Juniper JUNOS OS 10.3 - SYSTEM LOG MESSAGES REFERENCE 7-12-2010 Reference Manual page 163

System log messages reference
Table of Contents

Advertisement

Type
Severity
Facility
ASP_SFW_SYN_DEFENSE
System Log Message
Description
Type
Severity
Facility
Cause
ASP_SFW_TCP_BAD_SYN_COOKIE_RESP
System Log Message
Description
Type
Copyright © 2010, Juniper Networks, Inc.
protocol (numerical identifier and name), application, source (logical interface name, IP
address, and port number), and destination (IP address and port number).
Event: This message reports an event, not an error
notice
LOG_PFE
syslog-prefix error-code: proto protocol-id (protocol-name),
source-interface-nameseparatorsource-address:source-port ->
destination-addressdestination-port, event-type
The stateful firewall discarded the packet with the indicated characteristics, because
the Transmission Control Protocol (TCP) handshake that is used to establish a session
did not complete quickly enough. The time limit is set by the 'open-timeout' statement
at the [edit interfaces <services-interface> services-options] hierarchy level or is four
seconds by default. The event was reported to intrusion detection services (IDS) and
can cause IDS to activate SYN cookie protection. The discarded packet contained the
indicated information about its protocol (numerical identifier and name), source (logical
interface name, IP address, and port number), and destination (IP address and port
number).
Event: This message reports an event, not an error
notice
LOG_PFE
Possible causes for the handshake failure include the following: (1) sequence numbers
did not match in a SYN packet and a previous SYN packet (the second packet was not
a retransmission) (2) sequence numbers did not match in a SYN/ACK packet and a
previous SYN packet (3) either or both a SYN/ACK packet and an ACK packet did not
arrive at the firewall within the time limit.
syslog-prefix error-code: proto protocol-id (protocol-name),
source-interface-nameseparatorsource-address:source-port ->
destination-addressdestination-port, event-type
The stateful firewall discarded the Transmission Control Protocol (TCP) ACK packet
with the indicated characteristics, either because it is the first packet in a session, or
because its sequence number did not match the sequence number in the SYN/ACK
packet that the firewall previously generated for the session. The firewall generates
SYN/ACK packets when SYN cookie protection is activated. The discarded packet
contained the indicated information about its protocol (numerical identifier and name),
source (logical interface name, IP address, and port number), and destination (IP address
and port number).
Event: This message reports an event, not an error
Chapter 9: ASP System Log Messages
99

Advertisement

Table of Contents
loading

This manual is also suitable for:

Junos os 10.3 - software

Table of Contents