : Deny protocol src [interface_name:source_address/source_port] dst interface_name:dest_address/dest_port [type {string}, code {code}] by access_group acl_id An IP packet was denied by the ACL. This message displays even if you do not have the log option enabled for an ACL. If messages persist from the same source address, messages could indicate a foot printing or port scanning attempt. Contact the remote host administrators. 2-14

55 Chapter 2 Messages to %PIX-n : access-list acl_id {permitted denied est-allowed} protocol interface_name/source_address(source_port) -> interface_name/dest_address(dest_port) hit-cnt number ({first hit number-second interval}) This message reports when packets match an ACL statement, if you configured the log option for the access-list command. The message level depends on the level set in the access-list command (by default, the level is 6). The message indicates either the initial occurrance or the total number of occurrances during an interval. This message provides more information than message , which only logs denied packets, and does not include the hit count or a configurable level. See the following descriptions: {permitted denied est-allowed} These values specify if the packet was permitted or denied by the ACL. If the value is est-allowed, then the packet was denied by the ACL, but the packet was allowed for an already established session (for example, an internal user is allowed to accesss the Internet, and responding packets are allowed back). protocol tcp, udp, icmp, or an IP protocol number. interface_name The interface name for the source or destination of the logged flow. The VLAN interfaces are supported. source_address The source IP address of the logged flow. dest_address The destination IP address of the logged flow. source_port The source port of the logged flow (TCP or UDP). For ICMP, this field is 0. dest_port The destination port of the logged flow (TCP or UDP). For ICMP, this field is icmp-type. hit-cnt number The number of times this flow was permitted or denied by this ACL entry in the configured time interval. The value is 1, however, when the firewall generates the first syslog message for this flow. first hit The first message generated for this flow. number-second interval The interval in which the hit count is accumulated. Set this interval using the access-list command interval option (number). %PIX The number of ACL log deny-flows has reached limit If you configured the log option for an ACL deny statement (access-list id deny command), and a traffic flow matches the ACL statement, the firewall caches the flow information. When the number of matching flows that are cached on the firewall exceeds the user-configured limit (access-list deny-flow-max command), this message is logged. See the following description: number The limit configured using the access-list deny-flow-max command. This message might be generated as a result of a DoS attack. 2-15

56 Messages to Chapter %PIX : RIP auth failed from IP_address: version=number, type=string, mode=string, sequence=number on interface interface_name This is an alert log message. The firewall received a RIP reply message with bad authentication. This could be due to misconfiguration on the router or the firewall, or it could be an unsuccessful attempt to attack the firewall routing table. This may be an attack and should be monitored. If you are not familiar with the source IP address listed in this message, change your RIP authentication keys between trusted entities. An attacker may be trying to deduce the existing keys %PIX : RIP pkt failed from IP_address: version=number on interface interface_name This is an alert message. This could be a router bug, a packet with non-rfc values inside, or a malformed entry. This should not happen, and may be an attempt to exploit the PIX Firewall unit's routing table. This may be an attack and should be monitored. The packet has passed authentication, if enabled, and bad data is in the packet. The situation should be monitored and the keys should be changed if there are any doubts as to the originator of the packet %PIX : SMTP replaced string: out source_address in inside_address data: string This is a Mail Guard (SMTP) message generated by the fixup protocol smtp command. This message is logged if the PIX Firewall replaces an invalid character in an address with a space %PIX : Auth start for user user from inside_address/inside_port to outside_address/outside_port This is a AAA message. This message is logged if the PIX Firewall is configured for AAA and detects an authentication request by the specified user. 2-16

57 Chapter 2 Messages to %PIX : Auth from inside_address/inside_port to outside_address/outside_port failed (server IP_address failed) on interface interface_name. This is a AAA message. This message is logged if an authentication request fails because the specified authentication server cannot be contacted by the PIX Firewall. server. Check that the authentication daemon is running on the specified authentication %PIX : Auth from inside_address to outside_address/outside_port failed (all servers failed) on interface interface_name. This is a AAA message. This message is logged if no authentication server can be found. Ping the authentication server(s) from the PIX Firewall. Make sure the daemon(s) are running %PIX : Authentication succeeded for user user from inside_address/inside_port to outside_address/outside_port on interface interface_name. This is a AAA message. This message is logged when the specified authentication request succeeds %PIX : Authentication failed for user user from inside_address/inside_port to outside_address/outside_port on interface interface_name. This is a AAA message. This message is logged if the specified authentication request fails, possibly because of an incorrect password. 2-17

58 Messages to Chapter %PIX : Authorization permitted for user user from inside_address/inside_port to outside_address/outside_port on interface interface_name. succeeds. This is a AAA message. This message is logged when the specified authorization request %PIX : Authorization denied for user user from source_address/source_port to destination_address/destination_port on interface interface_name. This is a AAA message. This message is logged if a user is not authorized to access the specified address, possibly because of an incorrect password. This message works only with TACACS+ protocol %PIX : Authorization denied from inside_address/inside_port to outside_address/outside_port (not authenticated) on interface interface_name. This is a AAA message. This message is logged if the PIX Firewall is configured for AAA and a user attempted to make a TCP connection across the PIX Firewall without prior authentication %PIX : Auth from inside_address/inside_port to outside_address/outside_port failed (too many pending auths) on interface interface_name. This is a AAA message. This message is logged if an authentication request cannot be processed because the server has too many requests pending. Check to see if the authentication server is too slow to respond to authentication requests. Enable Flood Defender with the floodguard enable command. 2-18

59 Chapter 2 Messages to completed. %PIX : Authen Session Start: user 'user', sid number An authentication session started between the host and the firewall and has not yet %PIX : Authen Session End: user 'user', sid number, elapsed number seconds The authentication cache has timed out. Users must reauthenticate on their next connection. You can change the duration of this timer with the timeout uauth command %PIX : User must authenticate before using this service The user must be authenticated before using the service. Authenticate using FTP, Telnet, or HTTP before using the service %PIX : uauth_lookup_net fail for uauth_in() A request to authenticate did not have a corresponding request for authorization. Ensure that both the aaa authentication and aaa authorization command statements are included in the configuration. 2-19

60 Messages to Chapter %PIX : Authorization denied (acl=acl_id) for user 'user' from source_address/source_port to dest_address/dest_port on interface interface_name The access list check failed; either it matched a deny, or it matched nothing, such as an implicit deny. Connection denied by user access list acl_id, which was defined per the AAA authorization policy on CiscoSecure ACS. This message works only with RADIUS protocol 'user' %PIX : Can't find authorization ACL acl_id on 'PIX' for user The access control list (ACL) specified on the AAA server for this user does not exist on the firewall. This error can occur if you configure the AAA server before you configure the firewall. The Vender-Specific Attribute (VSA) on your AAA server might be one of the following values: acl=acl_id shell:acl=acl_id ACS:CiscoSecured-Defined-ACL=acl_ID AAA server. Add the ACL to the firewall, making sure to use the same name specified on the (max) %PIX : User at IP_address exceeded auth proxy connection limit A user has exceeded the user authentication proxy limit, and has opened too many connections to the proxy. Increase the proxy limit by entering the aaa proxy-limit proxy_limit command, or make the user close unused connections. If the error persists, it may indicate a possible DoS attack. 2-20

61 Chapter 2 Messages to %PIX : Downloaded ACL acl_id is empty The downloaded authorization access list has no ACEs. This might be caused by the misspelled attribute string 'ip:inacl#' or omission of the access-list command. junk:junk# 1=permit tcp any any eq junk" "ip:inacl#1= Correct the ACL elements that have the indicated error on the AAA server %PIX : Downloaded ACL acl_id has parsing error; ACE string An error is encountered during parsing the sequence number NNN in the attribute string 'ip:inacl#nnn=' of a downloaded authorization access list. The reasons include: - missing '=' - contains non-numeric, non-space characters between '#' and '=' - NNN is greater than ip:inacl# 1 permit tcp any any ip:inacl# 1junk2=permit tcp any any ip:inacl# =permit tcp any any Correct the ACL element that has the indicated error on the AAA server %PIX : Downloaded ACL has config error; ACE One of the elements of the downloaded authorization access list has a configuration error. The entire text of the element is included in the syslog message. This message is usually caused by an invalid access-list command statement. ip:inacl# 1=permit junk any any ip:inacl# 1=permit tcp any any eq junk Correct the ACL element that has the indicated error on the AAA server %PIX : Uauth null proxy error This message indicates an internal User Authentication error. However, if this error appears repeatedly, contact Cisco TAC. 2-21

62 Messages to Chapter %PIX : exceeded HTTPS proxy process limit For each HTTPS authentication, the firewall dedicates a process to service the authentication request. When the number of concurrently running processes exceeds the system-imposed limit, the firewall does not perform the authentication, and this message displays %PIX : No route to dest_address from source_address This message indicates a route lookup failure. A packet is looking for a destination IP address which is not in the routing table. Check the routing table and make sure there is a route to the destination %PIX : Begin configuration: IP_address writing to device This message is logged when you enter the write command to store your configuration on a device (either floppy, Flash memory, TFTP, the failover standby unit, or the console terminal). The IP_address indicates whether the login was made at the console port or via a Telnet connection %PIX : IP_address Erase configuration This is a firewall management message. This message is logged when you erase the contents of Flash memory by entering the write erase command at the console. The IP_address indicates whether the login was made at the console port or via a Telnet connection. After erasing the configuration, reconfigure the firewall and save the new configuration. Alternatively, you can restore information from a configuration that was previously saved, either on floppy or on a TFTP server elsewhere on the network. 2-22

63 Chapter 2 Messages to %PIX : IP_address end configuration: {FAILED OK} This message is logged when you enter the config floppy/memory/ network command, or the write floppy/memory/network/standby command. The IP_address indicates whether the login was made at the console port or via a Telnet connection. None required if the message ends with OK. If the message indicates a failure, try to fix the problem. For example, if writing to a floppy, ensure that the floppy is not write protected; if writing to a TFTP server, ensure that the server is up %PIX : IP_address end configuration: OK This message is logged when you exit configuration mode. The IP_address indicates whether the login was made at the console port or via a Telnet connection %PIX : Begin configuration: IP_address reading from device. This message is logged when you enter the reload or configure command to read in a configuration. The device text can be floppy, memory, net, standby, or terminal. The IP_address indicates whether the login was made at the console port or via a Telnet connection %PIX : User user executed the command string This syslog message is for accounting purposes. The user entered a command that modified the configuration. 2-23

64 Messages to Chapter %PIX :User user executed cmd:string This syslog message is for accounting purposes. The user entered a command that does not modify the configuration %PIX : (string:dec) PIX Clear complete. This message is logged when a request to clear the PIX Firewall configuration has finished. The source file and line number are identified %PIX : PIX reload command executed from telnet (remote IP_address). command. This message logs the address of the host initiating a PIX Firewall reboot with the reload %PIX : PIX startup completed. Beginning operation. This message is logged after the PIX Firewall finishes its initial boot and Flash memory reading sequence, and is ready to begin operating normally. Note This message cannot be blocked by using the no logging message command. 2-24

65 Chapter 2 Messages to %PIX : PIX Startup begin This message is logged when the PIX Firewall starts. Messages to This section contains messages from to %PIX : Too many connections on {static xlate} global_address! econns nconns This is a connection-related message. This message is logged when the maximum number of connections to the specified static address was exceeded. The econns variable is the maximum number of embryonic connections and nconns is the maximum number of connections permitted for the static or xlate. Use the show static command to check the limit imposed on connections to a static address. The limit is configurable %PIX : Embryonic limit exceeded nconns/elimit for outside_address/outside_port (global_address) inside_address/inside_port on interface interface_name This is a connection-related message regarding traffic to the firewall. This message is logged when the number of embryonic connections from the specified foreign address via the specified static global address to the specified local address exceeds the embryonic limit. When the limit on embryonic connections to the firewall is reached, the firewall attempts to accept them anyway, but puts a time limit on the connections. This allows some connections to succeed even if the PIX Firewall is very busy. The nconns variable lists the number of embryonic connections received and elimit lists the maximum number of embryonic connections specified in the static or nat command. This message indicates a more serious overload than message It could be caused by a SYN attack, or simply a very heavy load of legitimate traffic. Use the show static command to check the limit imposed on embryonic connections to a static address. 2-25

66 Messages to Chapter %PIX : FTP data connection failed for IP_address This is a connection-related message. This message is logged when the firewall is unable to allocate a structure to track the data connection for FTP because of insufficient memory. Reduce the amount of memory usage, or purchase additional memory %PIX : RCMD backconnection failed for IP_address/port This is a connection-related message. This message is logged if the firewall is unable to preallocate connections for inbound standard output for rsh commands due to insufficient memory. Check the rsh client version; the firewall only supports the Berkeley rsh. Also, reduce the amount of memory usage, or purchase additional memory %PIX : The PIX is disallowing new connections. This message occurs when you have enabled TCP system log messaging and the syslog server cannot be reached, or when using PIX Firewall Syslog Server (PFSS) and the disk on the Windows NT system is full. Disable TCP system log messaging. If using PFSS, free up space on the Windows NT system where PFSS resides. Also, make sure that the syslog host is up and you can ping the host from the PIX Firewall console. Then restart TCP system message logging to allow traffic %PIX : TCP connection limit of number for host IP_address on interface_name exceeded This is a connection-related message. This message is logged when the maximum number of connections to the specified static address was exceeded. The limit-count variable is the maximum of connections permitted for the host specified by the host-address variable. Use the show static and show nat commands to check the limit imposed on connections to an address. The limit is configurable. 2-26

67 Chapter 2 Messages to %PIX : Out of address translation slots! This is a connection-related message. This message is logged if the firewall has no more address translation slots available. Check the size of the global pool compared to the number of inside network clients. A PAT address may be necessary. Alternatively, shorten the timeout interval of xlates and connections. This could also be caused by insufficient memory; reduce the amount of memory usage, or purchase additional memory %PIX : Non-embryonic in embryonic list outside_address/outside_port inside_address/inside_port This is a connection-related message. This message is logged when a connection object (xlate) is in the wrong list. Contact Cisco TAC %PIX : (function:line_num) pix clear command return code The firewall received a non-zero value (an internal error) when attempting to clear the configuration in Flash memory. The message includes the reporting subroutine's filename and line number. For performance reasons, the end host should be configured to not inject IP fragments. This is most likely due to NFS. Set the read and write size equal to the interface MTU for NFS %PIX : Fragment database limit of number exceeded: src = IP_address,dest = IP_address, proto = protocol, id = number Too many IP fragments are currently awaiting reassembly. By default, the maximum number of fragments is 200 (refer to the fragment size command in the Cisco PIX Firewall Command Reference to raise the maximum). The firewall limits the number of IP fragments that can be concurrently reassembled. This restriction prevents memory depletion at the firewall under abnormal network conditions. In general, fragmented traffic should be a small percentage of the total traffic mix. A noticeable exception is in a network environment with NFS over UDP; if this type of 2-27

68 Messages to Chapter 2 traffic is relayed through the firewall, consider using NFS over TCP instead. To prevent fragmentation, see the sysopt connection tcpmss bytes command in the Cisco PIX Firewall Command Reference. If this message persists, a denial of service (DoS) attack might be in progress. Contact the remote peer s administrator or upstream provider %PIX : Invalid IP fragment, size = bytes exceeds maximum size = bytes: src = IP_address, dest = IP_address, proto = protocol, id = number An IP fragment is malformed. The total size of the reassembled IP packet exceeds the maximum possible size of 65,535 bytes. A possible intrusion event may be in progress. If this message persists, contact the remote peer's administrator or upstream provider %PIX : Discard IP fragment set with more than number elements: src = IP_address, dest = IP_address, proto = protocol, id = number Too many elements are in a fragment set. The firewall disallows any IP packet that is fragmented into more than 12 fragments. Refer to the fragment command in the Cisco PIX Firewall Command Reference for more information. A possible intrusion event may be in progress. If the message persists, contact the remote peer's administrator or upstream provider %PIX : LU SW_Module_Name error = number This message is logged if a Stateful Failover error occurred. Cisco TAC. If this error persists after traffic lessens through the firewall, report this error to 2-28

69 Chapter 2 Messages to %PIX : LU allocate block (bytes) failed. Stateful Failover could not allocate a block of memory to transmit stateful information to the standby firewall. Check the failover interface to make sure its xmit is normal using the show interface command. Also check the current block memory using the show block command. If current available count is 0 within any of the blocks of memory, then reload the firewall software to recover the lost blocks of memory %PIX : Unknown LU Object number Stateful Failover received an unsupported Logical Update object and therefore was unable to process it. This could be caused by corrupted memory, LAN transmissions, and other events. If you see this error infrequently, then no action is required. If this error occurs frequently, check the Stateful Failover link LAN connection. If the error was not caused by a faulty failover link LAN connection, determine if an external user is trying to compromise the protected network. Check for misconfigured clients %PIX : LU allocate connection failed Stateful Failover cannot allocate a new connection on the standby unit. This may be caused by little or no RAM memory available within the firewall. Check the available memory using the show memory command to make sure the PIX Firewall has free memory in the system. If there is no available memory, add more physical memory to the firewall %PIX : LU look NAT for IP_address failed Stateful Failover was unable to locate a NAT group for the IP_address on the standby unit. Most likely, the active and standby firewall units are out of sync. Use the write standby command on the active unit to synchronize system memory with the standby unit. 2-29

70 Messages to Chapter %PIX : LU allocate xlate failed Stateful Failover failed to allocate a translation slot (xlate) record. Check the available memory by using the show memory command to make sure the PIX Firewall has free memory in the system. If no memory is available, add more memory %PIX : LU no xlate for inside_address/inside_port outside_address/outside_port Unable to find a translation slot (xlate) record for a Stateful Failover connection; unable to process the connection information. Enter the write standby command on the active unit to synchronize system memory between the active and standby units %PIX : LU make UDP connection for outside_address:outside_port inside_address:inside_port failed Stateful Failover was unable to allocate a new record for a UDP connection. Check the available memory by using the show memory command to make sure the PIX Firewall has free memory in the system. If no memory is available, add more memory %PIX : LU PAT port port reserve failed Stateful Failover is unable to allocate a specific PAT address which is in use. If this error repeats frequently, use the write standby command on the active unit to synchronize system memory between the active and standby units. 2-30

71 Chapter 2 Messages to %PIX : LU create static xlate global_address ifc interface_name failed Stateful Failover is unable to create a translation slot (xlate). If this error repeats frequently, use the write standby command on the active unit to synchronize system memory between the active and standby units %PIX : LU missed number updates Stateful Failover assigns a sequence number for each record sent to the standby unit. When a received record sequence number is out of sequence with the last updated record, the information in between is assumed lost and this error message is sent. Unless there are LAN interruptions, check the available memory on both PIX Firewall units to ensure there is enough memory to process the stateful information. Use the show failover command to monitor the quality of stateful information updates %PIX : Memory allocation Error Failed to allocate RAM system memory. contact Cisco TAC. If this message occurs periodically, it can be ignored. If it repeats frequently, %PIX : CPU utilization for number seconds = percent This message is displayed if the percentage of CPU usage is greater than 100% for number seconds. If this message occurs frequently, contact Cisco TAC. 2-31

72 Messages to Chapter %PIX : Unable to open SNMP channel (UDP port port) on interface interface_number, error code = code This is an SNMP message. This message reports that the PIX Firewall is unable to receive SNMP requests destined for the firewall from SNMP management stations located on this interface. This does not affect the SNMP traffic passing through the PIX Firewall via any interface. An error code of -1 indicates that the firewall could not open the SNMP transport for the interface. An error code of -2 indicates that the firewall could not bind the SNMP transport for the interface. Once the firewall reclaims some of its resources when traffic is lighter, use the snmp-server host command for that interface again %PIX : Unable to open SNMP trap channel (UDP port port) on interface interface_number, error code = code This is an SNMP message. This message reports that the firewall is unable to send its SNMP traps from the firewall to SNMP management stations located on this interface. This does not affect the SNMP traffic passing through the firewall via any interface. An error code of -1 indicates that the firewall could not open the SNMP trap transport for the interface. An error code of -2 indicates that the firewall could not bind the SNMP trap transport for the interface. Once the firewall reclaims some of its resources when traffic is lighter, issue the snmp-server host command for that interface again %PIX : Unable to receive an SNMP request on interface interface_number, error code = code, will try again. This is an SNMP message. This message is logged because of an internal error in receiving an SNMP request destined for the firewall on the specified interface. request. The firewall SNMP agent goes back to wait for the next SNMP 2-32

73 Chapter 2 Messages to %PIX : Unable to send an SNMP response to IP Address IP_address Port port interface interface_number, error code = code This is an SNMP message. This message is logged because of an internal error in sending an SNMP response from the firewall to the specified host on the specified interface %PIX : incoming SNMP request (number bytes) on interface interface_name exceeds data buffer size, discarding this SNMP request. This is an SNMP message. This message reports that the length of the incoming SNMP request, destined for the firewall, exceeds the size of the internal data buffer (512 bytes) used for storing the request during internal processing; therefore, the firewall is unable to process this request. This does not affect the SNMP traffic passing through the firewall via any interface. Have the SNMP management station resend the request with a shorter length, for example, instead of querying multiple MIB variables in one request, try querying only one MIB variable in a request. This may involve modifying the configuration of the SNMP manager software %PIX : PPTP control daemon socket io string, errno = number. An internal TCP socket I/O error occurred. Report the problem to Cisco TAC %PIX : PPTP tunnel hashtable insert failed, peer = IP_address. An internal software error occurred while creating a new PPTP tunnel. Report the problem to Cisco TAC. 2-33

74 Messages to Chapter %PIX : PPP virtual interface interface_number isn't opened. An internal software error occurred while closing a PPP virtual interface. Report the problem to Cisco TAC %PIX : PPP virtual interface interface_number client ip allocation failed. An internal software error occurred while allocating an IP address to the PPTP client. This error occurs when the IP local address pool was depleted. Consider allocating a larger pool with the ip local pool command %PIX : Terminating manager session from IP_address on interface interface_name. Reason: incoming encrypted data (number bytes) longer than number bytes An incoming encrypted data packet destined for the PIX Firewall management port indicates a packet length exceeding the specified upper limit. This may be a hostile event. The firewall immediately terminates this management connection. Manager. Ensure that the management connection was initiated by Cisco Secure Policy %PIX :Bad route_compress() call, sdb= number An internal software error occurred. Contact Cisco TAC. 2-34

75 Chapter 2 Messages to Messages to This section contains messages from to %PIX : Built H245 connection for foreign_address outside_address/outside_port local_address inside_address/inside_port This is a connection-related message. This message is logged when an H.245 connection is started from foreign address outside_address to local address inside_address. This message only occurs if the firewall detects the use of an Intel Internet phone. The foreign port (outside_port) only displays on connections from outside the firewall. The local port value (inside_port) only appears on connections started on an internal interface %PIX : Pre-allocate H323 UDP backconnection for foreign_address outside_address/outside_port to local_address inside_address/inside_port This is a connection-related message. This message is logged when an H.323 UDP back-connection is preallocated to foreign address outside_address from local address inside_address. This message only occurs if the firewall detects the use of an Intel Internet phone. The foreign port (outside_port) only displays on connections from outside the PIX Firewall. The local port value (inside_port) only appears on connections started on an internal interface %PIX : Rebuilt TCP connection number for foreign_address outside_address/outside_port global_address global_address/global_port local_address inside_address/inside_port This is a connection-related message. This message appears after a TCP connection is rebuilt after a failover. A sync packet is not sent to the other PIX Firewall. The outside_address IP address is the foreign host, the global_address IP address is a global address on the lower security level interface, and the inside_address IP address is the local IP address behind the PIX Firewall on the higher security level interface. 2-35

76 Messages to Chapter %PIX : connections in use, connections most used This is a connection-related message. This message appears after a TCP connection restarts. connections is the number of connections %PIX : Built {inbound outbound} TCP connection number for interface_name:real_address/real_port (mapped_address/mapped_port) to interface_name:real_address/real_port (mapped_address/mapped_port) [(user)] A TCP connection slot between two hosts was created. Where: connection number is a unique identifier. interface, real_address, real_port identify the actual sockets. mapped_address, mapped_port identify the mapped sockets. user is the AAA name of the user. If inbound is specified, then the original control connection was initiated from the outside. For example, for FTP, all data transfer channels are inbound if the original control channel is inbound. If outbound is specified, then the original control connection was initiated from the inside %PIX : Teardown TCP connection number for interface_name:real_address/real_port to interface_name:real_address/real_port duration time bytes number [reason] [(user)] A TCP connection between two hosts was deleted. Where: connection number is an unique identifier. interface, real_address, real_port identify the actual sockets. time is the lifetime of the connection. bytes number is the data transfer of the connection. user is the AAA name of the user. 2-36

77 Chapter 2 Messages to The reason variable presents the action that causes the connection to terminate. Set the reason variable to one of the TCP termination reasons listed in Table 2-2. Table 2-2 TCP Termination Reasons Reason Reset-I Reset-O TCP FINs FIN Timeout SYN Timeout Xlate Clear Deny SYN Control Uauth Deny Unknown Description Reset was from the inside Reset was from the outside Normal close down sequence Force termination after 15 seconds await for last ACK Force termination after two minutes awaiting three-way handshake completion Command-line removal Terminate by application inspection Back channel initiation from wrong side Deny by URL filter Catch-all error %PIX : Built {inbound outbound} UDP connection number for interface_name:real_address/real_port (mapped_address/mapped_port) to interface_name:real_address/real_port (mapped_address/mapped_port) [(user)] A UDP connection slot between two hosts is created. See the following descriptions: connection number A unique identifier. interface, real_address, real_port The actual sockets. mapped_address and mapped_port The mapped sockets. user The AAA name of the user. If inbound is specified, then the original control connection is initiated from the outside. For example, for FTP, all data transfer channels are inbound if the original control channel is inbound. If outbound is specified, then the original control connection is initiated from the inside. 2-37

78 Messages to Chapter %PIX : Teardown UDP connection number for interface_name:real_address/real_port to interface_name:real_address/real_port duration time bytes number [(user)] A UDP connection slot between two hosts was deleted. Where: connection number is an unique identifier. interface, real_address, real_port are the actual sockets. time is the lifetime of the connection. bytes bytes is the data transfer of the connection. user is the AAA name of the user %PIX : H.323 library_name ASN Library failed to initialize, error code number The specified ASN library that the firewall uses for decoding the H.323 messages failed to initialize; the firewall cannot decode or inspect the arriving H.323 packet. The firewall allows the H.323 packet to pass through without any modification. When the next H.323 message arrives, the firewall attempts to initialize the library again. If this message is generated consistently for a particular library, contact Cisco TAC and provide them with all log messages (preferably with timestamps) %PIX : ACL = deny; no sa created IPSec proxy mismatches. Proxy hosts for the negotiated SA correspond to a deny access-list command policy. Check the access-list command statement in the configuration. Contact the administrator for the peer. 2-38

79 Chapter 2 Messages to %PIX : source_address {Stored Retrieved} dest_address: mapped_address This is an FTP/URL message. This message is logged when the specified host attempts to store or retrieve data from the specified FTP site %PIX : user source_address Accessed {JAVA URL URL} dest_address: url. This is an FTP/URL message. This message is logged when the specified host attempts to access the specified URL url %PIX : Access denied URL url SRC IP_address DEST IP_address: This is an FTP/URL message. This message is logged if access from the source address to the specified URL or FTP site is denied %PIX : URL Server IP_address timed out URL url This message logs when a URL server times out. 2-39

80 Messages to Chapter %PIX : URL Server IP_address request failed URL url This is an FTP/URL message. This message is logged if a Websense server request fails is pending. %PIX : URL Server IP_address request pending URL url This is an FTP/URL message. This message is logged when a Websense server request %PIX : URL Server IP_address not responding This is an FTP/URL message. The Websense server is unavailable for access, and the PIX Firewall attempts to either try to access the same server if it is the only server installed, or another server if there is more than one mode. %PIX : URL Server IP_address not responding, ENTERING ALLOW This is an FTP/URL message. This message is logged when you use the allow option of the filter command, and the Websense server(s) are not responding. The PIX Firewall allows all web requests to continue without filtering while the server(s) are not available. 2-40

81 Chapter 2 Messages to %PIX : LEAVING ALLOW mode, URL Server is up. This is an FTP/URL message. This message is logged when you use the allow option of the filter command, and the PIX Firewall receives a response message from a Websense server that previously was not responding. With this response message, the PIX Firewall exits the allow mode enabling once again the URL filtering feature %PIX : Ran out of buffer blocks specified by url-block command The URL pending buffer block is running out of space. command. Change the buffer block size by entering the url-block block block_size %PIX : No translation group found for protocol src interface_name:dest_address/dest_port dst interface_name:source_address/source_port A packet does not match any of the outbound nat rules. This message signals a configuration error. If dynamic NAT is desired for the source host, ensure that the nat command matches the source IP address. If static NAT is desired for the source host, ensure that the local IP address of the static command matches. If no NAT is desired for the source host, check the ACL bound to the nat 0 ACL %PIX : Regular translation creation failed for protocol src interface_name:source_address/source_port dst interface_name:dest_address/dest_port A protocol (UDP, TCP, or ICMP) failed to create a translation through the PIX Firewall. This message appears as a fix to caveat CSCdr0063 that requested that PIX Firewall not allow packets destined to network or broadcast addresses. PIX Firewall provides this checking for 2-41

82 Messages to Chapter 2 addresses that are explicitly identified with static command statements. With the change, for inbound traffic, the firewall denies translations for a destined IP address identified as a network or broadcast address. The PIX Firewall does not PAT all ICMP message types; it only PATs ICMP echo and echo-reply packets (types 8 and 0). Specifically, only ICMP echo or echo-reply packets create a PAT xlate. So, when the other ICMP messages types are dropped, syslog message (on the PIX Firewall) is generated. The firewall utilizes the global IP and mask from configured static command statements to differ regular IP addresses from network or broadcast IP addresses. If the global IP address is a valid network address with a matching network mask, then the firewall does not create an xlate for network or broadcast IP addresses with inbound packets. For example: static (inside,outside) netmask Global address is treated as a network address and as the broadcast address. Without an existing xlate, PIX Firewall denies inbound packets destined for or , and logs this syslog message. To handle the case where the suspected IP is a host IP, configure a separated static command statement with a host mask in front of the subnet static (first match rule for static command statements). The following static causes PIX Firewall to treat as a host address. static (inside,outside) netmask static (inside,outside) netmask The xlate may be created by traffic started with the inside host with the questioned IP address. Because the PIX Firewall treats a network or broadcast IP address as a host IP address with overlapped subnet static configuration, the network address translation for both static command statements must be the same. This message can be either an internal error or an error in the configuration %PIX : addrpool_free(): Orphan IP IP_address on interface interface_number The PIX Firewall has attempted to translate an address that it cannot find in any of its global pools. The PIX Firewall assumes that the address was deleted and drops the request. 2-42

83 Chapter 2 Messages to %PIX : Free unallocated global IP address. The firewall kernel detected an inconsistency condition when trying to free an unallocated global IP address back to the address pool. This abnormal condition may occur if the firewall is running a Stateful Failover setup and some of the internal states are momentarily out of sync between the active and standby unit. This condition is not catastrophic, and the PIX Firewall recovers automatically. Report this condition to Cisco TAC if you continue to see this message %PIX : Built {dynamic static} translation from interface_name [(<acl-name>)]:real_address to interface_name:mapped_address An address translation slot was created. The slot is used to translate the source address from the local side to the global side. In reverse, the slot is used to translate the destination address from the global side to the local side %PIX : Teardown {dynamic static} translation from interface_name [(<acl-name>)]:real_address to interface_name:mapped_address duration time The address translation slot was deleted %PIX : Built {dynamic static} {TCP UDP ICMP} translation from interface_name [(<acl-name>)]:real_address/real_port to interface_name:mapped_address/mapped_port A TCP, UDP, or ICMP address translation slot was created. The slot is used to translate the source socket from the local side to the global side. In reverse, the slot is used to translate the destination socket from the global side to the local side. 2-43

84 Messages to Chapter %PIX : Teardown {dynamic static} {TCP UDP ICMP} translation from interface_name [(<acl-name>)]:real_address/{real_port real_icmp_id}to interface_name:mapped_address/{mapped_port mapped_icmp_id} duration time The address translation slot was deleted %PIX : PIX console enable password incorrect for number tries (from IP_address) This is a firewall management message. This message is logged after the number number of times a user incorrectly types the password to enter privileged mode. The maximum is three attempts. The privileged mode password is not necessarily the same as the password for Telnet access to the firewall. Verify the password and try again %PIX : static global_address inside_address netmask netmask overlapped with global_address inside_address This message occurs if the IP addresses in one or more static command statements overlap. global_address is the global address, which is the address on the lower security interface and inside_address is the local address, which is the address on the higher security level interface. Use the show static command to view the static command statements in your configuration and fix the commands that overlap. The most common overlap occurs if you specify a network address such as and in another static command statement, specify a host within that range such as %PIX : Permitted manager connection from IP_address. This is a firewall management message. This message logs a successful connection to the firewall management port from the specified address. 2-44

85 Chapter 2 Messages to %PIX : LU loading standby start This message appears when Stateful Failover update information is sent to the standby firewall unit when the standby unit is first coming on line %PIX : LU loading standby end This message appears when Stateful Failover update information is done being sent to the standby unit unit. %PIX : LU recv thread up This message appears when an update acknowledgment is received from the standby %PIX : LU xmit thread up This message appears when a Stateful Failover update is transmitted to the standby unit. 2-45

86 Messages to Chapter %PIX : RIP hdr failed from IP_address: cmd=string, version=number domain=string on interface interface_name The firewall received a RIP message with an operation code other than reply, the message has a version number different than what is expected on this interface, and the routing domain entry was non-zero. This message is informational, but may also indicate that another RIP device is not configured correctly to communicate with the firewall %PIX : Denied ICMP type=number, code=code from IP_address on interface interface_name When using the icmp command with an access list, if the first matched entry is a permit entry, the ICMP packet continues processing. If the first matched entry is a deny entry or an entry is not matched, the firewall discards the ICMP packet and generates this syslog message. The icmp command enables or disables pinging to an interface. With pinging disabled, the firewall cannot be detected on the network. This feature is also referred to as configurable proxy pinging. Contact the administrator of the peer device %PIX : Invalid destination for ICMP error The destination for the ICMP error message is different than the source of the IP packet that induced the ICMP error message. If the message occurs frequently, this could be an active network probe, an attempt to use the ICMP error message as a covert channel, or a misbehaving IP host. Contact the administrator of the host that originated the ICMP error message %PIX : Pre-allocate RTSP UDP backconnection for foreign_address outside_address/outside_port to local_address inside_address/inside_port The firewall opened an RTSP connection for the specified IP addresses and ports. No action required. 2-46

87 Chapter 2 Messages to %PIX : Fail to establish SSH session because PIX RSA host key retrieval failed. This SSH message appears when the PIX Firewall cannot find the PIX Firewall unit s RSA host key, which is required for establishing an SSH session. The firewall host key may be absent because no PIX Firewall host key was generated or because the license for this PIX Firewall does not allow DES or 3DES. From the console, enter the show ca mypubkey rsa command to verify that PIX Firewall unit s RSA host key is present. If not, also enter the show version command to check whether the PIX Firewall unit s license allows DES or 3DES %PIX : SSH session from IP_address on interface interface_name for user user disconnected by SSH server, reason: reason This message appears after an SSH session completes. If a user enters quit or exit, the terminated normally message displays. If the session disconnected for another reason, the text describes the reason. Table 2-3 lists the possible reasons why a session disconnected. Table 2-3 SSH Disconnect Reasons Text String Action Bad checkbytes A mismatch was detected in the check Restart the SSH session. bytes during an SSH key exchange. CRC check failed Decryption failure Format error Internal error The CRC value computed for a particular packet does not match the CRC value embedded in the packet; the packet is bad. Decryption of an SSH session key failed during an SSH key exchange. A non-protocol version message was received during an SSH version exchange. This message indicates either an error internal to SSH on the firewall or an RSA key may not have been entered on the firewall or cannot be retrieved. No action required. If this message persists, call Cisco TAC. Check the RSA host key and try again. Check the SSH client, to ensure it is a supported version. From the firewall console, enter the show ca mypubkey rsa to verify that the RSA host key is present. If not, also enter the show version command to verify whether DES or 3DES is allowed. If an RSA host key is present, simply restart the SSH session. 2-47

88 Messages to Chapter 2 Table 2-3 SSH Disconnect Reasons (continued) Text String Action Invalid cipher type Invalid message length Invalid message type Out of memory Rejected by server Reset by client status code: hex (hex) Terminated by operator Time-out activated The SSH client requested an unsupported cipher. The length of SSH message arriving at the firewall exceeds 262,144 bytes or is shorter than 4096 bytes. The data may be corrupted. The firewall received a non-ssh message, or an unsupported or unwanted SSH message. This message appears when the PIX Firewall is unable to allocate memory for use by the SSH server, probably when the firewall is busy with high traffic. User authentication failed. An SSH client sent the SSH_MSG_DISCONNECT message to the firewall. Users closed the SSH client window (running on Windows) instead of entering quit or exit at the SSH console. The SSH session was terminated by entering the ssh disconnect command at the firewall console. The SSH session timed out because the duration specified by the ssh timeout command was exceeded. Enter the show version command to determine what features your license supports, then reconfigure the SSH client to use the supported cipher. No action required. Check whether the peer is an SSH client. If it is a client supporting SSHv1, and this message persists, from the firewall serial console enter the debug ssh command and capture the debug messages. Then contact Cisco TAC. Restart the SSH session later. Ask the user to verify their username and password. No action required. No action required. Encourage users to exit the client gracefully instead of just exiting. No action required. Restart the SSH connection. You can use the ssh timeout command to increase the default value of 5 minutes up to 60 minutes if required %PIX : Denied new tunnel to IP_address. VPN peer limit (platform_vpn_peer_limit) exceeded If more VPN tunnels (ISAKMP/IPSec) are concurrently attempting to be established than supported by the platform VPN peer limit, then the excess tunnels are aborted. 2-48

89 Chapter 2 Messages to %PIX : No memory available for limit_slow The requested operation failed because of a low memory condition. Reduce other system activity to ease memory demands. If conditions warrant, upgrade to a larger memory configuration %PIX : Bad path index of number for IP_address, number max A software error occurred. To determine the cause of the problem, contact Cisco TAC for assistance table. %PIX : IP routing table creation failure - reason An internal software error occurred, which prevented the creation of new IP routing Copy the message exactly as it appears, and report it to Cisco TAC limit. %PIX : IP routing table limit warning The number of routes in the named IP routing table has reached the configured warning Reduce the number of routes in the table, or reconfigure the limit netmask %PIX : IP routing table limit exceeded - reason, IP_address Further routes will be added to the table. Reduce the number of routes in the table, or reconfigure the limit. 2-49

90 Messages to Chapter %PIX : Internal error: reason An internal software error occurred. This message occurs at 5 second intervals. To determine the cause of the problem, contact Cisco TAC for assistance %PIX : Flagged as being an ABR without a backbone area The router was flagged as an area border router without a backbone area configured in the router. This message occurs at 5 second intervals. Restart the OSPF process %PIX : Reached unknown state in neighbor state machine An internal software error occurred. This message occurs at 5 second intervals %PIX : area string lsid IP_address mask netmask adv IP_address type number OSPF had a problem locating the LSA, which might lead to a memory leak. To determine the cause of the problem, contact Cisco TAC for assistance %PIX : lsid IP_address adv IP_address type number gateway gateway_address metric number network IP_address mask netmask protocol hex attr hex net-metric number OSPF found an inconsistency between its database and the IP routing table. To determine the cause of the problem, contact Cisco TAC for assistance. 2-50

91 Chapter 2 Messages to %PIX : if interface_name if_state number An internal error occurred. To determine the cause of the problem, contact Cisco TAC for assistance %PIX : OSPF is enabled on interface_name during idb initialization An internal error occurred. To determine the cause of the problem, contact Cisco TAC for assistance %PIX : OSPF process number is changing router-id. Reconfigure virtual link neighbors with our new router-id The OSPF process is being reset, and it is going to select a new router-id. This action will bring down all virtual links. To make them work again, virtual link configuration needs to be changed on all virtual link neighbors. new router-id. Change virtual link configuration on all the virtual link neighbors, to reflect our connection %PIX : The subject name of the peer cert is not allowed for When the firewall is an Easy VPN Remote device or Server, the peer certificate contains a subject name that does not match the ca verifycertdn command. This message might indicate a man in the middle attack, where a device spoofs the peer IP address and attempts to intercept a VPN connection from the firewall. 2-51

92 Messages to Chapter 2 Messages to This section contains messages from to nn %PIX nn: IDS:number string from IP_address to IP_address on interface interface_name messages. Messages through Cisco Intrusion Detection System signature Refer to the Cisco Intrusion Detection System Version User Guide for more information. You can view the NSDB and Signatures chapter, which describes each signature number (number) at the following website: All signature messages are not supported by the firewall in this release. IDS syslog messages all start with%pix nn and have the following format: %PIX nn IDS:number string from IP_address to IP_address on interface interface_name Options: number The signature number. Refer to the Cisco Intrusion Detection System Version User Guide at the following website: m string IP_address interface_name The signature message approximately the same as the NetRanger signature message. The local to remote address to which the signature applies. The name of the interface on which the signature originated. For example: %PIX IDS:2003 ICMP redirect from to on interface dmz %PIX IDS:4051 UDP Snork attack from to on interface outside Table 2-4 lists the supported signature messages. Table 2-4 IDS Syslog Messages Message Number Signature ID Signature Title Signature Type IP options-bad Option List Informational IP options-record Packet Route Informational 2-52

93 Chapter 2 Messages to Table 2-4 IDS Syslog Messages (continued) Message Number Signature ID Signature Title Signature Type IP options-timestamp Informational IP options-security Informational IP options-loose Source Route Informational IP options-satnet ID Informational IP options-strict Source Route Informational IP Fragment Attack Attack IP Impossible Packet Attack IP Fragments Overlap Attack ICMP Echo Reply Informational ICMP Host Unreachable Informational ICMP Source Quench Informational ICMP Redirect Informational ICMP Echo Request Informational ICMP Time Exceeded for a Datagram Informational ICMP Parameter Problem on Datagram Informational ICMP Timestamp Request Informational ICMP Timestamp Reply Informational ICMP Information Request Informational ICMP Information Reply Informational ICMP Address Mask Request Informational ICMP Address Mask Reply Informational Fragmented ICMP Traffic Attack Large ICMP Traffic Attack Ping of Death Attack Attack TCP NULL flags Attack TCP SYN+FIN flags Attack TCP FIN only flags Attack FTP Improper Address Specified Informational FTP Improper Port Specified Informational UDP Bomb attack Attack UDP Snork attack Attack UDP Chargen DoS attack Informational DNS HINFO Request Informational DNS Zone Transfer Informational DNS Zone Transfer from High Port Informational DNS Request for All Records Attack 2-53

94 Messages to Chapter 2 Table 2-4 IDS Syslog Messages (continued) Message Number Signature ID Signature Title Signature Type RPC Port Registration Informational RPC Port Unregistration Informational RPC Dump Informational Proxied RPC Request Attack ypserv (YP server daemon) Portmap Request Informational ypbind (YP bind daemon) Portmap Request Informational yppasswdd (YP password daemon) Portmap Request Informational ypupdated (YP update daemon) Portmap Request Informational ypxfrd (YP transfer daemon) Portmap Request Informational mountd (mount daemon) Portmap Request Informational rexd (remote execution daemon) Portmap Request Informational rexd (remote execution daemon) Attempt Informational statd Buffer Overflow Attack %PIX : Shuns cleared The clear shun command was entered to remove existing shuns from memory. This message is issued to allow an institution to keep a record of shunning activity %PIX : Shun added: IP_address IP_address port port A shun command was entered, where the first IP address is the shunned host. The other addresses and ports are optional and are used to terminate the connection if available. This message is issued to allow an institution to keep a record of shunning activity. 2-54

95 Chapter 2 Messages to %PIX : Shun deleted: IP_address A single shunned host was removed from the shun database. This message is issued to allow an institution to keep a record of shunning activity %PIX : Shunned packet: IP_address ==> IP_address on interface interface_name A packet was dropped because the host defined by IP src is a host in the shun database. A shunned host cannot pass traffic on the interface on which it is shunned. For example, an external host on the Internet can be shunned on the outside interface. This message provides a record of the activity of shunned hosts. This message and %PIX can be used to evaluate further risk assessment concerning this host %PIX : Shun add failed: unable to allocate resources for IP_address IP_address port port The firewall is out of memory; a shun could not be applied. The Cisco Intrusion Detection System should continue to attempt to apply this rule. Attempt to reclaim memory and reapply shun manually, or wait for the Cisco Intrusion Detection System to do this. 2-55

96 Messages to Chapter %PIX : decaps: rec'd IPSEC packet has invalid spi for destaddr=dest_address, prot=protocol, spi=number Received IPSec packet specifies a Security Parameters Index (SPI) that does not exist in SADB. This may be a temporary condition due to slight differences in aging of SAs between the IPSec peers, or it may be because the local SAs have been cleared. It may also be because of incorrect packets sent by the IPSec peer. This may also be an attack. The peer may not acknowledge that the local SAs have been cleared. If a new connection is established from the local router, the two peers may then reestablish successfully. Otherwise, if the problem occurs for more than a brief period, either attempt to establish a new connection or contact the peer's administrator %PIX : decapsulate: packet missing {AH ESP}, destadr=dest_address, actual prot=protocol Received IPSec packet missing an expected AH or ESP header. The peer is sending packets that do not match the negotiated security policy. This may be an attack. Contact the peer's administrator %PIX : identity doesn't match negotiated identity (ip) dest_address= dest_address, src_addr= source_address, prot= protocol, (ident) local=inside_address, remote=remote_address, local_proxy=ip_address/ip_address/port/port, remote_proxy=ip_address/ip_address/port/port An unencapsulated IPSec packet does not match the negotiated identity. The peer is sending other traffic through this security association. It may be due to an security association selection error by the peer. This may be a hostile event. Contact the peer's administrator to compare policy settings. 2-56

97 Chapter 2 Messages to %PIX : Rec'd packet not an IPSEC packet (ip) dest_address= dest_address, src_addr= source_address, prot= protocol The received packet matched the crypto map ACL, but it is not IPSec-encapsulated; the IPSec Peer is sending unencapsulated packets. This error can occur because of a policy setup error on the peer. For example, the firewall only accepts encrypted Telnet traffic to the outside interface port 23. If you attempt to Telnet without IPSec encryption to the outside interface on port 23, this message appears, but not on a telnet or traffic to the outside interface on ports other than 23. This error can also signify a hostile event. This syslog message is not generated except under the conditions cited (for example, it is not generated for traffic to the firewall interfaces themselves). See messages , , and for messages that track TCP and UDP requests. Contact the peer's administrator to compare policy settings %PIX : PPTP session state not established, but received an XGRE packet, tunnel_id=number, session_id=number session. The firewall received a PPTP XGRE packet without a corresponding control connection If this message occurs frequently, report the problem to Cisco TAC %PIX : PPP virtual interface interface_name rcvd pkt with invalid protocol: protocol, reason: reason. The firewall received an XGRE encapsulated PPP packet with an invalid protocol field. If this message occurs frequently, report the problem to Cisco TAC %PIX : PPP virtual interface max connections reached. The firewall cannot accept additional PPTP connections. Connections are allocated as soon as they are freed. 2-57

98 Messages to Chapter for MPPE. %PIX : PPP virtual interface interface_name requires mschap The MPPE is configured but MS-CHAP authentication is not. Add MS-CHAP authentication with the vpdn group group_name ppp authentication command for MPPE. %PIX : PPP virtual interface interface_name requires RADIUS The MPPE is configured but RADIUS authentication is not. Add RADIUS authentication with the vpdn group group_name ppp authentication command group info %PIX : PPP virtual interface interface_name missing aaa server AAA server configuration information cannot be found. Add AAA server information with the vpdn group group_name client authentication aaa aaa_server_group command %PIX : PPP virtual interface interface_name missing client ip address option The client IP address pool information is missing. Add IP address pool info with the vpdn group group_name client configuration address local address_pool_name command. 2-58

99 Chapter 2 Messages to %PIX : Rec'd packet not an PPTP packet. (ip) dest_address= dest_address, src_addr= source_address, data: string. The firewall received a spoofed PPTP packet. This may be a hostile event. Contact the peer's administrator to check the PPTP configuration settings %PIX : PPP virtual interface interface_name, user: user missing MPPE key from aaa server. The AAA server is not returning the MPPE key attributes required to set up the MPPE encryption policy. Check the AAA server configuration and if the AAA server cannot return MPPE key attributes, use local authentication instead with the vpdn group group_name client authentication local command %PIX : PPPoE - Service name 'any' not received in PADO. Intf:interface_name AC:ac_name. The firewall requested the PPPoE service any from the access controller at the Internet service provider. The response from the service provider includes other services but does not include the service any. This is a discrepancy in the implementation of the protocol. The PADO packet is processed normally and connection negotiations continue %PIX : PPPoE - Bad host-unique in PADO - packet dropped. Intf:interface_name AC:ac_name The firewall sent an identifier called the host-unique value to the access controller. The access controller responded with a different host-unique value. The PIX Firewall is unable to identify the corresponding connection request for this response. The packet is dropped and connection negotiations are aborted. Contact the Internet service provider. Either the access controller at the service provider is mishandling the host-unique value or the PADO packet is being forged. 2-59

100 Messages to Chapter %PIX : PPPoE - Bad host-unique in PADS - dropping packet. Intf:interface_name AC:ac_name The firewall sent an identifier called the host-unique value to the access controller. The access controller responded with a different host-unique value. The PIX Firewall is unable to identify the corresponding connection request for this response. The packet was dropped and connection negotiations were aborted. The Internet service provider should be contacted. Either the access controller at the service provider is mishandling the host-unique value or the PADO packet is being forged %PIX : PPPoE:PPP link down:reason The PPP link has gone down. There are many reasons why this could happen. The first format will display a reason if PPP provides one. Check the network link to ensure that the link is connected. The access concentrator could be down. Ensure that your authentication protocol matches the access concentrator. Ensure that your name and password are correct. Check with your ISP or network support person %PIX : PPPoE:No 'vpdn group' for PPPoE is created PPPoE requires a dial-out configuration before starting a PPPoE session. In general, the configuration should specify a dialing policy, the PPP authentication, the username and a password. The following example configures the firewall for PPPoE dialout. It also uses my-username and my-password to authenticate the access concentrator, using PAP if necessary. For example: vpdn group my-pppoe request dialout pppoe vpdn group my-pppoe ppp authentication pap vpdn group my-pppoe localname my-username vpdn username my-username password my-password ip address outside pppoe setroute The user should configure a VPDN group for PPPoE. 2-60

101 Chapter 2 Messages to d %PIX d: PPPoE:PPP - Unable to set default route to IP_address at interface_name Usually this message is followed by - default route already exists. Remove the current default route or remove the setroute parameter so that there is no conflict between PPPoE and the manually configured route %PIX : PPPoE:failed to assign PPP IP_address netmask netmask at interface_name channel. This message is followed by - subnet is the same as interface, or on failover In the first case, change the address causing the conflict. In the second case, configure the PPPoE on an interface other than the failover interface string %PIX : ISAKMP: Failed to allocate address for client from pool ISAKMP failed to allocate an IP address for the VPN client from the pool you specified with the ip local pool command statement. Use the ip local pool command to specify additional IP addresses for the pool %PIX : Received ARP {request response} collision from IP_address/mac_address on interface interface_name The firewall received an ARP packet, and the MAC address in the packet differs from the ARP cache entry. This traffic might be legitimate, or it might indicate that an ARP poisoning attack is in progress. Check the source MAC address to determine where the packets are coming from and check to see if it belongs to a valid host. 2-61

102 Messages to Chapter %PIX : Received mac mismatch collision from IP_address/mac_address for authenticated host This packet appears for one of the following conditions: The firewall received a packet with the same IP address but a different MAC address from one of its uauth entries. You configured the vpnclient mac-exempt command on the firewall, and the firewall receives a packet with an exempt MAC address but a different IP address from the corresponding uauth entry. This traffic might be legitimate, or it might indicate that a spoofing attack is in progress. Check the source MAC address and IP address to determine where the packets are coming from and check to see if they belong to a valid host %PIX : Unable to Pre-allocate H225 Call Signalling Connection for foreign_address outside_address[/outside_port] to local_address inside_address[/inside_port] The firewall failed to allocate RAM system memory while starting a connection or has no more address translation slots available. If this message occurs periodically, it can be ignored. If it repeats frequently, contact Cisco TAC. Also, check the size of the global pool compared to the number of inside network clients. A PAT address may be necessary. Alternatively, shorten the timeout interval of xlates and connections. This could also be caused by insufficient memory; reduce the amount of memory usage, or purchase additional memory %PIX : Unable to Pre-allocate H245 Connection for foreign_address outside_address[/outside_port] to local_address inside_address[/inside_port] The firewall failed to allocate RAM system memory while starting a connection or has no more address translation slots available. If this message occurs periodically, it can be ignored. If it repeats frequently, contact Cisco TAC. Also, check the size of the global pool compared to the number of inside network clients. A PAT address may be necessary. Alternatively, shorten the timeout interval of xlates and connections. This could also be caused by insufficient memory; reduce the amount of memory usage, or purchase additional memory. 2-62

103 Chapter 2 Messages to %PIX : H225 message from <src_ip/src_port> to <dest_ip/dest_pot>t contains bad protocol discriminator <hex_value> This event is logged when PIX is expecting the protocol discriminator, 0x08, but it received something other than 0x08. This could happen because the endpoint is sending a bad packet, or PIX received a message segment other than the first. Packet is let through since we currently do not handle segments %PIX : H225 message received from outside_address/outside_port to inside_address/inside_port before SETUP This message appears after an H.225 message is received out of order. The H.225 message was received before the initial SETUP message, which is not allowed. The PIX Firewall must receive an initial SETUP message for that H.225 call signalling channel before accepting any other H.225 messages %PIX : FTP port command low port: IP_address/port to IP_address on interface interface_name A client issued an ftp port command and supplied a port lesser than 1024 (in the well-known port range typically devoted to server ports). This is indicative of an attempt to avert the site s security policy. The firewall drops the packet, terminates the connection, and logs the event. 2-63

104 Messages to Chapter %PIX : FTP port command different address: IP_address(IP_address) to IP_address on interface interface_name A client issued an FTP port command and supplied an address other than the address used in the connection. This error message is indicative of an attempt to avert the site s security policy. For example, one might attempt to hijack an FTP session by changing the packet on the way, and putting different source information instead of the correct source information. The PIX Firewall drops the packet, terminates the connection, and logs the event. The address in parenthesis is the address from the port command %PIX : Deny traffic for local-host interface_name:inside_address, license limit of number exceeded The host limit was exceeded. An inside host is counted toward the limit when one of the following conditions is true: The inside host has forwarded traffic through the PIX Firewall within the last five minutes. The inside host currently reserved an xlate connection or user authentication at the PIX Firewall. The host limit is enforced on the low-end platforms. Use the show version command to view the host limit. Use the show local-host command to view the current active hosts and the inside users that have sessions at the firewall. To force disconnect one or more users, use the clear local-host command. To expire the inside users more quickly from the limit, set the xlate, connection, and uauth timeouts to the recommended values or lower. (See Table 2-5.) Table 2-5 Timeout xlate conn uauth Timeouts and Recommended Values Recommended Value 00:05:00 (five minutes) 00:01:00 (one hour) 00:05:00 (five minutes) 2-64

105 Chapter 2 Messages to %PIX : Embryonic limit neconns/elimit for through connections exceeded.outside_address/outside_port to global_address (inside_address)/inside_port on interface interface_name This message is about connections through the firewall. This message is logged when the number of connections from specified foreign address over specified global address to the specified local address exceeds the maximum embryonic limit for that static. The firewall attempts to accept the connection if it can allocate memory for that connection. It proxies on behalf of local host and sends a SYN_ACK packet to the foreign host. The firewall retains pertinent state information, drops the packet, and waits for the client's acknowledgment. It might be legitimate traffic, or indicate that a denial of service (DoS) attack is in progress. Check the source address to determine where the packets are coming from and whether it is a valid host number %PIX : IP route counter negative - reason, IP_address Attempt: An attempt to decrement the IP route counter into a negative value failed. Enter the clear ip route * command to reset the route counter. If the message continues to appear consistently, copy the messages exactly as they appear, and report it to Cisco TAC %PIX : Database scanner: external LSA IP_address netmask is lost, reinstalls The software detected an unexpected condition. The router will take corrective action and continue %PIX : db_free: external LSA IP_address netmask An internal software error occurred. 2-65

106 Messages to Chapter %PIX : Received invalid packet: reason from IP_address, interface_name An invalid OSPF packet was received. Details are included in the error message. The cause might be an incorrect OSPF configuration or an internal error in the sender. inconsistency. Check the OSPF configuration of the receiver and the sender configuration for %PIX : Received reason from unknown neighbor IP_address The OSPF hello, database description, or database request packet was received, but the router could not identify the sender. This situation should correct itself %PIX : Invalid length number in OSPF packet from IP_address (ID IP_address), interface_name The system received an OSPF packet with a filed length of less than normal header size or inconsistent with the size of the IP packet in which it arrived. This indicates a configuration error in the sender of the packet. From a neighboring address, locate the problem router and reboot it %PIX : Invalid lsa: reason Type number, LSID IP_address from IP_address, IP_address, interface_name The router received an LSA with an invalid LSA type. The cause is either memory corruption or unexpected behavior on a router. From a neighboring address, locate the problem router and reboot it. To determine what is causing this problem, contact Cisco TAC for assistance. 2-66

107 Chapter 2 Messages to %PIX : Found LSA with the same host bit set but using different mask LSA ID IP_address netmask New: Destination IP_address netmask An internal software error occurred. To determine what is causing this problem, contact Cisco TAC for assistance %PIX : Found generating default LSA with non-zero mask LSA type : number Mask : IP_address metric : number area : string The router tried to generate a default LSA with the wrong mask and possibly wrong metric due to an internal software error. To determine what is causing this problem, contact Cisco TAC for assistance %PIX : OSPF process number cannot start. There must be at least one up IP interface, for OSPF to use as router ID interfaces. OSPF failed while attempting to allocate a router ID from the IP address of one of its Make sure that there is at least one interface that is up and has a valid IP address. If there are multiple OSPF processes running on the router, each requires a unique router ID. You must have enough interfaces up so that each of them can obtain a router ID string %PIX : Virtual link information found in non-backbone area: An internal error occurred. To determine what is causing this problem, contact Cisco TAC for assistance. 2-67

108 Messages to Chapter %PIX : OSPF detected duplicate router-id IP_address from IP_address on interface interface_name OSPF received a hello packet from a neighbor that has the same router ID as this routing process. A full adjacency cannot be established. The OSPF router ID should be unique. Change the neighbor s router ID %PIX : Detected router with duplicate router ID IP_address in area string OSPF received a hello packet from a neighbor that has the same router ID as this routing process. A full adjacency cannot be established. The OSPF router ID should be unique. Change the neighbor s router ID %PIX : Detected router with duplicate router ID IP_address in Type-4 LSA advertised by IP_address OSPF received a hello packet from a neighbor that has the same router ID as this routing process. A full adjacency cannot be established. The OSPF router ID should be unique. Change the neighbor s router ID. Messages to This section contains messages from to %PIX : UDP DNS packet dropped due to domainname length check of 255 bytes: actual length:<n> bytes This message is printed when the domain-name length exceeds 255 bytes in a UDP DNS packet. (See rfc1035 section 3.1) 2-68

109 Chapter 2 Messages to %PIX :UDP DNS packet dropped due to label length check of 63 bytes actual length:<n> bytes This message is printed when the label length exceeds 63 bytes in a UDP DNS packet. (See rfc1035 section 3.1) %PIX :UDP DNS packet dropped due to packet length check of <n> bytes: actual length:<n1> bytes This message is printed when the packet length of a UDP DNS packet exceeds the maximum-length value which is configured along with the fixup protocol DNS command. (See EDCS ) <n> is the maximum-length configured in the command, <n1> is the actual length of the packet dropped. %PIX :UDP DNS packet dropped due to compression length check of <n> bytes: actual length:<n1> bytes This message is printed when a compression pointer loop is detected and the number of bytes read exceeds the size of the packet. <n> size of the packet, <n1> number of bytes parsed in the packet. (with a compression pointer to pointer loop we parse the same bytes repeatedly) Messages to This section contains messages from to to up %PIX :Line protocol on interface interface_name changed state The status of the line protocol has changed from down to up. 2-69

110 Messages to Chapter to down %PIX :Line protocol on interface interface_name changed state The status of the line protocol has changed from up to down. If this is an unexpected event, check the physical line. Messages to This section contains messages from to %PIX : ActiveX content modified src IP_address dest IP_address on interface interface_name. This message is logged after you turn on the activex option using the filter command, and the firewall detects an ActiveX object. The activex option allows the firewall to filter out ActiveX contents by modifying it so that it no longer is tagged as an HTML object %PIX : Java content modified src IP_address dest IP_address on interface interface_name. This message is logged after you turn on the java option using the filter command, and the firewall detects an Java applet. The java option allows the firewall to filter out Java contents by modifying it so that it no longer is tagged as an HTML object. 2-70

111 Chapter 2 Messages to %PIX : Bad TCP hdr length (hdrlen=bytes, pktlen=bytes) from source_address/source_port to dest_address/dest_port, flags: tcp_flags, on interface interface_name This message indicates that a header length in TCP is incorrect. Some operating systems do not handle TCP RSTs (resets) correctly when responding to a connection request to a disabled socket. If a client tries to connect to an FTP server outside the firewall and FTP is not listening, then the server sends an RST. Some operating systems send incorrect TCP header lengths, which causes this problem. UDP uses ICMP port unreachable messages. The TCP header length may indicate that it is larger than the packet length resulting in a negative number of bytes being transferred. A negative number is displayed by syslog as an unsigned number making it appear far larger than would be normal; for example, showing 4 GB transferred in 1 second. This message should occur infrequently %PIX : Invalid transport field for protocol=protocol, from source_address/source_port to dest_address/dest_port This message appears when there is an invalid transport number, in which the source or destination port number for a protocol is zero. The protocol field is 6 for TCP and 17 for UDP. If these messages persist, contact the peer's administrator %PIX : User transitioning priv level The privilege level of a command was changed %PIX : New user added to local dbase: Uname: user Priv: privilege_level Encpass: string A new username record was created. The message lists the username, privilege level, and encrypted password. 2-71

112 Messages to Chapter %PIX : User deleted from local dbase: Uname: user Priv: privilege_level Encpass: string A username record was deleted. The message lists the username, privilege level, and encrypted password %PIX : User priv level changed: Uname: user From: privilege_level To: privilege_level The privilege level of a user changed %PIX : Process number, Nbr IP_address on interface_name from string to string, reason An OSPF neighbor has changed its state. The message describes the change and the reason for it. This message appears only if the log-adjacency-changes command is configured for the OSPF process. To determine what is causing this problem, contact Cisco TAC for assistance. Messages to This section contains messages from to %PIX : PMTU-D packet number bytes greater than effective mtu number dest_addr=dest_address, src_addr=source_address, prot=protocol This message occurs when the firewall sends an ICMP destination unreachable message and when fragmentation is needed, but the don t-fragment bit is set. Ensure that the data is sent correctly. 2-72

113 Chapter 2 Messages to %PIX : Adjusting IPSec tunnel mtu The MTU for an IPSec tunnel is adjusted from Path MTU Discovery. Check MTU of the IPSec tunnels. If effective MTU is smaller than normal, check intermediate links %PIX : sa created A new security association (SA) was created. Informational message %PIX : deleting sa An SA was deleted. Informational message %PIX : PPTP received out of seq or duplicate pkt, tnl_id=number, sess_id=number, seq=number. The firewall received a PPTP packet that was out of sequence or duplicated. configuration. If the packet count is high, contact the peer administrator to check client PPTP %PIX : PPP virtual interface interface_name - user: user aaa authentication started. The firewall sent an authentication request to the AAA server. 2-73

114 Messages to Chapter %PIX : PPP virtual interface interface_name - user: user aaa authentication status The firewall received an authentication response from the AAA server %PIX : PPTP Tunnel created, tunnel_id is number, remote_peer_ip is remote_address, ppp_virtual_interface_id is number, client_dynamic_ip is IP_address, username is user, MPPE_key_strength is string A PPTP tunnel was created %PIX : PPTP Tunnel deleted, tunnel_id = number, remote_peer_ip= remote_address A PPTP tunnel was deleted %PIX : L2TP Tunnel created, tunnel_id is number, remote_peer_ip is remote_address, ppp_virtual_interface_id is number, client_dynamic_ip is IP_address, username is user An L2TP tunnel was created. 2-74

115 Chapter 2 Messages to %PIX : L2TP Tunnel deleted, tunnel_id = number, remote_peer_ip = remote_address An L2TP tunnel was deleted %PIX : Built PPTP Tunnel at interface_name, tunnel-id = number, remote-peer = IP_address, virtual-interface = number, client-dynamic-ip = IP_address, username = user, MPPE-key-strength = number This message is displayed each time a new PPPoE tunnel is created %PIX : Teardown PPPOE Tunnel at interface_name, tunnel-id = number, remote-peer = IP_address This message is displayed each time a new PPPoE tunnel is deleted %PIX : DHCP client interface interface_name: Allocated ip = IP_address, mask = netmask, gw = gateway_address The firewall DHCP client successfully obtained an IP address from a DHCP server. The dhcpc command statement lets the firewall obtain an IP_address and network mask for a network interface from a DHCP server as well as a default route. The default route statement uses the gateway_address as the address of the default router. 2-75

116 Messages to Chapter %PIX : DHCP client interface interface_name: address released The firewall DHCP client released an allocated IP address back to the DHCP server %PIX : DHCP daemon interface interface_name: address granted MAC_address (IP_address) The firewall DHCP server granted an IP address to an external client %PIX : DHCP daemon interface interface_name: address released An external client released an IP address back to the firewall DHCP server %PIX : Login denied from {source_address/source_port serial} to {interface_name:dest_address/service console} for user "user" This message appears after an incorrect login attempt. The firewall allows 3 login attempts per session. After the third attempt, the firewall terminates the session. For SSH and Telnet logins, the firewall generates a message either after the third failure or if at least one failed attempt has been tried, and the TCP session is terminated before the third attempt. For all other management logins, each failed attempt generates a message. If this message appears infrequently, no action is required. If this message appears frequently, it can indicate an attack. Inform the user to verify their username and password. 2-76

117 Chapter 2 Messages to %PIX : Login permitted from {source_address/source_port serial} to {interface_name:dest_address/service console} for user "user" This message appears when a user is authenticated successfully and a management session starts %PIX : PDM session number number from IP_address started This message indicates that an administrator has been authenticated successfully and a PDM session was started %PIX : PDM session number number from IP_address ended This message indicates that a PDM session ended %PIX : Pre-allocate SIP connection_type secondary channel for interface_name:ip_address/port to interface_name:ip_address from string message This message indicates that the fixup sip command pre-allocated a SIP connection after inspecting a SIP message. The connection_type is one of the following strings: SIGNALLING UDP SIGNALLING TCP SUBSCRIBE UDP SUBSCRIBE TCP Via UDP Route 2-77

118 Messages to Chapter 2 RTP RTCP %PIX : Pre-allocate Skinny connection_type secondary channel for interface_name:ip_address to interface_name:ip_address/port from string message This message indicates that the fixup skinny command pre-allocated a Skinny connection after inspecting a Skinny message. The connection_type is one of the following strings: SIGNALLING UDP SIGNALLING TCP SUBSCRIBE UDP SUBSCRIBE TCP Via UDP Route RTP RTCP %PIX : Built local-host interface_name:ip_address A network state container is reserved for host IP_address connected to interface interface_name. This is an informational message time %PIX : Teardown local-host interface_name:ip_address duration A network state container for host IP_address connected to interface interface_name is removed. This is an informational message. 2-78

119 Chapter 2 Messages to IP_address %PIX : NTP daemon interface interface_name: Packet denied from An NTP packet was received from a host that does not match one of the configured NTP servers. The firewall is only an NTP client; it is not a time server and does not respond to NTP requests %PIX : NTP daemon interface interface_name: Authentication failed for packet from IP_address The received NTP packet failed the authentication check. Ensure that both the firewall and the NTP server are set to use authentication, and the same key number and value %PIX : Authorization failed: Cmd: command Cmdtype: command_modifier Command authorization failed for the specified command. The command_modifier is one of the following strings: cmd (this string means the command has no modifier) clear no show If the firewall encounters any other value other than the four command types listed, the following message displays: unknown command type. 2-79

120 Messages to Chapter %PIX : User authentication succeeded: Uname: user User authentication when accessing the firewall succeeded %PIX : User authentication failed: Uname: user User authentication failed when attempting to access the firewall %PIX : User logged out: Uname: user The specified user logged out %PIX : Serial console idle timeout exceeded The configured idle timeout for the firewall serial console was exceeded because of no user activity %PIX : VPNClient: NAT configured for Client Mode with no split tunneling: NAT addr: mapped_address The VPN client policy for client mode with no split tunneling was installed. 2-80

121 Chapter 2 Messages to %PIX : VPNClient: NAT exemption configured for Network Extension Mode with no split tunneling VPN client policy for network extension mode with no split tunneling was installed %PIX : VPNClient: NAT configured for Client Mode with split tunneling: NAT addr: mapped_address Split Tunnel Networks: IP_address/netmask IP_address/netmask... VPN client policy for client mode with split tunneling was installed %PIX : VPNClient: NAT exemption configured for Network Extension Mode with split tunneling: Split Tunnel Networks: IP_address/netmask IP_address/netmask... VPN client policy for network extension mode with split tunneling was installed %PIX : VPNClient: DHCP Policy installed: Primary DNS: IP_address Secondary DNS: IP_address Primary WINS: IP_address Secondary WINS: IP_address VPN client policy for DHCP was installed. 2-81

122 Messages to Chapter %PIX : VPNClient: Perfect Forward Secrecy Policy installed Perfect forward secrecy was configured as part of the VPN client download policy %PIX : VPNClient: Head end : IP_address The VPN client is connected to the specified headend %PIX : VPNClient: Split DNS Policy installed: List of domains: string string... A split DNS policy was installed as part of the VPN client downloaded policy %PIX : VPNClient: Disconnecting from head end and uninstalling previously downloaded policy: Head End : IP_address A VPN client is disconnecting and uninstalling a previously installed policy %PIX : VNPClient: XAUTH Succeeded: Peer: IP_address The VPN client Xauth succeeded with the specified headend. 2-82

123 Chapter 2 Messages to %PIX : VNPClient: XAUTH Failed: Peer: IP_address The VPN client Xauth failed with the specified headend %PIX : VPNClient: Backup Server List: reason When the firewall is an Easy VPN Remote device, this message indicates that the Easy VPN Server downloaded a list of backup servers to the firewall. This list overrides any backup servers you configured locally. If the downloaded list is empty, then the firewall uses no backup servers. The reason is one of the following messages: A list of backup server IP addresses Received NULL list. Deleting current backup servers %PIX : VPNClient: Backup Server List Error: reason When the firewall is an Easy VPN Remote device, and the Easy VPN Server downloads a backup server list to the firewall, this message indicates that the list contains an invalid IP address or a host name. The firewall does not support DNS, and therefore does not support host names for servers unless you manually map a name to an IP address using the name command. On the Easy VPN Server, make sure the server IP addresses are correct, and configure the servers as IP addresses instead of host names. If you must use host names on the server, use the name command on the Easy VPN Remote device to map the IP addresses to names %PIX : VPNClient: Load Balancing Cluster with Virtual IP: IP_address has redirected the PIX to server IP_address When the firewall is an Easy VPN Remote device, the master server of the load balancing cluster redirected the firewall to connect to a particular server. 2-83

124 Messages to Chapter %PIX : VPNClient: Disconnecting from Load Balancing Cluster member IP_address When the firewall is an Easy VPN Remote device, this message indicates that it disconnected from a load balancing cluster server %PIX : VPNClient: Secure Unit Authentication Enabled When the firewall is an Easy VPN Remote device, the downloaded VPN policy enabled secure unit authentication (SUA) %PIX : VPNClient: Secure Unit Authentication Disabled When the firewall is an Easy VPN Remote device, the downloaded VPN policy disabled secure unit authentication (SUA) %PIX : VPNClient: User Authentication Enabled: Auth Server IP: IP_address Auth Server Port: port Idle Timeout: time When the firewall is an Easy VPN Remote device, the downloaded VPN policy enabled individual user authentication (IUA) for users on the firewall s inside network. IP_address The server IP address to which the firewall sends authentication requests. port The server port to which the firewall sends authentication requests. time The idle timeout value for authentication credentials. 2-84

125 Chapter 2 Messages to %PIX : VPNClient: User Authentication Disabled When the firewall is an Easy VPN Remote device, the downloaded VPN policy disabled individual user authentication (IUA) for users on the firewall s inside network %PIX : VPNClient: Device Pass Thru Enabled When the firewall is an Easy VPN Remote device, the downloaded VPN policy enabled device pass through. The device pass through feature allows devices that cannot perform authentication (such as an IP phone) to be exempt from authentication when Individual User Authentication (IUA) is enabled. If the Easy VPN Server enables this feature, you can specify the devices that should be exempt from authentication (IUA) using the vpnclient mac-exempt command on the firewall %PIX : VPNClient: Device Pass Thru Disabled When the firewall is an Easy VPN Remote device, the downloaded VPN policy disabled device pass through %PIX : VPNClient: Extended XAUTH conversation initiated when SUA disabled When the firewall is an Easy VPN Remote device and the downloaded VPN policy disabled secure unit authentication (SUA), the Easy VPN Server uses two-factor/securid/cryptocard-based authentication mechansims to authenticate the firewall using XAUTH. If you want the Easy VPN Remote device to be authenticated using two-factor/secureid/cryptocard-based authentication mechanisms, enable SUA on the server. 2-85

126 Messages to Chapter %PIX : VPNClient: Duplicate split nw entry When the firewall is an Easy VPN Remote device, this message indicates that the downloaded VPN policy contains duplicate split network entries. An entry is considered a duplicate if it matches both the network address and the network mask. Server. Remove duplicate split network entries from the VPN policy on the Easy VPN %PIX : Auto Update succeeded:filename, version:number An update from an Auto Update Server was successful. The filename variable is PIX image, PDM file, or configuration. The version number variable is the version number of the update %PIX : Auto Update failed:filename, version:number, reason:reason This message indicates that an update from an Auto Update Server failed. The filename variable is PIX image, PDM file, or configuration. The version number variable is the version number of the update. The reason variable describes why the update failed. Possible reasons for the failure include invalid image file, connection lost to server, configuration errors, etc. Check the configuration of the Auto Update Server %PIX :Auto Update failed to contact:url, reason:reason This indicates that the Auto Update daemon was unable to contact the specified URL url. This could be the URL of the Auto Update Server or one of the file server URLs returned by the Auto Update Server. The reason field describes why the contact failed. Possible reasons for the failure include no response from server, authentication failed, file not found, etc. Check the configuration of the Auto Update Server. 2-86

127 Chapter 2 Messages to %PIX : Checksum Failure in database in area string Link State Id IP_address Old Checksum number New Checksum number OSPF has detected a checksum error in the database due to memory corruption. Restart the OSPF process %PIX : interface interface_name has zero bandwidth The interface reports its bandwidth as zero. To determine what is causing this problem, contact Cisco TAC for assistance string %PIX : IP_address netmask changed from area string to area An OSPF configuration change has caused a network range to change areas. Reconfigure OSPF with the correct network range %PIX : Split DNS: request patched from server: IP_address to server: IP_address Split DNS is redirecting DNS queries from the original destination server to the primary enterprise DNS server. 2-87

128 Messages to Chapter %PIX : Split DNS: reply from server:ip_address reverse patched back to original server:ip_address Split DNS is redirecting DNS queries from the enterprise DNS server to the original destination server %PIX : Pre-allocate CTIQBE {RTP RTCP} secondary channel for interface_name:outside_address[/outside_port] to interface_name:inside_address[/inside_port] from CTIQBE_message_name message The firewall pre-allocates a connection object for the specified CTIQBE media traffic %PIX : Unsupported CTIQBE version: hex: from interface_name:ip_address/port to interface_name:ip_address/port The firewall received a CTIQBE message with an unsupported version number. The firewall drops the packet. If the version number captured in the log message is unreasonably large (greater than 10), the packet could be malformed, a non-ctiqbe packet, or corrupted before it arrives at the firewall. We recommend that you determine the source of the packets. If the version number is reasonably small (less than or equal to 10), then contact Cisco TAC to see if a new firewall image that supports this CTIQBE version is available. 2-88

129 Chapter 2 Messages to Messages to This section contains messages from to %PIX : alloc_user() out of Tcp_user objects This is a AAA message. This message is logged if the user authentication rate is too high for the firewall to handle new AAA requests. Enable Flood Defender with the floodguard enable command %PIX : lifetime expiring An SA lifetime has expired. Debugging message %PIX : replay rollover detected More than 4 billion packets have been received in the IPSec tunnel and a new tunnel is being negotiated. Contact the peer's administrator to compare the SA lifetime setting %PIX : sa_request IPSec has requested IKE for new SAs. Debugging message. 2-89

130 Messages to Chapter %PIX : H.225 message received from interface_name:ip_address/port to interface_name:ip_address/port is using an unsupported version number The firewall received an H.323 packet with an unsupported version number. The firewall might re-encode the protocol version field of the packet to the highest supported version. Use the version of H.323 that the firewall supports in the VoIP network %PIX : Received H.225 Release Complete with newconnectionneeded for interface_name:ip_address to interface_name:ip_address/port This is debugging message indicates that the firewall received the specified H.225 message, and that the firewall opened a new signalling connection object for the two specified H.323 endpoints , %PIX : FO replication failed: cmd=command returned=code %PIX : FO unreplicable: cmd=command These failover messages only appear during the development debug testing phase %PIX : (Primary) Beginning configuration replication: Receiving from mate. This is a failover message. This message is logged when the active unit starts replicating its configuration to the standby unit. (Primary) can also be listed as (Secondary) for the secondary unit. 2-90

131 Chapter 2 Messages to %PIX : (Primary) End Configuration Replication (ACT) This is a failover message. This message is logged when the active unit completes replicating its configuration on the standby unit. (Primary) can also be listed as (Secondary) for the secondary unit %PIX : (Primary) Beginning configuration replication: Receiving from mate. This message indicates that the standby the firewall received the first part of the configuration replication from the active the firewall. (Primary) can also be listed as (Secondary) for the secondary unit %PIX : (Primary) End Configuration Replication (STB) This is a failover message. This message is logged when the standby unit completes replicating a configuration sent by the active unit. (Primary) can also be listed as (Secondary) for the secondary unit %PIX : Configuration replication failed for command command This is a failover message. This message is logged when the standby unit is unable to complete replicating a configuration sent by the active unit. The command at which the failure occurs displays at the end of the message. Write down the command name and inform Cisco TAC. 2-91

132 Messages to Chapter %PIX : TCP access requested from source_address/source_port to interface_name:dest_address/service This message appears when the first TCP packet destined to the firewall requests to establish a TCP session. This packet is the first SYN packet of the three-way handshake. This message appears when the respective access control list (telnet, http or ssh) has permitted the packet. However, the SYN cookie verification is not yet completed and no state is reserved %PIX : {TCP UDP} access permitted from source_address/source_port to interface_name:dest_address/service For a TCP connection, this message appears when the second TCP packet destined to the firewall requests to establish a TCP session. This packet is the final ACK of the three-way handshake. This message appears when the respective access control list (Telnet, HTTP, or SSH) has permitted the packet. Also, the SYN cookie verification is successful and the state is reserved for the TCP session. For a UDP connection, the connection was permitted. For example, this message appears (with the service snmp) when the firewall receives an SNMP request from an authorized SNMP management station, and the request has been processed. When the service is snmp, this message occurs a maximum of 1 time every 10 seconds so that the log receiver is not overwhelmed %PIX : {TCP UDP} access denied by ACL from source_address/source_port to interface_name:dest_address/service This message appears when the firewall denies an attempt to connect to the interface service. For example, this message appears (with the service snmp) when the firewall receives an SNMP request from an unauthorized SNMP management station. Use the show http, show ssh, or show telnet command to verify that the firewall is configured to permit the service access from the host or network. If this message appears frequently, it can indicate an attack. 2-92

133 Chapter 2 Messages to %PIX : TCP connection limit exceeded from source_address/source_port to interface_name:dest_address/service The maximum number of firewall management connections for the service was exceeded. The firewall permits at most five concurrent management connections per management service. From the console, use the kill command to release the unwanted session %PIX : {TCP UDP} request discarded from source_address/source_port to interface_name:dest_address/service This message appears when the firewall does not have a UDP server that services the UDP request. The message can also indicate a TCP packet that does not belong to any session on the firewall. In addition, this message appears (with the service snmp) when the firewall receives an SNMP request with an empty payload, even if it is from an authorized host. When the service is snmp, this message occurs a maximum of 1 time every 10 seconds so that the log receiver is not overwhelmed. In networks that heavily utilize broadcasting services such as DHCP, RIP or NetBios, the frequency of this message can be high. If this message appears in excessive number, it may indicate an attack %PIX : protocol request discarded from source_address to interface_name:dest_address This message appears when the firewall does not have an IP server that services the IP protocol request; for example, the firewall receives IP packets that are not TCP or UDP, and the firewall cannot service the request. In networks that heavily utilize multicasting, the frequency of this message can be high. If this message appears in excessive number, it may indicate an attack. 2-93

134 Messages to Chapter

135 APPENDIX A Messages Listed by Severity Level This appendix contains the following sections: Alert Messages, User-Defined Severity, page A-1 Alert Messages, Severity 1, page A-1 Critical Messages, Severity 2, page A-3 s, Severity 3, page A-4 Warning Messages, Severity 4, page A-6 Notification Messages, Severity 5, page A-8 Informational Messages, Severity 6, page A-9 Debugging Messages, Severity 7, page A-13 Note The PIX Firewall does not send severity 0, emergency messages to syslog. These are analogous to a UNIX panic message, and denote an unstable system. Alert Messages, User-Defined Severity The following messages appear at a user-defined severity level: %PIX-n : access-list acl_id {permitted denied est-allowed} protocol interface_name/source_address(source_port) -> interface_name/dest_address(dest_port) hit-cnt number ({first hit number-second interval}) By default, this message appears at severity level 6. Alert Messages, Severity 1 The following messages appear at severity 1, alerts: %PIX : (Primary) Failover cable OK. %PIX : (Primary) Bad failover cable. %PIX : (Primary) Failover cable not connected (this unit). %PIX : (Primary) Failover cable not connected (other unit). %PIX : (Primary) Error reading failover cable status. A-1

136 Alert Messages, Severity 1 Appendix A Messages Listed by Severity Level %PIX : (Primary) Power failure/system reload other side. %PIX : (Primary) No response from other firewall (reason code = code). %PIX : (Primary) Other firewall network interface interface_number OK. %PIX : (Primary) Other firewall network interface interface_number failed. %PIX : (Primary) Other firewall reports this firewall failed. %PIX : (Primary) Other firewall reporting failure. %PIX : (Primary) Switching to ACTIVE (cause: string). %PIX : (Primary) Switching to STNDBY (cause: string). %PIX : (Primary) Switching to FAILED. %PIX : (Primary) Switching to OK. %PIX : (Primary) Disabling failover. %PIX : (Primary) Enabling failover. %PIX : (Primary) Monitoring on interface interface_name waiting %PIX : (Primary) Monitoring on interface interface_name normal %PIX : (Primary) Lost Failover communications with mate on interface interface_name. %PIX : (Primary) Link status Up on interface interface_name. %PIX : (Primary) Link status Down on interface interface_name. %PIX : (Primary) Testing interface interface_name. %PIX : (Primary) Testing on interface interface_name {Passed Failed}. %PIX : (Primary) Failover cable communication failure %PIX : (Primary) Incomplete/slow config replication %PIX : Failover LAN interface is up %PIX : LAN Failover interface is down %PIX : Receive a LAN_FAILOVER_UP message from peer. %PIX : Receive a LAN failover interface down msg from peer. %PIX : PIX dropped a LAN Failover command message. %PIX : The primary and standby units are switching back and forth as the active unit. %PIX : Deny protocol reverse path check from source_address to dest_address on interface interface_name %PIX : Deny protocol connection spoof from source_address to dest_address on interface interface_name %PIX The number of ACL log deny-flows has reached limit (number). %PIX : RIP auth failed from IP_address: version=number, type=string, mode=string, sequence=number on interface interface_name %PIX : RIP pkt failed from IP_address: version=number on interface interface_name %PIX : (Primary) Beginning configuration replication: Receiving from mate. %PIX : (Primary) End Configuration Replication (ACT) %PIX : (Primary) Beginning configuration replication: Receiving from mate. %PIX : (Primary) End Configuration Replication (STB) A-2

137 Appendix A Messages Listed by Severity Level Critical Messages, Severity 2 Critical Messages, Severity 2 The following messages appear at severity 2, critical: %PIX : Inbound TCP connection denied from IP_address/port to IP_address/port flags tcp_flags on interface interface_name %PIX : protocol Connection denied by outbound list acl_id src inside_address dest outside_address %PIX : Deny inbound UDP from outside_address/outside_port to inside_address/inside_port on interface interface_name. %PIX : Deny inbound UDP from outside_address/outside_port to inside_address/inside_port due to DNS {Response Query}. %PIX : Deny IP from IP_address to IP_address, IP options hex. %PIX : Dropping echo request from IP_address to PAT address IP_address %PIX : Deny IP spoof from (IP_address) to IP_address on interface interface_name. %PIX : Deny IP due to Land Attack from IP_address to IP_address %PIX : ICMP packet type ICMP_type denied by outbound list acl_id src inside_address dest outside_address %PIX : Deny IP teardrop fragment (size = number, offset = number) from IP_address to IP_address %PIX : SMTP replaced string: out source_address in inside_address data: string %PIX : Authen Session Start: user 'user', sid number %PIX : (string:dec) PIX Clear complete. %PIX : Embryonic limit exceeded nconns/elimit for outside_address/outside_port (global_address) inside_address/inside_port on interface interface_name %PIX : Terminating manager session from IP_address on interface interface_name. Reason: incoming encrypted data (number bytes) longer than number bytes %PIX :Bad route_compress() call, sdb= number %PIX : URL Server IP_address not responding, ENTERING ALLOW mode. %PIX : LEAVING ALLOW mode, URL Server is up. %PIX : Ran out of buffer blocks specified by url-block command %PIX : Denied new tunnel to IP_address. VPN peer limit (platform_vpn_peer_limit) exceeded %PIX : Configuration replication failed for command command A-3

138 s, Severity 3 Appendix A Messages Listed by Severity Level s, Severity 3 The following messages appear at severity 3, errors: %PIX : (Primary) Failover message block alloc failed %PIX : Deny inbound protocol src interface_name:dest_address/dest_port dst interface_name:source_address/source_port %PIX : Deny inbound (No xlate) string %PIX : Deny inbound icmp src interface_name: IP_address dst interface_name: IP_address (type dec, code dec) %PIX : Auth from inside_address/inside_port to outside_address/outside_port failed (too many pending auths) on interface interface_name. %PIX : User must authenticate before using this service %PIX : Can't find authorization ACL acl_id on 'PIX' for user 'user' %PIX : Downloaded ACL acl_id is empty %PIX : Downloaded ACL acl_id has parsing error; ACE string %PIX : Downloaded ACL has config error; ACE %PIX : Too many connections on {static xlate} global_address! econns nconns %PIX : FTP data connection failed for IP_address %PIX : RCMD backconnection failed for IP_address/port %PIX : The PIX is disallowing new connections. %PIX : TCP connection limit of number for host IP_address on interface_name exceeded %PIX : Out of address translation slots! %PIX : Non-embryonic in embryonic list outside_address/outside_port inside_address/inside_port %PIX : (function:line_num) pix clear command return code %PIX : LU SW_Module_Name error = number %PIX : LU allocate block (bytes) failed. %PIX : Unknown LU Object number %PIX : LU allocate connection failed %PIX : LU look NAT for IP_address failed %PIX : LU allocate xlate failed %PIX : LU no xlate for inside_address/inside_port outside_address/outside_port %PIX : LU make UDP connection for outside_address:outside_port inside_address:inside_port failed %PIX : LU PAT port port reserve failed %PIX : LU create static xlate global_address ifc interface_name failed %PIX : Memory allocation Error %PIX : CPU utilization for number seconds = percent A-4

139 Appendix A Messages Listed by Severity Level s, Severity 3 %PIX : Unable to open SNMP channel (UDP port port) on interface interface_number, error code = code %PIX : Unable to open SNMP trap channel (UDP port port) on interface interface_number, error code = code %PIX : Unable to receive an SNMP request on interface interface_number, error code = code, will try again. %PIX : Unable to send an SNMP response to IP Address IP_address Port port interface interface_number, error code = code %PIX : incoming SNMP request (number bytes) on interface interface_name exceeds data buffer size, discarding this SNMP request. %PIX : PPTP control daemon socket io string, errno = number. %PIX : PPTP tunnel hashtable insert failed, peer = IP_address. %PIX : PPP virtual interface interface_number isn't opened. %PIX : PPP virtual interface interface_number client ip allocation failed. %PIX : H.323 library_name ASN Library failed to initialize, error code number %PIX : ACL = deny; no sa created %PIX : URL Server IP_address timed out URL url %PIX : URL Server IP_address not responding %PIX : No translation group found for protocol src interface_name:dest_address/dest_port dst interface_name:source_address/source_port %PIX : Regular translation creation failed for protocol src interface_name:source_address/source_port dst interface_name:dest_address/dest_port %PIX : Free unallocated global IP address. %PIX : Denied ICMP type=number, code=code from IP_address on interface interface_name %PIX : Fail to establish SSH session because PIX RSA host key retrieval failed. %PIX : No memory available for limit_slow %PIX : Bad path index of number for IP_address, number max %PIX : IP routing table creation failure - reason %PIX : IP routing table limit warning %PIX : IP routing table limit exceeded - reason, IP_address netmask %PIX : Internal error: reason %PIX : Flagged as being an ABR without a backbone area %PIX : Reached unknown state in neighbor state machine %PIX : area string lsid IP_address mask netmask adv IP_address type number %PIX : lsid IP_address adv IP_address type number gateway gateway_address metric number network IP_address mask netmask protocol hex attr hex net-metric number %PIX : if interface_name if_state number %PIX : OSPF is enabled on interface_name during idb initialization A-5

140 Warning Messages, Severity 4 Appendix A Messages Listed by Severity Level %PIX : OSPF process number is changing router-id. Reconfigure virtual link neighbors with our new router-id %PIX : The subject name of the peer cert is not allowed for connection %PIX : PPPoE - Bad host-unique in PADO - packet dropped. Intf:interface_name AC:ac_name %PIX : PPPoE - Bad host-unique in PADS - dropping packet. Intf:interface_name AC:ac_name %PIX : PPPoE:PPP link down:reason %PIX : PPPoE:No 'vpdn group' for PPPoE is created %PIX d: PPPoE:PPP - Unable to set default route to IP_address at interface_name %PIX : PPPoE:failed to assign PPP IP_address netmask netmask at interface_name %PIX : Embryonic limit neconns/elimit for through connections exceeded.outside_address/outside_port to global_address (inside_address)/inside_port on interface interface_name %PIX : NTP daemon interface interface_name: Packet denied from IP_address %PIX : NTP daemon interface interface_name: Authentication failed for packet from IP_address %PIX : VPNClient: Backup Server List Error: reason %PIX : replay rollover detected %PIX : {TCP UDP} access denied by ACL from source_address/source_port to interface_name:dest_address/service Warning Messages, Severity 4 The following messages appear at severity 4, warning: %PIX : Deny protocol src [interface_name:source_address/source_port] dst interface_name:dest_address/dest_port [type {string}, code {code}] by access_group acl_id %PIX : User at IP_address exceeded auth proxy connection limit (max) %PIX : exceeded HTTPS proxy process limit %PIX : Fragment database limit of number exceeded: src = IP_address,dest = IP_address, proto = protocol, id = number %PIX : Invalid IP fragment, size = bytes exceeds maximum size = bytes: src = IP_address, dest = IP_address, proto = protocol, id = number %PIX : Discard IP fragment set with more than number elements: src = IP_address, dest = IP_address, proto = protocol, id = number %PIX : static global_address inside_address netmask netmask overlapped with global_address inside_address %PIX : Invalid destination for ICMP error %PIX nn: IDS:number string from IP_address to IP_address on interface interface_name %PIX : Shuns cleared %PIX : Shun added: IP_address IP_address port port A-6

141 Appendix A Messages Listed by Severity Level Warning Messages, Severity 4 %PIX : Shun deleted: IP_address %PIX : Shunned packet: IP_address ==> IP_address on interface interface_name %PIX : Shun add failed: unable to allocate resources for IP_address IP_address port port %PIX : decaps: rec'd IPSEC packet has invalid spi for destaddr=dest_address, prot=protocol, spi=number %PIX : decapsulate: packet missing {AH ESP}, destadr=dest_address, actual prot=protocol %PIX : identity doesn't match negotiated identity (ip) dest_address= dest_address, src_addr= source_address, prot= protocol, (ident) local=inside_address, remote=remote_address, local_proxy=ip_address/ip_address/port/port, remote_proxy=ip_address/ip_address/port/port %PIX : Rec'd packet not an IPSEC packet (ip) dest_address= dest_address, src_addr= source_address, prot= protocol %PIX : PPTP session state not established, but received an XGRE packet, tunnel_id=number, session_id=number %PIX : PPP virtual interface interface_name rcvd pkt with invalid protocol: protocol, reason: reason. %PIX : PPP virtual interface max connections reached. %PIX : PPP virtual interface interface_name requires mschap for MPPE. %PIX : PPP virtual interface interface_name requires RADIUS for MPPE. %PIX : PPP virtual interface interface_name missing aaa server group info %PIX : PPP virtual interface interface_name missing client ip address option %PIX : Rec'd packet not an PPTP packet. (ip) dest_address= dest_address, src_addr= source_address, data: string. %PIX : PPP virtual interface interface_name, user: user missing MPPE key from aaa server. %PIX : ISAKMP: Failed to allocate address for client from pool string %PIX : Received ARP {request response} collision from IP_address/mac_address on interface interface_name, page 2-61 %PIX : Received mac mismatch collision from IP_address/mac_address for authenticated host, page 2-62 %PIX : Unable to Pre-allocate H225 Call Signalling Connection for foreign_address outside_address[/outside_port] to local_address inside_address[/inside_port] %PIX : Unable to Pre-allocate H245 Connection for foreign_address outside_address[/outside_port] to local_address inside_address[/inside_port] %PIX : H225 message received from outside_address/outside_port to inside_address/inside_port before SETUP %PIX : FTP port command low port: IP_address/port to IP_address on interface interface_name %PIX : FTP port command different address: IP_address(IP_address) to IP_address on interface interface_name %PIX : Deny traffic for local-host interface_name:inside_address, license limit of number exceeded %PIX : IP route counter negative - reason, IP_address Attempt: number A-7

142 Notification Messages, Severity 5 Appendix A Messages Listed by Severity Level %PIX : Database scanner: external LSA IP_address netmask is lost, reinstalls %PIX : db_free: external LSA IP_address netmask %PIX : Received invalid packet: reason from IP_address, interface_name %PIX : Received reason from unknown neighbor IP_address %PIX : Invalid length number in OSPF packet from IP_address (ID IP_address), interface_name %PIX : Invalid lsa: reason Type number, LSID IP_address from IP_address, IP_address, interface_name %PIX : Found LSA with the same host bit set but using different mask LSA ID IP_address netmask New: Destination IP_address netmask %PIX : Found generating default LSA with non-zero mask LSA type : number Mask : IP_address metric : number area : string %PIX : OSPF process number cannot start. There must be at least one up IP interface, for OSPF to use as router ID %PIX : Virtual link information found in non-backbone area: string %PIX : OSPF detected duplicate router-id IP_address from IP_address on interface interface_name %PIX : Detected router with duplicate router ID IP_address in area string %PIX : Detected router with duplicate router ID IP_address in Type-4 LSA advertised by IP_address %PIX : UDP DNS packet dropped due to domainname length check of 255 bytes: actual length:<n> bytes, page 2-68 %PIX : Invalid transport field for protocol=protocol, from source_address/source_port to dest_address/dest_port %PIX : Auto Update failed:filename, version:number, reason:reason %PIX :Auto Update failed to contact:url, reason:reason %PIX : Unsupported CTIQBE version: hex: from interface_name:ip_address/port to interface_name:ip_address/port %PIX : TCP connection limit exceeded from source_address/source_port to interface_name:dest_address/service Notification Messages, Severity 5 The following messages appear at severity 5, notifications: %PIX : Authen Session End: user 'user', sid number, elapsed number seconds %PIX : Begin configuration: IP_address writing to device %PIX : IP_address Erase configuration %PIX : IP_address end configuration: {FAILED OK} %PIX : IP_address end configuration: OK %PIX : Begin configuration: IP_address reading from device. %PIX : User user executed the command string A-8

143 Appendix A Messages Listed by Severity Level Informational Messages, Severity 6 %PIX : PIX reload command executed from telnet (remote IP_address). %PIX : user source_address Accessed {JAVA URL URL} dest_address: url. %PIX : Access denied URL url SRC IP_address DEST IP_address: url %PIX : ActiveX content modified src IP_address dest IP_address on interface interface_name. %PIX : Java content modified src IP_address dest IP_address on interface interface_name. %PIX : Bad TCP hdr length (hdrlen=bytes, pktlen=bytes) from source_address/source_port to dest_address/dest_port, flags: tcp_flags, on interface interface_name %PIX : User transitioning priv level %PIX : New user added to local dbase: Uname: user Priv: privilege_level Encpass: string %PIX : User deleted from local dbase: Uname: user Priv: privilege_level Encpass: string %PIX : User priv level changed: Uname: user From: privilege_level To: privilege_level %PIX : Process number, Nbr IP_address on interface_name from string to string, reason %PIX : User logged out: Uname: user %PIX : Serial console idle timeout exceeded %PIX : Auto Update succeeded:filename, version:number Informational Messages, Severity 6 The following messages appear at severity 6, informational: %PIX : Deny TCP (no connection) from IP_address/port to IP_address/port flags tcp_flags on interface interface_name. %PIX : Auth start for user user from inside_address/inside_port to outside_address/outside_port %PIX : Auth from inside_address/inside_port to outside_address/outside_port failed (server IP_address failed) on interface interface_name. %PIX : Auth from inside_address to outside_address/outside_port failed (all servers failed) on interface interface_name. %PIX : Authentication succeeded for user user from inside_address/inside_port to outside_address/outside_port on interface interface_name. %PIX : Authentication failed for user user from inside_address/inside_port to outside_address/outside_port on interface interface_name. %PIX : Authorization permitted for user user from inside_address/inside_port to outside_address/outside_port on interface interface_name. %PIX : Authorization denied for user user from source_address/source_port to destination_address/destination_port on interface interface_name. %PIX : Authorization denied from inside_address/inside_port to outside_address/outside_port (not authenticated) on interface interface_name. %PIX : Authorization denied (acl=acl_id) for user 'user' from source_address/source_port to dest_address/dest_port on interface interface_name %PIX : No route to dest_address from source_address A-9

144 Informational Messages, Severity 6 Appendix A Messages Listed by Severity Level %PIX : PIX startup completed. Beginning operation. %PIX : PIX Startup begin %PIX : PIX Startup begin %PIX : LU missed number updates %PIX : Built H245 connection for foreign_address outside_address/outside_port local_address inside_address/inside_port %PIX : Pre-allocate H323 UDP backconnection for foreign_address outside_address/outside_port to local_address inside_address/inside_port %PIX : Rebuilt TCP connection number for foreign_address outside_address/outside_port global_address global_address/global_port local_address inside_address/inside_port %PIX : connections in use, connections most used %PIX : Built {inbound outbound} TCP connection number for interface_name:real_address/real_port (mapped_address/mapped_port) to interface_name:real_address/real_port (mapped_address/mapped_port) [(user)] %PIX : Teardown TCP connection number for interface_name:real_address/real_port to interface_name:real_address/real_port duration time bytes number [reason] [(user)] %PIX : Built {inbound outbound} UDP connection number for interface_name:real_address/real_port (mapped_address/mapped_port) to interface_name:real_address/real_port (mapped_address/mapped_port) [(user)] %PIX : Teardown UDP connection number for interface_name:real_address/real_port to interface_name:real_address/real_port duration time bytes number [(user)] %PIX : source_address {Stored Retrieved} dest_address: mapped_address %PIX : URL Server IP_address request failed URL url %PIX : addrpool_free(): Orphan IP IP_address on interface interface_number %PIX : Built {dynamic static} translation from interface_name [(<acl-name>)]:real_address to interface_name:mapped_address %PIX : Teardown {dynamic static} translation from interface_name [(<acl-name>)]:real_address to interface_name:mapped_address duration time %PIX : Built {dynamic static} {TCP UDP ICMP} translation from interface_name [(<acl-name>)]:real_address/real_port to interface_name:mapped_address/mapped_port %PIX : PIX console enable password incorrect for number tries (from IP_address) %PIX : Permitted manager connection from IP_address. %PIX : LU loading standby start %PIX : LU loading standby end %PIX : LU recv thread up %PIX : LU xmit thread up %PIX : RIP hdr failed from IP_address: cmd=string, version=number domain=string on interface interface_name %PIX : Pre-allocate RTSP UDP backconnection for foreign_address outside_address/outside_port to local_address inside_address/inside_port A-10

145 Appendix A Messages Listed by Severity Level Informational Messages, Severity 6 %PIX : SSH session from IP_address on interface interface_name for user user disconnected by SSH server, reason: reason %PIX : PPPoE - Service name 'any' not received in PADO. Intf:interface_name AC:ac_name. %PIX : PMTU-D packet number bytes greater than effective mtu number dest_addr=dest_address, src_addr=source_address, prot=protocol %PIX : Adjusting IPSec tunnel mtu %PIX : sa created %PIX : deleting sa %PIX : PPTP received out of seq or duplicate pkt, tnl_id=number, sess_id=number, seq=number. %PIX : PPP virtual interface interface_name - user: user aaa authentication started. %PIX : PPP virtual interface interface_name - user: user aaa authentication status %PIX : PPTP Tunnel created, tunnel_id is number, remote_peer_ip is remote_address, ppp_virtual_interface_id is number, client_dynamic_ip is IP_address, username is user, MPPE_key_strength is string %PIX : PPTP Tunnel deleted, tunnel_id = number, remote_peer_ip= remote_address %PIX : L2TP Tunnel created, tunnel_id is number, remote_peer_ip is remote_address, ppp_virtual_interface_id is number, client_dynamic_ip is IP_address, username is user %PIX : L2TP Tunnel deleted, tunnel_id = number, remote_peer_ip = remote_address %PIX : Built PPTP Tunnel at interface_name, tunnel-id = number, remote-peer = IP_address, virtual-interface = number, client-dynamic-ip = IP_address, username = user, MPPE-key-strength = number %PIX : Teardown PPPOE Tunnel at interface_name, tunnel-id = number, remote-peer = IP_address %PIX : DHCP client interface interface_name: Allocated ip = IP_address, mask = netmask, gw = gateway_address %PIX : DHCP client interface interface_name: address released %PIX : DHCP daemon interface interface_name: address granted MAC_address (IP_address) %PIX : DHCP daemon interface interface_name: address released %PIX : Login denied from {source_address/source_port serial} to {interface_name:dest_address/service console} for user "user" %PIX : Login permitted from {source_address/source_port serial} to {interface_name:dest_address/service console} for user "user" %PIX : PDM session number number from IP_address started %PIX : PDM session number number from IP_address ended %PIX : Pre-allocate SIP connection_type secondary channel for interface_name:ip_address/port to interface_name:ip_address from string message %PIX : Pre-allocate Skinny connection_type secondary channel for interface_name:ip_address to interface_name:ip_address/port from string message %PIX : Built local-host interface_name:ip_address A-11

146 Informational Messages, Severity 6 Appendix A Messages Listed by Severity Level %PIX : Teardown local-host interface_name:ip_address duration time %PIX : Authorization failed: Cmd: command Cmdtype: command_modifier %PIX : User authentication succeeded: Uname: user %PIX : User authentication failed: Uname: user %PIX : VPNClient: NAT configured for Client Mode with no split tunneling: NAT addr: mapped_address %PIX : VPNClient: NAT exemption configured for Network Extension Mode with no split tunneling %PIX : VPNClient: NAT configured for Client Mode with split tunneling: NAT addr: mapped_address Split Tunnel Networks: IP_address/netmask IP_address/netmask... %PIX : VPNClient: NAT exemption configured for Network Extension Mode with split tunneling: Split Tunnel Networks: IP_address/netmask IP_address/netmask... %PIX : VPNClient: DHCP Policy installed: Primary DNS: IP_address Secondary DNS: IP_address Primary WINS: IP_address Secondary WINS: IP_address %PIX : VPNClient: Perfect Forward Secrecy Policy installed %PIX : VPNClient: Head end : IP_address %PIX : VPNClient: Split DNS Policy installed: List of domains: string string... %PIX : VPNClient: Disconnecting from head end and uninstalling previously downloaded policy: Head End : IP_address %PIX : VNPClient: XAUTH Succeeded: Peer: IP_address %PIX : VNPClient: XAUTH Failed: Peer: IP_address %PIX : VPNClient: Backup Server List: reason %PIX : VPNClient: Load Balancing Cluster with Virtual IP: IP_address has redirected the PIX to server IP_address %PIX : VPNClient: Disconnecting from Load Balancing Cluster member IP_address %PIX : VPNClient: Secure Unit Authentication Enabled %PIX : VPNClient: Secure Unit Authentication Disabled %PIX : VPNClient: User Authentication Enabled: Auth Server IP: IP_address Auth Server Port: port Idle Timeout: time %PIX : VPNClient: User Authentication Disabled %PIX : VPNClient: Device Pass Thru Enabled %PIX : VPNClient: Device Pass Thru Disabled %PIX : VPNClient: Extended XAUTH conversation initiated when SUA disabled %PIX : VPNClient: Duplicate split nw entry %PIX : Checksum Failure in database in area string Link State Id IP_address Old Checksum number New Checksum number %PIX : interface interface_name has zero bandwidth %PIX : IP_address netmask changed from area string to area string %PIX : Split DNS: request patched from server: IP_address to server: IP_address A-12

147 Appendix A Messages Listed by Severity Level Debugging Messages, Severity 7 %PIX : Split DNS: reply from server:ip_address reverse patched back to original server:ip_address %PIX : Pre-allocate CTIQBE {RTP RTCP} secondary channel for interface_name:outside_address[/outside_port] to interface_name:inside_address[/inside_port] from CTIQBE_message_name message Debugging Messages, Severity 7 The following messages appear at severity 7, debugging: %PIX : uauth_lookup_net fail for uauth_in() %PIX : Uauth null proxy error %PIX :User user executed cmd:string %PIX : URL Server IP_address request pending URL url %PIX : alloc_user() out of Tcp_user objects %PIX : lifetime expiring %PIX : sa_request %PIX : H.225 message received from interface_name:ip_address/port to interface_name:ip_address/port is using an unsupported version number %PIX : Received H.225 Release Complete with newconnectionneeded for interface_name:ip_address to interface_name:ip_address/port %PIX : FO replication failed: cmd=command returned=code %PIX : FO unreplicable: cmd=command %PIX : TCP access requested from source_address/source_port to interface_name:dest_address/service %PIX : {TCP UDP} access permitted from source_address/source_port to interface_name:dest_address/service %PIX : {TCP UDP} request discarded from source_address/source_port to interface_name:dest_address/service %PIX : protocol request discarded from source_address to interface_name:dest_address A-13

148 Debugging Messages, Severity 7 Appendix A Messages Listed by Severity Level A-14

149 INDEX A AAA message 2-16, 2-17 ABR without backbone area 2-50 access denied TCP/UDP 2-92 URL 2-39 access-list command 2-10 access permitted 2-92 access requested 2-92 ACLs deny-flows 2-15 logging matches 2-15 ActiveX object, filtering 2-70 added messages 1-1 address translation slots 2-27, 2-62 ARP packet mismatch 2-61 ARP poisoning attack 2-61 asymmetric routing 2-14 attacks ARP poisoning 2-61 DNS HINFO request 2-53 DNS request for all records 2-53 DNS zone transfer 2-53 DNS zone transfer from high port 2-53 DoS 2-15, 2-20, 2-27, 2-65 fragmented ICMP traffic 2-53 IP fragment 2-53 IP fragments overlap 2-53 IP impossible packet 2-53 IP routing table 2-16 land 2-13 large ICMP traffic 2-53 man in the middle 2-51 ping of death 2-53 proxied RPC request 2-54 spoofing 2-12, 2-13, 2-62 statd buffer overflow 2-54 SYN 2-25 TCP FIN only flags 2-53 TCP NULL flags 2-53 TCP SYN+FIN flags 2-53 UDP bomb 2-53 UDP chargen DoS 2-53 UDP snork 2-53 Authen Session End 2-19 authentication failed 2-17 request succeeds 2-17 Auth from IP address/port to IP address/port failed 2-17 authorization denied from address 2-18 Auth start for user 2-16 Auto Update URL unreachable 2-86 B backup server list downloaded 2-83 error 2-83 bandwidth is zero 2-87 beginning configuration replication 2-90 broadcast, invalid source address 2-12 buffer 1-10 built H245 connection 2-35 IN-1

150 Index C can not specify PAT host 2-11 Cisco PIX Device Manager (PDM) 1-19 Cisco Secure Policy Manager (Cisco Secure PM) 1-19 commands access-list 2-10 access-list deny-flow-max 2-15 clear local-host 2-64 conduit 2-12 conduit permit icmp 2-12 config 2-23 configure 2-23 failover 2-5 failover active 2-4 filter activex 2-70 filter allow 2-40, 2-41 fixup protocol smtp 2-16 floodguard 2-18 global 2-41 ip verify reverse-path 2-13 logging 1-6 nat 2-41 no failover 2-5 no failover active 2-4 outbound deny 2-10 reload 2-23, 2-24 rsh 2-26 show blocks 2-7 show local-host 2-64 show outbound 2-10 show static 2-25 show version 2-64 sysopt connection enforcesubnet 2-12 timeout uauth 2-19 write 2-23 write erase 2-22 conduit command 2-12 conduit permit icmp command 2-12 config command 2-23 configure command 2-23 connection limit exceeded 2-93 console output 1-9 CTIQBE connection object pre-allocation 2-88 unsupported version 2-88 D default severity level 1-6 deleted messages 1-1 denied manager connection 1-5 deny inbound from outside 2-11 inbound ICMP 2-12 inbound UDP 2-10 inbound UDP due to query/response 2-10 IP from address to address 2-11 IP spoof 2-12 self route 2-11 TCP (no connection) 2-12 detecting use of Internet phone 2-35 device pass through disabled 2-85 enabled 2-85 DHCP client and server 2-75 disabling messages 1-14 DNS HINFO request attack 2-53 DNS query or response is denied 2-10 DNS request for all records attack 2-53 DNS server too slow 2-10 DNS zone transfer attack 2-53 DNS zone transfer from high port attack 2-53 DoS attack 2-15, 2-20, 2-27, 2-65 dropping echo request 2-11 IN-2

151 Index E Easy VPN Remote backup server list downloaded 2-83 error 2-83 device pass through disabled 2-85 enabled 2-85 load balancing cluster disconnected 2-84 redirected 2-83 split network entry duplicate 2-86 SUA disabled 2-84 enabled 2-84 user authentication disabled 2-85 enabled 2-84 XAUTH enabled 2-85 embryonic limit exceeded 2-25 enabling logging 1-9 end configuration--failed 2-23 End Configuration Replication 2-91 erase configuration 2-22 F failover active command 2-4 failover command 2-5 failover messages 2-1, 2-3, 2-5, 2-7, 2-90, 2-91 filter activex command 2-70 filter allow command 2-40, 2-41 filtering ActiveX objects 2-70 fixup protocol smtp command 2-16 floodguard command 2-18 format of messages 1-15 fragmented ICMP traffic attack 2-53 FTP data connection failed 2-26 G global command 2-41 H H H H hello packet with duplicate router ID 2-68 hostile event 2-13, 2-56, 2-57, 2-59 host limit 2-64 HTTPS process limit 2-22 I ICMP packet denied 2-11, 2-12 translation creation failed 2-42 IDB initializatrion 2-51 inbound TCP connection denied 2-9 insufficient memory 2-27, 2-62 interface bandwidth is zero 2-87 virtual 2-34 Internet phone, detecting use of 2-35 invalid character replaced in address 2-16 invalid source addresses 2-12 IP fragment attack 2-53 IP fragments overlap attack 2-53 IP impossible packet attack 2-53 IP route counter decrement failure 2-65 IP routing table attack 2-16 creation error 2-49 limit exceeded 2-49 limit warning 2-49 OSPF inconsistency 2-50 ip verify reverse-path command 2-13 IN-3

152 Index L land attack 2-13 large ICMP traffic attack 2-53 Leaving ALLOW mode, URL Server 2-41 level default 1-6 severity 1-16 link status Up or Down 2-6 load balancing cluster disconnected 2-84 redirected 2-83 logging command overview 1-6 logging output locations 1-10 loopback network, invalid source address 2-12 lost failover communications with mate 2-6 low memory 2-49 LSA default with wrong mask 2-67 invalid type 2-66 not found 2-50 M MAC address mismatch 2-62 man in the middle attack 2-51 memory corruption 2-87 insufficient 2-27, 2-62 leak 2-50 low 2-49 memory, insufficient 2-62 message block alloc failed 2-7 messages deleted 1-1 disabling 1-14 format 1-15 new 1-1 output locations 1-10 reenabling 1-14 severity levels 1-16 understanding 1-15 variables 1-15, 1-16 monitoring on interface 2-6 MPPE 2-58 MS-CHAP 2-58 N nat command 2-41 network range area change 2-87 new messages 1-1 no associated connection within connection table 2-12 no authentication server found 2-17 nobody keyword in a message 1-9 no failover active command 2-4 no failover command 2-5 no translation group found 2-41 O OSPF ABR without backbone area 2-50 checksum error 2-87 database description from unknown neighbor 2-66 database request from unknown neighbor 2-66 hello from unknown neighbor 2-66 hello packet with duplicate router ID 2-68 IDB initializatrion 2-51 invalid packet 2-66 IP routing table inconsistency 2-50 LSA default with wrong mask 2-67 invalid type 2-66 not found 2-50 neighbor state changed 2-72 IN-4

153 Index network range area change 2-87 packet of invalid length 2-66 process reset 2-51 router ID allocation failure 2-67 router-id reset 2-51 virtual links 2-51 outbound deny command 2-10 out of address translation slots! 2-27 output locations buffer 1-10 console 1-9 SNMP 1-13 syslog server 1-12 Telnet 1-11 P PAT address 2-27, 2-62 global address 2-11 host 2-11 PDM (PIX Device Manager) 1-19 permitted manager connection 1-5, 2-44 Telnet login session 1-5 ping of death attack 2-53 PIX clear finished 2-24 console enable password incorrect 2-44 reload command executed 2-24 power failure, failover 2-2 PPP virtual interface 2-34 PPTP tunnel 2-33 PPTP XGRE packet 2-57 preallocate H323 UDP backconnection 2-35 proxied RPC request attack 2-54 R RADIUS authentication 2-58 RCMD, back connection failed 2-26 rebuilt TCP connection 2-35 reenabling messages 1-14 reload command 2-23, 2-24 request discarded 2-93 router ID allocation failure 2-67 router-id reset 2-51 rsh command 2-26 S security breach 2-11 security policy management 1-19 self route 2-11 SETUP message 2-63 severity level default 1-6 severity levels definition 1-16 show blocks command 2-7 show outbound command 2-10 show static command 2-25 SMTP 2-16 SNMP management station 1-13 split network entry duplicate 2-86 spoofing attack 2-12, 2-13, 2-62 SSH 1-5 statd buffer overflow attack 2-54 SUA disabled 2-84 enabled 2-84 SYN 2-12 SYN attack 2-25 syslog server 1-12 sysopt connection enforcesubnet command 2-12 IN-5

154 Index T TCP access denied 2-92 access permitted 2-92 access requested 2-92 connection limit exceeded 2-93 request discarded 2-93 translation creation failed 2-42 TCP FIN only flags attack 2-53 TCP NULL flags attack 2-53 TCP SYN+FIN flags attack 2-53 Telnet logging 1-11, 1-20 Telnet login session failed 1-5 terminal monitor command 1-11 testing interface 2-7 logging 1-9 timeouts, recommended values 2-64 timeout uauth command 2-19 too many connections on static 2-25 tunnel, PPTP 2-33 U V enabled 2-84 error 2-21 variables in messages 1-15, 1-16 virtual interface 2-34 virtual links 2-51 vpdn group command 2-58 VPN peer limit 2-48 tunnel 2-48 W web requests, unfiltered 2-40 Websense server 2-40 write command 2-23 write erase command 2-22 X XAUTH enabled 2-85 XGRE 2-57 UDP access denied 2-92 access permitted 2-92 bomb attack 2-53 chargen DoS attack 2-53 packet 2-10 request discarded 2-93 snork attack 2-53 translation creation failed 2-42 URL filtering, disabled 2-40 URL Server 2-40 user authentication disabled 2-85 IN-6

Configuring System Message Logging

Configuring System Message Logging CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records

More information

Installing and Configuring External Flash Memory Cards in Cisco 3600 Series Routers

Installing and Configuring External Flash Memory Cards in Cisco 3600 Series Routers Installing and Configuring External Flash Memory Cards in Cisco 3600 Series Routers Product Numbers: MEM3600-4FC=, MEM3600-8FC=, MEM3600-16FC=, MEM3600-20FC= This document describes how to install external

More information

FXO, FXS, and E&M Voice Interface Card Support on Cisco 1700 Series Routers

FXO, FXS, and E&M Voice Interface Card Support on Cisco 1700 Series Routers FXO, FXS, and E&M Voice Interface Card Support on Cisco 1700 Series Routers This document describes the support on the Cisco 1751 and Cisco 1760 routers for the following new voice interface cards (VICs):

More information

Overview: Cisco Wireless Network Management Suite 1.0

Overview: Cisco Wireless Network Management Suite 1.0 Overview: Cisco Wireless Network Management Suite 1.0 Introduction Cisco Wireless Network Management Suite 1.0 (CWNMS 1.0) is a client/server based network management application suite for Broadband Fixed

More information

Getting Started. Cisco Desktop Product Suite 4.5 (ICD)

Getting Started. Cisco Desktop Product Suite 4.5 (ICD) Getting Started Cisco Desktop Product Suite 4.5 (ICD) Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)

More information

Session Initiation Protocol Gateway Call Flows and Compliance Information

Session Initiation Protocol Gateway Call Flows and Compliance Information Session Initiation Protocol Gateway Call Flows and Compliance Information Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000

More information

Cisco UCS Director Payment Gateway Integration Guide, Release 4.1

Cisco UCS Director Payment Gateway Integration Guide, Release 4.1 First Published: April 16, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883

More information

PIX/ASA 7.x with Syslog Configuration Example

PIX/ASA 7.x with Syslog Configuration Example PIX/ASA 7.x with Syslog Configuration Example Document ID: 63884 Introduction Prerequisites Requirements Components Used Conventions Basic Syslog Configure Basic Syslog using ASDM Send Syslog Messages

More information

Configuring Logging. Information About Logging CHAPTER

Configuring Logging. Information About Logging CHAPTER 52 CHAPTER This chapter describes how to configure and manage logs for the ASASM/ASASM and includes the following sections: Information About Logging, page 52-1 Licensing Requirements for Logging, page

More information

Monitoring the Firewall Services Module

Monitoring the Firewall Services Module 24 CHAPTER This chapter describes how to configure logging and SNMP for the FWSM. It also describes the contents of system log messages and the system log message format. This chapter does not provide

More information

Cisco PIX 515E Security Appliance Getting Started Guide

Cisco PIX 515E Security Appliance Getting Started Guide Cisco PIX 515E Security Appliance Getting Started Guide Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

Installation Guide for Cisco Unified ICM/Contact Center Enterprise and Hosted Release 9.0(1)

Installation Guide for Cisco Unified ICM/Contact Center Enterprise and Hosted Release 9.0(1) Installation Guide for Cisco Unified ICM/Contact Center Enterprise and Hosted Release 9.0(1) First Published: June 21, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA

More information

Cisco Registered Envelope Recipient Guide

Cisco Registered Envelope Recipient Guide September 8, 2008 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number:

More information

Cisco 831 Router and Cisco SOHO 91 Router Cabling and Setup Quick Start Guide

Cisco 831 Router and Cisco SOHO 91 Router Cabling and Setup Quick Start Guide English CHAPTER 1 Cisco 831 Router and Cisco SOHO 91 Router Cabling and Setup Quick Start Guide Cisco One-Year Limited Hardware Warranty Terms Easy Installation: Try These Steps First! (CRWS Users) Overview

More information

CD Installation Guide for the Cisco SIP Proxy Server on Linux

CD Installation Guide for the Cisco SIP Proxy Server on Linux CD Installation Guide for the Cisco SIP Proxy Server on Linux The describes how to install the Cisco SIP Proxy Server software on a Pentium-based server running Linux Kernel 2.2.13 or later. Network engineers,

More information

Cisco 837 Router and Cisco SOHO 97 Router Cabling and Setup

Cisco 837 Router and Cisco SOHO 97 Router Cabling and Setup English CHAPTER 1 Cisco 837 Router and Cisco SOHO 97 Router Cabling and Setup Cisco One-Year Limited Hardware Warranty Terms Easy Installation: Try These Steps First! (CRWS Users) Overview Parts List Verify

More information

Transferring Files Using HTTP or HTTPS

Transferring Files Using HTTP or HTTPS Transferring Files Using HTTP or HTTPS First Published: May 5, 2005 Last Updated: May 14, 2009 Cisco IOS Release 12.4 provides the ability to transfer files between your Cisco IOS software-based device

More information

Cisco OC-3/OC-12/OC-48 SFP Transceiver Modules Compatibility Matrix

Cisco OC-3/OC-12/OC-48 SFP Transceiver Modules Compatibility Matrix Cisco OC-3/OC-12/OC-48 SFP Transceiver Modules Compatibility Matrix This publication contains information about the Cisco platforms and software versions that support the OC-3/OC-12/OC-48 Small Form-Factor

More information

Cisco IP Phone 7961G/7961G-GE and 7941G/7941G-GE Enhancements

Cisco IP Phone 7961G/7961G-GE and 7941G/7941G-GE Enhancements Enhancements The purpose of this document is to provide a summary of some of the feature behavior enhancements on the new, and how they differ from the Cisco IP Phone 7960G/7940G. Complete information

More information

Cisco VPN Client User Guide for Mac OS X

Cisco VPN Client User Guide for Mac OS X Release 4.0 April 2003 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 Customer

More information

Disaster Recovery System Administration Guide for Cisco Unified Presence Server Release 1.0(3)

Disaster Recovery System Administration Guide for Cisco Unified Presence Server Release 1.0(3) Disaster Recovery System Administration Guide for Cisco Unified Presence Server Release 1.0(3) The Disaster Recovery System Administration Guide provides an overview of the Disaster Recovery System, describes

More information

User Guide for Resource Manager Essentials

User Guide for Resource Manager Essentials User Guide for Resource Manager Essentials Software Release 3.4 CiscoWorks2000 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408

More information

Constraining IP Multicast in a Switched Ethernet Network

Constraining IP Multicast in a Switched Ethernet Network Constraining IP Multicast in a Switched Ethernet Network This module describes how to configure routers to use the Cisco Group Management Protocol (CGMP) in switched Ethernet networks to control multicast

More information

Data Center Infrastructure Design Guide 2.1 Readme File

Data Center Infrastructure Design Guide 2.1 Readme File Data Center Infrastructure Design Guide 2.1 Readme File Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

This feature was introduced. This feature was integrated in Cisco IOS Release 12.2(11)T.

This feature was introduced. This feature was integrated in Cisco IOS Release 12.2(11)T. BGP Link Bandwidth The Border Gateway Protocol (BGP) Link Bandwidth feature is used to advertise the bandwidth of an autonomous system exit link as an extended community. This feature is configured for

More information

Cisco IP Phone 7912G. At a Glance

Cisco IP Phone 7912G. At a Glance At a Glance Cisco IP Phone 7912G 1 Overview 2 Connecting Your Phone 3 Introducing Your Cisco IP Phone 7912G 4 Tips for Using Your Phone 5 Using Additional Features 6 Where to Find More Information 7 Safety

More information

642 523 Securing Networks with PIX and ASA

642 523 Securing Networks with PIX and ASA 642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall

More information

Cisco ASA 5505 Getting Started Guide

Cisco ASA 5505 Getting Started Guide Cisco ASA 5505 Getting Started Guide Software Version 7.2 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide

Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide Release 2.3 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

More information

Enabling and Monitoring NetFlow on Subinterfaces

Enabling and Monitoring NetFlow on Subinterfaces Enabling and Monitoring NetFlow on Subinterfaces This module contains instructions for enabling and monitoring NetFlow on a router subinterface or a Versatile Interface Processor (VIP) controller interface.

More information

Configuring the Cisco Secure PIX Firewall with a Single Intern

Configuring the Cisco Secure PIX Firewall with a Single Intern Configuring the Cisco Secure PIX Firewall with a Single Intern Table of Contents Configuring the Cisco Secure PIX Firewall with a Single Internal Network...1 Interactive: This document offers customized

More information

System Message Logging

System Message Logging System Message Logging This module describes how to configure system message logging on your wireless device in the following sections: Understanding System Message Logging, page 1 Configuring System Message

More information

Integrating CAD with Thin Client and Virtual Desktop Environments

Integrating CAD with Thin Client and Virtual Desktop Environments Integrating CAD with Thin Client and Virtual Desktop Environments CAD for Cisco Unified Contact Center Express, releases 6.2 10.5 CAD for Cisco Unified Contact Center Enterprise, releases 7.0 10.0 First

More information

Cisco WAN Access Performance Management System User Guide, 2.0

Cisco WAN Access Performance Management System User Guide, 2.0 Cisco WAN Access Performance Management System User Guide, 2.0 July, 2003 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000

More information

Sample Configuration: Cisco UCS, LDAP and Active Directory

Sample Configuration: Cisco UCS, LDAP and Active Directory First Published: March 24, 2011 Last Modified: March 27, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

GLBP - Gateway Load Balancing Protocol

GLBP - Gateway Load Balancing Protocol GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy

More information

L2TP Dial-Out Load Balancing and Redundancy

L2TP Dial-Out Load Balancing and Redundancy L2TP Dial-Out Load Balancing and Redundancy The L2TP Dial-Out Load Balancing and Redundancy feature enables an L2TP network server (LNS) to dial out to multiple L2TP access concentrators (LACs) When the

More information

Basic Software Configuration Using the Cisco IOS Command-Line Interface

Basic Software Configuration Using the Cisco IOS Command-Line Interface Basic Software Configuration Using the Cisco IOS Command-Line Interface This document describes how to use the Cisco IOS command-line interface (CLI) to perform a basic software configuration for your

More information

Accessibility Guidelines for Cisco Unified Contact Center Management Portal

Accessibility Guidelines for Cisco Unified Contact Center Management Portal Accessibility Guidelines for Cisco Unified Contact Center Management Portal Release 8.0(1) February 2010 Corporate Headquarters Cisco System s, Inc. 170 West Tasman D riv e San Jose, CA 95134-1706 USA

More information

P and FTP Proxy caching Using a Cisco Cache Engine 550 an

P and FTP Proxy caching Using a Cisco Cache Engine 550 an P and FTP Proxy caching Using a Cisco Cache Engine 550 an Table of Contents HTTP and FTP Proxy caching Using a Cisco Cache Engine 550 and a PIX Firewall...1 Introduction...1 Before You Begin...1 Conventions...1

More information

Cisco IP Phone 7914 Expansion Module

Cisco IP Phone 7914 Expansion Module Quick Start Guide Cisco IP Phone 7914 Expansion Module 1 Introduction to the Cisco IP Phone 7914 Expansion Module 2 Installing the 7914 Expansion Module 3 Features 4 How to Use the 7914 Expansion Module

More information

Cisco Router and Security Device Manager File Management

Cisco Router and Security Device Manager File Management Application Note Cisco Router and Security Device Manager File Management Introduction Cisco Router and Security Device Manager (SDM) allows you to view and manage the file system on your Cisco router

More information

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Configuring SSL VPN on the Cisco ISA500 Security Appliance Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these

More information

Cisco ASA, PIX, and FWSM Firewall Handbook

Cisco ASA, PIX, and FWSM Firewall Handbook Cisco ASA, PIX, and FWSM Firewall Handbook David Hucaby, CCIE No. 4594 Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA Contents Foreword Introduction xxii xxiii Chapter 1 Firewall

More information

QoS: CBQoS Management Policy-to- Interface Mapping Support Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 1000)

QoS: CBQoS Management Policy-to- Interface Mapping Support Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 1000) QoS: CBQoS Management Policy-to- Interface Mapping Support Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 1000) Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

More information

Cisco IOS Flexible NetFlow Command Reference

Cisco IOS Flexible NetFlow Command Reference Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION

More information

Cisco Collaboration with Microsoft Interoperability

Cisco Collaboration with Microsoft Interoperability Cisco Collaboration with Microsoft Interoperability Infrastructure Cheatsheet First Published: June 2016 Cisco Expressway X8.8 Cisco Unified Communications Manager 10.x or later Microsoft Lync Server 2010

More information

Implementation Note for NetFlow Collectors

Implementation Note for NetFlow Collectors This document describes the implementation details for NetFlow collectors for the ASA 5580 adaptive security appliance, and includes the following sections: Event-Driven Data Export Bidirectional Flows

More information

Troubleshooting Procedures for Cisco TelePresence Video Communication Server

Troubleshooting Procedures for Cisco TelePresence Video Communication Server Troubleshooting Procedures for Cisco TelePresence Video Communication Server Reference Guide Cisco VCS X7.2 D14889.01 September 2011 Contents Contents Introduction... 3 Alarms... 3 VCS logs... 4 Event

More information

Cisco Network Planning Solution 2.0.2 Documentation Guide and Supplemental License Agreement

Cisco Network Planning Solution 2.0.2 Documentation Guide and Supplemental License Agreement Cisco Network Planning Solution 2.0.2 Documentation Guide and Supplemental License Agreement June 2007 This documentation guide contains the End User Supplemental License Agreement for Cisco Systems Network

More information

Cisco Smart Care Services Questions and Answers About the Voice Quality Monitor Service

Cisco Smart Care Services Questions and Answers About the Voice Quality Monitor Service Cisco Smart Care Services Questions and Answers About the Voice Quality Monitor Service For Qualified Cisco Partners October 2008 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose,

More information

White Paper: Cisco Unity Data and the Directory

White Paper: Cisco Unity Data and the Directory White Paper: Cisco Unity Data and the Directory Published February 28, 2002 This document describes the Cisco Unity data that is stored in the directory and explains how this data is kept consistent with

More information

Cisco PIX Firewall and VPN Configuration Guide. Version 6.3

Cisco PIX Firewall and VPN Configuration Guide. Version 6.3 Cisco PIX Firewall and VPN Configuration Guide Version 6.3 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-2685 Document version: 6PW101-20120217 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P.

More information

Cisco Reader Comment Card General Information

Cisco Reader Comment Card General Information Cisco Reader Comment Card General Information 1 Years of networking experience: Years of experience with Cisco products: 2 I have these network types: LAN Backbone WAN Other: 3 I have these Cisco products:

More information

Disaster Recovery Configuration Guide for CiscoWorks Network Compliance Manager 1.8

Disaster Recovery Configuration Guide for CiscoWorks Network Compliance Manager 1.8 Disaster Recovery Configuration Guide for CiscoWorks Network Compliance Manager 1.8 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel:

More information

User Guide for Cisco Unified MeetingPlace Web Conferencing

User Guide for Cisco Unified MeetingPlace Web Conferencing User Guide for Cisco Unified MeetingPlace Web Conferencing Release 5.4 Revised August, 2007 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished

More information

Cisco Internet Service Node (ISN) Installation Guide

Cisco Internet Service Node (ISN) Installation Guide Cisco Internet Service Node (ISN) Installation Guide Internet Service Node (ISN) Release 2.1 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

Cisco Unified Communications Manager SIP Line Messaging Guide (Standard)

Cisco Unified Communications Manager SIP Line Messaging Guide (Standard) Cisco Unified Communications Manager SIP Line Messaging Guide (Standard) For Cisco Unified Communications Manager Release 8.5(1) These materials are made available by Cisco as a courtesy to provide certain

More information

I prefer this access method:

I prefer this access method: Please visit the on-line survey at www.cisco.com/go/crc to submit your comments about accessing Cisco technical documentation. Document Title Cisco Wireless IP Phone 7920 User Guide Part Number 78-14564-01

More information

Upgrading to the Cisco ubr7246vxr Universal Broadband Router

Upgrading to the Cisco ubr7246vxr Universal Broadband Router Upgrading to the Cisco ubr7246vxr Universal Broadband Router This document outlines the process for upgrading an existing Cisco ubr7246 universal broadband router to a Cisco ubr7246vxr chassis, along with

More information

Cisco TelePresence VCR MSE 8220

Cisco TelePresence VCR MSE 8220 Cisco TelePresence VCR MSE 8220 Getting started 61-0008-05 Contents General information... 3 About the Cisco TelePresence VCR MSE 8220... 3 Port and LED location... 3 LED behavior... 4 Installing the VCR

More information

Table of Contents. Introduction

Table of Contents. Introduction viii Table of Contents Introduction xvii Chapter 1 All About the Cisco Certified Security Professional 3 How This Book Can Help You Pass the CCSP Cisco Secure VPN Exam 5 Overview of CCSP Certification

More information

Cisco Expressway IP Port Usage for Firewall Traversal. Cisco Expressway X8.1 D15066.01 December 2013

Cisco Expressway IP Port Usage for Firewall Traversal. Cisco Expressway X8.1 D15066.01 December 2013 Cisco Expressway IP Port Usage for Firewall Traversal Cisco Expressway X8.1 D15066.01 December 2013 Contents: Cisco Expressway IP port usage Which IP ports are used with Cisco Expressway? Which IP ports

More information

Ports Reference Guide for Cisco Virtualization Experience Media Engine for SUSE Linux Release 9.0

Ports Reference Guide for Cisco Virtualization Experience Media Engine for SUSE Linux Release 9.0 Ports Reference Guide for Cisco Virtualization Experience Media Engine for SUSE Linux Release 9.0 Ports 2 Virtualization Experience Media Engine 2 Virtualization Experience Client Manager 3 Cisco Jabber

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

EMC Data Domain Management Center

EMC Data Domain Management Center EMC Data Domain Management Center Version 1.1 Initial Configuration Guide 302-000-071 REV 04 Copyright 2012-2015 EMC Corporation. All rights reserved. Published in USA. Published June, 2015 EMC believes

More information

Cisco Unified Communications Self Care Portal User Guide, Release 10.5(1)

Cisco Unified Communications Self Care Portal User Guide, Release 10.5(1) Cisco Unified Communications Self Care Portal User Guide, Release 10.5(1) Unified Communications Self Care Portal 2 Unified Communications Self Care Settings 2 Phones 4 Additional Settings 12 Revised:

More information

QUICK START GUIDE. Cisco C170 Email Security Appliance

QUICK START GUIDE. Cisco C170 Email Security Appliance 1 0 0 1 QUICK START GUIDE Email Security Appliance Cisco C170 303357 Cisco C170 Email Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance

More information

Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual

Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual www.hillstonenet.com Preface Conventions Content This document follows the conventions below: CLI Tip: provides

More information

SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging

SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION:

More information

Cisco TelePresence Video Communication Server (Cisco VCS) IP Port Usage for Firewall Traversal. Cisco VCS X8.5 December 2014

Cisco TelePresence Video Communication Server (Cisco VCS) IP Port Usage for Firewall Traversal. Cisco VCS X8.5 December 2014 Cisco TelePresence Video Communication Server (Cisco VCS) IP Port Usage for Firewall Traversal Cisco VCS X8.5 December 2014 Contents: Cisco VCS IP port usage Which IP ports are used with Cisco VCS? Which

More information

Basic System. Vyatta System. REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging VYATTA, INC.

Basic System. Vyatta System. REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging VYATTA, INC. VYATTA, INC. Vyatta System Basic System REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com

More information

Release Notes for the Cisco WAN Modeling Tools, Release 15.4.00 Patch 1

Release Notes for the Cisco WAN Modeling Tools, Release 15.4.00 Patch 1 Release Notes for the Cisco WAN Modeling Tools, Release 15.4.00 Patch 1 June 2007 Rev. A0 These release notes are for use with the Cisco WAN Modeling Tools, which includes the following subsystems: NMT

More information

management and configuration guide hp procurve series 2500 switches www.hp.com/go/procurve

management and configuration guide hp procurve series 2500 switches www.hp.com/go/procurve management and configuration guide hp procurve series 2500 switches www.hp.com/go/procurve HP ProCurve Switches 2512 and 2524 Software Release F.01or Greater Management and Configuration Guide Copyright

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

Troubleshooting the Firewall Services Module

Troubleshooting the Firewall Services Module 25 CHAPTER This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page

More information

Getting Started with the Cisco IP Phone 7910 Series

Getting Started with the Cisco IP Phone 7910 Series Getting Started with the Cisco IP Phone 7910 Series Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)

More information

Cisco Unified Web and E-Mail Interaction Manager Knowledge Base Author s Guide

Cisco Unified Web and E-Mail Interaction Manager Knowledge Base Author s Guide Cisco Unified Web and E-Mail Interaction Manager Knowledge Base Author s Guide For Unified Contact Center Enterprise Release 9.0(1) January 2013 Americas Headquarters Cisco Systems, Inc. 170 West Tasman

More information

TelePresence Migrating TelePresence Management Suite (TMS) to a New Server

TelePresence Migrating TelePresence Management Suite (TMS) to a New Server TelePresence Migrating TelePresence Management Suite (TMS) to a New Server THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,

More information

Troubleshooting the Firewall Services Module

Troubleshooting the Firewall Services Module CHAPTER 25 This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page

More information

Firewall. Vyatta System. REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall VYATTA, INC.

Firewall. Vyatta System. REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall VYATTA, INC. VYATTA, INC. Vyatta System Firewall REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and

More information

Firewall. Vyatta System. REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall VYATTA, INC.

Firewall. Vyatta System. REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall VYATTA, INC. VYATTA, INC. Vyatta System Firewall REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and

More information

PIX/ASA 7.x and above : Mail (SMTP) Server Access on Inside Network Configuration Example

PIX/ASA 7.x and above : Mail (SMTP) Server Access on Inside Network Configuration Example PIX/ASA 7.x and above : Mail (SMTP) Server Access on Inside Network Configuration Example Document ID: 70031 Contents Introduction Prerequisites Requirements Components Used Conventions Related Products

More information

Cisco TelePresence VCR Converter 1.0(1.8)

Cisco TelePresence VCR Converter 1.0(1.8) Cisco TelePresence VCR Converter 1.0(1.8) Software release notes D14725.02 February 2011 Contents Contents Document revision history... 3 Introduction... 4 New features in version 1.0(1.8)... 5 Convert

More information

Firewall Authentication Proxy for FTP and Telnet Sessions

Firewall Authentication Proxy for FTP and Telnet Sessions Firewall Authentication Proxy for FTP and Telnet Sessions First Published: May 14, 2003 Last Updated: August 10, 2010 Before the introduction of the Firewall Authentication Proxy for FTP and Telnet Sessions

More information

How To Monitor Cisco Secure Pix Firewall Using Ipsec And Snmp Through A Pix Tunnel

How To Monitor Cisco Secure Pix Firewall Using Ipsec And Snmp Through A Pix Tunnel itoring Cisco Secure PIX Firewall Using SNMP and Syslog Thro Table of Contents Monitoring Cisco Secure PIX Firewall Using SNMP and Syslog Through VPN Tunnel...1 Introduction...1 Before You Begin...1 Conventions...1

More information

White Paper: Active Directory Capacity Planning (Cisco Unity Versions 4.x, 3.1, and 3.0(3) and Later with Microsoft Exchange)

White Paper: Active Directory Capacity Planning (Cisco Unity Versions 4.x, 3.1, and 3.0(3) and Later with Microsoft Exchange) White Paper: Active Directory Capacity Planning (Cisco Unity Versions 4.x, 3.1, and 3.0(3) and Later with Microsoft Exchange) Revised August 10, 2007 Purpose This document provides capacity planning recommendations

More information

FireSIGHT User Agent Configuration Guide

FireSIGHT User Agent Configuration Guide Version 2.2 August 20, 2015 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

Configuring the PIX Firewall with PDM

Configuring the PIX Firewall with PDM Configuring the PIX Firewall with PDM Objectives In this lab exercise you will complete the following tasks: Install PDM Configure inside to outside access through your PIX Firewall using PDM Configure

More information

Cisco PIX 501 Firewall

Cisco PIX 501 Firewall Quick Start Guide Cisco PIX 501 Firewall 1 Check Items Included 2 Installing the PIX 501 3 Configuring the PIX 501 4 Optional Maintenance and Upgrade Procedures About the Cisco PIX 501 Firewall The PIX

More information

Web Application Firewall

Web Application Firewall Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information