Log Reference
Log Reference
Log Reference
VERSION 5.2.3
FORTINET DOCUMENT LIBRARY
http://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
FORTIGATE COOKBOOK
http://cookbook.fortinet.com
FORTIGUARD CENTER
http://www.fortiguard.com
FEEDBACK
Email: [email protected]
01-523-262694-20170127
TABLE OF CONTENTS
Change Log 5
Introduction 6
Before You Begin 7
How This Reference is Organized 7
Overview 8
Managing and Understanding Logs 9
Log Types and Sub Types 10
Type 10
Subtype 10
Priority Level 11
Log Message Format 11
Log Field Format 12
Log Schema Structure 13
Header and Body Fields 13
Log ID Numbers 16
Log ID Definitions 17
Traffic Log 20
Traffic Log Messages 28
Security Log 29
Application Control 30
Application Control Log Messages 34
AntiVirus 35
AntiVirus Log Messages 41
DLP 43
Email Filter 48
Email Filter Log Messages 52
IPS 54
IPS Log Messages 58
Anomaly 59
Anomaly Log Messages 62
Web Filter 63
Web Filter Log Messages 68
Event Log 70
Endpoint Control 71
Endpoint Log Messages 74
GTP 75
GTP Log Messages 83
High Availability 85
High Availability Log Messages 88
Router 90
Router Log Messages 92
System 93
System Log Messages 102
User 124
User Log Messages 128
VPN 131
VPN Log Messages 137
WAD 143
WAD Log Messages 146
Wireless 148
Wireless Log Messages 154
Other Logs 156
VOIP 157
VOIP Log Messages 160
NetScan 161
NetScan Log Messages 165
Appendix A: Log field diff - 5.2.2 and 5.2.3 166
Security (UTM) 166
Antivirus 166
Application 166
Anomaly 166
DLP 167
Email 167
IPS 167
WebFilter 167
Event 167
Endpoint 168
System 168
Other logs 168
VOIP 169
Change Log
5 Log Reference
Fortinet Technologies Inc.
Introduction
This document provides information about all the log messages applicable to the FortiGate devices running FortiOS
version 5.2.0 or higher. The logs are intended for administrators to be used as reference for more information about a
specific log entry and message that is generated.
6 Log Reference
Fortinet Technologies Inc.
Before You Begin
Before you begin using this reference, read the following notes:
The information in this document applies to all FortiGate units currently running FortiGate 5.2.0 or higher.
l Ensure that you have enabled logging for FortiGate unit. For more information, see the Logging and Reporting
chapter in the FortiGate handbook.
l Each log message is displayed in RAW format in the Log View of the web-based manager.
l Each log message is documented similar to how it appears in the log viewer table based on the RAW format. For
more information, see the Logging and Reporting chapter in the FortiGate Handbook.
NOTE: This reference contains detailed information for each log type and sub type; however, this reference contains
only information gathered at publication and, as a result, not every log message field contains detailed information.
The following sections are grouped by log type with the exception of Event and Security log types which are grouped by
sub types, for example; Security->AntiVirus and Event->System, due to the large number of sub types associated
with the security and event logs.
7 Log Reference
Fortinet Technologies Inc.
Overview
The log types described in this document report traffic, security, and event log information useful for system
administrators when recording, monitoring, and tracing the operation of a FortiGate device running FortiOS. The logs
provide information regarding the following:
l Firewall attacks
l Configuration changes
l Successful and unsuccessful system operations
8 Log Reference
Fortinet Technologies Inc.
Managing and Understanding Logs
This document is organized by log types and sub types which provide quick access to messages related to specific logs
and filters the messages into meaningful sections in the database.
It provides administrators with a comprehensive list of all the log messages that the FortiGate generates with
explanations of what the messages mean and what possible actions you might take upon receiving them. The
document is organized by log type and sub types. In each section, the log entry messages are listed by their log type
ID numbers. See, the Log Types and Sub Types section for more information about the Log ID numbering format.
9 Log Reference
Fortinet Technologies Inc.
Log Types and Sub Types
FortiGate devices can record the following types and sub types of log entry information:
Log Details
Type Description Sub Type
Traffic Records traffic flow information, such as an HTTP/HTTPS request and l Local
its response, if any.
l Forward
l Multicast
l Sniffer
Type
Each log entry contains a Type (type) field that indicates its log type, and in which log file it is stored.
Subtype
Each log entry might also contain a Sub Type (subtype) field within a log type, based on the feature associated with
the cause of the log entry.
For example:
10 Log Reference
Fortinet Technologies Inc.
Log Types and Sub Types
l In event logs, some log entries have a subtype of user, system, or other sub types.
l In security (UTM) logs, some log entries have a subtype of DLP, Web Filter, Email or other sub types.
l In traffic logs, the sub types are: local, forward, multicast, and sniffer.
Priority Level
Each log entry contains a Level (pri) field that indicates the estimated severity of the event that caused the log entry,
such as pri=warning, and therefore how high a priority it is likely to be. Level (pri) associations with the descriptions
below are not always uniform. They also may not correspond with your own definitions of how severe each event is. If
you require notification when a specific event occurs, either configure SNMP traps or alert email by administrator-
defined Severity Level (severity_level) or ID (log_id), not by Level (pri).
Priority Levels
Level (0 is Name Description
highest)
6 Information General information about system operations. Used in event logs to record con-
figuration changes.
For each location where the FortiGate device can store log files (disk, memory, Syslog or FortiAnalyzer), you can
define a severity threshold. The FortiGate stores all log messages equal to or exceeding the log severity level
selected. For example, if you select Error, FortiGate will store log messages whose log severity level is Error, Critical,
Alert, and Emergency.
For documentation purposes, all log types and sub types follow this generic table format to present the log message
entry and severity information.
2 LOG_ID_TRAFFIC_ALLOW Notice
Log Reference 11
Fortinet Technologies Inc.
Log Types and Sub Types
The following table describes the standard format in which each log type is described in this document. For
documentation purposes, all log types and sub types follow this generic table format to present the log entry
information.
Example: Log Entry Information
Log Field Log Field Description Data Type Length Value(s)
12 Log Reference
Fortinet Technologies Inc.
Log Schema Structure
Each log entry consists of several fields and values. In the web-based manager, the logs are displayed in a Formatted
table view or Raw format. You can download the logs in the raw format for further analysis.
l Header - Contains the date and time the log originated, log identifier, message identifier, administrative domain
(ADOM), the log caategory, severity level, and where the log originated. These fields are common to all log types.
l Body - Describes the reason why the log was created and actions taken by the FortiGate device to address it. These
fields vary by log type.
Following is an example of traffic log entry in raw format. The body fields are highlighted in Bold.
date=2014-07-04 time=14:26:59 logid=0001000014 type=traffic subtype=local
level=notice vd=vdom1 srcip=10.6.30.254 srcport=54705 srcintf="mgmt1"
dstip=10.6.30.1 dstport=80 dstintf="vdom1" sessionid=350696 status=close
policyid=0 dstcountry="Reserved" srccountry="Reserved" trandisp=noop service=HTTP
proto=6 app="Web Management" duration=13 sentbyte=1948 rcvdbyte=3553 sentpkt=9
Log Reference 13
Fortinet Technologies Inc.
Log Schema Structure
The following table describes each possible header and body field, according to its name as it appears in the
Formatted or Raw view.
Example: Traffic Log (Raw Format)
Field Name Field Exists in Log Type Example Field - Value (raw format)
(Raw format Description
view in
parentheses)
Header
Body
14 Log Reference
Fortinet Technologies Inc.
Log Schema Structure
• In HTTP
requests, this
is the web
browser or
other client.
• In HTTP
responses,
this is the
physical
server.
Log Reference 15
Fortinet Technologies Inc.
Log Schema Structure Log ID Numbers
Log ID Numbers
The ID (log_id) is a 10-digit field located in the header, immediately following the time and date fields. It is a unique
identifier for that specific log and includes the following information about the log entry.
Log Type Represented by the l Traffic log IDs begin with "00".
first two digits of the l Event log IDs begin with "01".
log ID.
16 Log Reference
Fortinet Technologies Inc.
Log ID Numbers Log Schema Structure
The log_id field is a number assigned to all permutations of the same message. It classifies a log entry by the nature
of the cause of the log message, such as administrator authentication failures or traffic. Other log messages that
share the same cause will share the same log_id.
Log ID Definitions
Following are the definitions for the log type IDs and sub type IDs applicable to FortiOS version 5.2.1 and later.
traffic:0 l forward:0
l local:1
l multicast:2
l sniffer:4
event:1 l system:0
l vpn:1
l user:2
l router:3
l wireless:4
l wad:5
l gtp:6
l endpoint:7
l ha:8
antivirus: 2 l virus:2
l suspicious:0
l analytics:1
l botnet:2
l infected:11
l filename:12
l oversize:13
l scanerror:62
l switchproto:63
Log Reference 17
Fortinet Technologies Inc.
Log Schema Structure Log ID Numbers
webfilter:3 l content:14
l urlfilter:15
l ftgd_blk:16
l ftgd_allow:17
l ftgd_err:18
l activexfilter:35
l cookiefilter:36
l appletfilter:37
l ftgd_quota_counting:38
l ftgd_quota_expired:39
l ftgd_quota:40
l scriptfilter:41
l webfilter_command_block:43
ips:4 l signature:19
spam: 5 l msn-hotmail:5
l yahoo-mail:6
l gmail:7
l smtp:8
l pop3:9
l imap:10
l mapi:11
l carrier-endpoint-filter:
l 47 mass-mms:52
contentlog: 6 l HTTP:24
l FTP:25
l SMTP:26
l POP3:27
l IMAP:28
l HTTPS:30
l im-all:31
l NNTP:39
l VOIP:40
l SMTPS:55
l POP3S:56
l IMAPS:57
l MM1:48
l MM3:49
l MM4:50
l MM7:51
18 Log Reference
Fortinet Technologies Inc.
Log ID Numbers Log Schema Structure
anomaly: 7 l anomaly: 20
voip: 8 l viop: 14
dlp: 9 l dlp:54
l dlp-docsource:55
app-ctrl-all: 10 l app-ctrl-all:59
netscan: 11 l discovery:0
l vulnerability:1
UTM l virus:2
l webfilter:3
l ips:4
l spam:5
l contentlog:6
l voip:8
l dlp:9
l app-ctrl:10
Log Reference 19
Fortinet Technologies Inc.
Traffic Log
Traffic log messages record network traffic passing through the FortiGate unit.
l Forward
l Multicast
l Local
l Sniffer
The following table describes the log fields of the Traffic log.
NOTE: In the policyid field of traffic log messages, the number may be zero because any policy that is automatically
added by the FortiGate unit is indexed as zero. For more information, see the Fortinet Knowledge Base article, Firewall
policy=0.
Log Field Name Log Field Descrip- Data Type Length Value
tion
- All Others =
allowed by Firewall
Policy and the
status indicates
how it was closed.
20 Log Reference
Fortinet Technologies Inc.
Traffic Log
Log Field Name Log Field Descrip- Data Type Length Value
tion
Log Reference 21
Fortinet Technologies Inc.
Traffic Log
Log Field Name Log Field Descrip- Data Type Length Value
tion
22 Log Reference
Fortinet Technologies Inc.
Traffic Log
Log Field Name Log Field Descrip- Data Type Length Value
tion
Log Reference 23
Fortinet Technologies Inc.
Traffic Log
Log Field Name Log Field Descrip- Data Type Length Value
tion
24 Log Reference
Fortinet Technologies Inc.
Traffic Log
Log Field Name Log Field Descrip- Data Type Length Value
tion
Log Reference 25
Fortinet Technologies Inc.
Traffic Log
Log Field Name Log Field Descrip- Data Type Length Value
tion
26 Log Reference
Fortinet Technologies Inc.
Traffic Log
Log Field Name Log Field Descrip- Data Type Length Value
tion
Log Reference 27
Fortinet Technologies Inc.
Traffic Log Messages
The following table describes the log message IDs and messages of the Traffic log.
2 LOG_ID_TRAFFIC_ALLOW Notice
3 LOG_ID_TRAFFIC_DENY Warning
4 LOG_ID_TRAFFIC_OTHER_START Notice
5 LOG_ID_TRAFFIC_OTHER_ICMP_ALLOW Notice
6 LOG_ID_TRAFFIC_OTHER_ICMP_DENY Warning
7 LOG_ID_TRAFFIC_OTHER_INVALID Warning
8 LOG_ID_TRAFFIC_WANOPT Notice
9 LOG_ID_TRAFFIC_WEBCACHE Notice
10 LOG_ID_TRAFFIC_EXPLICIT_PROXY Notice
11 LOG_ID_TRAFFIC_FAIL_CONN Warning
12 LOG_ID_TRAFFIC_MULTICAST Notice
13 LOG_ID_TRAFFIC_END_FORWARD Notice
14 LOG_ID_TRAFFIC_END_LOCAL Notice
15 LOG_ID_TRAFFIC_START_FORWARD Notice
16 LOG_ID_TRAFFIC_START_LOCAL Notice
17 LOG_ID_TRAFFIC_SNIFFER Notice
28 Log Reference
Fortinet Technologies Inc.
Security Log
Security Log
The following sections provide information about the different types of logs recorded under the Security log type.
In FortiOS 5.0 and previous versions, the logs were displayed under the UTM log type. In FortiOS
5.2.0 and later versions, the UTM logs are displayed under the Security log type. All logs grouped
in the security log include the log field type=utm.
Application Control 30
Application Control Log Messages 34
AntiVirus 35
AntiVirus Log Messages 41
DLP 43
Email Filter 48
Email Filter Log Messages 52
IPS 54
IPS Log Messages 58
Anomaly 59
Anomaly Log Messages 62
Web Filter 63
Web Filter Log Messages 68
Log Reference 29
Fortinet Technologies Inc.
Application Control
Application Control log messages record application control protocols and events.
In the log fields, these logs are defined as: type=utm; subtype=app-ctrl.
30 Log Reference
Fortinet Technologies Inc.
Application Control Security Log
Log Reference 31
Fortinet Technologies Inc.
Security Log Application Control
32 Log Reference
Fortinet Technologies Inc.
Application Control Security Log
Log Reference 33
Fortinet Technologies Inc.
Application Control Log Messages
The following table describes the log message IDs and messages of the Application Control log.
34 Log Reference
Fortinet Technologies Inc.
AntiVirus
AntiVirus log messages record actual viruses that are contained in an email as well as anything that appears to be
similar to a virus or suspicious, such as in a file or in an email.
In the log fields, these logs are defined as: type=utm; subtype=virus.
Log Field Name Log Field Description Data Type Length Value
35 Log Reference
Fortinet Technologies Inc.
AntiVirus Security Log
Log Field Name Log Field Description Data Type Length Value
• file type
Log Reference 36
Fortinet Technologies Inc.
Security Log AntiVirus
Log Field Name Log Field Description Data Type Length Value
37 Log Reference
Fortinet Technologies Inc.
AntiVirus Security Log
Log Field Name Log Field Description Data Type Length Value
l No-quarantine-
for- HTTP-GET-
filepattern-
block
l No-quarantine-
foroversized-
files
l No-skip
Log Reference 38
Fortinet Technologies Inc.
Security Log AntiVirus
Log Field Name Log Field Description Data Type Length Value
39 Log Reference
Fortinet Technologies Inc.
AntiVirus Security Log
Log Field Name Log Field Description Data Type Length Value
Log Reference 40
Fortinet Technologies Inc.
AntiVirus Log Messages
The following table describes the log message IDs and messages of the Anti Virus log.
41 Log Reference
Fortinet Technologies Inc.
AntiVirus Security Log
Log Reference 42
Fortinet Technologies Inc.
DLP
Data Leak Protection (DLP) log messages record data leaks. These logs provide additional information to help
administrators better analyze and detect data leaks.
In the log fields, these logs are defined as: type=utm; subtype=dlp.
Log Field Name Log Field Description Data Type Length Value
43 Log Reference
Fortinet Technologies Inc.
DLP Security Log
Log Field Name Log Field Description Data Type Length Value
Log Reference 44
Fortinet Technologies Inc.
Security Log DLP
Log Field Name Log Field Description Data Type Length Value
mmsdir String 3
45 Log Reference
Fortinet Technologies Inc.
DLP Security Log
Log Field Name Log Field Description Data Type Length Value
Log Reference 46
Fortinet Technologies Inc.
Security Log DLP
The following table describes the log message IDs and messages of the Data Leak Protection log.
47 Log Reference
Fortinet Technologies Inc.
Email Filter
Email filter log messages record email protocols, such as SMTP, POP3 and IMAP.
In the log fields, these logs are defined as: type=utm; subtype=emailfilter.
Log Field Name Log Field Description Data Type Length Value
48 Log Reference
Fortinet Technologies Inc.
Email Filter Security Log
Log Field Name Log Field Description Data Type Length Value
Log Reference 49
Fortinet Technologies Inc.
Security Log Email Filter
Log Field Name Log Field Description Data Type Length Value
50 Log Reference
Fortinet Technologies Inc.
Email Filter Security Log
Log Field Name Log Field Description Data Type Length Value
Log Reference 51
Fortinet Technologies Inc.
Email Filter Log Messages
The following table describes the log message IDs and messages of the Email log.
52 Log Reference
Fortinet Technologies Inc.
Email Filter Security Log
Log Reference 53
Fortinet Technologies Inc.
IPS
Intrusion logs record security logs for protocols, such as ICMP and virus attacks. The IPS logs also provide additional
log details, such as the anomaly logs. The "anomaly" logs are generated from the kernel without signatures. (e.g.TCP
SYN flood etc.).
In the log fields, these logs are defined as: type=utm; subtype= ips.
Log Field Name Log Field Descrip- Data Type Length Value
tion
54 Log Reference
Fortinet Technologies Inc.
IPS Security Log
Log Field Name Log Field Descrip- Data Type Length Value
tion
Log Reference 55
Fortinet Technologies Inc.
Security Log IPS
Log Field Name Log Field Descrip- Data Type Length Value
tion
56 Log Reference
Fortinet Technologies Inc.
IPS Security Log
Log Field Name Log Field Descrip- Data Type Length Value
tion
Log Reference 57
Fortinet Technologies Inc.
IPS Log Messages
The following table describes the log message IDs and messages of the IPS log.
58 Log Reference
Fortinet Technologies Inc.
Anomaly
In the log fields, these logs are defined as: type=utm; subtype= anomaly.
Log Field Name Log Field Description Data Type Length Value
59 Log Reference
Fortinet Technologies Inc.
Anomaly Security Log
Log Field Name Log Field Description Data Type Length Value
ref String
severity String 8
Log Reference 60
Fortinet Technologies Inc.
Security Log Anomaly
Log Field Name Log Field Description Data Type Length Value
61 Log Reference
Fortinet Technologies Inc.
Anomaly Log Messages
The following table describes the log message IDs and messages of the Anomaly log.
62 Log Reference
Fortinet Technologies Inc.
Web Filter
Web filter log messages record URL activity as well as filters, such as a blocked URL as it is found in the URL black list.
In the log fields, these logs are defined as: type=utm; subtype= webfilter.
Log Field Name Log Field Description Data Type Length Value
63 Log Reference
Fortinet Technologies Inc.
Web Filter Security Log
Log Field Name Log Field Description Data Type Length Value
Log Reference 64
Fortinet Technologies Inc.
Security Log Web Filter
Log Field Name Log Field Description Data Type Length Value
65 Log Reference
Fortinet Technologies Inc.
Web Filter Security Log
Log Field Name Log Field Description Data Type Length Value
Log Reference 66
Fortinet Technologies Inc.
Security Log Web Filter
Log Field Name Log Field Description Data Type Length Value
67 Log Reference
Fortinet Technologies Inc.
Web Filter Log Messages
The following table describes the log message IDs and messages of the Web log.
68 Log Reference
Fortinet Technologies Inc.
Web Filter Security Log
Log Reference 69
Fortinet Technologies Inc.
Event Log
Event Log
The following sections provide information about the different types of logs recorded under the Event log type.
l Endpoint Control
l GTP
l High Availability
l System
l Router
l VPN
l USer
l WAD
l Wireless
In the log field, these logs are defined as: type=event; subtypes=endpoint control, gtp, vpn, user, wad, system, router,
wireless, high availability.
Endpoint Control 71
Endpoint Log Messages 74
GTP 75
GTP Log Messages 83
High Availability 85
High Availability Log Messages 88
Router 90
Router Log Messages 92
System 93
System Log Messages 102
User 124
User Log Messages 128
VPN 131
VPN Log Messages 137
WAD 143
WAD Log Messages 146
Wireless 148
Wireless Log Messages 154
70 Log Reference
Fortinet Technologies Inc.
Endpoint Control
Following are the log details for the events generated for Endpoint control logs.
In the log fields, these logs are defined as: type=event; subtype= endpoint.
71 Log Reference
Fortinet Technologies Inc.
EndpointControl Event Log
repeat UINT16 5
Log Reference 72
Fortinet Technologies Inc.
Event Log EndpointControl
used_for_ UINT16 5
type
73 Log Reference
Fortinet Technologies Inc.
Endpoint Log Messages
The following table describes the log message IDs and messages of the Endpoint log.
74 Log Reference
Fortinet Technologies Inc.
GTP
Event-GTP log messages record GTP activity. These messages are recorded only when running FortiGate Carrier
firmware.
In the log fields, these logs are defined as: type=event; subtype= gtp.
75 Log Reference
Fortinet Technologies Inc.
GTP Event Log
Log Reference 76
Fortinet Technologies Inc.
Event Log GTP
77 Log Reference
Fortinet Technologies Inc.
GTP Event Log
Log Reference 78
Fortinet Technologies Inc.
Event Log GTP
79 Log Reference
Fortinet Technologies Inc.
GTP Event Log
Log Reference 80
Fortinet Technologies Inc.
Event Log GTP
81 Log Reference
Fortinet Technologies Inc.
GTP Event Log
Log Reference 82
Fortinet Technologies Inc.
GTP Log Messages
The following table describes the log message IDs and messages of the GTP log.
83 Log Reference
Fortinet Technologies Inc.
GTP Event Log
Log Reference 84
Fortinet Technologies Inc.
High Availability
Event-HA log messages are recorded when FortiGate units are in high availability mode. These log messages describe
changes in cluster unit status. The changes in status occur if a cluster unit fails or starts up, or if a link fails or is
restored. Each of these messages includes the serial number of the cluster unit reporting the message. You can use
the serial number to determine the status of cluster unit that has changed.
In the log fields, these logs are defined as: type=event; subtype= ha.
85 Log Reference
Fortinet Technologies Inc.
High Availability Event Log
ip The IP address. IP 39
Address
sn String 64
Log Reference 86
Fortinet Technologies Inc.
Event Log High Availability
87 Log Reference
Fortinet Technologies Inc.
High Availability Log Messages
The following table describes the log message IDs and messages of the HA log.
88 Log Reference
Fortinet Technologies Inc.
High Availability Event Log
Log Reference 89
Fortinet Technologies Inc.
Router
Event-Router log messages record events that occur on the FortiGate network interfaces.
In the log fields, these logs are defined as: type=event; subtype= router.
90 Log Reference
Fortinet Technologies Inc.
Router Event Log
Log Reference 91
Fortinet Technologies Inc.
Router Log Messages
The following table describes the log message IDs and messages of the Router log.
92 Log Reference
Fortinet Technologies Inc.
System
Event-System log messages record events that occur in the FortiGatesystem, such as administrators logging in and
out, or events occurring on the interfaces.
In the log fields, these logs are defined as: type=event; subtype= system.
Log Field Name Log Field Description Data Type Length Value
93 Log Reference
Fortinet Technologies Inc.
System Event Log
Log Field Name Log Field Description Data Type Length Value
cipher UINT16
community String 36
created String 64
crl String
dir String 8
disk UINT8 3
Log Reference 94
Fortinet Technologies Inc.
Event Log System
Log Field Name Log Field Description Data Type Length Value
encryption
fams_pause UINT32 10
free String 32
95 Log Reference
Fortinet Technologies Inc.
System Event Log
Log Field Name Log Field Description Data Type Length Value
green String 32
len UINT32 10
limit UINT32 10
Log Reference 96
Fortinet Technologies Inc.
Event Log System
Log Field Name Log Field Description Data Type Length Value
97 Log Reference
Fortinet Technologies Inc.
System Event Log
Log Field Name Log Field Description Data Type Length Value
newchannel UINT8
newchassisid UINT8
newslot UINT8
• file_block
• carrier_ep_bwl
• flood
• dupe
• alert
• mms_checksum
• virus
oldchannel UINT8
oldchassisid UINT8
oldslot UINT8
portbegin UINT16 5
portend UINT16 5
probeproto String 16
process String
Log Reference 98
Fortinet Technologies Inc.
Event Log System
Log Field Name Log Field Description Data Type Length Value
red String 32
99 Log Reference
Fortinet Technologies Inc.
System Event Log
Log Field Name Log Field Description Data Type Length Value
setuprate UINT64 20
slot UINT8
sn String 64
state String 64
Log Field Name Log Field Description Data Type Length Value
unit UINT32 10
used UINT32 10
The following table describes the log message IDs and messages of the System log.
Event-User log messages record what users are configuring on the FortiGate unit, and what is occurring on the
FortiGate unit. For example, memory storage is becoming full.
In the log fields, these logs are defined as: type=event; subtype= user.
count UINT32 10
portbegin UINT16 5
portend UINT16 5
rsso_key String 64
scope String 16
server String 64
The following table describes the log message IDs and messages of the User log.
Event-VPN log messages record VPN user, administration and session events.
In the log fields, these logs are defined as: type=event; subtype= vpn.
• HMAC_SHA256
• ESP_3DES
• ESP_AES
• CREATE_CHILD
• main
• quick
• xauth
• xauth_client
fication.
• INVALID-PAYLOAD-TYPE
• DOI-NOT-SUPPORTED
• SITUATION-NOT-SUPPORTED
• INVALID-COOKIE
• INVALID-MAJOR-VERSION
• INVALID-MINOR-VERSION
• INVALID-EXCHANGE-TYPE
• INVALID-FLAGS
• INVALID-MESSAGE-ID
• INVALID-PROTOCOL-ID
• INVALID-SPI • INVALID-TRANSFORM-ID
• ATTRIBUTES-NOT-SUPPORTED
• NO-PROPOSAL-CHOSEN
• BAD-PROPOSAL-SYNTAX
• PAYLOAD-MALFORMED
• INVALID-KEY-INFORMATION
• INVALID-ID-INFORMATION
• INVALID-CERT-ENCODING
• INVALID-CERTIFICATE
• BAD-CERT-REQUEST-SYNTAX
• INVALID-CERT-AUTHORITY
• INVALID-HASH-INFORMATION
• AUTHENTICATION-FAILED
• INVALID-SIGNATURE
• ADDRESS-NOTIFICATION
• NOTIFY-SA-LIFETIME
• CERTIFICATE-UNAVAILABLE
• UNSUPPORTED-EXCHANGE-TYPE
• UNEQUAL-PAYLOAD-LENGTHS
• CONNECTED
• RESPONDER-LIFETIME
• REPLAY-STATUS
Log Reference 134
Fortinet Technologies Inc. • INITIAL-CONTACT
• R-U-THERE
Event Log VPN
• DONE
• PENDING
role String 9
stage UINT8 3
status String 23
The following table describes the log message IDs and messages of the VPN log.
Event-Wad log messages record WAN optimization events, such as a user adding an WAN optimization rule as well as
web proxy events.
In the log fields, these logs are defined as: type=event; subtype= wad.
The following table describes the log message IDs and messages of the WAD log.
Event-Wireless log messages record wireless events that occur with FortiGate units that have WiFi capabilities.
In the log fields, these logs are defined as: type=event; subtype= wireless.
• wep128
• wpa-psk
• wpa-radius
• wpa
• wpa2
• wpa2-auto
seq String 16
sn String 64
The following table describes the log message IDs and messages of the Wireless log.
Other Logs
VOIP 157
VOIP Log Messages 160
NetScan 161
NetScan Log Messages 165
VOIP log messages record VOIP activities that include the SIP and SCCP protocols.
Log Field Name Log Field Description Data Type Length Value
call_id String 64
column UINT32 10
count UINT32 10
dir String 8
duration UINT32 10
epoch UINT32 10
Log Field Name Log Field Description Data Type Length Value
kind String 10
line String 64
malform_data UINT32 10
malform_desc String 47
phone String 64
request_name String 64
Log Field Name Log Field Description Data Type Length Value
to String 512
The following table describes the log message IDs and messages of the VOIP log.
Netscan logs record network scanning activities preformed by the FortiGate unit.
Log Field Name Log Field Descrip- Data Type Length Value
tion
agent String 64
end UINT32 10
engine String 32
Log Field Name Log Field Descrip- Data Type Length Value
tion
osfamily String 64
osgen String 64
plugin String 32
Log Field Name Log Field Descrip- Data Type Length Value
tion
start UINT32 10
Log Field Name Log Field Descrip- Data Type Length Value
tion
vulnref String
The following table describes the log message IDs and messages of the NetScan log.
Refer to the FortiOS Log Reference Guide Version 5.2.2 for a complete list of log field details related to version 5.2.2.
This section covers changes applicable to the 5.2.3 version only. It is recommended that you keep both the 5.2.2 and
5.2.3 FortiOS Log Reference Guides available for a comparison of log field delta between the versions.
For all reference purposes, in the tables provided below (see tables) , the term Removed indicates
that a log field was removed in version 5.2.3 but exists in version 5.2.2. Similarly, the term Added
indicates that a log filed was added in version 5.2.3 but does not exist in version 5.2.2.
Security (UTM)
The following tables provide a list of log fields that were added newly or removed from the security (UTM) log subtypes
in FortiOS version 5.2.3.
Antivirus
dstintf Added
srcintf Added
Application
dstintf Added
srcintf Added
Anomaly
dstintf Added
srcintf Added
DLP
dstintf Added
srcintf Added
dstintf Added
srcintf Added
IPS
dstintf Added
srcintf Added
WebFilter
dstintf Added
srcintf Added
Event
The following tables provide a list of log fields that were added newly or removed between from the event log subtypes
in FortiOS version 5.2.3.
Endpoint
dstintf Added
srcintf Added
System
dst Removed
dstport Removed
encryption Added
expectedhandshake Added
expectedsignature Added
mac Added
maxminor Added
max-minor Removed
minminor Added
min_minor Removed
recv-minor Removed
recvminor Added
Other logs
The following tables provide a list of log fields that were added newly or removed between the from the other log types
in FortiOS version 5.2.3.
VOIP
dstintf Added
srcintf Added