00 HowTo Read Fire Ware Logs
00 HowTo Read Fire Ware Logs
Fireware How To
Logging and Notification
How do I read Fireware log messages?
Introduction
Understanding the log messages the Firebox sends to the log file is a critical function for a Firebox administrator. The log messages give you important information about the flow of traffic through your network. The log messages are also a key component in troubleshooting problems that occur in your network. This document explains the types of log messages the Firebox generates. It gives examples of traffic and alarm log messages for Fireboxes using Fireware appliance software. For a list of Fireware event log messages, go to the Reference Guide and review the Log Messages chapter.
Traffic logs
The Firebox sends traffic logs as it applies packet filter and proxy rules to traffic passing through the Firebox.
Alarm logs
Alarm logs are sent when an alarm condition is met. The Firebox sends the alarm to the Traffic Monitor and Log Server and triggers the specified action. Some alarms are set in your Firebox configuration. For example, you can use Policy Manager to configure an alarm to occur when a certain threshold is met. Other alarms are set by default. The Firebox sends an alarm log when a network connection on one of the Firebox interfaces fails. This cannot be changed in your configuration. The Firebox never sends more than 10 alarms in 15 minutes for the same set of conditions. There are eight categories of alarm logs: System, IPS, AV, Policy, Proxy, Probe, Denial of service, and Traffic.
Event logs
Event logs are created because of Firebox user activity. Events that cause event logs include: Firebox start up/shut down Firebox and VPN authentication Process start up/shut down Problems with the Firebox hardware components Any task done by the Firebox administrator
Diagnostic logs
Diagnostic logs are more detailed log messages sent by the Firebox that you can use to help troubleshoot problems. You can select the level of diagnostic logging to see in your traffic monitor, or write to your log file. You can configure the diagnostic log level from Policy Manager: select Setup > Logging > Advanced Diagnostics. The available levels are off, low, medium, high, and advanced. We do not recommend that you set the logging level to advanced unless you are working with a technical support team to diagnose a problem, as it can cause the log file to fill up very quickly.
Traffic Logs
Most of the logs shown in Traffic Monitor are traffic logs. Traffic logs show the traffic that moves through your Firebox and how the packet filter and proxy policies were applied. Traffic Monitor shows all of the log messages from the Firebox that are recorded in your log file.
FWAllow Each packet filter log message starts with FWDeny or FWAllow. This header shows whether the packet was allowed or denied by the Firebox. d="2005-01-25T23:12:12" The date and time the event occurred, adjusted according to the time zone setting in Policy Manager: select Setup > System. orig="HQFirebox" The name or IP address (if no name is available) of the Firebox writing the log message. disp="Allow" The packet disposition. Can be deny or allow. pri="1" The priority of the log. The priority is used only for Net IQ reporting and is set to 1 (critical mode), 4 (warning mode), or 6 (normal allowed traffic). policy=ssh-outgoing-05 The name of the policy in Policy Manager that handled this packet. src_ip=192.168.30.159 The source IP address of this packet. dst_ip=10.10.171.98 The destination IP address for this packet. pr="ssh" The protocol used in this packet. src_port="56952" The source port for this packet. dst_port="22" The destination port for this packet.
Traffic Logs
src_intf="1-Trusted" The number of the source interface for this packet, and the name you have given the source interface for this packet (as defined in Policy Manager: select Network > Configuration). A source interface of trusted indicates that this packet originated behind the trusted interface of the Firebox. A source interface of external shows that the packet has come from outside the Firebox. dst_intf="0-External" The number of the destination interface for this packet, and the name you have given for the destination interface for this packet (as defined in Policy Manager: select Network > Configuration). rc="100" Return code for the packet. This information is used in Historical Reporting. msg=firewall pass, mss not exceeding 1460, idle timeout=43205 sec The message field. pckt_len="60" The length of the packet, in bytes. ttl="63" The packet time to live, in seconds. log_type="tr" The type of log message. All traffic logs use the tr log type.
Proxy Logs
When the Firebox processes an event that is handled by a proxy, it writes more than one log message. The first entry shows the same information as a packet filter log, but includes two more fields: proxy_act The name of the proxy action handling this packet. A proxy action is a set of rules for a proxy that can be applied to more than one policy. rule_name The name of the specific proxy rule handling this packet. content_type The type of content in the packet that is filtered by the proxy rule. Other log messages that the Firebox writes when an event is handled by a proxy contain a variable number of fields. Here is an example of a group of log messages created by a user request handled by a proxy:
<ProxyMatch d="2005-02-01T23:35:16" orig="HQFirebox" proc_id="cfm[1497]" disp="Allow" pri="6" policy="HTTP-proxy-01" src_ip="192.168.1.124" dst_ip="66.35.250.151" pr="tcp/ http" src_port="4345" dst_port="80" src_intf="1-Trusted" dst_intf="0-External" src_ip_nat="250.168.43.6" src_port_nat="13419" rc="590" msg="ProxyAllow: HTTP Header content type match" proxy_act="HTTP-Client.2" rule_name="text/*" content_type="text/ xml" log_type="tr"/> <ProxyHTTPReq d="2005-02-01T23:35:16" orig="HQFirebox" proc_id="cfm[1497]" disp="Allow" pri="6" policy="HTTP-proxy-01" src_ip="192.168.1.124" dst_ip="66.35.250.151" pr="tcp/http" src_port="4345" dst_port="80" src_intf="1Trusted" dst_intf="0-External" src_ip_nat="250.168.43.6" src_port_nat="13419" rc="525" msg="HTTP Request" proxy_act="HTTP-Client.2" op="GET" dstname="poli-
tics.slashdot.org" arg="/politics.rss" sent_bytes="345" rcvd_bytes="2727" log_type="tr"/> <ProxyConnEnd d="2005-02-01T23:35:16" orig="HQFirebox" proc_id="cfm[1497]" disp="Allow" pri="6" policy="HTTP-proxy-01" src_ip="192.1681.124" dst_ip="66.35.250.151" pr="tcp/http" src_port="4345" dst_port="80" src_intf="1Trusted" dst_intf="0-External" src_ip_nat="250.168.43.6" src_port_nat="13419" rc="523" msg="Conn End" proxy_act="HTTP-Client.2" log_type="tr"/>
Each proxy has its own set of messages. The tables here show the log messages each proxy can write to the log file, and the secondary fields for each log message.
Traffic Logs
Traffic Logs
HTTP REQUEST CATEGORIES cats dstname arg HTTP SERVICE UNAVAILABLE service details HTTP REQUEST URL PATH OVERSIZE HTTP REQ op dstname arg HTTP HEADER IPS MATCH ips_msg signature_id HTTP BODY IPS MATCH ips_msg signature_id HTTP BYTECOUNT UPDATE
Alarm Logs
Alarm Logs
Alarm logs are sent when an alarm condition is met. The Firebox sends the alarm log to the Traffic Monitor and Log Server and triggers the specified action. Some alarms are set in your Firebox configuration. For example, you can use Policy Manager to configure an alarm to occur when a certain threshold is met. Other alarms are set by default. The Firebox sends an alarm log when a network connection on one of the Firebox interfaces fails. This cannot be changed in your configuration. The Firebox never sends more than 10 alarms in 15 minutes for the same set of conditions. There are eight categories of alarm logs: System, IPS, AV, Policy, Proxy, Probe, Denial of service, and Traffic. There is a table below for each category of alarms, showing the format of the alarm log messages in each category.
Policy Alarms
Default Name
Policy
Message Format
alarm_name=WGRD_PM_BP_Alar m, alarm id, timestamp, message, policy name, source IP, destination IP, protocol, source port, destination port, source interface, destination interface, log_type=al
Example Message
alarm_name="WGRD_PM_BP_Alar m" alarm_id="4001" time="Wed Mar 2 07:41:21 2005 (PST)" msg="Block" policy="WGRD_PM_BP_Policy" src_ip="24.56.20.79" dst_ip="192.168.30.164" pr="tcp/ sun-rpc" src_port="1727" dst_port="111" src_intf="0External" dst_intf="2-Optional-1" log_type="al"/
Caused By
These alarms are caused by events associated with each policy.
Proxy Alarms
Default Name
Proxy
Message Format
alarm_name=Proxy, alarm_id, time, message, source IP, destination IP, protocol, source port, destination port, source interface destination interface, log_type=al
Example Message
alarm_name="Proxy" alarm_id="6001" time="Tue Aug 3 00:49:35 2004 (PST)" msg="ProxyAllow/HTTP Request method match" src_ip="192.168.1.102" dst_ip="16.0.0.107" pr="tcp/smtp" src_port="1384" dst_port="25" src_intf="PPTP" dst_intf="1Trusted" log_type="al"/
Caused By
These alarms are caused by events associated with each proxy action.
System Alarms
Default Name
System
Message Format
alarm _name detected, message_string.
Example Message
System detected. [1401-0512@H] user abc failed to log in from 192.168.228.226. System detected. [1401-0202@H] Number of IPSec tunnels 2500 reaches max IPSec tunnels allowed.
Caused By
These alarms are triggered by system events.
Message Format
alarm_name detected. message_string.
Example Message
NOTE: The content of this alarm message is based on what DOS event triggered it. See the examples below. SYN-Attack detected. TCP SYN attack detected on interface 1. UDP-Flood detected. UDP Flood attack detected on interface 1. ICMP-Flood detected. ICMP Flood attack detected on interface 1. Ping-of-Death detected. PING-OFDEATH attack detected on interface 1. Source-Route detected. SOURCEROUTE attack detected on interface 1. IPSec-Flood detected. IPSEC Flood attack detected on interface 1.
Caused By
These alarms are triggered by any DOS events.
alarm _name detected. TCP SYN attack detected on interface interface_number. alarm _name detected. UDP Flood attack detected on interface interface_number. alarm_name detected. ICMP Flood attack detected on interface interface_number. alarm_name detected, PING-OFDEATH attack detected on interface interface_number. alarm_name detected. SOURCEROUTE attack detected on interface interface_number. alarm_name detected. IPSEC Flood attack detected on interface interface_number. alarm_name detected. IKE Flood attack detected on interface interface_number. alarm_name detected. Denial-ofService attacks (>threshold) from source IP address/subnet mask detected on interface interface_number. alarm_name detected. Denial-ofService attacks (>threshold) for destination IP address/subnet mask detected on interface interface_number.
These alarms are triggered by SYN attacks. These alarms are triggered by UDP Flood attacks. These alarms are triggered by ICMP Flood attacks. These alarms are triggered by Ping-ofDeath attacks. These alarms are triggered by SourceRoute attacks. These alarms are triggered by high severity level and IPSec Flood attacks. These alarms are triggered by IKE Flood attacks. These alarms are triggered by Distributed Denial of Service Source attacks.
IPSecFlood
IKE-Flood
DDOSAttack-Src
DDOS-Attack-Src detected. Denialof-Service attacks (.50) from source 192.168.226.226/255.255.255.255 detected on interface 1.
DDOSAttackDest
DDOS-Attack-Src detected. Denialof-Service attacks (.50) for destination 192.168.226.226/ 255.255.255.255 detected on interface 1.
10
Alarm Logs
Message Format
alarm_name detected. message_string.
Example Message
Port-Scan detected. Port scan threshold 300 reached, 300 ports scanned by 192.168.228.226 in 10 seconds. IP-Scan detected. IP scan threshold 300 reached, 300 IPs scanned by 192.168.228.226 in 10 seconds. IP-Spoofing detected. IP source spoofing detected, src_intf=30, src_ip=192.168.228.226. Tear-Drop detected. TEAR-DROP attack detected on interface 1.
Caused By
These alarms are triggered by Port Space Probe attacks.
IP-Scan
alarm_name detected. message_string. alarm_name detected. message_string. alarm_name detected. TEAR-DROP attack detected on interface interface_number.
These alarms are triggered by Address Space Probe attacks. These alarms are triggered by IP Spoofing attacks. These alarms are triggered by Tear-Drop attacks.
IPSpoofing Tear-Drop
Traffic Alarms
Default Name
Traffic
Message Format
alarm _name detected, message_string.
Example Message
NOTE: The content of this alarm message is based on what traffic event triggered the alarm. See the examples below. ESP-Auth-Error detected. ESP Authentication error, policy_id=2, local_ip=10.10.10.10, peer_ip=192.168.228.226, spi=12345678, sa_id=1000, interface=1, the first 80 bytes are A0 B1 C2.........
Caused By
These alarms are triggered by any traffic events. These alarms are triggered by the traffic event ESP-AUTH_ERR.
ESP-AuthError
alarm_name detected. ESP Authentication error, policy_id=policy_id_number, local_ip=local_IP_address, peer_ip=peer_IP_address, spi=spi, sa_id=ID_of_SA, interface=interface_number, the first (x) bytes are list_of_first x number of bytes. alarm_name detected. AH Authentication error, policy_id=policy_id_number, local_ip=local_IP_address, peer_ip=peer_IP_address, spi=spi, sa_id=ID_of_SA, interface=interface_number, the first (x) bytes are list_of_first x number of bytes.
AH-AuthError
AH-Auth-Error detected. AH Authentication error, policy_id=2, local_ip=10.10.10.10, peer_ip=192.168.228.226, spi=12345678, sa_id=1000, interface=1, the first 80 bytes are A0 B1 C2.........
Traffic Alarms
Default Name
ESPReplayError
Message Format
alarm_name detected. ESP replay error, policy_id=policy_id_number, local_ip=local_IP_address, peer_ip=peer_IP_address, spi=spi, sa_id=ID_of_SA, interface=interface_number, the first (x) bytes are list_of_first x number of bytes. alarm_name detected. AH replay error, policy_id=policy_id_number, local_ip=local_IP_address, peer_ip=peer_IP_address, spi=spi, sa_id=ID_of_SA, interface=interface_number, the first (x) bytes are list_of_first x number of bytes. alarm_name detected. Invalid SPI %d(0x%x) detected on interface interface_number, the first (x) bytes are list_of_first x number of bytes. alarm_name detected. Policy error detected on interface interface_number, the first (x) bytes are list_of_first x number of bytes.
Example Message
ESP-Replay-Error detected. ESP replay error, policy_id=2, local_ip=10.10.10.10, peer_ip=192.168.228.226, spi=12345678, sa_id=1000, interface=1, the first 80 bytes are A0 B1 C2.........
Caused By
These alarms are triggered by the traffic event ESP_REPLAY_ERROR.
AHReplayError
AH-Replay-Error detected. AH replay error, policy_id=2, local_ip=10.10.10.10, peer_ip=192.168.228.226, spi=12345678, sa_id=1000, interface=1, the first 80 bytes are A0 B1 C2.........
InvalidSPI
Invalid-SPI detected. Invalid SPI 12345678 (0xBC614E) detected on interface 1, the first 80 bytes are A0 B1 C2........ Other-Policy-Error detected. Policy error detected on interface 1, the first 80 bytes are A0 B1 C2............
These alarms are triggered by the traffic event INVALID_SPI. These alarms are triggered by the traffic event OTHER_AUTH_ERROR.
OtherPolicyError
Probe Alarms
Default Name
Any Probe Alarm
Message Format
Operator [Probe probe_name: probe_value (value) alarm_cond_op_name threshold (threshold)]
Example Message
NOTE: The content of this alarm message is based on the event that triggered the alarm. See the examples below. [Probe Link Status: 0.00 (value) becomes 0.00 (threshold)] OR [Probe Link Status: 1.00 (value) becomes 0.00 (threshold)] OR [Probe Link Status: 0.00 (value) becomes 0.00 (threshold)]
Caused By
These alarms are triggered by counter values.
LinkDown
Message Format
alarm_name-AV alarm id, timestamp, message, source IP, destination IP, protocol, source port, destination port, source interface, destination interface, virus name, sender, log_type=al
Example Message
alarm_name="AV" alarm_id="6001" time="Mon Aug 2 22:20:44 2004 (PST)" msg="SMTP Filename" src_ip="192.168.1.102" dst_ip="16.0.0.107" pr="tcp/smtp" src_port="1384" dst_port="25" src_intf="PPTP" dst_intf="1Trusted" virus="Eicar-TestSignature" sender="phillip@sjcqa.com" log_type="al"/
Caused By
These alarms are caused by events associated with each AV rule of the SMTP proxy action.
12
Event Logs
Message Format
alarm_name=IPS, alarm id, timestamp, message, source IP, destination IP, protocol, source port, destination port, source interface, destination interface, IPS message, signature category, signature ID, log_type=al
Example Message
alarm_name="IPS" alarm_id="3001" time="Wed Aug 4 00:58:33 2004 (PST)" msg="IPS" src_ip="16.0.0.1" dst_ip="16.0.1.107" pr="tcp/http" src_port="4110" dst_port="80" src_intf="1-Trusted" dst_intf="0External" ips_msg="WEB-ATTACKS kill command attempt" signature_cat="http-request" signature_id="1335" log_type="al"/
Caused By
These alarms are caused by different protocol types.
Event Logs
Event logs are created because of Firebox user activity. Events that cause event logs include: Firebox start up/shut down Firebox and VPN authentication Process start up/shut down Problems with the Firebox hardware components Any task done by the Firebox administrator On a Firebox using Fireware appliance software, there are seven product components, including 27 different log modules, that create event and diagnostic log messages to send to the log server. The function of each log module is shown in the table that follows.
Function
Internet Key Exchange daemon. Diagnose the configuration and operation of VPN tunnels. Point to Point Tunneling Protocol daemon. Diagnose the daemon that manages PPTP for VPN tunnels. Virtual Router Redundancy Protocol daemon. Diagnose the module that manages the virtual router for High Availability. High Availability Manager. Diagnose the module that manages High Availability operations. Transport (HA) Protocol. Diagnose the module that manages the High Availability transport protocol. DHCP client. Diagnose the module that gets IP addresses for DHCP clients. DHCP server. Diagnose the module that DHCP servers use to give IP addresses to clients. DHCP relay. Diagnose the module that relays DHCP requests to another server. Point to Point protocol daemon. Diagnose the daemon that gives you PPP protocol support for PPPoE and PPTP. Point to Point Protocol over Ethernet daemon. Diagnose the daemon that manages PPPoE. Connection Framework Manager. Diagnose the service that manages proxy protected connections.
High Availability
VRRP
HAM TPDAEMON
Dynamic IP
Proxy
CFM
Function
Session Manager. Diagnose the module that converts network packet streams into TCP connections and UDP connections. Hypertext Transfer Protocol proxy. Diagnose the process that analyzes HTTP connections. Simple Mail Transfer Protocol proxy. Diagnose the process that analyzes SMTP connections. File Transfer Protocol proxy. Diagnose the process that analyzes FTP connections. Domain Name Service proxy. Diagnose the analysis service for DNS connections. WebBlocker Server daemon. Diagnose the module that gives you the list of Web sites to block. AntiVirus Server. Diagnose the server that supports AV detection. Configuration Maintenance Manager. Diagnose the module that manages device configuration. Simple Network Management Protocol daemon. Diagnose the module that can query for SNMP MIB and can send SNMP traps to the user. Monitoring Agent. Diagnose Alarm Manager, the module that collects alarms and determines the alarm response. Management Information Agent. Diagnose the module that captures appliance statistics. Monitor daemon. Diagnose the daemon that monitors the network link. Web server. Diagnose the device Web server that supports Web authentication and WSM. Dynamic VPN Control Protocol Client daemon. Diagnose the daemon that manages devices under DVCP control. Policy Management Module. Diagnose the module that manages and controls packet filter policies. Authentication Domain Manager. Diagnose the module that authenticates packet filters and VPN tunnels.
Management
CMM SNMP
MA
PMM ADM
SUPPORT:
COPYRIGHT 2006 WatchGuard Technologies, Inc. All rights reserved. WatchGuard, the WatchGuard logo, Firebox, and Core are registered trademarks or trademarks of WatchGuard Techwww.watchguard.com/support nologies, Inc. in the United States and/or other countries. U.S. and Canada +877.232.3531 All Other Countries +1.206.613.0456
14