cc/td/doc/product/iaabu/pix/pix_v52
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

System Log Messages

System Log Messages

This chapter lists the PIX Firewall system log messages. The messages are listed numerically by message code.


Note   The messages shown in this guide only apply to PIX Firewall version 5.2 and later. When a number is skipped from a sequence, for example, 106004 or 110001, the message is no longer in the PIX Firewall code.

This chapter includes the following sections:

Syslog message 100000 is for Cisco Secure Intrusion Detection System (NetRanger) signatures. PIX Firewall provides access to the following single-packet (called "atomic") IDS signatures.

Messages 100001 to 105020

%PIX-1-101001: (Primary) Failover cable OK.

%PIX-1-101002: (Primary) Bad failover cable.

%PIX-1-101003: (Primary) Failover cable not connected (this unit).

%PIX-1-101004: (Primary) Failover cable not connected (other unit).

%PIX-1-101005: (Primary) Error reading failover cable status.

%PIX-1-102001: (Primary) Power failure/System reload other side.

%PIX-1-103001: (Primary) No response from other firewall (reason code = code).

%PIX-1-103002: (Primary) Other firewall network interface interface_number OK.

%PIX-1-103003: (Primary) Other firewall network interface interface_number failed.

%PIX-1-103004: (Primary) Other firewall reports this firewall failed.

%PIX-1-103005: (Primary) Other firewall reporting failure.

%PIX-1-104001: (Primary) Switching to ACTIVE (cause: reason).

%PIX-1-104002: (Primary) Switching to STNDBY (cause: reason).

%PIX-1-104003: (Primary) Switching to FAILED.

%PIX-1-104004: (Primary) Switching to OK.

%PIX-1-105001: (Primary) Disabling failover.

%PIX-1-105002: (Primary) Enabling failover.

%PIX-1-105003: (Primary) Monitoring on interface int_name waiting

%PIX-1-105004: (Primary) Monitoring on interface int_name normal

%PIX-1-105005: (Primary) Lost Failover communications with mate on interface int_name.

%PIX-1-105006: (Primary) Link status `Up' on interface int_name.

%PIX-1-105007: (Primary) Link status `Down' on interface int_name.

%PIX-1-105008: (Primary) Testing interface int_name.

%PIX-1-105009: (Primary) Testing on interface int_name result.

%PIX-3-105010: (Primary) Failover message block alloc failed

%PIX-1-105011: (Primary) Failover cable communication failure

%PIX-1-105020: (Primary) Incomplete/slow config replication

Messages 106001 to 112001

%PIX-2-106001: Inbound TCP connection denied from IP_addr/port to IP_addr/port flags TCP_flags on interface int_name

%PIX-2-106002: protocol# Connection denied by outbound list list_ID src laddr/lport dest faddr/fport

%PIX-2-106006: Deny inbound UDP from faddr/fport to laddr/lport on interface int_name.

%PIX-2-106007: Deny inbound UDP from faddr/fport to laddr/lport due to DNS flag.

%PIX-3-106010: Deny inbound from outside: IP_addr to inside: IP_addr chars.

%PIX-7-106011: Deny inbound (No xlate) chars

%PIX-2-106012: Deny IP from IP_addr to IP_addr, IP options hex.

%PIX-2-106013: Dropping echo request from IP_addr to PAT address IP_Addr

%PIX-3-106014: Deny inbound icmp src interface name: IP_addr dst interface name: IP_addr (type dec, code dec)

%PIX-6-106015: Deny TCP (no connection) from IP_addr/port to IP_addr/port flags flags on interface int_name.

%PIX-2-106016: Deny IP spoof from (IP_addr) to IP_addr on interface int_name.

  Furthermore, if sysopt connection enforcesubnet is enabled, PIX Firewall discards packets with a source address belonging to the destination subnet from traversing the PIX Firewall and logs this message.

To further enhance spoof packet detection, use the
conduit command to configure the PIX Firewall to discard packets with source addresses belonging to the internal network.

%PIX-2-106017: Deny IP due to Land Attack from IP_addr to IP_addr

%PIX-2-106018: ICMP packet type ICMP_type denied by outbound list list_ID src laddr dest faddr

%PIX-4-106019: IP packet from src_addr to dest_addr, protocol protocol received from interface int_name deny by access-group acl_ID

%PIX-2-106020: Deny IP teardrop fragment (size = num, offset = num) from IP_addr to IP_addr

%PIX-1-106021: Deny protocol reverse path check from src_addr to dest_addr on interface int_name

  PIX Firewall looks up a route based on the src_addr. If an entry is not found and a route is not defined, then this syslog message appears and the connection is dropped.
  If there is a route, PIX Firewall checks which interface it corresponds to. If the packet arrived on another interface, then it is a spoof or there is an asymmetric routing environment. PIX Firewall does not support asymmetric routing (where there is more than one path to a destination).
  If configured on an internal interface, PIX Firewall checks static route command statements or RIP and if the src_addr is not found, then an internal user is spoofing their address.
  An attack is in progress. With this feature enabled, no user action is required. PIX Firewall repels the attack.

%PIX-1-106022: Deny protocol connection spoof from src_addr to dest_addr on interface int_name

%PIX-1-107001: RIP auth failed from IP_addr: version=vers, type=type, mode=mode, sequence=seq on interface int_name

%PIX-1-107002: RIP pkt failed from IP_addr: version=vers on interface int_name

%PIX-2-108002: SMTP replaced chars: out src_addr in laddr data: chars

%PIX-6-109001: Auth start for user `username' from laddr/lport to faddr/fport

%PIX-6-109002: Auth from laddr/lport to faddr/fport failed (server IP_addr failed) on interface int_name.

%PIX-6-109003: Auth from laddr to faddr/fport failed (all servers failed) on interface int_name.

%PIX-6-109005: Authentication succeeded for user `user' from laddr/lport to faddr/fport on interface int_name.

%PIX-6-109006: Authentication failed for user `user' from laddr/lport to faddr/fport on interface int_name.

%PIX-6-109007: Authorization permitted for user `user' from laddr/lport to faddr/fport on interface int_name.

%PIX-6-109008: Authorization denied for user `user' from faddr/fport to laddr/lport on interface int_name.

%PIX-6-109009: Authorization denied from laddr/lport to faddr/fport (not authenticated) on interface int_name.

%PIX-3-109010: Auth from laddr/lport to faddr/fport failed (too many pending auths) on interface int_name.

%PIX-2-109011: Authen Session Start: user 'user', sid session_num

%PIX-5-109012: Authen Session End: user 'user', sid session_num, elapsed num seconds

%PIX-3-109013: User must authenticate before using this service

%PIX-7-109014: uauth_lookup_net fail for uauth_in()

%PIX-6-109015: Authorization denied (acl=acl_ID) for user 'username' from src_addr/src_port to dest_addr/dest_port on interface int_name

%PIX-3-109016: Downloaded authorization access-list acl_ID not found for user 'username'

%PIX-6-110001: No route to dest_addr from src_addr

%PIX-3-110002: No ARP for host IP_addr

%PIX-5-111001: Begin configuration: IP_addr writing to device

%PIX-5-111003: IP_addr Erase configuration

%PIX-5-111004: IP_addr end configuration: [FAILED]|[OK]

%PIX-5-111005: IP_addr end configuration: OK

%PIX-5-111006: Console Login from user at IP_addr

%PIX-5-111007: Begin configuration: IP_addr reading from device.

%PIX-5-111008: User 'user' executed the 'cmd' command.

%PIX-2-112001: (chars:dec) pix clear finished.

Messages 199001 to 209005

%PIX-5-199001: PIX reload command executed from IP_addr.

%PIX-6-199002: PIX startup completed. Beginning operation.

%PIX-6-199003: Reducing Link MTU dec.

%PIX-6-199005: PIX Startup begin

%PIX-3-201002: Too many connections on static|xlate gaddr! econns nconns

%PIX-2-201003: Embryonic limit exceeded neconns/elimit for faddr/fport (gaddr) laddr/lport on interface int_name

%PIX-3-201005: FTP data connection failed for IP_addr

%PIX-3-201006: RCMD backconnection failed for IP_addr/port

%PIX-3-201008: The PIX is disallowing new connections.

%PIX-3-202001: Out of address translation slots!

%PIX-3-202005: Non-embryonic in embryonic list faddr/fport laddr/lport

%PIX-3-208005: (function:line_num) pix clear command return return_code

%PIX-4-209003: Fragment database limit of bytes exceeded: src = IP_addr,
dest = IP_addr, proto = protocol, id = ID

%PIX-4-209004: Invalid IP fragment, size = bytes exceeds maximum size = bytes: src = IP_addr, dest = IP_addr, proto = protocol, id = ID

%PIX-4-209005: Discard IP fragment set with more than number elements:
src = IP_addr, dest = IP_addr, proto = protocol, id = ID

Messages 210001 to 213004

%PIX-3-210001: LU SW_Module_Name error = error_code

%PIX-3-210002: LU allocate block (size) failed.

%PIX-3-210003: Unknown LU Object ID

%PIX-3-210005: LU allocate connection failed

%PIX-3-210006: LU look NAT for IP_addr failed

%PIX-3-210007: LU allocate xlate failed

%PIX-3-210008: LU no xlate for laddr/l_port faddr/f_port

%PIX-3-210010: LU make UDP connection for faddr:f_port laddr:l_port failed

%PIX-3-210020: LU PAT port port_number reserve failed

%PIX-3-210021: LU create static xlate global_IP ifc int_name failed

%PIX-6-210022: LU missed number updates

%PIX-3-211001: Memory allocation Error

%PIX-3-212001: Unable to open SNMP channel (UDP port udp_port) on interface interface_number, error code = code

%PIX-3-212002: Unable to open SNMP trap channel (UDP port udp_port) on interface interface_number, error code = code

%PIX-3-212003: Unable to receive an SNMP request on interface interface_number, error code = code, will try again.

%PIX-3-212004: Unable to send an SNMP response to IP Address IP_addr Port port interface interface_number, error code = code

%PIX-3-212005: incoming SNMP request (number bytes) on interface int_name exceeds data buffer size, discarding this SNMP request.

%PIX-3-213001: PPTP control daemon socket io string, errno = num.

%PIX-3-213002: PPTP tunnel hashtable insert failed, peer = IP_addr.

%PIX-3-213003: PPP virtual interface number isn't opened.

%PIX-3-213004: PPP virtual interface number client ip allocation failed.

Messages 302001 to 315011

%PIX-6-302001: Built inbound|outbound TCP connection id for faddr faddr/fport gaddr gaddr/gport laddr laddr/lport (username)

%PIX-6-302002: Teardown TCP connection id for faddr IP_addr/port gaddr IP_addr/port laddr IP_addr/port (username) duration time bytes num (chars).

%PIX-6-302003: Built H245 connection for faddr faddr/fport laddr laddr/lport

%PIX-6-302004: Pre-allocate H323 UDP backconnection for faddr faddr/fport to laddr laddr/lport

%PIX-6-302005: Built UDP connection for faddr faddr/fport gaddr gaddr/gport laddr laddr/lport

%PIX-6-302006: Teardown UDP connection for faddr faddr/fport gaddr gaddr/gport laddr laddr/lport

%PIX-6-302009: Rebuilt TCP connection id for faddr faddr/fport gaddr gaddr/gport laddr laddr/lport

%PIX-6-302010: conns in use, conns most used

%PIX-3-302302: ACL = deny; no sa created

%PIX-6-303002: src_addr Stored|Retrieved dest_addr: nat_addrs

%PIX-5-304001: user src_addr Accessed JAVA URL|URL dest_addr: url.

%PIX-5-304002: Access denied URL chars SRC IP_addr DEST IP_addr: chars

%PIX-3-304003: URL Server IP_addr timed out URL string

%PIX-6-304004: URL Server IP_addr request failed URL chars

%PIX-7-304005: URL Server IP_addr request pending URL chars

%PIX-3-304006: URL Server IP_addr not responding

%PIX-2-304007: URL Server IP_addr not responding, ENTERING ALLOW mode.

%PIX-2-304008: LEAVING ALLOW mode, URL Server is up.

%PIX-6-305001: Portmapped translation built for gaddr IP_addr/port laddr IP_addr/port

%PIX-6-305002: Translation built for gaddr IP_addr to laddr IP_addr

%PIX-6-305003: Teardown translation for global IP_addr local IP_addr

%PIX-6-305004: Teardown portmap translation for global IP_addr/port local IP_addr/port

%PIX-3-305005: No translation group found for protocol.

%PIX-3-305006: Invalid dst is network/broadcast IP, translation creation failed for protocol src int_name:IP_addr dst int_name:IP_addr

  PIX Firewall utilizes the global IP and mask from configured static command statements to differ regular IP addresses from network or broadcast IP addresses. If the global IP address is a valid network address with a matching network mask, then the PIX Firewall will not create an xlate for network or broadcast IP addresses with inbound packets. For example:
    static (inside,outside) 10.2.2.128 10.1.1.128 netmask 255.255.255.128
     
    
  Global address 10.2.2.128 is treated as a network address and 10.2.2.255 as the broadcast address. Without an existing xlate, PIX Firewall denies inbound packets destined for 10.2.2.128 or 10.2.2.255, and logs this syslog message.
  In case the suspected IP is really a host IP, a separated static command statement with a host mask needs to be configured and in front of the subnet static (first match rule for static command statements). The following static causes PIX Firewall to treat 10.2.2.128 as a host address:
    	static (inside,outside) 10.2.2.128 10.2.2.128 netmask 255.255.255.255
    	static (inside,outside) 10.2.2.128 10.2.2.128 netmask 255.255.255.128
    
  The xlate may be created by traffic started with the inside host with the questioned IP address. PIX Firewall treats a network or broadcast IP address as a host IP address with overlapped subnet static config, the network address translation for both static need be the same.

%PIX-6-305007: Orphan IP IP_addr on interface interface_number

%PIX-6-307001: Denied Telnet login session from IP_addr on interface int_name.

%PIX-6-307002: Permitted Telnet login session from IP_addr

%PIX-6-307003: telnet login session failed from IP_addr (num attempts) on interface int_name.

%PIX-6-308001: PIX console enable password incorrect for num tries (from IP_addr).

%PIX-4-308002: static gaddr1 laddr1 netmask mask1 overlapped with gaddr2 laddr2

%PIX-3-309001: Denied manager connection from IP_addr.

%PIX-6-309002: Permitted manager connection from IP_addr.

%PIX-6-311001: LU loading standby start

%PIX-6-311002: LU loading standby end

%PIX-6-311003: LU recv thread up

%PIX-6-311004: LU xmit thread up

%PIX-6-312001: RIP hdr failed from IP_addr: cmd=cmd, version=vers domain=name on interface int_name

%PIX-3-313001: Denied ICMP type=icmp_type, code=type_code from IP_addr on interface int_name

%PIX-6-314001: Pre-allocate RTSP UDP backconnection for faddr faddr/fport to laddr laddr/lport

%PIX-3-315001: Denied SSH session from IP_addr on interface int_name

%PIX-6-315002: Permitted SSH session from IP_addr on interface int_name for user "user_id"

    %PIX-3-315002: Permitted SSH session from 10.21.196.38 on interface outside for user "pix"
    

%PIX-6-315003: SSH login session failed from IP_addr on (num attempts) on interface int_name by user "user_id"

%PIX-3-315004: Fail to establish SSH session because PIX RSA host key retrieval failed.

%PIX-6-315011: SSH session from IP_addr on interface int_name for user "user_id" terminated normally

%PIX-6-315011: SSH session from IP_addr on interface int_name for user "user_id" disconnected by SSH server, reason: "text"

Messages 400000 to 709007

%PIX-4-4000nn: IDS:sig_num sig_msg from IP_addr to IP_addr on interface int_name

  http://www.cisco.com/univercd/cc/td/doc/product/iaabu/csids/csids1/csidsug/sigs.htm
  All signature messages are not supported by PIX Firewall in this release. IDS syslog messages all start with %PIX-4-4000nn and have the following format:
  %PIX-4-4000nn IDS:sig_num sig_msg from ip_addr to ip_addr on interface int_name

Options:

sig_num

The signature number. Refer to the Cisco Secure Intrusion Detection System Version 2.2.1 User Guide at the following site:

http://www.cisco.com/univercd/cc/td/doc/product/iaabu/csids/csids1/csidsug/sigs.htm

sig_msg

The signature message—approximately the same as the NetRanger signature message.

ip_addr

The local to remote address to which the signature applies.

int_name

The name of the interface on which the signature originated.

  For example:
%PIX-4-400013 IDS:2003 ICMP redirect from 10.4.1.2 to 10.2.1.1 on interface dmz
%PIX-4-400032 IDS:4051 UDP Snork attack from 10.1.1.1 to 192.168.1.1 on interface outside
  Table 2-2 lists the supported signature messages.

Table 2-2: IDS Syslog Messages
Message #
Signature ID 
Signature Title
Signature Type

400000

1000

IP options-Bad Option List

Informational

400001

1001

IP options-Record Packet Route

Informational

400002

1002

IP options-Timestamp

Informational

400003

1003

IP options-Security

Informational

400004

1004

IP options-Loose Source Route

Informational

400005

1005

IP options-SATNET ID

Informational

400006

1006

IP options-Strict Source Route

Informational

400007

1100

IP Fragment Attack

Attack

400008

1101

IP Unknown IP Protocol

Attack

400009

1103

IP Fragments Overlap

Attack

400010

2000

ICMP Echo Reply

Informational

400011

2001

ICMP Host Unreachable

Informational

400012

2002

ICMP Source Quench

Informational

400013

2003

ICMP Redirect

Informational

400014

2004

ICMP Echo Request

Informational

400015

2005

ICMP Time Exceeded for a Datagram

Informational

400016

2006

ICMP Parameter Problem on Datagram

Informational

400017

2007

ICMP Timestamp Request

Informational

400018

2008

ICMP Timestamp Reply

Informational

400019

2009

ICMP Information Request

Informational

400020

2010

ICMP Information Reply

Informational

400021

2011

ICMP Address Mask Request

Informational

400022

2012

ICMP Address Mask Reply

Informational

400023

2150

Fragmented ICMP Traffic

Attack

400024

2151

Large ICMP Traffic

Attack

400025

2154

Ping of Death Attack

Attack

400026

3040

TCP NULL flags

Attack

400027

3041

TCP SYN+FIN flags

Attack

400028

3042

TCP FIN only flags

Attack

400029

3153

FTP Improper Address Specified

Informational

400030

3154

FTP Improper Port Specified

Informational

400031

4050

UDP Bomb attack

Attack

400032

4051

UDP Snork attack

Attack

400033

4052

UDP Chargen DoS attack

Attack

400034

6050

DNS HINFO Request

Attack

400035

6051

DNS Zone Transfer

Attack

400036

6052

DNS Zone Transfer from High Port

Attack

400037

6053

DNS Request for All Records

Attack

400038

6100

RPC Port Registration

Informational

400039

6101

RPC Port Unregistration

Informational

400040

6102

RPC Dump

Informational

400041

6103

Proxied RPC Request

Attack

400042

6150

ypserv (YP server daemon) Portmap Request

Informational

400043

6151

ypbind (YP bind daemon) Portmap Request

Informational

400044

6152

yppasswdd (YP password daemon) Portmap Request

Informational

400045

6153

ypupdated (YP update daemon) Portmap Request

Informational

400046

6154

ypxfrd (YP transfer daemon) Portmap Request

Informational

400047

6155

mountd (mount daemon) Portmap Request

Informational

400048

6175

rexd (remote execution daemon) Portmap Request

Informational

400049

6180

rexd (remote execution daemon) Attempt

Informational

400050

6190

statd Buffer Overflow

Attack

400051

8000

FTP Retrieve Password File

Attack


%PIX-4-402101: decaps: rec'd IPSEC packet has invalid spi for destaddr=IP_addr, prot=protocol, spi=spi

%PIX-4-402102: decapsulate: packet missing packet_type, destadr=dest_addr, actual prot=protocol

%PIX-4-402103: identity doesn't match negotiated identity (ip) dest_addr= IP_addr, src_addr= IP_addr, prot= protocol, (ident) local=IP_addr, remote=IP_addr, local_proxy=IP_addr/IP_addr/port/port, remote_proxy=IP_addr/IP_addr/port/port

%PIX-4-402106: Rec'd packet not an IPSEC packet (ip) dest_addr= IP_addr, src_addr= IP_addr, prot= protocol

%PIX-4-403101: PPTP session state not established, but received an XGRE packet, tunnel_id=id, session_id=session

%PIX-4-403102: PPP virtual interface int_name rcvd pkt with invalid protocol: protocol, reason: text.

%PIX-4-403103: PPP virtual interface max connections reached.

%PIX-4-403104: PPP virtual interface int_name requires mschap for MPPE.

%PIX-4-403106: PPP virtual interface int_name requires RADIUS for MPPE.

%PIX-4-403107: PPP virtual interface int_name missing aaa server group info

%PIX-4-403108: PPP virtual interface int_name missing client ip address option

%PIX-4-403109: Rec'd packet not an PPTP packet. (ip) dest_addr= IP_addr, src_addr= IP_addr, data: text.

%PIX-4-403110: PPP virtual interface int_name, user: user missing MPPE key from aaa server.

%PIX-4-404101: ISAKMP: Failed to allocate address for client from pool pool_id

%PIX-4-405101: Unable to Pre-allocate H225 Call Signalling Connection for faddr faddr[/fport] to laddr laddr[/lport]

%PIX-4-405102: Unable to Pre-allocate H245 Connection for faddr faddr[/fport] to laddr laddr[/lport]

%PIX-5-500001: ActiveX content modified src IP_addr dest IP_addr on interface int_name.

%PIX-5-500002: Java content modified src IP_addr dest IP_addr on interface int_name.

%PIX-5-500003: Bad TCP hdr length (hdrlen=bytes, pktlen=bytes) from src_addr/sport to dest_addr/dport, flags: tcp_flags, on interface int_name

  The TCP header length may indicate that it is larger than the packet length resulting in a negative number of bytes being transferred. A negative number is displayed by syslog as an unsigned number making it appear far larger than would be normal; for example, showing 4 GB transferred in 1 second.

%PIX-4-500004: Invalid transport field for protocol=protocol, from src_addr/src_port to dest_addr/dest_port

%PIX-6-602101: PMTU-D packet packet_length bytes greater than effective mtu mtu_value dest_addr=dest_ip, src_addr=source_ip, prot=protocol

%PIX-6-602102: Adjusting IPSec tunnel mtu

%PIX-6-602301: sa created

%PIX-6-602302: deleting sa

%PIX-6-603101: PPTP received out of seq or duplicate pkt, tnl_id=id, sess_id=session, seq=num.

%PIX-6-603102: PPP virtual interface int_name - user: user aaa authentication started.

%PIX-6-603103: PPP virtual interface int_name - user: user aaa authentication status.

%PIX-6-603104: PPTP Tunnel created, tunnel_id is id, remote_peer_ip is IP_addr, ppp_virtual_interface_id is id, client_dynamic_ip is IP_addr, username is login, MPPE_key_strength is chars

%PIX-6-603105: PPTP Tunnel deleted, tunnel_id = id, remote_peer-_ip= IP_addr

%PIX-6-604101: DHCP client interface int_name: Allocated ip = ip_address,
mask = mask, gw = gateway_address

%PIX-6-604102: DHCP client interface int_name: address released

%PIX-6-604103: DHCP daemon interface int_name: address granted MAC_addr (IP_addr)

%PIX-6-604104: DHCP daemon interface int_name: address released

%PIX-7-701001: alloc_user() out of Tcp_user objects

%PIX-7-702301: lifetime expiring

%PIX-3-702302: replay rollover detected

%PIX-7-702303: sa_request

%PIX-7-709001: FO replication failed: cmd=command returned=code

%PIX-7-709002: FO unreplicable: cmd=command

%PIX-1-709003: (Primary) Beginning configuration replication: Receiving from mate.

%PIX-1-709004: (Primary) End Configuration Replication (ACT)

%PIX-1-709005: (Primary) Beginning configuration replication: Receiving from mate.

%PIX-1-709006: (Primary) End Configuration Replication (STB)

%PIX-2-709007: Configuration replication failed for command command_name


hometocprevnextglossaryfeedbacksearchhelp
Posted: Mon Aug 28 07:13:39 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.