Log View
System triggers the log when a PPPoE WAN link <widx> is acted for ACTION. ACTION=bind and IP=<ip> must
be generated in pairs for a log. Three more logs are introduced when a PPPoE WAN link goes to failure:
l
PPPOE config‐requests timeout
l
PPPOE connection no response
l
PPPOE authentication failed
IP-MAC Mapping
MAC {IP‐5‐TUPLE} BAD_SRC_MAC=<MAC>
The first packet of session {IP‐5‐TUPLE} blocked by IP-MAC Mapping triggers the log. System generates only one
log for this session. This log indicates source MAC addresses <MAC> of the packets of {IP‐5‐TUPLE} and the MAC
address defined in IP-MAC table are mismatched, and so that the packets are blocked.
MAC {IP‐5‐TUPLE} BAD_DST_MAC=<MAC>
The first packet of session {IP‐5‐TUPLE} blocked by IP-MAC Mapping triggers the log. System generates only one
log for this session. This log indicates destination MAC addresses <MAC> of the packets of {IP‐5‐TUPLE} and the
MAC address defined in IP-MAC table are mismatched, and so that the packets are blocked.
See "IP-MAC Mapping" for further information.
Tunnel Routing
TR {IP‐5‐TUPLE} GROUP=<group name> TOTLEN=<pktlen>
The first packet of session {IP‐5‐TUPLE} being transferred by Tunnel Routing triggers the log. System generates
only one log for this session. This log indicates packets of {IP‐5‐TUPLE} are transferred through the Tunnel Group
<group name>, and the first packet size of the session is <pktlen>.
TUN FROM=<ip> TO=<ip> ACTION=<start|stop|fail|recover>
This log is triggered when a single GRE tunnel FROM=<ip> TO=<ip> is acted for actions ACTION.
See "Tunnel Routing" for further information.
IPSec
ISAKMP-SA <established|expired|deleted> <LOCAL_IP_PORT>-<REMOTE_IP_PORT>
An ISAKMP SA between <LOCAL_IP_PORT> and <REMOTE_IP_PORT> is established, expired or deleted.
IPsec-SA <established|expired>: ESP/<Transport|Tunnel> <LOCAL_IP_PORT>-><REMOTE_
IP_PORT>
260 FortiWAN Handbook
Fortinet Technologies Inc.