Fortinet FortiGate FortiGate-3000 Administration Manual page 109

Fortinet fortigate fortigate-3000: user guide
Hide thumbs Also See for FortiGate FortiGate-3000:
Table of Contents

Advertisement

System config
FortiGate-3000 Administration Guide
Table 8: FortiGate system traps
Trap message
CPU usage high
(SysCpuHigh)
Disk low
<FortiGate_serial_no>
<interface_name>
HA state
HA switch
Memory low
(SysMemLow)
The <interface_name>
Interface IP is changed
to <new_IP>
(Serial No.:
<FortiGate_serial_no>)
(IntfIpChange)
Table 9: FortiGate VPN traps
Trap message
VPN tunnel is up
(VpnTunnelUp)
VPN tunnel down
(VpnTunnelDown)
Table 10: FortiGate IPS traps
Trap message
Syn flood attack.
(IdsSynFlood)
Port scan attack.
(IdsPortScan)
Table 11: FortiGate antivirus traps
Trap message
Description
Virus detected
The FortiGate unit detects a virus and removes the infected file from an
(AvVirus)
HTTP or FTP download or from an email message.
01-28006-0010-20041105
Description
CPU usage exceeds 90%.
On a FortiGate unit with a hard drive, hard drive usage exceeds
90%.
The configuration of an interface of a FortiGate unit changes. The
trap message includes the name of the interface and the serial
number of the FortiGate unit.
HA state changes. The trap message includes the previous state, the
new state and a flag indicating whether the unit is the master.
The primary unit in an HA cluster fails and is replaced with a new
primary unit.
Memory usage exceeds 90%.
The IP address of an interface of a FortiGate unit changes. The trap
message includes the name of the interface, the new IP address of
the interface, and the serial number of the FortiGate unit. This trap
can be used to track interface IP address changes for interfaces
configured with dynamic IP addresses set using DHCP or PPPoE.
Description
An IPSec VPN tunnel starts up and begins processing network
traffic.
An IPSec VPN tunnel shuts down.
Description
NIDS attack prevention detects and provides protection from a
syn flood attack.
NIDS attack prevention detects and provides protection from a
port scan attack.
SNMP
109

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents