Vous êtes sur la page 1sur 90

FortiWeb 4.

0 MR4 Patch 2
Log Reference

FortiWeb 4.0 MR4 Patch 2 Log Reference September 25, 2012 2nd Edition Copyright 2012 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, and FortiGuard are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance metrics contained herein were attained in internal lab tests under ideal conditions, and performance may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinets General Counsel, with a purchaser that expressly warrants that the identified product will perform according to the performance metrics herein. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinets internal lab tests. Fortinet disclaims in full any guarantees. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.

Technical Documentation Knowledge Base Forums Customer Service & Support Training Services

docs.fortinet.com kb.fortinet.com https://support.fortinet.com/forum support.fortinet.com training.fortinet.com

FortiGuard Threat Activities & Research fortiguard.com Document Feedback techdocs@fortinet.com

Table of Contents
Introduction....................................................................................................... 5
Scope....................................................................................................................... 5

Whats new........................................................................................................ 6
Documentation enhancements................................................................................ 6

Anatomy ............................................................................................................ 7
Header & body fields ............................................................................................... 7 Log ID numbers ..................................................................................................... 12 Types ..................................................................................................................... 12 Subtypes................................................................................................................ 13 Priority level ........................................................................................................... 13 Message IDs .......................................................................................................... 14

Event ................................................................................................................ 15
Reboot, shut down, & boot up messages ............................................................. 17 00020001 ............................................................................................................... 17 00020006 ............................................................................................................... 18 00020088 ............................................................................................................... 20 00021101 ............................................................................................................... 21 00021140 ............................................................................................................... 21 00021234 ............................................................................................................... 22 00022004 ............................................................................................................... 24 00022804 ............................................................................................................... 26 00032003 ............................................................................................................... 27 00032006 ............................................................................................................... 29 00032007 ............................................................................................................... 30 00032095 ............................................................................................................... 32 00032101 ............................................................................................................... 34 00032102 ............................................................................................................... 34 00032103 ............................................................................................................... 35 00032120 ............................................................................................................... 36 00032121 ............................................................................................................... 37 00032138 ............................................................................................................... 38 00032139 ............................................................................................................... 39 00032140 ............................................................................................................... 41 00032142 ............................................................................................................... 42 00032901 ............................................................................................................... 43 00037999 ............................................................................................................... 44
Page 3

00045002 ............................................................................................................... 45 00045003 ............................................................................................................... 47 00046002 ............................................................................................................... 48 00046003 ............................................................................................................... 48 00046005 ............................................................................................................... 49 00046006 ............................................................................................................... 50 00046007 ............................................................................................................... 51 00046009 ............................................................................................................... 52 00046010 ............................................................................................................... 53 00090003 ............................................................................................................... 53 00090007 ............................................................................................................... 54 00090008 ............................................................................................................... 56 000100001 ............................................................................................................. 58 00110001 ............................................................................................................... 59 00110002 ............................................................................................................... 61 00120001 ............................................................................................................... 62 00120004 ............................................................................................................... 64 00120005 ............................................................................................................... 65 00130001 ............................................................................................................... 66 00130002 ............................................................................................................... 68 00130003 ............................................................................................................... 69 00130004 ............................................................................................................... 71 00130005 ............................................................................................................... 72 00130006 ............................................................................................................... 74 00130007 ............................................................................................................... 76

Attack .............................................................................................................. 78
Attack log fields ..................................................................................................... 80 SSL/TLS error messages....................................................................................... 82

Traffic .............................................................................................................. 85
00010001 ............................................................................................................... 85

Fortinet Technologies Inc.

Page 4

FortiWeb 4.0 MR4 Patch 2 Log Reference

Introduction
This document is a detailed reference of all of your FortiWeb appliances possible log messages. It is organized primarily by the log type: Event Attack Traffic To look up the meaning of a specific log message, go to the section that matches its Type (type) field, then look for the table that matches its ID (log_id). This document also explains the general structure of FortiWeb log messages, and the meanings of common fields (see Anatomy on page 7).

Scope
This document provides administrators information about log messages that can be recorded by a FortiWeb appliance. This document does not cover how to configure logging. It assumes you have already configured it, and need to know how to interpret the log messages. For instructions on how to configure logging, see the FortiWeb Administration Guide or FortiWeb CLI Reference.

Page 5

Whats new
The list below contains features new or changed since the previous release, FortiWeb 4.0 MR3. Reworked signatures logs Attacks and data leaks detected by signatures, such as XSS, SQL injection, and credit card leaks, are now logged according to the new signature framework, with their category and ID. HA logs Failovers and configuration changes in high availability clusters are now logged. Reboot logs FortiWeb now logs shut down and reboot explicitly, rather than implying it by related daemon startups. SSL/TLS inspection logs When FortiWeb is operating in transparent inspection or offline protection mode, and when it is applying policies to HTTPS traffic, it is possible that the client and back-end web server may agree to a cipher suite that is not supported by FortiWeb. Relatedly, an administrator may have uploaded the wrong certificate and private key. In these cases, FortiWeb cannot successfully eavesdrop. These errors are now logged according by cause to aid in troubleshooting.

Documentation enhancements
Related log messages have been linked, enabling you to quickly jump to similar log messages in different places in the document.

Page 6

Anatomy
This section explains the composition of FortiWeb log messages.

Header & body fields


Each log message is comprised of several field-value pairs. (The name may vary slightly between Raw versus Formatted views in the web UI.) Figure 1: ID (log_id) header field and its value

Formatted view

Raw format log_id=0104012345


Field name Field value

All log messages fields belong to one of two parts: Header Contains the time and date the log originated, a log identifier, a message identifier, the type of log, the severity level (priority) and where the log message originated. These fields exist in all logs. Body Describes the reason why the log was created, plus any actions that the FortiWeb appliance took to respond to it. These fields vary by log type. Figure 2: Log message header and body

For example, this is a raw-format event log message. Body fields are in bold-italic. date=2010-08-16 time=17:30:23 log_id=0104012345 type=event subtype=admin pri=information msg_id=000044866169 device_id=FV1AA2B34567890 timezone="(GMT-12:00)Eniwetok,Kwajalein" user=admin
Page 7

ui=GUI(10.0.0.22) action=login status=success reason=none msg="User admin login successfully from GUI(10.0.0.22)" This attack log message contains the same header fields, but its body fields are different. date=2010-08-12 time=14:02:00 log_id=0430067890 type=attack subtype=waf_common_exploits pri=alert msg_id=000044866168 device_id=FV1AA2B34567890 timezone="(GMT-12:00)Eniwetok,Kwajalein" proto=tcp service=http src=10.0.0.33 src_port=59474 dst=10.0.0.11 dst_port=80 policy=1 action=alert http_method=get http_url="/" http_host="10.0.0.11" http_agent="Wget/1.10.2 (Red Hat modified)" http_session_id=unknown severity_level=High trigger_policy=xhwang msg="Common Exploits: Command Injection" Similarly, traffic log body fields are different. date=2010-08-12 time=14:02:00 log_id=0090024680 type=traffic subtype=accept pri=notice msg_id=000044866169 device_id=FV1AA2B34567890 timezone="(GMT-12:00)Eniwetok,Kwajalein" proto=tcp service=http src=10.0.0.33 src_port=59474 dst=10.0.0.11 dst_port=80 policy=1 action="alert" http_host="10.0.0.11" http_agent="Wget/1.10.2 (Red Hat modified)" http_url="/" attack_type="" msg="HTTP request from 10.0.0.33:59474 to 10.0.0.11:80 ,protocol:HTTP" The following table describes each possible header or body field, according to its name as it appears in the Formatted or Raw view. Table 1: Log message fields Field name (Raw view name in paretheses) Header Date (date) Time (time) The year, month, and day when the log message was recorded. The hour (according to a 24-hour clock, where 15:00 is 3:00 PM), minute, and second that the log message was recorded. See Log ID numbers on page 12. Description Exists in log type Event Example field-value pair

Attack Traffic (Raw view)

+ +

+ +

+ +

date=2010-09-03

time=15:38:01

ID (log_id) MSG ID (msg_id) Type (type) Sub Type (subtype)

+ + + +

+ + + +

+ + + +

log_id=0116080121

See Message IDs on page 14.

msg_id=000044866169

See Types on page 12.

type=attack

See Subtypes on page 13.

subtype=waf_information

Fortinet Technologies Inc.

Page 8

FortiWeb 4.0 MR4 Patch 2 Log Reference

Table 1: Log message fields Field name (Raw view name in paretheses) Level (pri) Device ID (device_id) Time Zone (timezone) The identifier, typically the serial number, of the appliance which originally recorded the log. The name, geographical region, and Greenwich Mean Time (GMT) adjustment of the time zone in which the appliance is located. See Priority level on page 13. Description Exists in log type Event Example field-value pair

Attack Traffic (Raw view)

+ +

+ +

+ +

pri=alert

device_id=FV-1AA2B345678 90

timezone="(GMT-5:00)East ern Time(US & Canada)"

Body Protocol (proto) tcp The protocol used by web traffic. By definition, for FortiWeb, this is always TCP. http or https The name of the application-layer protocol used by the traffic. By definition, for FortiWeb, this is always HTTP or HTTPS. The IP address of the traffics origin. The source varies by the direction: In HTTP requests, this is the web browser or other client. In HTTP responses, this is the physical server. Source Port (src_port) Destination (dst) The IP address of the traffics destination. The source varies by the direction: In HTTP requests, this is the physical server. In HTTP responses, this is the web browser or other client. Destination Port The port number of the traffics destination. (dst_port) The port number of the traffics origin.

proto=tcp

Service (service)

service=http

Source (src)

scr=10.0.0.0

+ +

+ +

src_port=3471

dst=10.0.0.1

dst_port=8080

Fortinet Technologies Inc.

Page 9

FortiWeb 4.0 MR4 Patch 2 Log Reference

Table 1: Log message fields Field name (Raw view name in paretheses) Policy (policy) User (user) User Interface (ui) The name of the policy governing the traffic which caused the log message. The name of the account that performed the action that caused the log message. The type of management interface, such as the web UI or CLI, used by the administrative session which caused the log message. The action associated with the log message or policy violation, such as: login or Alert Status (status) Reason (reason) Duration (duration) HTTP method (http_method) URL (http_url) The duration of the HTTP session. Currently, this is not used, and always set to 0 (zero). The method, such as GET or POST, used by the HTTP request. The URL in the HTTP header of the HTTP request, such as: /images/buttons/hintOver.png The reason for the status. The result of the action. Description Exists in log type Event Example field-value pair

Attack Traffic (Raw view)

+ -

+ -

policy="policy_1"

user=admin

ui=GUI(17.16.1.10)

Action (action)

action=Alert

+ + -

status=failure

reason=name_invalid

duration=0

+ +

http_method=get

http_url="/image/up.png"

Fortinet Technologies Inc.

Page 10

FortiWeb 4.0 MR4 Patch 2 Log Reference

Table 1: Log message fields Field name (Raw view name in paretheses) HTTP Host (http_host) The Host: field in the HTTP header of the HTTP request, such as: www.example.com or 10.0.0.1:8080 This is typically a fully qualified domain name (FQDN) or IP address and port number that resolves or routes to the virtual server on the FortiWeb appliance. HTTP Agent (http_agent) The User-Agent: field in the HTTP header of the HTTP request, which contains the name of the web browser or other client which initiated the HTTP request, such as: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; yie9) HTTP Session ID The HTTP session identifier associated with the HTTP request (if any). Description Exists in log type Event Example field-value pair

Attack Traffic (Raw view)

http_host="example.com"

http_agent="Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; yie9)"

(http_sessio n_id) The ID may be unknown if the Session Management option is not enabled in the governing protection profile. Severity Level

http_session_id=K8BXT3TN YUM710UEGWC8IQBTPX9 PRWHB

The severity that was configured in the rule or policy governing the traffic (severity_le which caused the log message. vel) Trigger Policy The name of the trigger policy that was involved in generating this log (trigger_pol message (if any). icy) The trigger policy value may be an empty string if no trigger policy was selected in the policy.

severity_level=High

trigger_policy=notificat ion-server-group1

Fortinet Technologies Inc.

Page 11

FortiWeb 4.0 MR4 Patch 2 Log Reference

Table 1: Log message fields Field name (Raw view name in paretheses) Message (msg) Details describing the reason why the log message was created. The message varies by the nature of the cause, but may include whether or not the log message is for incoming (HTTP request) or outgoing (HTTP reponse) traffic, the source and destination, and the HTTP method or return code. Detailed Information (N/A) This column contains the entire log message in raw format. If your Column Settings show this column, the entire raw log message will be included in the row under this column, next to the formatted column view of the same log message. This way, if you want to view the entire raw log message, you can simply scroll the page, instead of switching the entire page back and forth from Raw to Formatted log views. This column appears only when using the Formatted log view. It does not actually exist as a field in the raw logs. Description Exists in log type Event Example field-value pair

Attack Traffic (Raw view)

msg="User admin modified Other Log Settings Event Log from GUI(172.16.1.10)."

date=2011-08-09 time=20:48:13 log_id=00070011 msg_id=000000000046 type=attack sub...

Log ID numbers
The ID (log_id) is an 8-digit field located in the header, immediately following the time and date fields. The log_id field is a number assigned to all permutations of the same message. It classifies a log message by the nature of the cause of the log message, such as administrator authentication failures or traffic. Other log messages that share the same cause will share the same log_id. For example, creating an administrator account always has the log ID 00090007.

Types
Each log message contains a Type (type) field that indicates its category, and in which log file it is stored. FortiWeb appliances can record the following categories of log messages:

Fortinet Technologies Inc.

Page 12

FortiWeb 4.0 MR4 Patch 2 Log Reference

Table 2: Log types Log type Event Traffic Attack Description Records administrative events, such as downloading a backup copy of the configuration, and hardware failures. Records traffic flow information, such as HTTP requests and HTTP responses, if applicable. Records attack and intrusion attempt events.

Avoid recording highly frequent log types such as traffic logs to the local hard disk for an extended period of time. Excessive logging frequency can cause undue wear on the hard disk and may cause premature failure.

Subtypes
Each log message contains a Sub Type (subtype) field that further subdivides its category according to the feature involved with the cause of the log message. For example: In event logs, some may have a subtype of system, admin, or other subtypes. In attack logs, some may have a subtype of waf_bad_robot, waf_header_overflow, or other subtypes. In traffic logs, the subtype is always traffic.

Priority level
Each log message contains a Level (pri) field that indicates the estimated severity of the event that caused the log message, such as pri=warning, and therefore how high a priority it is likely to be.
Level (pri) associations with the descriptions below are not fully uniform. They also may not correspond with your own definitions of how severe each event is. If you require notification when a specific event occurs, either configure SNMP traps or alert email by administrator-defined Severity Level (severity_level) or ID (log_id), rather than by this threshold.

Table 3: Approximate log priority levels Level (0 is highest) 0 1 2 Emergency Alert Critical The system has become unusable. Immediate action is required. Functionality is affected. Name Description

Fortinet Technologies Inc.

Page 13

FortiWeb 4.0 MR4 Patch 2 Log Reference

Table 3: Approximate log priority levels Level (0 is highest) 3 4 5 6 Error Warning Notification Information An error condition exists and functionality could be affected. Functionality could be affected. Information about normal events. General information about system operations. Name Description

For each location where the FortiWeb appliance can store log files (disk, memory, Syslog or FortiAnalyzer), you can define a severity threshold. The FortiWeb appliance will store all log messages equal to or exceeding the log severity level you select. For example, if you select Error, the FortiWeb appliance will store log messages whose log severity level is Error, Critical, Alert, and Emergency. Avoid recording log messages using low log severity thresholds such as information or notification to the local hard disk for an extended period of time. A low log severity threshold is one possible cause of frequent logging. Excessive logging frequency can cause undue wear on the hard disk and may cause premature failure.

Message IDs
The MSG ID (msg_id) field is an 12-digit number located in the header, incremented with each individual log message generated by the FortiWeb appliance. It is used only for numbering each log entry, and does not necessarily reflect its cause. Each msg_id number is a unique identifier for that specific log entry. No other log messages, regardless of cause, share the same msg_id.

Fortinet Technologies Inc.

Page 14

FortiWeb 4.0 MR4 Patch 2 Log Reference

Event
Event log messages record subsystem events such as NTP-based time changes, reboots and RAID level changes. They also record configuration changes. To locate a description for an event log message, match the ID (log_id) field. Log ID numbers for logs of the event type are listed sequentially. Alternatively, to locate all logs of each sub-type, see Table 4. Table 4: Event logs by subtype & ID Sub Type (subtype) admin ID (log_id) 00032003 00032006 00032007 00032095 00032101 00032102 00032103 00032120 00032121 00032138 00032139 00032140 00032142 00032901 auth 00045002 00045003 ha policy 00037999 00120001 00120004 00120005 protection 00130001

Page 15

Table 4: Event logs by subtype & ID Sub Type (subtype) ID (log_id) 00130002 00130003 00130004 00130005 00130006 00130007 route system 000100001 00020001 00020006 00020088 00021101 00021140 00021234 00022004 00022804 00090003 00090007 00090008 user 00110001 00110002 XML 00046002 00046003 00046005 00046006 00046007 00046009 00046010

Fortinet Technologies Inc.

Page 16

FortiWeb 4.0 MR4 Patch 2 Log Reference

Reboot, shut down, & boot up messages


When FortiWeb is shutting down, if you are attached to the local console, you will see messages output to the CLI notifying you that the operating system is halting. The system is going down NOW !! As one of its final actions, FortiWeb records the shutdown: date=2012-08-22 time=12:43:03 log_id=00022101 msg_id=000000182451 type=event subtype="system" pri=critical device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" action=shutdown msg="shutdown the device" or reboot: date=2012-06-26 time=12:27:37 log_id=00032138 msg_id=000000118753 type=event subtype="admin" pri=critical device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=ssh(172.20.120.225) action=reboot msg="User admin rebooted the devicefrom ssh(172.20.120.225)." in the event log. If FortiWeb is rebooting, or starting up from a cold boot, when it starts up again, the local console prints: System is started. and its subsystems are loaded and readied to do their work. At this time FortiWeb records daemon startups in the event log, such as: date=2012-08-22 time=06:40:52 log_id=00032006 msg_id=000000000017 type=event subtype="admin" pri=information device_id=FVVM00UNLICENSED timezone="(GMT-8:00)Pacific Time(US&Canada)" msg="Log daemon started" Related 00021140 00032006 00032138

00020001

Meaning An administrator changed the NTP synchronization settings. Field name ID (log_id) Sub Type (subtype) Description 00020001 See Log ID numbers on page 12. system See Subtypes on page 13.

Fortinet Technologies Inc.

Page 17

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name Level (pri) Message (msg)

Description information See Priority level on page 13. User <administrator_name> modified Synchronize with NTP Server Status {enable | disable} from {GUI(<mgmt_ipv4>) | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> modified Synchronize with NTP Server Sync Interval to <minutes_int> from {GUI(<mgmt_ipv4>) | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Examples date=2012-05-25 time=04:15:52 log_id=00020001 msg_id=000000029282 type=event subtype="system" pri=information device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.220) msg="User admin modified Synchronize with NTP Server Status disable from GUI(172.20.120.220)." date=2012-06-26 time=10:21:08 log_id=00020001 msg_id=000000118695 type=event subtype="system" pri=information device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.225) msg="User admin modified Synchronize with NTP Server Sync Interval to 1 from GUI(172.20.120.225)." Related 00021140 00032140

00020006

Meaning Either: A web server that belongs to a server farm definition became available (up). A web server that belongs to a server farm definition became unavailable (down) according to the configured server health check, if any.

Fortinet Technologies Inc.

Page 18

FortiWeb 4.0 MR4 Patch 2 Log Reference

Solution If a web server is being detected as unavailable, but it is actually up: 1. Verify that you have selected a server health check in the server farm definition. 2. Verify that the server health check is using a method to contact the server that the server will respond to. If you are using Ping, for example, the server must be responsive to ICMP ECHO_REQUEST signals. Field name ID (log_id) Sub Type (subtype) Level (pri) Message (msg) Description 00020006 See Log ID numbers on page 12. system See Subtypes on page 13. alert See Priority level on page 13. policy <policy_name> Physical Server[<pserver_name>:<pserver-port_int>] is up policy <policy_name> Physical Server[<pserver_name>:<pserver-port_int>] is down

Examples date=2012-06-27 time=10:45:14 log_id=00020006 msg_id=000000123458 type=event subtype="system" pri=alert device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" msg="policy policy1 Physical Server[laptop-apache:443] is up" date=2012-05-22 time=11:25:59 log_id=00020006 msg_id=000000000033 type=event subtype="system" pri=alert device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" msg="policy policy1 Physical Server[laptop-apache:80] is down" Related 00120001

Fortinet Technologies Inc.

Page 19

FortiWeb 4.0 MR4 Patch 2 Log Reference

00020088

Meaning During a firmware upgrade, if the new firmware uses a different format for any existing settings, FortiWeb will attempt also to upgrade the configuration. If FortiWeb had to convert any settings to the new format, this log is recorded. Normally, no action is required. However, if you notice any behavior changes after the upgrade, you may want to compare your configuration with a backup copy to verify that it has been converted correctly. Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui) Action (action) Reason (reason) Status (status) Message (msg) upgrade Description 00020088 See Log ID numbers on page 12. system See Subtypes on page 13. information See Priority level on page 13. unknown

none

success

The old configurations are not compatible with the new version, and some of them have been changed correctly.

Example date=2012-07-20 time=15:49:55 log_id=00020088 msg_id=000000178864 type=event subtype="system" pri=information device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=unknown ui="" action=upgrade status=success reason=none msg="The old configurations are not compatible with the new version, and some of them have been changed correctly." Related
Fortinet Technologies Inc.

00032142
Page 20 FortiWeb 4.0 MR4 Patch 2 Log Reference

00032095

00021101

Meaning An administrator halted the operating system of the FortiWeb appliance in preparation to power off the hardware. Field name ID (log_id) Sub Type (subtype) Level (pri) Action (action) Message (msg) Example date=2012-08-22 time=12:43:03 log_id=00022101 msg_id=000000182451 type=event subtype="system" pri=critical device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" action=shutdown msg="shutdown the device" Related Reboot, shut down, & boot up messages Description 00021101 See Log ID numbers on page 12. system See Subtypes on page 13. critical See Priority level on page 13. shutdown

shutdown the device

00021140

Meaning The FortiWebs system clock was updated via NTP.

Fortinet Technologies Inc.

Page 21

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui) Message (msg) Example

Description 00021140 See Log ID numbers on page 12. system See Subtypes on page 13. notice See Priority level on page 13. ntp_daemon

NONE

The ntp daemon changed time from <old-timestamp_str> to <new-timestamp_str>.

date=2012-05-28 time=21:00:32 log_id=00021140 msg_id=000000042354 type=event subtype="system" pri=notice device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=ntp_daemon ui=NONE field=date-time msg="The ntp daemon changed time from Mon May 28 06:37:03 2012 to Mon May 28 21:00:32 2012 " Related 00020001

00021234

Meaning Either: the FortiGuard Antivirus or FortiGuard FortiWeb Security Service license could not be authenticated the FortiGuard services were up-to-date as of the time that the log message was recorded, when FortiWeb polled FortiGuard for the latest updates FortiWeb could not connect to the FDN update servers, or the connection was interrupted, and therefore could not update its packages for FortiGuard services a FortiGuard service update failed a FortiGuard service update succeeded

Fortinet Technologies Inc.

Page 22

FortiWeb 4.0 MR4 Patch 2 Log Reference

Solution If a FortiGuard license could not be authenticated: 1. Check with the Fortinet Technical Support web site to make sure that you have purchased a license for this FortiWeb. If you have an HA pair, you should have one license for each appliance in the pair. 2. Verify that the license is not currently expired, or not yet in effect. 3. Verify that FortiWeb can connect to the Internet to validate its license. To do this, it will require a valid route, DNS settings, and possibly also time settings. If connectivity is unreliable, the initial license request may fail. In this case, you can either wait 30 minutes for the appliance to request authorization again, or use the CLI command execute update-now to force an immediate license authentication query. If FortiWeb could not connect to the FDN or package retrieval failed, verify that FortiWeb has reliable Internet connectivity. Field name ID (log_id) Sub Type (subtype) Level (pri) Description 00021234 See Log ID numbers on page 12. system See Subtypes on page 13. error (for unauthorized licenses, update failures, or connectivity errors) or information (for up-to-date results from the FortiGuard poll) See Priority level on page 13. Message (msg) Fortiweb {virus engine | virus extend signature | virus signature | waf signature} is unauthorized Fortiweb {virus engine | virus extend signature | virus signature | waf signature} is already up-to-date update failed, failed to connect to fds server! update failed, couldn't receive a update package! Fortiweb {virus engine | virus extend signature | virus signature | waf signature} update failed Fortiweb {virus engine | virus extend signature | virus signature | waf signature} update succeeded

Examples date=2012-06-27 time=13:32:08 log_id=00021234 msg_id=000000123729 type=event subtype="system" pri=error device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" msg="Fortiweb virus engine is unauthorized"

Fortinet Technologies Inc.

Page 23

FortiWeb 4.0 MR4 Patch 2 Log Reference

date=2012-06-27 time=13:32:08 log_id=00021234 msg_id=000000123728 type=event subtype="system" pri=error device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" msg="Fortiweb virus extend signature is unauthorized" date=2012-06-27 time=13:32:08 log_id=00021234 msg_id=000000123727 type=event subtype="system" pri=error device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" msg="Fortiweb virus signature is unauthorized" date=2012-06-27 time=13:32:08 log_id=00021234 msg_id=000000123726 type=event subtype="system" pri=information device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" msg="Fortiweb waf signature is already up-to-date" date=2012-05-24 time=17:22:47 log_id=00021234 msg_id=000000021604 type=event subtype="system" pri=error device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" msg="update failed, failed to connect fds server!" date=2012-09-19 time=12:20:10 log_id=00021234 msg_id=000000070564 type=event subtype="system" pri=error device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" msg="Fortiweb virus extend signature update failed" date=2012-09-19 time=08:05:10 log_id=00021234 msg_id=000000068286 type=event subtype="system" pri=information device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" msg="Fortiweb virus engine update succeeded"

00022004

Meaning A scheduled FortiWeb configuration backup to an FTP server failed.

Fortinet Technologies Inc.

Page 24

FortiWeb 4.0 MR4 Patch 2 Log Reference

Solution There could be several reasons why the backup failed. 1. Check the IP address and login credentials that you have defined for FortiWebs FTP connection. 2. Verify that the directory you specified to receive backups exists, and has write permissions for that user name. 3. Make sure that the FTP servers disk is not full, that it has enough disk space to receive the backup, and that that user name has not consumed its disk space quota, if any. 4. Make sure that FortiWebs system time is accurate, and that the backup is not scheduled during a network or server maintenance window. 5. Test that a reliable route exists between FortiWeb and the FTP server by using execute ping and execute traceroute commands in the CLI. Keep in mind that if the network or the FTP server was down for maintenance at the time of the backup attempt, the backup would have failed during that time, even if connectivity works for you now. 6. If you have firewalls or routers performing NAT between FortiWeb and the FTP server, verify that FTP connections are allowed between them. Firewalls include host-based ones that may be on the FTP server itself, such as Windows Firewall or ipfw. Keep in mind that the FTP protocol requires TCP port 21, but that its mechanism style could be active or passive FTP, and that the protocol has both a command channel and a data transfer channel. If either of these channels fail, the backup will fail. Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) Action (action) Message (msg) Example date=2012-08-26 time=00:00:00 log_id=00022004 msg_id=000001104952 type=event subtype="system" pri=information device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=system action=backup msg="backup backup_backup-server_20120826000000 to 172.16.1.10 fortiweb/backups/ FAIL" Description 00022004 See Log ID numbers on page 12. system See Subtypes on page 13. information See Priority level on page 13. system

backup

backup backup_<FTP-backup_name>_<timestamp_str> to <server_ipv4> <folder_str> FAIL

Fortinet Technologies Inc.

Page 25

FortiWeb 4.0 MR4 Patch 2 Log Reference

00022804

Meaning License authentication determined that the FortiWeb-VM license uploaded by an administrator is either valid or invalid. Solution If the license is invalid: 1. Check with the Fortinet Technical Support web site to make sure that you have purchased a license for this FortiWeb. If you have an HA pair, you should have one license for each appliance in the pair. If you are using a trial license, verify that the trial period has not expired. 2. If you are using a purchased license, verify that you have uploaded the license file to FortiWeb-VM. 3. Verify that the license has not been already used by another. (If you upload the license and it is currently associated with a different management IP, the web UI will display an error message: Duplicate license detected.) 4. Verify that the number of allocated vCPUs does not exceed the limit of the license. 5. Verify that FortiWeb can connect to the Internet to validate its license. To do this, it will require a valid route, DNS settings, and possibly also time settings. If connectivity is unreliable, the initial license request may fail. In this case, you can either wait 30 minutes for the appliance to request authorization again, or use the CLI command execute update-now to force an immediate license authentication query. Field name ID (log_id) Sub Type (subtype) Level (pri) Message (msg) Examples Description 00022804 See Log ID numbers on page 12. system See Subtypes on page 13. critical See Priority level on page 13. License status changed to {VALID | INVALID}

Fortinet Technologies Inc.

Page 26

FortiWeb 4.0 MR4 Patch 2 Log Reference

date=2012-05-22 time=02:13:15 log_id=00022804 msg_id=000000000014 type=event subtype="system" pri=critical device_id=FVVM020000003619 timezone="(GMT-8:00)Pacific Time(US&Canada)" service=license status=VALID msg="License status changed to VALID" date=2012-06-13 time=12:15:38 log_id=00022804 msg_id=000000104120 type=event subtype="system" pri=critical device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" service=license status=INVALID msg="License status changed to INVALID"

00032003

Meaning Either: Someone attempted to log in to a FortiWeb administrator account, but failed. An administrator deleted a scheduled backup of the FortiWeb configuration to an FTP server. Solution If you suspect that an unauthorized person is attempting to log in to your FortiWeb, there are some preventative measures that you can take. 1. Restrict physical access to the FortiWeb to ensure that only authorized persons can attach a console or computer to the appliances local console port. 2. Configure all administrator accounts with trusted IPs that restrict login attempts to ones that originate only from your trusted, physically secured, private administrative network. Do not allow login attempts from hostile or untrusted IP addresses. If any administrator account uses a broad trusted IP definition such as 0.0.0.0/0.0.0.0, then due to that account, FortiWeb must allow login attempts from all IP addresses, including the Internet. Brute force login attempts are then a significant risk. 3. Enable strong password enforcement. Passwords must be significantly complex in length and character types in order to make brute force login attempts impractically slow. 4. Require regular password changes. 5. Enable only secure administrative protocols (SSH and HTTPS) on network interfaces. Insecure protocols such as HTTP and Telnet are easily susceptible to eavesdropping, man-in-the-middle, and other attacks that could compromise your connection, your password, or both. Field name ID (log_id) Sub Type (subtype) Description 00032003 See Log ID numbers on page 12. admin See Subtypes on page 13.
Page 27 FortiWeb 4.0 MR4 Patch 2 Log Reference

Fortinet Technologies Inc.

Field name Level (pri)

Description alert (for a failed administrator authentication) or information (for deletion of an FTP backup schedule) See Priority level on page 13.

User (user) User Interface (ui) Action (action) Status (status) Reason (reason) Message (msg)

<administrator_name>

{GUI(<mgmt_ipv4>) | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} login N/A failure N/A {name_invalid | password_invalid} N/A User <administrator_name> login failed from {GUI(<mgmt_ipv4>) | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> delete backup config rule <FTP-backup_name> <from {GUI(<mgmt_ipv4>) | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Examples date=2012-08-22 time=15:28:37 log_id=00032009 msg_id=000000000376 type=event subtype="admin" pri=alert device_id=FVVM00UNLICENSED timezone="(GMT-5:00)Eastern Time(US & Canada)" user="admin2" ui=GUI(172.20.120.49) action=login status=failure reason="password_invalid" msg="User admin2 login failed from GUI(172.20.120.49)" date=2012-08-28 time=08:34:24 log_id=00033003 msg_id=000001145610 type=event subtype="admin" pri=information device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) msg="User admin delete backup config rule FTP-backup1 from GUI(172.20.120.222)" Related 00032006

Fortinet Technologies Inc.

Page 28

FortiWeb 4.0 MR4 Patch 2 Log Reference

00032006

Meaning Either: A FortiWeb administrator logged in. The logging daemon started. Normally, this occurs at boot time. The scheduled configuration backup daemon started. Normally, this occurs at boot time. Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) Description 00032006 See Log ID numbers on page 12. admin See Subtypes on page 13. information See Priority level on page 13. <administrator_name> N/A N/A User Interface (ui) {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} Logins from jsconsole indicate use of the CLI Console widget on System > Status > Status in the web UI (GUI). The source IP address is the same as the one recorded in the corresponding log message for the GUI login. N/A N/A Action (action) login N/A N/A Status (status) success N/A N/A

Fortinet Technologies Inc.

Page 29

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name Reason (reason)

Description none N/A N/A

Message (msg)

User <administrator_name> login accepted from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} Log daemon started Backup daemon started

Examples date=2010-11-04 time=09:26:08 log_id=00032006 msg_id=000000000006 type=event subtype=admin pri=information device_id=0123456789876543 timezone="(GMT-8:00)Pacific Time(US&Canada)" user="admin" ui=console action=login status=success reason=none msg="User admin login accepted from console" date=2012-06-27 time=10:45:14 log_id=00032006 msg_id=000000123460 type=event subtype="admin" pri=information device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" msg="Log daemon started" date=2012-06-27 time=10:45:14 log_id=00032006 msg_id=000000123457 type=event subtype="admin" pri=information device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" msg="Backup daemon started" Related 00032007 00022804

00032007

Meaning Either: A FortiWeb administrator logged out. This can occur either by clicking Logout in the web UI, or by inactivity that allows the session to time out. An administrator deleted a locally-stored attack log, event log, or traffic log file.

Fortinet Technologies Inc.

Page 30

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name ID (log_id) Sub Type (subtype) Level (pri)

Description 00032007 See Log ID numbers on page 12. admin See Subtypes on page 13. information (for a session ending/logout) or notice (for a log file deletion) See Priority level on page 13.

User (user) User Interface (ui)

<administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} Logins from jsconsole indicate use of the CLI Console widget on System > Status > Status in the web UI (GUI). The source IP address is the same as the one recorded in the corresponding log message for the GUI login.

Action (action)

logout logout N/A

Status (status)

success success N/A

Reason (reason)

exit timeout N/A

Message (msg)

User <administrator_name> logs out from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} GUI session timeout from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> has deleted disk log <file_str> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Fortinet Technologies Inc.

Page 31

FortiWeb 4.0 MR4 Patch 2 Log Reference

Examples date=2012-02-13 time=18:49:57 log_id=00032007 msg_id=000015400632 type=event subtype="admin" pri=information device_id=FV-1KC3R08600008 timezone="(GMT+8:00)Beijing,ChongQing,HongKong,Urumgi" user=admin ui=ssh(10.0.0.66) action=logout status=success reason=exit msg="User admin logs out from ssh(10.0.0.66)" date=2012-05-22 time=02:51:44 log_id=00032007 msg_id=000000000020 type=event subtype="admin" pri=information device_id=FVVM020000003619 timezone="(GMT-8:00)Pacific Time(US&Canada)" user=admin ui=GUI(172.20.120.220) action=logout status=success reason=timeout msg="GUI session timeout from GUI(172.20.120.220)" date=2012-08-28 time=08:00:16 log_id=00032007 msg_id=000001145040 type=event subtype="admin" pri=notice device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) log=alog.log msg="User admin has deleted disk log alog.log from GUI(172.20.120.222)" Related 00032006 00022804

00032095

Meaning Either: A FortiWeb administrator downloaded a log file. An administrator downloaded a backup copy of FortiWebs core configuration file, fwb_system.conf. An administrator downloaded an X.509 server certificate or CSR. Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) Description 00032095 See Log ID numbers on page 12. admin See Subtypes on page 13. warning See Priority level on page 13. <administrator_name>

Fortinet Technologies Inc.

Page 32

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name User Interface (ui)

Description {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} Logins from jsconsole indicate use of the CLI Console widget on System > Status > Status in the web UI (GUI). The source IP address is the same as the one recorded in the corresponding log message for the GUI login.

Action (action) Status (status) Message (msg)

download

success

Logging file has been backed up by user <administrator_name> via {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} System config file has been backed up by user <administrator_name> via {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} Local Cert(CSR) file has been backed up by user <administrator_name> via {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Examples date=2012-02-13 time=18:43:10 log_id=00032095 msg_id=000015400519 type=event subtype="admin" pri=warning device_id=FV-1KC3R08600008 timezone="(GMT+8:00)Beijing,ChongQing,HongKong,Urumgi" user=admin ui=GUI(10.0.0.1) action=download status=success msg="Logging file has been backed up by user admin via GUI(10.0.0.1)" date=2012-07-04 time=10:28:18 log_id=00032095 msg_id=000000136532 type=event subtype="admin" pri=warning device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.221) action=download status=success msg="System config file has been backed up by user admin via GUI(172.20.120.221)" date=2012-08-28 time=09:29:50 log_id=00032095 msg_id=000001146535 type=event subtype="admin" pri=warning device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) action=download status=success msg="Local Cert(CSR) file has been backed up by user admin via GUI(172.20.120.222)" Related
Fortinet Technologies Inc.

00020088 00032142
Page 33 FortiWeb 4.0 MR4 Patch 2 Log Reference

00032101

Meaning A FortiWeb administrator created an administrative access profile. Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui) Description 00032101 See Log ID numbers on page 12. admin See Subtypes on page 13. notice See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} Logins from jsconsole indicate use of the CLI Console widget on System > Status > Status in the web UI (GUI). The source IP address is the same as the one recorded in the corresponding log message for the GUI login.

Message (msg)

User <administrator_name> added a new access profile <profile_name> via {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Example date=2012-08-28 time=15:11:23 log_id=00032101 msg_id=000001152340 type=event subtype="admin" pri=notice device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) profile=write-only msg="User admin added new access profile write-only from GUI(172.20.120.222)" Related 00032102 00032103

00032102

Meaning A FortiWeb administrator changed an administrative access profile.


Fortinet Technologies Inc. Page 34 FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui)

Description 00032102 See Log ID numbers on page 12. admin See Subtypes on page 13. notice See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} Logins from jsconsole indicate use of the CLI Console widget on System > Status > Status in the web UI (GUI). The source IP address is the same as the one recorded in the corresponding log message for the GUI login.

Message (msg)

User <administrator_name> changed the setting of access profile <profile_name> via {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Example date=2012-08-28 time=15:07:08 log_id=00032102 msg_id=000001152268 type=event subtype="admin" pri=notice device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) profile=read_only field=mntgrp old=Read new=NONE msg="User admin changed the setting of access profile read_only from GUI(172.20.120.222)" Related 00032101 00032103

00032103

Meaning A FortiWeb administrator deleted an administrative access profile.

Fortinet Technologies Inc.

Page 35

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui)

Description 00032103 See Log ID numbers on page 12. admin See Subtypes on page 13. notice See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} Logins from jsconsole indicate use of the CLI Console widget on System > Status > Status in the web UI (GUI). The source IP address is the same as the one recorded in the corresponding log message for the GUI login.

Message (msg)

User <administrator_name> deleted a access profile <profile_name> via {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Example date=2012-08-28 time=15:11:28 log_id=00032103 msg_id=000001152344 type=event subtype="admin" pri=notice device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) profile=write-only msg="User admin deleted a access profile write-only from GUI(172.20.120.222)" Related 00032102 00032101

00032120

Meaning A FortiWeb administrator changed the configuration of a network interface.

Fortinet Technologies Inc.

Page 36

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui)

Description 00032120 See Log ID numbers on page 12. admin See Subtypes on page 13. notice See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} Logins from jsconsole indicate use of the CLI Console widget on System > Status > Status in the web UI (GUI). The source IP address is the same as the one recorded in the corresponding log message for the GUI login.

Message (msg)

User <administrator_name> modified Interface <interface_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Example date=2012-05-29 time=10:11:16 log_id=00032120 msg_id=000000055256 type=event subtype="admin" pri=notice device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=console intf=port1 msg="User admin modified Interface port1 from console" Related 00032121

00032121

Meaning A FortiWeb administrator changed the IP address of a network interface.

Fortinet Technologies Inc.

Page 37

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui)

Description 00032121 See Log ID numbers on page 12. admin See Subtypes on page 13. notice See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} Logins from jsconsole indicate use of the CLI Console widget on System > Status > Status in the web UI (GUI). The source IP address is the same as the one recorded in the corresponding log message for the GUI login.

Message (msg)

User <administrator_name> changed the ip setting of interface <interface_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Example date=2012-05-29 time=10:11:16 log_id=00032121 msg_id=000000055255 type=event subtype="admin" pri=notice device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=console intf=port1 field=ip old=172.20.120.47:255.255.255.0 new=10.1.1.220:255.255.255.0 msg="User admin changed the ip setting of interface port1 from console" Related 00032120

00032138

Meaning A FortiWeb administrator rebooted the appliance.

Fortinet Technologies Inc.

Page 38

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui)

Description 00032138 See Log ID numbers on page 12. admin See Subtypes on page 13. critical See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} Logins from jsconsole indicate use of the CLI Console widget on System > Status > Status in the web UI (GUI). The source IP address is the same as the one recorded in the corresponding log message for the GUI login.

Action (action) Message (msg)

reboot

User <administrator_name> rebooted the device from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Example date=2012-06-26 time=12:27:37 log_id=00032138 msg_id=000000118753 type=event subtype="admin" pri=critical device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=ssh(172.20.120.225) action=reboot msg="User admin rebooted the device from ssh(172.20.120.225)." Related 00021101 Reboot, shut down, & boot up messages

00032139

Meaning Either: A FortiWeb administrator restored the configuration by uploading a backup file. An administrator installed new FortiWeb firmware.

Fortinet Technologies Inc.

Page 39

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui)

Description 00032139 See Log ID numbers on page 12. admin See Subtypes on page 13. critical See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} Logins from jsconsole indicate use of the CLI Console widget on System > Status > Status in the web UI (GUI). The source IP address is the same as the one recorded in the corresponding log message for the GUI login.

Action (action) Message (msg)

restore-configuration upgrade-image User <administrator_name> restored the configuration from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> upgrade the image from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Examples date=2012-05-22 time=08:25:30 log_id=00032139 msg_id=000000000023 type=event subtype="admin" pri=critical device_id=FVVM020000003619 timezone="(GMT-8:00)Pacific Time(US&Canada)" user=admin ui=GUI(172.20.120.220) action=restore-configuration msg="User admin restored the configuration from GUI(172.20.120.220)" date=2012-06-06 time=09:26:17 log_id=00032139 msg_id=000000065391 type=event subtype="admin" pri=critical device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(10.1.1.8) action=upgrade-image msg="User admin upgrade the image from GUI(10.1.1.8)"

Fortinet Technologies Inc.

Page 40

FortiWeb 4.0 MR4 Patch 2 Log Reference

00032140

Meaning Either: A FortiWeb administrator enabled or disabled a global advanced setting, such as shared IP detection or recursive URL decoding. An administrator manually changed the FortiWeb system clocks date and/or time. Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui) Description 00032140 See Log ID numbers on page 12. admin See Subtypes on page 13. notice See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} Logins from jsconsole indicate use of the CLI Console widget on System > Status > Status in the web UI (GUI). The source IP address is the same as the one recorded in the corresponding log message for the GUI login.

Message (msg)

User <administrator_name> changed '<setting_name>' in Advanced settings to '{Enable | Disable}' from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> changed '<setting_name>' global setting to <value_str> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> changed time from <previous-time_str> to <current-time_str> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Fortinet Technologies Inc.

Page 41

FortiWeb 4.0 MR4 Patch 2 Log Reference

Examples date=2012-05-22 time=11:25:56 log_id=00032140 msg_id=000000000026 type=event subtype="admin" pri=notice device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=unknown ui=unknown field=share-ip old_value=10 new_value=11 msg="User unknown changed 'Shared IP' in Advanced settings to 'Enable' from unknown" date=2012-05-22 time=11:25:56 log_id=00032140 msg_id=000000000027 type=event subtype="admin" pri=notice device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=unknown ui=unknown field=circulate-url-decode old_value=10 new_value=11 msg="User unknown changed 'Support Recursive Decoding' in Advanced settings to 'Enable' from unknown" date=2012-05-25 time=04:15:52 log_id=00032140 msg_id=000000029283 type=event subtype="admin" pri=notice device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user="admin" ui=GUI(172.20.120.220) action=time_change field=date-time msg="User admin changed time from Fri May 25 05:38:15 2012 to Fri May 25 04:15:52 2012 from GUI(172.20.120.220)" date=2012-08-28 time=15:02:48 log_id=00032140 msg_id=000001152196 type=event subtype="admin" pri=notice device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) field=timeout old_value=480m new_value=479m msg="User admin changed timeout global setting to 479m from GUI(172.20.120.222)" Related 00020001

00032142

Meaning A FortiWeb administrator downloaded a complete FortiWeb configuration backup file, including any X.509 certificates that had been uploaded. Field name ID (log_id) Sub Type (subtype) Level (pri) Description 00032142 See Log ID numbers on page 12. admin See Subtypes on page 13. notice See Priority level on page 13.

Fortinet Technologies Inc.

Page 42

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name User (user) User Interface (ui)

Description <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} Logins from jsconsole indicate use of the CLI Console widget on System > Status > Status in the web UI (GUI). The source IP address is the same as the one recorded in the corresponding log message for the GUI login.

Message (msg)

User <administrator_name> backed up the full configuration from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Example date=2012-06-13 time=12:40:59 log_id=00032142 msg_id=000000104535 type=event subtype="admin" pri=notice device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=ssh(172.20.120.225) action=download msg="User admin backed up the full configuration from ssh(172.20.120.225)" Related 00020088 00032095 00090008

00032901

Meaning FortiWeb failed to connect to a web site that you have configured to be monitored by the anti-defacement feature. Therefore it could not determine whether the web site has been defaced. Solution Verify the login and IP address that you provided. Also, on the web server, check the file system permissions for the account that FortiWeb is using to connect. (FortiWeb must be able to both read and, if it will be restoring files, write to the folder and files. On Microsoft Windows, you may need to examine your security policy configuration to make sure that the account is authenticating as itself, and is not degrading to the guest account.) Verify that a route exists between the FortiWeb and the web server, and that connectivity is reliable, with no packet loss. Also verify that any routers or firewalls between them, including Windows Firewall, are not blocking SSH, FTP, or CIFS connections. Other troubleshooting varies by the protocol that FortiWeb is using to connect, such as checking for a compatible protocol version and cipher suite.

Fortinet Technologies Inc.

Page 43

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name ID (log_id) Sub Type (subtype) Level (pri) User Interface (ui) Action (action) Status (status) Reason (reason) Message (msg) Example

Description 00032901 See Log ID numbers on page 12. admin See Subtypes on page 13. warning See Priority level on page 13. anti-defacement

monitor

alert

filechange

Fail to connect to website <anti-defacement_name> (host is <server_ipv4>)

date=2012-02-13 time=18:49:09 log_id=00032901 msg_id=000015400628 type=event subtype="admin" pri=warning device_id=FV-1KC3R08600008 timezone="(GMT+8:00)Beijing,ChongQing,HongKong,Urumgi" ui=anti-defacement action=monitor status=alert reason=filechange msg="Fail to connect to website www.example.com (host is 10.0.0.1)"

00037999

Meaning Either: A failover occurred that is, the secondary (standby) appliance in the FortiWeb high availability (HA) cluster assumed the duties of processing traffic because it detected that the primary (active) appliance had failed. An administrator changed the HA configuration of the cluster.

Fortinet Technologies Inc.

Page 44

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) Action (action) Message (msg)

Description 00037999 See Log ID numbers on page 12. ha See Subtypes on page 13. warning (for a failover) or information (for an HA configuration change) See Priority level on page 13. HA (for a failover) or admin (for an HA configuration change)

HA-switch

HA switch from standby to main. User <administrator_name> modified ha.<setting_name> to <value_str> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Examples date=2012-08-20 time=16:15:27 log_id=00037999 msg_id=000001009877 type=event subtype="ha" pri=warning device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" action=HA-Switch user=HA msg="HA switch from standby to main." date=2012-08-23 time=15:42:39 log_id=00037999 msg_id=000001065009 type=event subtype="ha" pri=information device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.49) msg="User admin modified ha.priority to 4 from GUI(172.20.120.49)."

00045002

Meaning Someone attempted to log in to a web site where you have configured FortiWeb to provide authentication, but failed.

Fortinet Technologies Inc.

Page 45

FortiWeb 4.0 MR4 Patch 2 Log Reference

Solution If you suspect that an unauthorized person is attempting to log in to your web site, there are some preventative measures that you can take. 1. Require regular password changes. 2. Require strong passwords. Passwords must be significantly complex in length and character types in order to make brute force login attempts impractically slow. 3. Redirect requests for HTTP to a secure (HTTPS) URL. Insecure protocols such as HTTP are easily susceptible to eavesdropping, man-in-the-middle, and other attacks that could compromise your connection, your password, or both. Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui) Action (action) Status (status) Reason (reason) Request URL (request_url) Message (msg) Example date=2012-02-13 time=12:30:06 log_id=00045002 msg_id=000015388815 type=event subtype="auth" pri=alert device_id=FV-1KC3R08600008 timezone="(GMT+8:00)Beijing,ChongQing,HongKong,Urumgi" user="test2" ui="Application(10.0.0.66)" action=login status=failure reason="LDAP wrong username/password" msg="User test2 HTTP BASIC login failed from 10.0.0.66" request_url=www.example.com/login.html Related
Fortinet Technologies Inc. Page 46 FortiWeb 4.0 MR4 Patch 2 Log Reference

Description 00045002 See Log ID numbers on page 12. auth See Subtypes on page 13. alert See Priority level on page 13. <user_name>

Application(<source_ipv4>)

login

failure

LDAP wrong username/password

<request_url>

User <user_name> <auth-method_str> login failed from <source_ipv4>

00045003 00110001

00045003

Meaning An end-user successfully logged in to a web site that you have configured FortiWeb to provide with authentication. Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui) Action (action) Status (status) Request URL (request_url) Message (msg) Example date=2012-02-13 time=12:30:06 log_id=00045003 msg_id=000015388817 type=event subtype="auth" pri=information device_id=FV-1KC3R08600008 timezone="(GMT+8:00)Beijing,ChongQing,HongKong,Urumgi" user="test2" ui="Application(10.11.0.66)" action=login status=success msg="User test2 HTTP BASIC login successfully from 10.11.0.66" request_url=www.example.com/user.html Related
Fortinet Technologies Inc.

Description 00045003 See Log ID numbers on page 12. auth See Subtypes on page 13. information See Priority level on page 13. <user_name>

Application(<source_ipv4>)

login

success

<request_url>

User <user_name> <auth-method_str> login successfully from <source_ipv4>

00045002
Page 47 FortiWeb 4.0 MR4 Patch 2 Log Reference

00110001

00046002

Meaning An administrator created, changed, or deleted an XML content filter rule. Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui) Message (msg) Description 00046002 See Log ID numbers on page 12. XML See Subtypes on page 13. information See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | edit | deleted} xml_filter_rule <XML-content-filter_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Example date=2012-08-28 time=12:34:21 log_id=00046002 msg_id=000001149675 type=event subtype="XML" pri=information device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) msg="User admin delete xml_filter_rule xml-content-filter2 from GUI(172.20.120.222)"

00046003

Meaning An administrator created, changed, or deleted an XML intrusion prevention rule.

Fortinet Technologies Inc.

Page 48

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui) Message (msg)

Description 00046003 See Log ID numbers on page 12. XML See Subtypes on page 13. information See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | edit | deleted} xml_intrusion_prevention_rule <XML-intrusion-preventor_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Example date=2012-02-13 time=18:21:02 log_id=00046003 msg_id=000015399611 type=event subtype="XML" pri=information device_id=FV-1KC3R08600008 timezone="(GMT+8:00)Beijing,ChongQing,HongKong,Urumgi" user=admin ui=ssh(10.0.0.66) msg="User admin added xml_intrusion_prevention_rule FWB_intrusion_filter from ssh(10.0.0.66)"

00046005

Meaning An administrator created, changed, or deleted an XML key management group. Field name ID (log_id) Sub Type (subtype) Level (pri) Description 00046005 See Log ID numbers on page 12. XML See Subtypes on page 13. information See Priority level on page 13.

Fortinet Technologies Inc.

Page 49

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name User (user) User Interface (ui) Message (msg)

Description <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | edit | deleted} xml_key_management <XML-intrusion-preventor_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Example date=2012-02-13 time=18:02:16 log_id=00046005 msg_id=000015399338 type=event subtype="XML" pri=information device_id=FV-1KC3R08600008 timezone="(GMT+8:00)Beijing,ChongQing,HongKong,Urumgi" user=admin ui=ssh(10.0.0.66) msg="User admin edit xml_key_management key-group1 from ssh(10.0.0.66)"

00046006

Meaning An administrator created, changed, or deleted a one-time or recurring schedule. Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui) Message (msg) Description 00046006 See Log ID numbers on page 12. XML See Subtypes on page 13. information See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> edit {xml_period_time_recurring | xml_period_time_onetime} <schedule_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Fortinet Technologies Inc.

Page 50

FortiWeb 4.0 MR4 Patch 2 Log Reference

Example date=2012-08-28 time=11:18:17 log_id=00046006 msg_id=000001148400 type=event subtype="XML" pri=information device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) msg="User admin edit xml_period_time_recurring recurring-schedule1 from GUI(172.20.120.222)"

00046007

Meaning A W3C Schema file defining XML structures was uploaded. Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui) Message (msg) Description 00046007 See Log ID numbers on page 12. unknown See Subtypes on page 13. information See Priority level on page 13. unknown

unknown

User <administrator_name> added schema_file <schema_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Examples date=2010-11-04 time=09:26:04 log_id=00046007 msg_id=000000000001 type=event subtype=unknown pri=information device_id=0123456789876543 timezone="(GMT-8:00)Pacific Time(US&Canada)" user=unknown ui=unknown msg="User unknown added schema_file UBL1.0 from unknown"

Fortinet Technologies Inc.

Page 51

FortiWeb 4.0 MR4 Patch 2 Log Reference

date=2010-11-04 time=09:26:04 log_id=00046007 msg_id=000000000002 type=event subtype=unknown pri=information device_id=0123456789876543 timezone="(GMT-8:00)Pacific Time(US&Canada)" user=unknown ui=unknown msg="User unknown added schema_file UBL2.0 from unknown" date=2010-11-04 time=09:26:04 log_id=00046007 msg_id=000000000003 type=event subtype=unknown pri=information device_id=0123456789876543 timezone="(GMT-8:00)Pacific Time(US&Canada)" user=unknown ui=unknown msg="User unknown added schema_file RSS2.0 from unknown"

00046009

Meaning An administrator created a web service definition by selecting one of the actions defined in a previously uploaded WSDL file. Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui) Message (msg) Description 00046009 See Log ID numbers on page 12. XML See Subtypes on page 13. information See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> added xml web service <wsdl-action_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Example date=2012-07-19 time=09:05:44 log_id=00046009 msg_id=000000170205 type=event subtype="XML" pri=information device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.122) msg="User admin added xml web service getSummary from GUI(172.20.120.122)" Related

Fortinet Technologies Inc.

Page 52

FortiWeb 4.0 MR4 Patch 2 Log Reference

00046010

00046010

Meaning An administrator created, changed, or deleted a WSDL group. Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui) Message (msg) Description 00046010 See Log ID numbers on page 12. XML See Subtypes on page 13. information See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | edit | deleted} xml_period_time_recurring recurring-schedule1 <XML-intrusion-preventor_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Example date=2012-02-13 time=17:59:42 log_id=00046010 msg_id=000015399283 type=event subtype="XML" pri=information device_id=FV-1KC3R08600008 timezone="(GMT+8:00)Beijing,ChongQing,HongKong,Urumgi" user=admin ui=ssh(10.0.0.66) msg="User admin edit xml service group WSDL-group1 from ssh(10.0.0.66)" Related 00046009

00090003

Meaning An administrator changed the DNS settings.

Fortinet Technologies Inc.

Page 53

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui) Message (msg)

Description 00090003 See Log ID numbers on page 12. system See Subtypes on page 13. information See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> modified DNS settings from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Example date=2012-02-13 time=13:54:06 log_id=00090003 msg_id=000015393524 type=event subtype="system" pri=information device_id=FV-1KC3R08600008 timezone="(GMT+8:00)Beijing,ChongQing,HongKong,Urumgi" user=admin ui=ssh(10.0.0.66) msg="User admin modified DNS settings from ssh(10.0.0.66)." Related 00021101 00032006

00090007

Meaning Either: A FortiWeb administrator created, changed, or deleted another FortiWeb administrator account. Resetting the accounts password, as well as any other setting change, is considered to be an account change. An administrator hid or displayed a widget on his or her GUI dashboard.

Fortinet Technologies Inc.

Page 54

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui) Message (msg)

Description 00090007 See Log ID numbers on page 12. system See Subtypes on page 13. information See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | modified | deleted} administrator <administrator_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | deleted} Status Content <widget_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Examples date=2012-02-10 time=08:19:44 log_id=00090007 msg_id=000000015674 type=event subtype="system" pri=information device_id=FVVM020000003619 timezone="(GMT-8:00)Pacific Time(US&Canada)" user=admin ui=GUI(172.20.120.46) msg="User admin added administrator admin1 from GUI(172.20.120.46)." date=2012-08-28 time=15:22:26 log_id=00090007 msg_id=000001152554 type=event subtype="system" pri=information device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) msg="User admin added Status Content policysummary from GUI(172.20.120.222)."

Fortinet Technologies Inc.

Page 55

FortiWeb 4.0 MR4 Patch 2 Log Reference

00090008

Meaning An administrator either: generated a certificate signing request (CSR) uploaded the X.509 certificate identifying a protected web server (with or without its private key) for the purpose of HTTPS inspection or SSL/TLS offloading deleted a server certificate or CSR added, changed, or deleted a certificate verificator added, changed, or deleted a CA group added, changed, or deleted an intermediate certificate group uploaded or deleted a CAs certificate uploaded or deleted an OCSP servers certificate (i.e. a remote certificate) Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui) Description 00090008 See Log ID numbers on page 12. system See Subtypes on page 13. information See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Fortinet Technologies Inc.

Page 56

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name Message (msg)

Description User <administrator_name> {added | deleted} local certificate <certificate_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | modified | deleted} certificate verify <verificator_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | modified | deleted} certificate CA group <CA-group_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | modified | deleted} intermediate certificate group <intermediate-cert-group_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | deleted} certificate CA <CA-cert_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | deleted} remote certificate <OCSP-cert_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Examples date=2012-08-28 time=09:29:43 log_id=00090008 msg_id=000001146533 type=event subtype="system" pri=information device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) msg="User admin added local certificate csr1 from GUI(172.20.120.222)." date=2012-08-28 time=10:14:13 log_id=00090008 msg_id=000001147276 type=event subtype="system" pri=information device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) msg="User admin deleted local certificate csr1 from GUI(172.20.120.222)." date=2012-08-28 time=14:40:06 log_id=00090008 msg_id=000001151812 type=event subtype="system" pri=information device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) msg="User admin modified certificate verify cert-verifier1 from GUI(172.20.120.222)."

Fortinet Technologies Inc.

Page 57

FortiWeb 4.0 MR4 Patch 2 Log Reference

date=2012-08-28 time=14:53:21 log_id=00090008 msg_id=000001152035 type=event subtype="system" pri=information device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) msg="User admin modified certificate CA group ca-group1 from GUI(172.20.120.222)." date=2012-08-28 time=14:52:58 log_id=00090008 msg_id=000001152028 type=event subtype="system" pri=information device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) msg="User admin modified intermediate CA group intermediary-cert-group1 from GUI(172.20.120.222)." date=2012-08-28 time=14:57:17 log_id=00090008 msg_id=000001152102 type=event subtype="system" pri=information device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) msg="User admin added certificate CA CA_Cert_2 from GUI(172.20.120.222)." Related 00032142

000100001

Meaning An administrator created, changed, or deleted a static IP-layer route. Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui) Message (msg) Description 000100001 See Log ID numbers on page 12. route See Subtypes on page 13. information See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | modified | deleted} Route <route_index> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Fortinet Technologies Inc.

Page 58

FortiWeb 4.0 MR4 Patch 2 Log Reference

Examples date=2012-05-22 time=02:12:13 log_id=00100001 msg_id=000000000012 type=event subtype="route" pri=information device_id=FVVM00UNLICENSED timezone="(GMT-8:00)Pacific Time(US&Canada)" user=admin ui=console msg="User admin added Route 1 from console."

00110001

Meaning Either: An administrator created, changed, or deleted a local user account. An administrator created, changed, or deleted a user group. An administrator created, changed, or deleted an LDAP user/administrator authentication query. An administrator created, changed, or deleted an NTLM user authentication query. Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui) Description 00110001 See Log ID numbers on page 12. user See Subtypes on page 13. information See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Fortinet Technologies Inc.

Page 59

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name Message (msg)

Description User <administrator_name> {added | modified | deleted} User Group <group_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | modified | deleted} Local User <account_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | modified | deleted} LDAP User <query_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | modified | deleted} Ntlm User <query_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Examples date=2012-02-13 time=12:29:58 log_id=00110001 msg_id=000015388799 type=event subtype="user" pri=information device_id=FV-1KC3R08600008 timezone="(GMT+8:00)Beijing,ChongQing,HongKong,Urumgi" user=admin ui=ssh(10.0.0.66) msg="User admin added User Group user-group1 from ssh(10.0.0.66)." date=2012-08-28 time=14:25:48 log_id=00110001 msg_id=000001151563 type=event subtype="user" pri=information device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) msg="User admin added Local User local-user1 from GUI(172.20.120.222)." date=2012-08-28 time=14:29:41 log_id=00110001 msg_id=000001151631 type=event subtype="user" pri=information device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) msg="User admin modified LDAP User LDAP query 1 from GUI(172.20.120.222)." date=2012-08-28 time=14:29:49 log_id=00110001 msg_id=000001151633 type=event subtype="user" pri=information device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) msg="User admin modified Ntlm User ntlm-user1 from GUI(172.20.120.222)." Related 00045002 00045003 00110001

Fortinet Technologies Inc.

Page 60

FortiWeb 4.0 MR4 Patch 2 Log Reference

00110002

Meaning An administrator created, changed, or deleted a RADIUS query definition. Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui) Message (msg) Description 00110002 See Log ID numbers on page 12. user See Subtypes on page 13. information See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | modified | deleted} the Radius User <query_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Example date=2012-02-13 time=12:26:52 log_id=00110002 msg_id=000015388491 type=event subtype="user" pri=information device_id=FV-1KC3R08600008 timezone="(GMT+8:00)Beijing,ChongQing,HongKong,Urumgi" user=admin ui=ssh(10.0.0.66) msg="User admin deleted the Radius User RADIUS-query1 from ssh(10.0.0.66)." Related 00045002 00045003 00110002

Fortinet Technologies Inc.

Page 61

FortiWeb 4.0 MR4 Patch 2 Log Reference

00120001

Meaning Either: An administrator created, changed, or deleted a policy that governs flow of traffic to your web servers (i.e. a server policy). An administrator created, changed, or deleted a server health check that monitors the availability of your web servers. An administrator created, changed, or deleted the configuration of a web server that is defined by its IP address (i.e. a physical server). An administrator created, changed, or deleted the configuration of a web server that is defined by its fully qualified domain name (i.e. a domain server). An administrator created, changed, or deleted a virtual server on FortiWeb. An administrator created, changed, or deleted a URL interpreter for auto-learning on FortiWeb. An administrator created, changed, or deleted a custom error page. Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui) Description 00120001 See Log ID numbers on page 12. policy See Subtypes on page 13. information See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} Logins from jsconsole indicate use of the CLI Console widget on System > Status > Status in the web UI (GUI). The source IP address is the same as the one recorded in the corresponding log message for the GUI login.

Fortinet Technologies Inc.

Page 62

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name Message (msg)

Description User <administrator_name> {added | modified | deleted} the Policy <server-policy_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | modified | deleted} Server Health Check <server-health-check_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | modified | deleted} Pserver <physical-server_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | modified | deleted} Pserver <physical-server_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | modified | deleted} Vserver <virtual-server_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | modified | deleted} custom-application.{application-policy | url-replacer} <url-interpreter_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | modified | deleted} Error Page <custom-error_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Examples date=2012-02-13 time=18:49:03 log_id=00120001 msg_id=000015400610 type=event subtype="policy" pri=information device_id=FV-1KC3R08600008 timezone="(GMT+8:00)Beijing,ChongQing,HongKong,Urumgi" user=admin ui=ssh(10.0.0.66) msg="User admin modified Policy policy1 from ssh(10.0.0.66) ." date=2012-06-27 time=15:31:50 log_id=00120001 msg_id=000000123843 type=event subtype="policy" pri=information device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.225) msg="User admin modified Server Health Check server-health-check1 from GUI(172.20.120.225)."

Fortinet Technologies Inc.

Page 63

FortiWeb 4.0 MR4 Patch 2 Log Reference

date=2012-05-25 time=00:11:46 log_id=00120001 msg_id=000000029184 type=event subtype="policy" pri=information device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.220) msg="User admin modified Pserver laptop-apache from GUI(172.20.120.220) ." date=2012-05-29 time=10:14:07 log_id=00120001 msg_id=000000055307 type=event subtype="policy" pri=information device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(10.1.1.8) msg="User admin modified Vserver vip1 from GUI(10.1.1.8)." date=2012-08-28 time=10:55:30 log_id=00120001 msg_id=000001147998 type=event subtype="policy" pri=information device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) msg="User admin deleted custom-application.url-replacer tomcat-login from GUI(172.20.120.222)." date=2012-08-28 time=12:51:10 log_id=00120001 msg_id=000001149966 type=event subtype="policy" pri=information device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) msg="User admin added Error Page error-page1 from GUI(172.20.120.222) ." Related 00020006

00120004

Meaning An administrator changed a network service definition. Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) Description 00120004 See Log ID numbers on page 12. policy See Subtypes on page 13. information See Priority level on page 13. <administrator_name>

Fortinet Technologies Inc.

Page 64

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name User Interface (ui)

Description {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} Logins from jsconsole indicate use of the CLI Console widget on System > Status > Status in the web UI (GUI). The source IP address is the same as the one recorded in the corresponding log message for the GUI login.

Action (action) Message (msg) User <administrator_name> modified the Service <service_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Example date=2012-02-13 time=13:57:40 log_id=00120004 msg_id=000015393556 type=event subtype="policy" pri=information device_id=FV-1KC3R08600008 timezone="(GMT+8:00)Beijing,ChongQing,HongKong,Urumgi" user=admin ui=ssh(10.0.0.66) action="" msg="User admin added the Service SOAP-1 from ssh(10.0.0.66)"

00120005

Meaning An administrator changed a protected host name (HTTP Host: header) definition. Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) Description 00120005 See Log ID numbers on page 12. policy See Subtypes on page 13. information See Priority level on page 13. <administrator_name>

Fortinet Technologies Inc.

Page 65

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name User Interface (ui)

Description {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} Logins from jsconsole indicate use of the CLI Console widget on System > Status > Status in the web UI (GUI). The source IP address is the same as the one recorded in the corresponding log message for the GUI login.

Action (action) Message (msg) User <administrator_name> modified the Protected Server <protected-host_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Example date=2012-02-13 time=18:37:05 log_id=00120005 msg_id=000015400267 type=event subtype="policy" pri=information device_id=FV-1KC3R08600008 timezone="(GMT+8:00)Beijing,ChongQing,HongKong,Urumgi" user=admin ui=ssh(10.0.0.66) action="" msg="User admin modified the Protected Server FWB_host_bruteforce from ssh(10.0.0.66)"

00130001

Meaning Either: An administrator created, changed, or deleted an inline or offline protection profile. An administrator created, changed, or deleted an auto-learning profile. An administrator created, changed, or deleted a URL access rule. An administrator created, changed, or deleted a robot control rule. An administrator switched to use a different antivirus database, or adjusted the decompression buffer size. Field name ID (log_id) Sub Type (subtype) Level (pri) Description 00130001 See Log ID numbers on page 12. protection See Subtypes on page 13. information See Priority level on page 13.

Fortinet Technologies Inc.

Page 66

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name User (user) User Interface (ui)

Description <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} Logins from jsconsole indicate use of the CLI Console widget on System > Status > Status in the web UI (GUI). The source IP address is the same as the one recorded in the corresponding log message for the GUI login.

Message (msg)

User <administrator_name> {added | modified | deleted} Inline Profile <profile_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | modified | deleted} Offline Profile <profile_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | modified | deleted} Auto Learn <profile_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | modified | deleted} URL Access Rule <rule_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | modified | deleted} Robot Control <rule_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> modified AV database version to {basic | extended} from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Examples date=2012-05-25 time=00:09:01 log_id=00130001 msg_id=000000029131 type=event subtype="protection" pri=information device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.220) msg="User admin modified Inline Profile inline-protection-profile1 from GUI(172.20.120.220)."

Fortinet Technologies Inc.

Page 67

FortiWeb 4.0 MR4 Patch 2 Log Reference

date=2012-02-13 time=18:49:05 log_id=00130001 msg_id=000015400624 type=event subtype="protection" pri=information device_id=FV-1KC3R08600008 timezone="(GMT+8:00)Beijing,ChongQing,HongKong,Urumgi" user=admin ui=ssh(10.0.0.66) msg="User admin modified Offline Profile FWB_protection_profile_off from ssh(10.0.0.66)." date=2012-06-27 time=10:45:57 log_id=00130001 msg_id=000000123462 type=event subtype="protection" pri=information device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.225) msg="User admin modified Auto Learn auto-learning-clone1 from GUI(172.20.120.225)." date=2012-05-24 time=18:20:11 log_id=00130001 msg_id=000000022692 type=event subtype="protection" pri=information device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.220) msg="User admin modified URL Access Rule url-access-rule1 from GUI(172.20.120.220)." date=2012-05-25 time=04:43:57 log_id=00130001 msg_id=000000029585 type=event subtype="protection" pri=information device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.220) msg="User admin modified Robot Control robot-controller1 from GUI(172.20.120.220)." date=2012-08-28 time=14:39:45 log_id=00130001 msg_id=000001151805 type=event subtype="protection" pri=information device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) msg="User admin modified AV database version to basic from GUI(172.20.120.222)."

00130002

Meaning An administrator changed a parameter validation rule. Field name ID (log_id) Sub Type (subtype) Level (pri) Description 00130002 See Log ID numbers on page 12. protection See Subtypes on page 13. information See Priority level on page 13.

Fortinet Technologies Inc.

Page 68

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name User (user) User Interface (ui)

Description <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} Logins from jsconsole indicate use of the CLI Console widget on System > Status > Status in the web UI (GUI). The source IP address is the same as the one recorded in the corresponding log message for the GUI login.

Action (action) Message (msg) User <administrator_name> modified the Parameter Validation Rule <profile_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Example date=2012-02-13 time=13:26:02 log_id=00130002 msg_id=000015391609 type=event subtype="protection" pri=information device_id=FV-1KC3R08600008 timezone="(GMT+8:00)Beijing,ChongQing,HongKong,Urumgi" user=admin ui=ssh(10.0.0.66) action="" msg="User admin modified the Parameter Validation Rule param-validation1 from ssh(10.0.0.66)"

00130003

Meaning Either: An administrator created, changed, or deleted a custom attack or data leak signature. An administrator created, changed, or deleted a web vulnerability scan schedule, profile, or policy. An administrator created, changed, or deleted an auto-learning URL interpreter rule or policy, or a custom data type. Field name ID (log_id) Sub Type (subtype) Description 00130003 See Log ID numbers on page 12. protection See Subtypes on page 13.

Fortinet Technologies Inc.

Page 69

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name Level (pri) User (user) User Interface (ui)

Description information See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} Logins from jsconsole indicate use of the CLI Console widget on System > Status > Status in the web UI (GUI). The source IP address is the same as the one recorded in the corresponding log message for the GUI login.

Action (action) Message (msg) User <administrator_name> {added | deleted | modified} the Custom Protection Rule <signature_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | deleted | modified} the Wvs {Policy | Profile | Schedule} <scan-component_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | deleted | modified} the Custom {Suspicious URL | Suspicious URL Rule | Data Type} <auto-learning-component_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Examples date=2012-02-13 time=15:00:52 log_id=00130003 msg_id=000015395527 type=event subtype="protection" pri=information device_id=FV-1KC3R08600008 timezone="(GMT+8:00)Beijing,ChongQing,HongKong,Urumgi" user=admin ui=ssh(10.0.0.66) action="" msg="User admin deleted the Custom Protection Rule custom-sig1 from ssh(10.0.0.66)" date=2012-06-05 time=08:59:44 log_id=00130003 msg_id=000000058072 type=event subtype="protection" pri=information device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(10.1.1.8) action="" msg="User admin modified the Custom Protection Rule custom-signature1 from GUI(10.1.1.8)"

Fortinet Technologies Inc.

Page 70

FortiWeb 4.0 MR4 Patch 2 Log Reference

date=2012-08-28 time=10:19:15 log_id=00130003 msg_id=000001147361 type=event subtype="protection" pri=information device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) action="" msg="User admin deleted the Wvs Policy wvs-policy1 from GUI(172.20.120.222)" date=2012-08-28 time=11:09:48 log_id=00130003 msg_id=000001148252 type=event subtype="protection" pri=information device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) action="" msg="User admin modified the Custom Suspicious URL Rule custom-suspicious-url-policy1 from GUI(172.20.120.222)"

00130004

Meaning An administrator created a page order rule. Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui) Description 00130004 See Log ID numbers on page 12. protection See Subtypes on page 13. information See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} Logins from jsconsole indicate use of the CLI Console widget on System > Status > Status in the web UI (GUI). The source IP address is the same as the one recorded in the corresponding log message for the GUI login.

Action (action) Message (msg) User <administrator_name> added the Page Access Rule <profile_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Fortinet Technologies Inc.

Page 71

FortiWeb 4.0 MR4 Patch 2 Log Reference

Example date=2012-02-13 time=14:13:56 log_id=00130004 msg_id=000015394029 type=event subtype="protection" pri=information device_id=FV-1KC3R08600008 timezone="(GMT+8:00)Beijing,ChongQing,HongKong,Urumgi" user=admin ui=ssh(10.0.0.66) action="" msg="User admin added the Page Access Rule access-rule1 from ssh(10.0.0.66)"

00130005

Meaning Either: An administrator created, changed, or deleted a geographical client IP blacklist. An administrator created, changed, or deleted an anti-DoS policy. An administrator created, changed, or deleted an X-headers (X-Forwarded-For: etc.) rule. Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui) Description 00130005 See Log ID numbers on page 12. protection See Subtypes on page 13. information See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} Logins from jsconsole indicate use of the CLI Console widget on System > Status > Status in the web UI (GUI). The source IP address is the same as the one recorded in the corresponding log message for the GUI login.

Action (action)

Fortinet Technologies Inc.

Page 72

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name Message (msg)

Description User <administrator_name> {added | modified | deleted} the geo block list <geo-to-ip_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | modified | deleted} the DoS Prevention Policy <policy_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | modified | deleted} the x-forwarded-for rule <rule_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Examples date=2012-08-28 time=12:37:49 log_id=00130005 msg_id=000001149735 type=event subtype="protection" pri=information device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) action="" msg="User admin deleted the DoS Prevention Policy dos-sensor2 from GUI(172.20.120.222)" date=2012-06-27 time=11:13:49 log_id=00130005 msg_id=000000123712 type=event subtype="protection" pri=information device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.225) action="" msg="User admin modified the geo block list all-locations from GUI(172.20.120.225)" date=2012-05-25 time=00:35:27 log_id=00130005 msg_id=000000029279 type=event subtype="protection" pri=information device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.220) action="" msg="User admin modified the DoS Prevention Policy dos-protection1 from GUI(172.20.120.220)" date=2012-05-29 time=10:15:05 log_id=00130005 msg_id=000000055319 type=event subtype="protection" pri=information device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(10.1.1.8) action="" msg="User admin modified the x-forwarded-for rule x-headers1 from GUI(10.1.1.8)"

Fortinet Technologies Inc.

Page 73

FortiWeb 4.0 MR4 Patch 2 Log Reference

00130006

Meaning Either: An administrator created, changed, or deleted a client source IP black list or white list. An administrator created, changed, or deleted a data leak or attack signature set. An administrator created, changed, or deleted an HTTP-based routing policy. An administrator created, changed, or deleted a custom web crawler definition. Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui) Description 00130006 See Log ID numbers on page 12. protection See Subtypes on page 13. information See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} Logins from jsconsole indicate use of the CLI Console widget on System > Status > Status in the web UI (GUI). The source IP address is the same as the one recorded in the corresponding log message for the GUI login.

Action (action)

Fortinet Technologies Inc.

Page 74

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name Message (msg)

Description User <administrator_name> {added | modified | deleted} the IP List Policy <profile_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | modified | deleted} the Signature Group <signatures_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | modified | deleted} the http-content-routing-policy <http-route_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} User <administrator_name> {added | modified | deleted} the custom robot <crawler-definition_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Examples date=2012-02-13 time=18:28:01 log_id=00130006 msg_id=000015399800 type=event subtype="protection" pri=information device_id=FV-1KC3R08600008 timezone="(GMT+8:00)Beijing,ChongQing,HongKong,Urumgi" user=admin ui=ssh(10.0.0.66) action="" msg="User admin added the IP List Policy client-blacklist1 from ssh(10.0.0.66)" date=2012-05-25 time=04:44:09 log_id=00130006 msg_id=000000029586 type=event subtype="protection" pri=information device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.220) action="" msg="User admin modified the IP List Policy client-blacklist1 from GUI(172.20.120.220)" date=2012-05-25 time=04:23:25 log_id=00130006 msg_id=000000029406 type=event subtype="protection" pri=information device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.220) action="" msg="User admin modified the Signature Group attack-signatures1 from GUI(172.20.120.220)"

Fortinet Technologies Inc.

Page 75

FortiWeb 4.0 MR4 Patch 2 Log Reference

date=2012-08-28 time=12:57:46 log_id=00130006 msg_id=000001150081 type=event subtype="protection" pri=information device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) action="" msg="User admin modified the http-content-routing-policy http-route1 from GUI(172.20.120.222)" date=2012-08-28 time=13:44:50 log_id=00130006 msg_id=000001150869 type=event subtype="protection" pri=information device_id=FV-1KC3R11700136 timezone="(GMT-5:00)Eastern Time(US & Canada)" user=admin ui=GUI(172.20.120.222) msg="User admin modified custom robot custom-robot1 from GUI(172.20.120.222)."

00130007

Meaning An administrator deleted an exception to a protection rule. Field name ID (log_id) Sub Type (subtype) Level (pri) User (user) User Interface (ui) Description 00130007 See Log ID numbers on page 12. protection See Subtypes on page 13. information See Priority level on page 13. <administrator_name>

{GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console} Logins from jsconsole indicate use of the CLI Console widget on System > Status > Status in the web UI (GUI). The source IP address is the same as the one recorded in the corresponding log message for the GUI login.

Action (action) Message (msg) User <administrator_name> deleted the Exclusion Rule <profile_name> from {GUI(<mgmt_ipv4>) | jsconsole | telnet(<mgmt_ipv4>) | ssh(<mgmt_ipv4>) | console}

Fortinet Technologies Inc.

Page 76

FortiWeb 4.0 MR4 Patch 2 Log Reference

Example date=2012-02-13 time=12:54:12 log_id=00130007 msg_id=000015390804 type=event subtype="protection" pri=information device_id=FV-1KC3R08600008 timezone="(GMT+8:00)Beijing,ChongQing,HongKong,Urumgi" user=admin ui=ssh(10.0.0.66) action="" msg="User admin deleted the Exclusion Rule excluded-URLs1 from ssh(10.0.0.66)"

Fortinet Technologies Inc.

Page 77

FortiWeb 4.0 MR4 Patch 2 Log Reference

Attack
Attack log messages record traffic that violated its matching policy. Log ID numbers of this type are listed in Table 5. The operating mode, network topology, and the rules configured Action can all affect how a policy responds to an attack, data leak, or server information disclosure. Depending on your configuration, violating traffic is either: blocked sanitized, then passed through allowed to continue unmodified (that is, logged only) To locate a description for an attack log message, match the ID (log_id) field in the attack log message with that shown in Table 5. All attack log messages have the same body fields, described in Attack log fields on page 80. Table 5: Attack logs by subtype & ID ID (log_id) 00070001 00070002 00070003 00070004 00070005 00070006 Sub Type (subtype) waf_allow_method allow_host waf_page_rule waf_start_page waf_cookie_poison waf_parameter_rule Message (msg) HTTP Method Violation HTTP Host Violation Page Access Rule Violation Start Page Violation Cookie Poisoning Parameter Validation Violation:(parameter name: <parameter_name>) Blacklisted IP blocked URL Access Violation : <rule_name> Credit Card Detection : Signature ID n Cross Site Scripting : Signature ID n Generic Attacks-<subtype_name> : Signature ID n Information Disclosure-HTTP Header Leakage : Signature ID n SQL Injection : Signature ID n where n is the index number of the specific predefined attack or data leak signature
Page 78

00070007 00070008 00070010

waf_black_ip waf_url_access waf_signature_detection

Table 5: Attack logs by subtype & ID ID (log_id) 00070015 00070017 00070018 00070020 00070021 00070022 00070023 00070024 00070025 00070026 00070027 00070028 00070029 00070030 00070031 00070032 00070033 00070034 00070035 (when based upon the HTTP session ID) 00070036 (when based upon the source IP) Sub Type (subtype) waf_bad_robot waf_hidden_fields waf_brute_login waf_custom_protection waf_header_overflow waf_headline_overflow waf_body_overflow waf_content_overflow waf_parameter_overflow waf_request_overflow waf_url_parameter_overflow waf_illegal_http_version waf_cookiecount_overflow waf_req_headline_overflow waf_illegal_http_method waf_url_parameter_count_overflo w waf_illegal_hostname waf_illegal_file_type DDOS based on HTTP session: waf_http_request_overflow Message (msg) Bad Robot Violation Hidden Field Manipulation Brute Force Login Violation Custom Attack Violation: <signature_name> Header Length Exceeded Header Line Length Exceeded Body Length Exceeded Content Length Exceeded Total URL and Body Parameters Length Exceeded HTTP Request Length Exceeded Total URL Parameters Length Exceeded Illegal HTTP Version Too Many Cookies in Request Too Many Headers in Request Illegal HTTP Method Too Many Parameters in Request illegal host name filename [<file_str>]: Illegal file size DoS Attack: HTTP Flood Prevention Violation

DDOS based on HTTP session: waf_tcp_connection_overflow

DoS Attack: Malicious IPs Violation

Fortinet Technologies Inc.

Page 79

FortiWeb 4.0 MR4 Patch 2 Log Reference

Table 5: Attack logs by subtype & ID ID (log_id) 00070037 (when based upon the HTTP session ID) 00070038 (when based upon the source IP) 00070039 00070040 00070041 00070042 00070043 00070044 00070045 00070046 00070047 00070048 xml_intrusion xml_filter xml_wsdl_operation xml_schema xml_wsdl_schema xml_decrypt xml_sigverify xml_nonxml xml_sql_injection waf_dos_prevention_type Sub Type (subtype) DDOS based on source IP: waf_http_request_overflow Message (msg) DoS Attack: HTTP Access Limit Violation

DDOS based on source IP: waf_tcp_connection_overflow

DoS Attack: TCP Flood Prevention Violation

xml_intrusion xml_filter xml_wsdl_operation xml_schema xml_wsdl_schema xml_decrypt xml_sigverify xml_nonxml xml_sql_injection SYN Flood Prevention Started SYN Flood Prevention Stopped

00070049 00070050

waf_dos_real_browser_enforceme Real Browser Enforcement: DoS attack from <client_ipv4> nt_check_fail https_connection_failed Varies by the cause of the SSL/TLS error. See SSL/TLS error messages on page 82.

00070057

waf_max_num_ranges_in_Range_ Too many ranges in Rang Header header

Attack log fields


Fields in the body of attack log messages are described below. For descriptions of header fields that exist in every log message, see Header & body fields on
page 7.

Fortinet Technologies Inc.

Page 80

FortiWeb 4.0 MR4 Patch 2 Log Reference

Meaning Traffic violating a policy was detected by the FortiWeb appliance. Solution If your appliance was: operating in reverse proxy or true transparent proxy mode and configured to deny traffic (e.g. the Action is Alert & Deny in the log message) the traffic was blocked. No action is required. If many attacks come from a client, though, for performance reasons, consider blacklisting its IP address. Otherwise, if your appliance was: operating in offline protection or transparent inspection mode or configured only to monitor traffic (e.g. Monitor Mode was enabled or the Action is Alert, not Alert & Deny) examine the web server to determine whether or not it was affected. By the nature of log-only actions, detected attack attempts are logged but not blocked. You may also want to determine if the attack is from a single source IP address or distributed: blacklisting an offending client may help you to efficiently prevent further attack attempts, improving performance, until you can take further action. By the nature of the network topology for offline protection mode (which can potentially cause differences in speeds of the separate routing paths), and asynchronous inspection for transparent inspection mode, blocking cannot be guaranteed. For details, see the FortiWeb Administration Guide. Tip: If an attack is not being detected as you expect, enable session management, traffic logging, and packet payload retention. You can examine the traffic logs packet payload to determine why it is not matching your profile rules and/or enabled attack signatures. For instructions, see the FortiWeb Administration Guide. Field name ID (log_id) Sub Type (subtype) Level (pri) Action (action) Description An indentifying number. See Log ID numbers on page 12 and the column ID on page 78. See Subtypes on page 13 and the column Sub Type on page 78. alert The action that you configured FortiWeb to take in response to the policy violation, such as: Alert or Alert_Deny Action options vary by the nature of the attack. For details on actions, see the FortiWeb Administration Guide. Service (service) Policy (policy) HTTP Method (http_method) <service_name> <server-policy_name> Varies by the web application, but is usually GET or POST.

Fortinet Technologies Inc.

Page 81

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name HTTP Host (http_host)

Description The domain name as it appears in the request from the client, which may be different from your internal DNS name if any for the web server, or, if you are using HTTP Host: rewrites, different from the domain name of the virtual host on the web server. e.g. www.example.co.jp instead of www1.local or the virtual host that serves responses for all DNS names, www.example.com. The URL as it appears in the request from the client.This does not include the service or host name. e.g. /main/index.html. The HTTP client platform, as it is reported by the client itself. This is often fake in attacks. See Message on page 78.

URL (http_url) HTTP Agent (http_agent) Message (msg) Example

date=2012-05-25 time=00:22:28 log_id=00070038 msg_id=000000029190 type=attack subtype="DDOS based on source IP: waf_tcp_connection_overflow" pri=alert device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" proto=tcp service=https src=172.20.120.47 src_port=62906 dst=172.20.120.170 dst_port=443 policy="policy1" action=Alert http_method=others http_url="unknown" http_host="unknown" http_agent="unknown" http_session_id=unknown severity_level=Medium trigger_policy="notification-servers1" msg="DoS Attack: TCP Flood Prevention Violation"

SSL/TLS error messages


If you are configuring HTTPS for the first time, it is possible that you will see some SSL or TLS-related error messages. Because they are rare and tend to indicate a potential attack attempt, they are located in the attack logs, except for cipher or key exchange errors, which tend to be traffic flow problems (see Traffic on page 85). Although the ID (log_id) is the same for all HTTPS connection errors (00070050), the Message (msg) field varies by the cause. Table 6: HTTPS attack log messages Message (msg) X509 Error 2 - Unable to get The CAs certificate does not exist in the store of trusted issuer certificate CAs (System > Certificates > CA), nor is it included in a signing chain within the certificate file. X509 Error 4 - The certificate signature could not be decrypted. The certificates signature value could not be determined, and therefore it could not be decrypted. It does not mean that the signature did not match the expected value. This applies only to RSA keys. X509 Error 6 - Unable to decode issuer public key The public key in the certificates CAs Subject Public Key Info: field could not be read. Cause & description

Fortinet Technologies Inc.

Page 82

FortiWeb 4.0 MR4 Patch 2 Log Reference

Table 6: HTTPS attack log messages Message (msg) X509 Error 7 - Certificate signature failure The certificates signature is invalid. Cause & description

X509 Error 9 - Certificate is The certificates Not Before: field is after the current not yet valid time and date. X509 Error 10 - Certificate has expired X509 Error 13 - Format error. The certificate notBefore field contains an invalid time X509 Error 14 - Format error. The certificate notAfter field contains an invalid time X509 Error 17 - An error occurred trying to allocate memory The certificates Not After: field is after the current time and date. The certificates Not Before: field contains an invalid time.

The certificates Not After: field contains an invalid time.

FortiWeb is out of memory. This should never happen.

X509 Error 18 - Certificate The certificate is self-signed meaning that it is acting as its is self signed and the same own CA. However, the certificate does not exist in the certificate cannot be found store of trusted CAs (System > Certificates > CA). in the list of trusted certificates X509 Error 19 Root certificate could not be found locally The certificate contains a signing chain that is not complete. The certificates signing chain must terminate with the certificate of a CA that is trusted by FortiWeb (System > Certificates > CA). The certificate indicates an Issuer: field (CA), so it should not be self-signed. However, the certificates signing chain does not contain that issuing CAs certificate.

X509 Error 20 - Issuer certificate could not be found

X509 Error 21 - No The certificates signing chain contains only one signatures could be certificate. However, the certificate is not a self-signed verified. Chain contains certificate. only one certificate and it is not self signed X509 Error 24 - Invalid CA certificate Either the CAs certificate is not actually from a CA, or its extensions are not consistent with the supplied purpose.

X509 Error 25 - Path length The certificates Basic Constraints: fields Path constraint exceeded Length Constraint= parameter was exceeded.

Fortinet Technologies Inc.

Page 83

FortiWeb 4.0 MR4 Patch 2 Log Reference

Table 6: HTTPS attack log messages Message (msg) X509 Error 26 Unsupported certificate The certificates Key Usage: field or Enhanced Key Usage: field does not match FortiWebs purpose. This could occur if, for example, an email signing certificate were to be accidentally used as a server certificate. The root CAs certificate is not marked as trusted for the certificates purpose (Certificate Usage: field). The root CAs certificate is marked to reject the certificates purpose (Certificate Usage: field). Cause & description

X509 Error 27 - Certificate not trusted X509 Error 28 - Certificate rejected.

X509 Error 32 - Key usage The certificate of the CA currently being examined in the does not include certificate signing chain was rejected because its Key Usage: signing extension does not permit certificate signing. X509 Error 52 - Get client certificate failed FortiWeb does not have the certificate of the CA that signed the personal certificate in its store of trusted CAs (System > Certificates > CA), and therefore cannot verify the personal certificate. The client did not present its personal certificate to FortiWeb. This could be caused by the client not having its personal certificate properly installed.

X509 Error 53 - Protocol error

Fortinet Technologies Inc.

Page 84

FortiWeb 4.0 MR4 Patch 2 Log Reference

Traffic
Traffic log messages record traffic that was accepted by a policy and passed through the FortiWeb appliance. All traffic log messages share the same ID (log_id): 00010001.

00010001
Traffic log messages are described below. For descriptions of header fields that exist in every log message, see Header & body fields on page 7. Meaning Traffic matching and complying with a policy passed through or by FortiWeb. If there is an error in the message, however, and the request/response used HTTPS, FortiWeb could not scan it. Depending on the mode of operation, an attack could have bypassed FortiWeb.

Page 85

Solution If HTTPS traffic is not flowing as you expect, and you have recently enabled HTTPS, typically this is due to a misconfiguration. The error message will indicate the appropriate solution: No Server Certificate for SSL Connection FortiWeb does not have the server certificate, so it cannot decode the SSL traffic. To fix this, upload the web servers certificate to FortiWeb. SSL Certificate Key Mismatch An X.509 server certificate was uploaded to FortiWeb, but its private key did not match the one used by this HTTPS session. To fix this, upload the back-end web servers current certificate. Ephemeral keys cannot be decrypted Ephemeral Diffie-Hellman key exchange can't be inspected due to the property of perfect forward secrecy. To fix this, disable ephemeral Diffie-Hellman on the back-end web server, and select a different key exchange method. Unsupported Cipher for SSL Connection Includes all the other reasons for failed HTTPS inspection such as message digest (MAC) failure or nonexistence, unsupported encryption algorithm, etc. To fix this, on the back-end web server, disable cipher suites that are not supported by FortiWeb. Unmonitored SSL Connection The HTTPS session was initiated before FortiWeb was deployed or before the server policy was enabled, so FortiWeb could not listen for the private keys, and therefore cannot decrypt subsequent requests/responses in this HTTPS session. If your appliance was operating in reverse proxy or true transparent proxy mode, the traffic was blocked, and no attack could have passed through to your protected web servers. No action is required except to make sure that you have uploaded to FortiWeb the correct certificate for all protected web servers. Otherwise, if your appliance was: operating in offline protection or transparent inspection mode or configured only to monitor traffic (e.g. Monitor Mode was enabled or the Action is Alert, not Alert & Deny) examine the web server to determine whether or not an encrypted attack has passed through. You should also examine your web servers HTTPS configuration and disable cipher suites and key exchanges that are not supported by FortiWeb so that during negotiation with clients, your web server does not agree to use encryption that FortiWeb cannot scan for attacks. By the nature of log-only actions, detected attack attempts are logged but not blocked. You may also want to determine if the attack is from a single source IP address or distributed: blacklisting an offending client may help you to efficiently prevent further attack attempts, improving performance, until you can take further action. By the nature of the network topology for offline protection mode (which can potentially cause differences in speeds of the separate routing paths), and asynchronous inspection for transparent inspection mode, blocking cannot be guaranteed and some key exchanges are not supported. For details, see the FortiWeb Administration Guide.

Fortinet Technologies Inc.

Page 86

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name ID (log_id)

Description 00010001 All traffic log messages share the same ID (log_id=00010001). See Log ID numbers on page 12. traffic All traffic log messages share the same subtype (subtype=traffic). See Subtypes on page 13. notice See Priority level on page 13. <service_name>

Sub Type (subtype)

Level (pri) Service (service) Policy (policy) HTTP Host (http_host)

<server-policy_name> The domain name as it appears in the request from the client. This may be different from your internal DNS name if any for the web server, or, if you are using HTTP Host: rewrites, different from the virtual host on the web server. e.g. www.example.co.jp instead of www1.local or the virtual host that serves responses for all DNS names, www.example.com. The URL as it appears in the request from the client.This does not include the service or host name. e.g. /main/index.html.

URL (http_url)

Fortinet Technologies Inc.

Page 87

FortiWeb 4.0 MR4 Patch 2 Log Reference

Field name HTTP Agent (http_agent) Message (msg)

Description The HTTP client platform, as it is reported by the client itself. This is often fake in attacks. Whether or not the log message is for incoming (HTTP request) or outgoing (HTTP reponse) traffic, the source and destination IP address, and the HTTP method or HTTP error/status/return code, such as: HTTP request from 192.168.1.1:40170 to 10.0.0.1:80, method GET HTTP request from 10.1.1.8:50848 to 10.1.1.221:80, method POST HTTP response from 10.0.0.1:80 to 192.168.1.1:40170, return code 404 HTTPS response from 192.168.100.6:80 to 172.20.120.225:50008, return code 304 If the transaction used HTTPS and there was an error when either decoding it or participating in the handshake, there may be an error message instead of the HTTP method or return code: HTTP request from 192.168.1.1:40170 to 10.0.0.1:80, Unsupported Cipher for SSL Connection HTTP request from 192.168.1.1:40170 to 10.0.0.1:80, No Server Certificate for SSL Connection HTTP request from 192.168.1.1:40170 to 10.0.0.1:80, SSL Certificate Key Mismatch HTTP request from 192.168.1.1:40170 to 10.0.0.1:80, Ephemeral keys cannot be decrypted HTTP request from 192.168.1.1:40170 to 10.0.0.1:80, Unmonitored SSL Connection

Examples date=2012-06-26 time=13:13:30 log_id=00010001 msg_id=000000118800 type=traffic subtype="traffic" pri=notice device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" proto=tcp service=https src=172.20.120.225 src_port=50010 dst=172.20.120.48 dst_port=443 policy=policy1 http_host="172.20.120.48" http_agent="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.56 Safari/536.5" http_url="/favicon.ico" msg="HTTPS request from 172.20.120.225:50010 to 172.20.120.48:443, method GET"

Fortinet Technologies Inc.

Page 88

FortiWeb 4.0 MR4 Patch 2 Log Reference

date=2012-06-26 time=13:13:30 log_id=00010001 msg_id=000000118801 type=traffic subtype="traffic" pri=notice device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" proto=tcp service=https src=192.168.100.6 src_port=80 dst=172.20.120.225 dst_port=50010 policy=policy1 http_host="172.20.120.48" http_agent="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.56 Safari/536.5" http_url="/favicon.ico" msg="HTTPS response from 192.168.100.6:80 to 172.20.120.225:50010, return code 404" date=2012-08-29 time=15:24:01 log_id=00010001 msg_id=000000035215 type=traffic subtype="traffic" pri=notice device_id=FVVM020000003619 timezone="(GMT-5:00)Eastern Time(US & Canada)" proto=tcp service=https src=172.20.120.222 src_port=53275 dst=172.20.120.48 dst_port=80 policy=policy1 http_host="172.20.120.48" http_agent="Mozilla/5.0 (Windows NT 6.1; WOW64; rv:14.0) Gecko/20100101 Firefox/14.0.1" http_url="/" msg="HTTPS request from 172.20.120.222:53275 to 172.20.120.48:80, Ephemeral keys cannot be decrypted"

Fortinet Technologies Inc.

Page 89

FortiWeb 4.0 MR4 Patch 2 Log Reference

Vous aimerez peut-être aussi