WSM Reference Guide - WatchGuard Technologies
WSM Reference Guide - WatchGuard Technologies WSM Reference Guide - WatchGuard Technologies
Event LogsEvent Log Message CatalogLog Module Log Message ID MessageIKE 3 Certificate chain forming failure because the size is too largeIKE 4 Certificate chain forming failure: %sIKE 5 Certificate validation failure: %sIKE 6 Certificate validation failed because the Firebox cannot retrieve the publickeyIKE 7 Cannot validate peer ID in certificate (idType %d)IKE 8 Cannot retrieve private key in certificate (id %d)IKE 1000 IKE full policy loading completeIKE 1002 IKE ready to have trace level %d and event level %dIKE 1003 IKE is set to use LDAP server (%s)IKE 1005 IKE daemon is startingIKE 1006 IKE daemon stoppedIKE 1007 IKE uses software cryptoIKE 1008 IKE uses hardware crypto card for the public key cipherIKE 1600 Try primary RADIUS server %sIKE 1601 Backup RADIUS server (%s) is not respondingIKE 1602 Backup RADIUS server (%s) is not responding. Switch to primary server %sIKE 1603 Primary RADIUS server (%s) is not respondingIKE 1604 Primary RADIUS server (%s) is not responding. Switch to backup RADIUSserver %s.IKE 1605 Primary RADIUS server (%s) is not responding. No backup RADIUS serverconfigured.IKE 9007 IKE is terminated by SIGBUS (%d). System may be out of memory.IKE 9011 IKE is terminated by SIGSEGV (%d). System may become unstable.MA 1000 received SIGTERM, MA daemon is shutting downMIA 100 eth%d is up.MIA 101 eth%d is downMIA 201 The number of allowed IPSec tunnels %d is at 90% of its limitMIA 202 The current number of IPSec tunnels %d is at its limit.MIA 203 The number of %s exceeds its high water mark %lu.MIA 204 The number of %s is at its limit %lu.MIA 301 Deleted tunnel to peer %s.MIA 302 The system’s cooling fan failed.MIA 303 The system’s supply power failed.MIA 304 The system's cooling fan recovered.MIA 305 The system's supply power recovered.MIA 306 This load balancing server %s recovered.MIA 307 The load balancing server %s does not respond.MIA 308 Heartbeats lost.50 WatchGuard System Manager
Event LogsEvent Log Message CatalogLog Module Log Message ID MessageMIA 309 Heartbeats recovered.MIA 310 Received SIGTERM, MIA daemon is shutting down.MIA 401 Added MUVPN user group %s (%d).MIA 402 Deleted MUVPN user group %s (%d).MIA 403 Updated MUVPN user group %s (%d).MIA 404 Phase 1 SA %d set for MUVPN user %d.MIA 405 Phase 1 rekey for MUVPN user %d.MIA 406 MUVPN user %s logged in from %s.MIA 407 MUVPN user %s (login from %s) logged out.MIA 408 Cannot add a tunnel %d to MUVPN user %s because the phase 1 SA %ddoes not exist or is expiredMIA 409 Add tunnel %d to MUVPN user %s. The phase 1 SA is %d.MONITORD 100 %s is connectedMONITORD 101 %s is disconnectedMONITORD 102 Response from gateway %s on %s receivedMONITORD 103 No response from gateway %s on %sMONITORD 201 The intermodule connection does not workMONITORD 202 LNKMON cannot activate this service socket: %dPMM 1 Firewall user %s from %u.%u.%u.%u logged out due to idle timeoutPMM 2 %sPMM 3 policy=\”5s\” %s%s%s%s%s rc=\”5d\” msg=\”%s%s%s%s\”pckt_len=\”%s\” ttl=\%s\”PMM 4 policy=\”%s\” %s rc=\”%d\” msg=\”%s\”PMM 5 policy=\"%s\" src_ip=\"\" dst_ip=\"\" pr=\"\" src_port=\"\" dst_port=\"\"src_intf=\"%s\" dst_intf=\"\" rc=\"%d\" msg=\"%s\"PMM 6 Firewall user %s from %u.%u.%u.%u logged in.PMM 7 Firewall user %s from %u.%u.%u.%u logged out.PMM 100 Failed to open %s: %s.PMM 101 Failed to update run time %s.PMM 102 %s is %s %s by unknown module.PMM 103 %s is %s %s by %sPPTP 1000 Starting up pptpdPPTP 2001 PPTP CHAP authentication OK for peer %sPPTP 2002 PPTP CHAP authentication failed for peer %sPPTP 2003 PPTP connection up for %sPPTP 2004 PPTP connection down for %sPPTP 2005 PPTP authentication server %s:%d not respondingReference Guide 51
- Page 3 and 4: ContentsCHAPTER 1 Internet Protocol
- Page 5 and 6: CHAPTER 1Internet Protocol Referenc
- Page 7 and 8: Internet Protocol HeaderKeyword Num
- Page 9 and 10: Transfer ProtocolsSource RoutingThe
- Page 11 and 12: CHAPTER 2MIME Content TypesSoftware
- Page 13 and 14: Type Subtype Reference (where avail
- Page 15 and 16: Type Subtype Reference (where avail
- Page 17 and 18: Type Subtype Reference (where avail
- Page 19 and 20: Type Subtype Reference (where avail
- Page 21 and 22: Type Subtype Reference (where avail
- Page 23 and 24: CHAPTER 3Services and PortsWell-kno
- Page 25 and 26: Well-Known Services ListPort(s) Pro
- Page 27 and 28: Well-Known Services ListService Nam
- Page 29 and 30: Well-Known Services ListService Nam
- Page 31 and 32: CHAPTER 4Log MessagesUnderstanding
- Page 33 and 34: Traffic LogsFWAllowEach packet filt
- Page 35 and 36: Traffic Logsdst_ip="66.35.250.151"
- Page 37 and 38: Traffic LogsDNS Proxy Traffic Log M
- Page 39 and 40: Traffic LogsHTTP Proxy Traffic Log
- Page 41 and 42: Alarm LogsPolicy AlarmsDefaultNameP
- Page 43 and 44: Alarm LogsDenial of Servce (DoS) Al
- Page 45 and 46: Event LogsGateway AntiVirus Service
- Page 47 and 48: Event LogsDescription of Log Module
- Page 49 and 50: Event LogsEvent Log Message Catalog
- Page 51 and 52: Event LogsEvent Log Message Catalog
- Page 53: Event LogsEvent Log Message Catalog
- Page 57 and 58: Event LogsEvent Log Message Catalog
- Page 59 and 60: Firebox Log File XML DTD and Schema
- Page 61 and 62: Firebox® X Edge Log MessagesModule
- Page 63 and 64: Firebox® X Edge Log MessagesModule
- Page 65 and 66: Firebox® X Edge Log MessagesModule
- Page 67 and 68: Firebox® X Edge Log MessagesModule
- Page 69 and 70: Firebox® X Edge Log MessagesModule
- Page 71 and 72: Firebox® X Edge Log MessagesModule
- Page 73 and 74: CHAPTER 5WebBlocker ContentWatchGua
- Page 75 and 76: WebBlocker CategoriesCategoryDrugs,
- Page 77 and 78: WebBlocker CategoriesCategoryJob Se
- Page 79 and 80: CHAPTER 6ResourcesThere are many re
- Page 81 and 82: Mailing ListsMailing Listswg-users@
- Page 83 and 84: White Hat Web Sitesbeginners. Cons:
- Page 85 and 86: Other Web Sitesmaintains a list of
- Page 87 and 88: RSS Feedswww.sophos.com/virusinfo/i
- Page 89 and 90: IndexBblocked sites, searching for
Event LogsEvent Log Message CatalogLog Module Log Message ID MessageMIA 309 Heartbeats recovered.MIA 310 Received SIGTERM, MIA daemon is shutting down.MIA 401 Added MUVPN user group %s (%d).MIA 402 Deleted MUVPN user group %s (%d).MIA 403 Updated MUVPN user group %s (%d).MIA 404 Phase 1 SA %d set for MUVPN user %d.MIA 405 Phase 1 rekey for MUVPN user %d.MIA 406 MUVPN user %s logged in from %s.MIA 407 MUVPN user %s (login from %s) logged out.MIA 408 Cannot add a tunnel %d to MUVPN user %s because the phase 1 SA %ddoes not exist or is expiredMIA 409 Add tunnel %d to MUVPN user %s. The phase 1 SA is %d.MONITORD 100 %s is connectedMONITORD 101 %s is disconnectedMONITORD 102 Response from gateway %s on %s receivedMONITORD 103 No response from gateway %s on %sMONITORD 201 The intermodule connection does not workMONITORD 202 LNKMON cannot activate this service socket: %dPMM 1 Firewall user %s from %u.%u.%u.%u logged out due to idle timeoutPMM 2 %sPMM 3 policy=\”5s\” %s%s%s%s%s rc=\”5d\” msg=\”%s%s%s%s\”pckt_len=\”%s\” ttl=\%s\”PMM 4 policy=\”%s\” %s rc=\”%d\” msg=\”%s\”PMM 5 policy=\"%s\" src_ip=\"\" dst_ip=\"\" pr=\"\" src_port=\"\" dst_port=\"\"src_intf=\"%s\" dst_intf=\"\" rc=\"%d\" msg=\"%s\"PMM 6 Firewall user %s from %u.%u.%u.%u logged in.PMM 7 Firewall user %s from %u.%u.%u.%u logged out.PMM 100 Failed to open %s: %s.PMM 101 Failed to update run time %s.PMM 102 %s is %s %s by unknown module.PMM 103 %s is %s %s by %sPPTP 1000 Starting up pptpdPPTP 2001 PPTP CHAP authentication OK for peer %sPPTP 2002 PPTP CHAP authentication failed for peer %sPPTP 2003 PPTP connection up for %sPPTP 2004 PPTP connection down for %sPPTP 2005 PPTP authentication server %s:%d not responding<strong>Reference</strong> <strong>Guide</strong> 51