The following article provides an overview of all security events processed by the Barracuda CloudGen Firewall.
Event-ID | Description | Relevance | Severity | Notification | Persistent |
---|---|---|---|---|---|
53 | Duplicate IP Detected | An IP address living on the system has additionally been detected in the network. | Warning | 2 | yes |
140 | Mail Size Limit Exceeded | The size of an email has exceeded the configured limit. This event is only reported when the parameter Limit Mail Data Size is set to yes. | Notice | 2 | no |
300 | User ID (UID) Invalid | Invalid system user ID. See log for details. | Security | 3 | no |
304 | Reserved Login ID Used | Apple notification. Apple ID was used to sign in to a device. | Security | 3 | no |
2400 | Config Node Change Notice | A configuration file has been edited in the Barracuda Firewall Control Center configuration tree. "Config node change" events are only reported if event notification has been configured for configuration file changes (CC context menu entry Properties …). The following events apply:
| Notice | 2 | no |
2401 | Config Node Change Warning | Warning | 2 | no | |
2402 | Config Node Change Alert | Security | 3 | no | |
2420 | NG Firewall Login Notice | An application has been granted administrative access to the system. Barracuda Networks applications generate "Barracuda Networks Subystem Login" notifications every time a user has successfully logged into an application that interacts with the graphical administration tool Barracuda Firewall Admin (for example: control, event, statistics, config). The severity level for notifications regarding access to box services is configurable in CONFIGURATION > Configuration Tree > Box > Advanced Configuration > Access Notification. Notifications for other services may be customized per service. | Notice | 2 | no |
2421 | NG Firewall Login Warning | Warning | 2 | no | |
2422 | NG Firewall Login Alert | Security | 3 | no | |
2510 | FW Global Connection Limit Exceeded | The number of total sessions allowed for a request has been exceeded (see: General Firewall Configuration). | Security | 3 | yes |
2600 | DHCP Lease Deleted | A DHCP lease has been deleted from the database. | Notice | 2 | no |
3003 | VPN Server On-Demand Tunnel Activated | An on-demand VPN site-to-site tunnel has been activated. | Notice | 1 | no |
3004 | VPN Server On-Demand Tunnel Deactivated | An on-demand VPN site-to-site tunnel has been deactivated. | Notice | 1 | no |
3005 | VPN Client Connected | A user establishes a client-to-site VPN tunnel. | Notice | 2 | no |
3006 | VPN Client Disconnected | A user terminates a client-to-site VPN tunnel. | Notice | 2 | no |
3011 | CRL Collection Failed | The collection of the Certificate Revocation List (CRL) has failed. Paths to CRLs are defined in the VPN Settings > Root Certificates > Certificate Revocation. Polling for CRL retrieval is defined through parameter CRL Poll Time. | Security | 3 | no |
3012 | VPN Client Version | Connection refused due to invalid VPN Client version. | Warning | 2 | no |
3013 | Antivir Pattern Update Failed | An update to the recent Virus Scanner definitions has not succeeded. | Security | 3 | no |
4000 | FW Port Scan Detected | The number of blocked requests has exceeded the port scan threshold within the configured port scan detection interval. Limit values can be customized in the Port Scan Policy section. Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > General Firewall Configuration > Operational. | Notice | 2 | no |
4002 | FW Flood Ping Protection | The minimum delay time for pinging defined in a firewall service object has been under-run and the connection has therefore been blocked by the FW. | Warning | 2 | no |
4004 | FW Activating Perimeter | The inbound mode threshold (%) value specified in the local firewall settings (see: Host Firewall) has been exceeded. | Security | 3 | no |
4006 | FW Pending TCP Connection | The number of pending TCP sessions per source IP exceeds the allowed maximum. Requests initiating further pending sessions will be blocked. The threshold is configurable in the Firewall Forwarding Settings > Firewall tab (parameter Max. Pending Forward Accepts/Src). | Security | 3 | no |
4008 | FW UDP Connection per Source Limit Exceeded | The maximum number of UDP sessions per source IP has been exceeded. The thresholds can be configured in the Local Firewall Settings > Session Limits tab (parameter Max Local-In UDP/Src) and in the Firewall Forwarding Settings > Firewall tab (parameter Max. Forwarding UDP/Src). | Warning | 2 | no |
4009 | FW UDP Connection Limit Exceeded | The maximum number of UDP sessions has been exceeded. The threshold can be configured in the Local Firewall Settings > Session Limits tab (parameter Max UDP (%)). | Security | 3 | no |
4010 | FW Oversized SYN Packet | An oversized SYN packet has been dropped by the firewall. | Notice | 2 | no |
4012 | FW Large ICMP Packet Dumped | An ICMP-ECHO packet larger than the configured maximum ping size (see: Service Objects) has been dropped by the firewall. | Notice | 2 | no |
4014 | FW IP Spoofing Attempt Detected | An IP spoofing attempt has been discovered. | Notice | 4 | no |
4015 | FW Potential IP Spoofing Attempt | A SYN flooding attack has been identified (see: Best Practice - Protect Against TCP SYN Flooding Attacks with TCP Accept Policies). | Notice | 4 | no |
4016 | FW Rule Connection Limit Exceeded | The maximum number of concurrent connections allowed per rule has been exceeded. The maximum value is defined by the parameter Max. Number of Sessions (see: General Firewall Configuration). | Warning | 2 | no |
4018 | FW Rule Connection per Source | The maximum number of concurrent connections allowed per rule and source has been exceeded. The maximum value is defined by the parameter Max. Number of Sessions per Source (see: General Firewall Configuration). | Warning | 2 | no |
4020 | FW Rule Notice | A firewall rule equipped with event generation has been processed. The severity level of the generated event is defined by the rule (see: How to Configure Event Notifications). | Notice | 2 | no |
4021 | FW Rule Warning | A firewall rule generating event log type `warning` has been processed. | Warning | 2 | no |
4022 | FW Rule Alert | A firewall rule generating event log type `alert` has been processed. | Security | 3 | no |
4023 | FW Rule Idle Alert | This event is triggered if an access rule has not been used for a configured period of time. | Security | 3 | no |
4024 | FW Global Connection per Source Limit Exceeded | The maximum number of concurrent connections allowed per source has been exceeded. The maximum value is defined by parameters Max Local-In Session/Src in the Local Firewall Settings and Max. Forwarding Session/Src in the Forwarding Firewall Settings. | Warning | 2 | no |
4026 | FW ICMP-ECHO Connection per Source Limit Exceeded | The maximum number of concurrent ICMP-ECHO connections allowed per source has been exceeded. The maximum value is defined by parameters Max Local-In Echo/Src in the Local Firewall Settings and Max. Forwarding Echo/Src in the Forwarding Firewall Settings. | Warning | 2 | no |
4027 | FW ICMP-ECHO Connection Limit Exceeded | The maximum number of ICMP-ECHO connections has been exceeded. The threshold can be configured in the Local Firewall Settings > Session Limits tab (parameter Max Echo (%) (see: General Firewall Configuration). | Warning | 2 | no |
4028 | FW OTHER-IP Connection per Source Limit Exceeded | The maximum number of concurrent OTHER-IP connections (all IP protocols except TCP, UDP, and ICMP) allowed per source has been exceeded. The maximum value is defined by parameters Max Local-In Other/Src in the Local Firewall Settings and Max. Forwarding Other/Src in the Forwarding Firewall Settings. | Warning | 2 | no |
4029 | FW OTHER-IP Session Limit | The maximum number of OTHER-IP sessions (all IP protocols except TCP, UDP, and ICMP) has been exceeded. The threshold can be configured in the Local Firewall Settings > Session Limits tab (parameter Max Other (%). | Warning | 2 | no |
4050 | FW ARP MAC Address Changed | ARP has detected a MAC address change. | Notice | 2 | no |
4051 | FW ARP Ambiguous Duplicate | ARP has detected a duplicate MAC address. | Notice | 2 | no |
4052 | FW ARP Request Device | ARP has detected a device mismatch. | Notice | 2 | no |
4053 | FW ARP Reverse Routing Interface Mismatch | ARP has detected an interface mismatch. | Notice | 2 | no |
4054 | FW RSTP Interface Role Changed | RSTP has detected a change in the link state. Both 'RSTP link down' and 'RSTP link up' events will be notified. | Notice | 2 | no |
4060 | IPS Log Notice | IPS Signature. An object of event log type `Notice' referenced in the Intrusion Prevention System (IPS) database has been detected by the firewall. | Notice | 2 | no |
4061 | IPS Log Warning | IPS Signature. An object of event log type `Warning' referenced in the Intrusion Prevention System (IPS) database has been detected by the firewall. | Warning | 2 | no |
4062 | IPS Log Alert | IPS Signature. An object of event log type `Alert' referenced in the Intrusion Prevention System (IPS) database has been detected by the firewall. | Security | 3 | no |
4063 | IPS Drop Notice | IPS Signature. An object of event log type `Drop Notice' referenced in the Intrusion Prevention System (IPS) database has been detected by the firewall. | Notice | 2 | no |
4064 | IPS Drop Warning | IPS Signature. An object of event log type `Drop Warning' referenced in the Intrusion Prevention System (IPS) database has been detected by the firewall. | Warning | 2 | no |
4065 | IPS Drop Alert | IPS Signature. An object of event log type `Drop Alert' referenced in the Intrusion Prevention System (IPS) database has been detected by the firewall. | Security | 3 | no |
4100 | User Unknown | A system login has been attempted with an unknown login ID (CONFIGURATION > Configuration Tree > Box > Advanced Configuration > Access Notification, see: How to Configure Access Notifications). | Warning | 2 | no |
4110 | Authentication Failure Notice | A login attempt with a valid login ID has failed (CONFIGURATION > Configuration Tree > Box > Advanced Configuration > Access Notification , see: How to Configure Access Notifications). | Notice | 2 | no |
4111 | Authentication Failure Warning | A login attempt with a valid login ID has failed the second time (CONFIGURATION > Configuration Tree > Box > Advanced Configuration > Access Notification , see: How to Configure Access Notifications). The ACL does not match. | Warning | 2 | no |
4112 | Authentication Failure Alert | A login attempt with a valid login ID has failed at least three times (CONFIGURATION > Configuration Tree > Box > Advanced Configuration > Access Notification , see: How to Configure Access Notifications). Password authentication failure and/or unsuccessful command match. | Security | 3 | no |
4120 | Session Opened Notice | Informal event stating that a firewall session has been initiated. | Notice | 2 | no |
4121 | Session Opened Warning | A traced user has initiated an SSH connection. | Warning | 2 | no |
4122 | Session Opened Alert | A firewall session has been initiated. See log for details. | Security | 3 | no |
4124 | Remote Command Execution | Remote command execution has been triggered remotely by the Barracuda Firewall Control Center (in CC CONTROL > Remote Execution) or by an authorized user. Note that copying files with SCP also generates this event. Successful authentication and command is accepted. | Notice | 2 | no |
4125 | Remote Command Execution | Remote command execution of event log type 'warning' has been triggered. | Warning | 2 | no |
4126 | Remote Command Execution | Remote command execution of event log type `alert` has been triggered. | Security | 3 | no |
4130 | System Login Notice | The quality of these event notifications is determined by the settings made in CONFIGURATION > Configuration Tree > Box > Advanced Configuration > Access Notification ( see: How to Configure Access Notifications). The following notifications apply with default settings:
| Notice | 2 | no |
4131 | System Login Warning | Warning | 2 | no | |
4132 | System Login Alert | Security | 3 | no | |
4160 | Log Data Deleted | One or more entries have been deleted from the log database. See log for details. | Notice | 2 | no |
4162 | Statistics Data Deleted | One or more entries have been deleted from the statistics database. See log for details. | Notice | 2 | no |
4163 | Statistics Collection Failed | CC Statistics Collection has failed for a range, cluster, or box service. See statistics services, CC Control > Statistics Collection, and log for details. | Notice | 2 | no |
4200 | CTRL-ALT-DEL | Keyboard combination CTRL-ALT-DEL has been used on Barracuda Firewall Admin to shut down or reboot a firewall. | Warning | 2 | no |
4202 | System Reboot | The system has been rebooted. The manual reboot will trigger this event just like the Watchdog repair binary (see: Watchdog). | Warning | 2 | no |
4204 | System Shutdown | The system has been shut down. | Warning | 2 | no |
4206 | Runlevel Changed | The run level of the operating system has changed. Run levels change during system boot. | Notice | 2 | no |
4210 | Single User Mode | The system has been booted in Single User mode using the boot option "single". | Warning | 2 | no |
4212 | Problems During Bootup | Unusual behavior of the firewall during the bootup process. See log for details. | Warning | 2 | no |
4214 | Incomplete Previous Boot | The previous system bootup could not be completed. | Warning | 2 | no |
4220 | System Boot | The system is starting the bootup process. | Notice | 2 | no |
4222 | Emergency System Boot | An emergency system boot has been executed. See log for details. | Warning | 2 | no |
4240 | Bootloader Configuration | A configuration change has been applied to the bootloader configuration. See log for details. | Notice | 2 | no |
4242 | Two-Phase Kernel Update | New kernels were installed during the update. See log for details. | Notice | 2 | no |
4244 | Automatic Kernel Update | New kernels were installed during the update. See log for details. | Notice | 2 | no |
4246 | Kernel Update Rejected | The kernel update has failed. See log for details. | Warning | 2 | no |
4248 | Custom Bootloader or Kernel | The bootloader or kernel was updated. See log for details. | Notice | 2 | no |
4250 | Bootloader Test Activation | Bootloader test activation has errors or failures. See log for details. | Notice | 2 | no |
4252 | Bootloader Activation Failed | Bootloader activation has failed. See log for details. | Warning | 2 | no |
4254 | Bootloader Disaster Recovery | Bootloader disaster recovery was performed. See log for details. | Warning | 2 | no |
4256 | Bootloader Reconfigured | A new configuration has been applied to the bootloader. See log for details. | Notice | 2 | no |
4258 | Kernel Update | A kernel update was performed. See log for details. | Warning | 2 | no |
4260 | Pending Kernel Update | The kernel update is waiting for installation. See log for details. | Warning | 2 | no |
4261 | Activate Pending Kernel | The kernel update is waiting for activation. See log for details. | Warning | 2 | no |
4262 | Bootloader Reconfiguration | The Bootloader configuration update has failed. See log for details. | Warning | 2 | no |
4264 | Kernel Update Failed | The kernel update has failed. See log for details. | Warning | 2 | no |
4300 | Empty ACL Encountered | Access Control List (ACL) contains empty values. See log for details. | Security | 3 | no |
4302 | Overlong ACL Encountered | Access Control List (ACL) contains too many values. See log for details. | Security | 3 | no |
4304 | Password or Key Update Failure | Password or key update failed. See log for details. | Security | 3 | no |
4306 | Password Updated | The password of the support user or the user "root" has changed. | Warning | 2 | no |
4307 | Key Updated | The root public RSA key has changed. | Warning | 2 | no |
4400 | Release Update Triggered | A software update has been triggered manually. | Notice | 2 | no |
4402 | Subsystem Release Update | CloudGen Firewall successfully updated. See log for details. | Notice | 2 | no |
4404 | Subsystem Release UpdateCanceled | A software update has been canceled. | Notice | 2 | no |
4406 | Subsystem Release Update | A software update has been aborted. See log for details. | Warning | 2 | no |
4408 | Release Update Failed | A CloudGen Firewall release update has failed. See log for details. | Security | 3 | no |
4410 | Release Inconsistencies Detected | Incorrect RPM packages have been installed (for example: hotfixes intended for another Barracuda CloudGen Firewall release version) or Barracuda Networks files have been modified (for example: by manually editing a Barracuda Networks script). | Warning | 2 | no |
4412 | Active Kernel not in RPM-DB | The Linux Kernel in use has not been added to the RPM database. | Notice | 2 | no |
4450 | New Barracuda Software Update | A new software update from Barracuda Networks is available. See DASHBOARD General Page. | Notice | 2 | yes |
4460 | New Product Tip | A new product tip from Barracuda Networks is available. See DASHBOARD General Page. | Notice | 2 | yes |
4500 | Mail Data Discarded | An email has been discarded from the mail queue. This event is reported only when the parameter Admin Reception Commands is set to yes. | Notice | 2 | no |
4504 | Mail Operation Changed | An email has been allowed or blocked manually (Processes Tab, Allow Mail Reception/Block Mail Reception). This event is reported only when the parameter Admin Discard Mail Cmd is set to yes. | Notice | 2 | no |
4506 | Mail Delivery Refused | Email delivery to a banned recipient has been refused. This event is reported only when the parameter Recipient Dropped is set to yes. | Notice | 2 | no |
4508 | Mail Relaying Denied | Relaying of an email has been denied according to the content filter configuration. This event is reported only when the parameter Mail Denied is set to yes. | Notice | 2 | no |
4512 | Mail Rule Notice | These are customized events with corresponding customized descriptions, which are triggered when the action type 'Event' is used.
Events will be reported only when the parameter User Defined Rule Event is set to yes (default). | Notice | 2 | no |
4513 | Mail Rule Warning | Warning | 2 | no | |
4514 | Mail Rule Alert | Security | 3 | no | |
4600 | Attempted Illegal Assignment | While processing data provided by dhcpd , a potentially malign assignment ${KEY} = -->${VAL}<-- has been detected. | Security | 3 | no |
5000 | User added to ATP quarantine | A user or IP address has been added to the ATP quarantine network object. | Warning | 1 | yes |
5001 | ATP malicious activity detected | A file considered to be malicious has been detected by ATP. | Warning | 1 | yes |
5002 | ATP Cloud Status | Firewall connection to the ATP Cloud - primary ATP server cannot be reached, switching over to the secondary server. | Notice | 2 | yes |
5003 | ATP Cloud Status | Firewall connection to the ATP Cloud - connection to primary and secondary ATP servers failed due to latency or overload. | Warning | 2 | yes |
5004 | DNS Sinkhole address accessed | A client has accessed the DNS sinkhole address. This may point to a potential infection of the client. | Warning | 1 | yes |
5005 | The virus Scan file blocked | Virus scanning in the firewall has detected and blocked a file containing malware. | Warning | 1 | yes |