Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Logging System Log Messages, 4.1
System Log Messages
Downloads: This chapterpdf (PDF - 1.68MB) The complete bookPDF (PDF - 8.7MB) | Feedback

Syslog Messages

Table Of Contents

Syslog Messages

Messages 102001 to 199009

102001

103001

103002

103003

103004

103005

103006

103007

104001, 104002

104003

104004

105001

105002

105003

105004

105005

105006, 105007

105008

105010

105020

105021

105031

105032

105034

105035

105038

105039

105040

105042

105043

105044

105045

105046

105047

106001

106002

106006

106007

106010

106011

106012

106013

106014

106015

106016

106017

106018

106020

106021

106022

106023

106024

106025, 106026

106027

106028

106100

106101

107001

107002

108002

108003

108004

108005

108006

108007

109001

109002

109003

109005

109006

109007

109008

109010

109011

109012

109013

109014

109016

109017

109018

109019

109020

109021

109022

109023

109024

109025

109026

109027

109028

109029

109030

109031

109032

109035

109036

109037

109039

110001

111002

111003

111004

111005

111007

111008

111009

111111

112001

113001

113003

113004

113005

113006

113007

113008

113009

113010

113011

113012

113013

113014

113015

113016

113017

113018

113019

199001

199002

199003

199005

199006

199907

199908

199909

Messages 201002 to 217001

201002

201003

201004

201005

201006

201009

202001

202005

202011

202012

208005

209003

209004

209005

210001

210002

210003

210005

210006

210007

210008

210010

210020

210021

210022

211001

211003

212001

212002

212003

212004

212005

212006

213007

214001

215001

217001

Messages 302003 to 336011

302003

302004

302009

302010

302012

302013

302014

302015

302016

302017

302018

302019

302020

302021

302022

302023

302024

302025

302302

303002

303003

303004

304001

304002

304003

304004

304005

304006

304007

304008

304009

305005

305006

305007

305008

305009

305010

305011

305012

308001

308002

311001

311002

311003

311004

312001

313001

313003

313004

314001

315004

315011

316001

317001

317002

317003

317004

317005

318001

318002

318003

318004

318005

318006

318007

318008

319001

319002

319003

319004

320001

321001

321002

321003

321004

322001

322002

322003

322004

323004

323005

324000

324001

324002

324003

324004

324005

324006

324007

325001

325002

326001

326002

326004

326005

326006

326007

326008

326009

326010

326011

326012

326013

326014

326015

326016

326017

326019

326020

326021

326022

326023

326024

326025

326026

326027

326028

329001

336001

336002

336003

336004

336005

336006

336007

336008

336009

336010

336011

Messages 400000 to 431002

401004

401005

402101

402102

402103

402106

404101

404102

402117

405001

405101

405002

405101

405102

405103

405104

405105

405201

406001

406002

407001

407002

407003

408001

408002

409001

409002

409003

409004

409005

409006

409007

409008

409009

409010

409011

409012

409013

409023

410001

411001

411002

411003

411004

412001

412002

413001

413002

413003

413004

414001

414002

415001

415002

415003

415004

415005

415006

415007

415008

415009

415010

415011

415012

415013

415014

415015

415016

415017

415018

415019

415020

416001

417001

417004

417006

418001

431001

431002

Messages 500001 to 510002

500001

500002

500003

500004

501101

502101

502102

502103

502111

502112

503001

504001

504002

506001

507001

510001

510002

Messages 602101 to 609002

602101

602102

602201

602202

602203

602301

602302

602303

602304

604101

604102

604103

604104

605005

606001

606002

606003

606004

607001

607002

607003

608001

609001

609002

610001

610002

610101

612001

612002

612003

613001

613002

613003

614001

614002

615001

615002

616001

617001

617002

617003

617004

620001

620002

621001

621002

621003

621006

621007

622001

622002

Messages 701001 to 720073

701001

701002

702201

702202

702203

702204

702205

702206

702207

702208

702209

702210

702211

702212

702301

702302

702303

703001

703002

709001, 709002

709003

709004

709005

709006

709007

709008

710001

710002

710003

710004

710005

710006

711001

711002

711003

713004

713006

713008

713009

713010

713012

713014

713016

713017

713018

713020

713022

713024

713025

713026

713027

713028

713029

713030

713031

713032

713033

713034

713035

713036

713037

713039

713040

713041

713042

713043

713047

713048

713049

713050

713051

713052

713056

713059

713060

713061

713062

713063

713065

713066

713068

713072

713073

713074

713075

713076

713078

713081

713082

713083

713084

713085

713086

713088

713092

713094

713098

713099

713102

713103

713104

713105

713107

713109

713112

713113

713114

713115

713116

713117

713118

713119

713120

713121

713122

713123

713124

713127

713128

713129

713130

713131

713132

713133

713134

713135

713136

713137

713138

713139

713140

713141

713142

713143

713144

713145

713146

713147

713148

713149

713152

713154

713155

713156

713157

713158

713159

713160

713161

713162

713163

713164

713165

713166

713167

713168

713169

713170

713171

713172

713174

713176

713177

713178

713179

713182

713184

713185

713186

713187

713189

713190

713193

713194

713195

713196

713197

713198

713199

713203

713204

713205

713206

713208

713209

713210

713211

713212

713213

713214

713215

713216

713217

713218

713219

713220

713221

713222

713223

713224

713225

713226

713229

713236

713229

713900

713901

713902

713903

713904

713905

713906

714001

714002

714003

714004

714005

714006

714007

714011

715001

715004

715005

715006

715007

715008

715009

715013

715019

715020

715021

715022

715027

715028

715033

715034

715035

715036

715037

715038

715039

715040

715041

715042

715044

715045

715046

715047

715048

715049

715050

715051

715052

715053

715054

715055

715056

715057

715058

715059

715060

715061

715062

715063

715064

715065

715066

715067

715068

715069

715070

715071

715072

715074

715075

715076

715077

717001

717002

717003

717004

717005

717006

717007

717008

717009

717010

717011

717012

717013

717014

717015

717016

717017

717018

717019

717022

717025

717028

717029

718001

718002

718003

718004

718005

718006

718007

718008

718009

718010

718011

718012

718013

718014

718015

718016

718017

718018

718019

718020

718021

718022

718023

718024

718025

718026

718027

718028

718029

718030

718031

718032

718033

718034

718035

718036

718037

718038

718039

718040

718041

718042

718043

718044

718045

718046

718047

718048

718049

718050

718051

718052

718053

718054

718055

718056

718057

718058

718059

718060

718061

718062

718063

718064

718065

718066

718067

718068

718069

718070

718071

718072

718073

718074

718075

718076

718077

718078

718079

718080

718081

718084

718085

718086

718087

718088

719001

719002

719003

719004

719005

719006

719007

719008

719009

719010

719011

719012

719013

719014

719015

719016

719025

719026

720001

720002

720003

720004

720005

720006

720007

720008

720009

720010

720011

720012

720013

720014

720015

720016

720017

720018

720019

720020

720021

720022

720023

720024

720025

720026

720027

720028

720029

720030

720031

720032

720033

720034

720035

720036

720037

720038

720039

720040

720041

720042

720043

720044

720045

720046

720047

720048

720049

720050

720051

720052

720053

720054

720055

720056

720057

720058

720059

720060

720061

720062

720063

720064

720065

720066

720067

720068

720069

720070

720071

720072

720073


Syslog Messages


This chapter lists the FWSM syslog messages. The messages are listed numerically by message code.


Note The messages shown in this guide apply to software Version 4.0 and higher. When a number is skipped in a sequence, the message is no longer in the software.


This chapter includes the following sections:

Messages 102001 to 199009

Messages 201002 to 217001

Messages 302003 to 336011

Messages 400000 to 431002

Messages 500001 to 510002

Messages 602101 to 609002

Messages 701001 to 720073

Messages 102001 to 199009

This section contains messages from 102001 to 199009.

102001

Error Message    %FWSM-1-102001: (Primary) Power failure/System reload other side.

Explanation    This is a failover message, which is logged if the primary unit detects a system reload or a power failure on the other unit. (Primary) can also be listed as (Secondary) for the secondary unit.

Recommended Action    On the unit that experienced the reload, issue the show crashinfo command to determine whether there is a traceback associated with the reload. Also verify that the unit is powered on and that power cables are connected correctly.

103001

Error Message    %FWSM-1-103001: (Primary) No response from other firewall (reason 
code = code).

Explanation    This is a failover message, which is displayed if the primary unit is unable to communicate with the secondary unit over the failover cable. (Primary) can also be listed as (Secondary). for the secondary unit. Table 1-1 lists the reason codes and the descriptions to determine why the failover occurred.

Table 1-1 Reason Codes

Reason Code
Description

1

No failover hello seen on serial cable for 30+ seconds. This ensures that failover is running correctly on the other unit.

2

An interface did not pass one of the four failover tests, which are as follows: 1) Link Up, 2) Monitor for Network Traffic, 3) ARP, and 4) Broadcast Ping.

3

No acknowledgement for 15 or more seconds after a command was sent on the serial cable.

4

The local unit is not receiving the hello packet on the failover LAN and other data interfaces, and it is declaring that the peer is down.

5

The standby peer went down during the configuration synchronization process.


Recommended Action    Verify that the failover cable is connected correctly and both units have the same hardware, software, and configuration. If the problem persists, contact the Cisco TAC.

103002

Error Message    %FWSM-1-103002: (Primary) Other firewall network interface 
interface_number OK.

Explanation    This is a failover message, which is displayed when the primary unit detects that the network interface on the secondary unit is okay. (Primary) can also be listed as (Secondary) for the secondary unit.

Recommended Action    None required.

103003

Error Message    %FWSM-1-103003: (Primary) Other firewall network interface 
interface_number failed.

Explanation    This is a failover message, which is displayed if the primary unit detects a bad network interface on the secondary unit. (Primary) can also be listed as (Secondary) for the secondary unit.

Recommended Action    Check the network connections on the secondary unit and check the network hub connection. If necessary, replace the failed network interface.

103004

Error Message    %FWSM-1-103004: (Primary) Other firewall reports this firewall failed.

Explanation    This is a failover message, which is displayed if the primary unit receives a message from the secondary unit indicating that the primary has failed. (Primary) can also be listed as (Secondary) for the secondary unit.

Recommended Action    Verify the status of the primary unit.

103005

Error Message    %FWSM-1-103005: (Primary) Other firewall reporting failure.

Explanation    This is a failover message, which is displayed if the secondary unit reports a failure to the primary unit. (Primary) can also be listed as (Secondary) for the secondary unit.

Recommended Action    Verify the status of the secondary unit.

103006

Error Message    %FWSM-1-103006: (Primary|Secondary) Mate version ver_num is not 
compatible with ours ver_num 

Explanation    This message appears when the firewall detects that a peer unit is running a version that is not the same as the local unit and is not compatible with the HA Hitless Upgrade feature.

ver_num—Version number

Recommended Action    Install the same version or a compatible version image on both firewall units.

103007

Error Message    %FWSM-1-103007: (Primary|Secondary) Mate version ver_num is not 
identical with ours ver_num 

Explanation    This message appears when the firewall detects that a peer unit is running a version that is not identical, but does support Hitless Upgrade and is compatible with the local unit. The system performance could be degraded because the image version is not the same, and the peer unit could encounter a stability issue if running a different version for an extended period.

ver_num—Version number

Recommended Action    Install the same version image on both units as soon as possible.

104001, 104002

Error Message    %FWSM-1-104001: (Primary) Switching to ACTIVE (cause: string).
Error Message    %FWSM-1-104002: (Primary) Switching to STNDBY (cause: string).

Explanation    Both instances are failover messages, which usually are logged when you force the pair to switch roles, either by entering the failover active command on the standby unit, or the no failover active command on the active unit. (Primary) can also be listed as (Secondary) for the secondary unit. Possible values for the string variable are as follows:

state check

bad/incomplete config

ifc [interface] check, mate is healthier

the other side wants me to standby

in failed state, cannot be active

switch to failed state

Recommended Action    If the message occurs because of manual intervention, none required. Otherwise, use the cause reported by the secondary unit to verify the status of both units of the pair.

104003

Error Message    %FWSM-1-104003: (Primary) Switching to FAILED.

Explanation    This is a failover message, which is displayed when the primary unit fails.

Recommended Action    Check the syslog messages on the primary unit for an indication of the nature of the problem (see message 104001). (Primary) can also be listed as (Secondary) for the secondary unit.

104004

Error Message    %FWSM-1-104004: (Primary) Switching to OK.

Explanation    This is a failover message, which is displayed when a previously failed unit now reports that it is operating again. (Primary) can also be listed as (Secondary) for the secondary unit.

Recommended Action    None required.

105001

Error Message    %FWSM-1-105001: (Primary) Disabling failover.

Explanation    This is a failover message, which is displayed when you enter the no failover command on the console. (Primary) can also be listed as (Secondary) for the secondary unit.

Recommended Action    None required.

105002

Error Message    %FWSM-1-105002: (Primary) Enabling failover.

Explanation    This is a failover message, which is displayed when you enter the failover command with no arguments on the console, after having previously disabled failover. (Primary) can also be listed as (Secondary) for the secondary unit.

Recommended Action    None required.

105003

Error Message    %FWSM-1-105003: (Primary) Monitoring on interface interface_name 
waiting

Explanation    This is a failover message. The security appliance is testing the specified network interface with the other unit of the failover pair. (Primary) can also be listed as (Secondary) for the secondary unit.

Recommended Action    None required. The security appliance monitors its network interfaces frequently during normal operations.

105004

Error Message    %FWSM-1-105004: (Primary) Monitoring on interface interface_name 
normal

Explanation    This is a failover message. The test of the specified network interface was successful. (Primary) can also be listed as (Secondary) for the secondary unit.

Recommended Action    None required.

105005

Error Message    %FWSM-1-105005: (Primary) Lost Failover communications with mate on 
interface interface_name.

Explanation    This is a failover message, which is displayed if this unit of the failover pair can no longer communicate with the other unit of the pair. (Primary) can also be listed as (Secondary) for the secondary unit.

Recommended Action    Verify that the network connected to the specified interface is functioning correctly.

105006, 105007

Error Message    %FWSM-1-105006: (Primary) Link status Up on interface interface_name.
Error Message    %FWSM-1-105007: (Primary) Link status Down on interface 
interface_name.

Explanation    Both instances are failover messages, which report the results of monitoring the link status of the specified interface. (Primary) can also be listed as (Secondary) for the secondary unit.

Recommended Action    If the link status is down, verify that the network connected to the specified interface is operating correctly.

105008

Error Message    %FWSM-1-105008: (Primary) Testing interface interface_name.

Explanation    This is a failover message, which is displayed when the tests a specified network interface. This testing is performed only if the security appliance fails to receive a message from the standby unit on that interface after the expected interval. (Primary) can also be listed as (Secondary) for the secondary unit.

Recommended Action    None required.

105010

Error Message    %FWSM-3-105010: (Primary) Failover message block alloc failed

Explanation    Block memory was depleted. This is a transient message, and the security appliance should recover. (Primary) can also be listed as (Secondary) for the secondary unit.

Recommended Action    Use the show blocks command to monitor the current block memory.

105020

Error Message    %FWSM-1-105020: (Primary) Incomplete/slow config replication

Explanation    When a failover occurs, the active security appliance detects a partial configuration in memory. Normally, this is caused by an interruption in the replication service. (Primary) can also be listed as (Secondary) for the secondary unit.

Recommended Action    Once the failover is detected by the security appliance, the security appliance automatically restarts and loads its configuration from flash memory and/or resynchronizes with another security appliance. If failovers happen continuously, check the failover configuration and make sure both security appliances can communicate with each other.

105021

Error Message    %FWSM-1-105021: (failover_unit) Standby unit failed to sync due to a 
locked context_name config. Lock held by lock_owner_name 

Explanation    During configuration synchronization, a standby unit will reload itself if another process locks the configuration for more than five minutes, which prevents the failover process from applying the new configuration. This can occur when an administrator pages through a running configuration on the standby unit while configuration synchronization is in process. See the show running-config EXEC command and the pager lines num CONFIG command.

Recommended Action    Avoid viewing or modifying the configuration on the standby unit when it first boots up and is establishing a failover connection with the active unit.

105031

Error Message    %FWSM-1-105031: Failover LAN interface is up

Explanation    The LAN failover interface link is up.

Recommended Action    None required.

105032

Error Message    %FWSM-1-105032: LAN Failover interface is down

Explanation    The LAN failover interface link is down.

Recommended Action    Check the connectivity of the LAN failover interface. Make sure that the speed/duplex setting is correct.

105034

Error Message    %FWSM-1-105034: Receive a LAN_FAILOVER_UP message from peer.

Explanation    The peer has just booted and sent the initial contact message.

Recommended Action    None required.

105035

Error Message    %FWSM-1-105035: Receive a LAN failover interface down msg from peer.

Explanation    The peer LAN failover interface link is down. The unit switches to active mode if it is in standby mode.

Recommended Action    Check the connectivity of the peer LAN failover interface.

105038

Error Message    %FWSM-1-105038: (Primary) Interface count mismatch

Explanation    When a failover occurs, the active security appliance detects a partial configuration in memory. Normally, this is caused by an interruption in the replication service. (Primary) can also be listed as (Secondary) for the secondary unit.

Recommended Action    Once the failover is detected by the security appliance, the security appliance automatically reloads the configuration from flash memory and/or resynchronizes with another security appliance. If failovers happen continuously, check the failover configuration and make sure that both security appliances can communicate with each other.

105039

Error Message    %FWSM-1-105039: (Primary) Unable to verify the Interface count with 
mate. Failover may be disabled in mate. 

Explanation    Failover initially verifies that the number of interfaces configured on the primary and secondary security appliances are the same. This message indicates that the primary security appliance cannot verify the number of interfaces configured on the secondary security appliance and that the primary security appliance is not able communicate with the secondary security appliance over the failover interface. (Primary) can also be listed as (Secondary) for the secondary security appliance.

Recommended Action    Verify the failover LAN, interface configuration, and status on the primary and secondary security appliances. Make sure that the secondary security appliance is running the security appliance application and that failover is enabled.

105040

Error Message    %FWSM-1-105040: (Primary) Mate failover version is not compatible.

Explanation    The primary and secondary security appliance should run the same failover software version to act as a failover pair. This message indicates that the secondary security appliance failover software version is not compatible with the primary security appliance. Failover is disabled on the primary security appliance. (Primary) can also be listed as (Secondary) for the secondary security appliance.

Recommended Action    Maintain consistent software versions between the primary and secondary security appliances to enable failover.

105042

Error Message    %FWSM-1-105042: (Primary) Failover interface OK 

Explanation    LAN failover interface link is up.

Explanation    The interface used to send failover messages to the secondary security appliance is functioning. (Primary) can also be listed as (Secondary) for the secondary security appliance.

Recommended Action    None required.

105043

Error Message    %FWSM-1-105043: (Primary) Failover interface failed 

Explanation    The LAN failover interface link is down.

Recommended Action    Check the connectivity of the LAN failover interface. Make sure that the speed/duplex setting is correct.

105044

Error Message    %FWSM-1-105044: (Primary) Mate operational mode mode is not compatible 
with my mode mode.

Explanation    When the operational mode (single or multi) does not match between failover peers, failover will be disabled.

Recommended Action    Configure the failover peers to have the same operational mode, and then reenable failover.

105045

Error Message    %FWSM-1-105045: (Primary) Mate license (number contexts) is not 
compatible with my license (number contexts).

Explanation    When the feature licenses do not match between failover peers, failover will be disabled.

Recommended Action    Configure the failover peers to have the same feature license, and then reenable failover.

105046

Error Message    %FWSM-1-105046 (Primary|Secondary) Mate has a different chassis 

Explanation    Two failover units have a different type of chassis. For example, one has a three-slot chassis, and the other has a six-slot chassis.

Recommended Action    Make sure that the two failover units are the same.

105047

Error Message    %FWSM-1-105047: Mate has a io_card_name1 card in slot slot_number which 
is different from my io_card_name2 

Explanation    The two failover units have different types of cards in their respective slots.

Recommended Action    Make sure that the card configurations for the failover units are the same.

106001

Error Message    %FWSM-2-106001: Inbound TCP connection denied from IP_address/port to 
IP_address/port flags tcp_flags on interface interface_name 

Explanation    This is a connection-related message, which occurs when an attempt to connect to an inside address is denied by your security policy. Possible tcp_flags values correspond to the flags in the TCP header that were present when the connection was denied. For example, a TCP packet arrived for which no connection state exists in the security appliance, and it was dropped. The tcp_flags in this packet are FIN and ACK.

The tcp_flags are as follows:

ACK—The acknowledgment number was received.

FIN—Data was sent.

PSH—The receiver passed data to the application.

RST—The connection was reset.

SYN—Sequence numbers were synchronized to start a connection.

URG—The urgent pointer was declared valid.

Recommended Action    None required.

106002

Error Message    %FWSM-2-106002: protocol Connection denied by outbound list acl_ID src 
inside_address dest outside_address 

Explanation    This is a connection-related message, which is displayed if the specified connection fails because of an outbound deny command. The protocol variable can be ICMP, TCP, or UDP.

Recommended Action    Use the show outbound command to check outbound lists.

106006

Error Message    %FWSM-2-106006: Deny inbound UDP from outside_address/outside_port to 
inside_address/inside_port on interface interface_name.

Explanation    This is a connection-related message, which is displayed if an inbound UDP packet is denied by your security policy.

Recommended Action    None required.

106007

Error Message    %FWSM-2-106007: Deny inbound UDP from outside_address/outside_port to 
inside_address/inside_port due to DNS {Response|Query}.

Explanation    This is a connection-related message, which is displayed if a UDP packet containing a DNS query or response is denied.

Recommended Action    If the inside port number is 53, the inside host probably is set up as a caching name server. Add an access-list command statement to permit traffic on UDP port 53. If the outside port number is 53, a DNS server was probably too slow to respond, and the query was answered by another server.

106010

Error Message    %FWSM-3-106010: Deny inbound protocol src 
interface_name:dest_address/dest_port dst 
interface_name:source_address/source_port 

Explanation    This is a connection-related message, which is displayed if an inbound connection is denied by your security policy.

Recommended Action    Modify the security policy if traffic should be permitted. If the message occurs at regular intervals, contact the remote peer administrator.

106011

Error Message    %FWSM-3-106011: Deny inbound (No xlate) string 

Explanation    The message will appear under normal traffic conditions if there are internal users that are accessing the Internet through a web browser. This message will appear any time a connection is reset, when the host at the end of the connection sends a packet after the security appliance receives the reset. It can typically be ignored.

Recommended Action    Prevent this syslog message from getting logged to the syslog server by entering the no logging message 106011 command.

106012

Error Message    %FWSM-6-106012: Deny IP from IP_address to IP_address, IP options hex.

Explanation    This is a packet integrity check message. An IP packet was seen with IP options. Because IP options are considered a security risk, the packet was discarded.

Recommended Action    Contact the remote host system administrator to determine the problem. Check the local site for loose source routing or strict source routing.

106013

Error Message    %FWSM-2-106013: Dropping echo request from IP_address to PAT address 
IP_address 

Explanation    The security appliance discarded an inbound ICMP Echo Request packet with a destination address that corresponds to a PAT global address. The inbound packet is discarded because it cannot specify which PAT host should receive the packet.

Recommended Action    None required.

106014

Error Message    %FWSM-3-106014: Deny inbound icmp src interface_name: IP_address dst interface_name: IP_address (type dec, code dec) 

Explanation    The security appliance denied any inbound ICMP packet access. By default, all ICMP packets are denied access unless specifically permitted.

Recommended Action    None required.

106015

Error Message    %FWSM-6-106015: Deny TCP (no connection) from IP_address/port to 
IP_address/port flags tcp_flags on interface interface_name.

Explanation    The security appliance discarded a TCP packet that has no associated connection in the security appliance connection table. The security appliance looks for a SYN flag in the packet, which indicates a request to establish a new connection. If the SYN flag is not set, and there is not an existing connection, the security appliance discards the packet.

Recommended Action    None required unless the security appliance receives a large volume of these invalid TCP packets. If this is the case, trace the packets to the source and determine the reason that these packets were sent.

106016

Error Message    %FWSM-2-106016: Deny IP spoof from (IP_address) to IP_address on 
interface interface_name. 

Explanation    The security appliance discarded a packet with an invalid source address.  Invalid source addresses are those addresses belonging to the following:

Loopback network (127.0.0.0)

Broadcast  (limited, net-directed, subnet-directed, and all-subnets-directed)

The destination host (land.c)

To further enhance spoof packet detection, use the conduit command to configure the security appliance to discard packets with source addresses belonging to the internal network. Now that the icmp command has been implemented, the conduit command has been deprecated and is no longer guaranteed to work properly.

Recommended Action    Determine if an external user is trying to compromise the protected network. Check for misconfigured clients.

106017

Error Message    %FWSM-2-106017: Deny IP due to Land Attack from IP_address to 
IP_address 

Explanation    The security appliance received a packet with the IP source address equal to the IP destination, and the destination port equal to the source port. This message indicates a spoofed packet that is designed to attack systems. This attack is referred to as a Land Attack.

Recommended Action    If this message persists, an attack may be in progress. The packet does not provide enough information to determine from where the attack originates.

106018

Error Message    %FWSM-2-106018: ICMP packet type ICMP_type denied by outbound list 
acl_ID src inside_address dest outside_address 

Explanation    The outgoing ICMP packet with the specified ICMP from local host (inside_address) to the foreign host (outside_address) was denied by the outbound ACL list.

Recommended Action    None required.

106020

Error Message    %FWSM-2-106020: Deny IP teardrop fragment (size = number, offset = 
number) from IP_address to IP_address 

Explanation    The security appliance discarded an IP packet with a teardrop signature containing either a small offset or fragment overlapping. This is a hostile event that circumvents the security appliance or an Intrusion Prevention Service.

Recommended Action    Contact the remote peer administrator or escalate this issue according to your security policy.

106021

Error Message    %FWSM-1-106021: Deny protocol reverse path check from source_address 
to dest_address on interface interface_name 

Explanation    An attack is in progress. Someone is attempting to spoof an IP address on an inbound connection. Unicast RPF, also known as reverse route lookup, detected a packet that does not have a source address represented by a route and assumes that it is part of an attack on your security appliance.

This message appears when you have enabled Unicast RPF with the ip verify reverse-path command. This feature works on packets input to an interface; if it is configured on the outside, the security appliance checks packets arriving from the outside.

The security appliance looks up a route based on the source_address. If an entry is not found and a route is not defined, this syslog message appears and the connection is dropped.

If there is a route, the security appliance checks which interface it corresponds to. If the packet arrived on another interface, it is either a spoof or there is an asymmetric routing environment that has more than one path to a destination. The security appliance does not support asymmetric routing.

If the security appliance is configured on an internal interface, it checks static route command statements or RIP, and if the source_address is not found, an internal user is spoofing their address.

Recommended Action    Although an attack is in progress, if this feature is enabled, no user action is required. The security appliance repels the attack.

106022

Error Message    %FWSM-1-106022: Deny protocol connection spoof from source_address to 
dest_address on interface interface_name 

Explanation    A packet matching a connection arrives on a different interface from the interface that the connection began on.

For example, if a user starts a connection on the inside interface, but the security appliance detects the same connection arriving on a perimeter interface, the security appliance has more than one path to a destination. This is known as asymmetric routing and is not supported on the security appliance.

An attacker also might be attempting to append packets from one connection to another as a way to break into the security appliance. In either case, the security appliance displays this message and drops the connection.

Recommended Action    This message appears when the ip verify reverse-path command is not configured. Check that the routing is not asymmetric.

106023

Error Message    %FWSM-4-106023: Deny protocol src 
[interface_name:source_address/source_port] dst 
interface_name:dest_address/dest_port [type {string}, code {code}] by access_group acl_ID 

Explanation    An IP packet was denied by the ACL. This message displays even if you do not have the log option enabled for an extended ACL.

Recommended Action    If messages persist from the same source address, messages might indicate a foot-printing or port-scanning attempt. Contact the remote host administrators.

106024

Error Message    %FWSM-2-106024: Access rules memory exhausted

Explanation    The access list compilation process has run out of memory. All configuration information that has been added since the last successful access list was removed from the system, and the most recently compiled set of access lists will continue to be used.

Recommended Action    Access lists, AAA, ICMP, SSH, Telnet, and other rule types are stored and compiled as access list rule types. Remove some of these rule types so that others can be added.


Note Do not enter the write mem command if the memory exhaustion occurred after elements were added to object groups. Doing so may cause ACLs using this object group to not take effect anymore after rebooting. Remove the object group changes manually before continuing instead.


106025, 106026

Error Message    %FWSM-6-106025: Failed to determine the security context for the 
packet:sourceVlan:source_address dest_address source_port dest_port protocol 
Error Message    %FWSM-6-106026: Failed to determine the security context for the 
packet:sourceVlan:source_address dest_address source_port dest_port protocol 

Explanation    The security context of the packet in multiple context mode cannot be determined. Both messages can be generated for IP packets being dropped in either router or transparent mode.

Recommended Action    None required.

106027

Error Message    %FWSM-4-106027:Failed to determine the security context for the 
packet:vlansource Vlan#:ethertype src sourceMAC dst destMAC 

Explanation    The security context of the packet in multiple context mode cannot be determined. Non-IP packets are being dropped in transparent mode only.

Recommended Action    None required.

106028

Error Message    %FWSM-6-106028: Deny TCP (Connection marked for deletion) from src 
ip-address/src-port to dst ip-address/dst-port flags flag on interface intf-name 

Explanation    This syslog message is generated because a TCP port (source, destination, or both) was reused to start a new connection within the TIME_WAIT period prescribed in the TCP RFC for an existing connection. This message appears only for a short period of time (until the connection is actually cleaned up), and only for new connections for SYN-only TCP packets whose flow has been marked for deletion. Although reuse is not mandatory, it is recommended. If a VLAN is shared in more than one context, then the VLAN number appears instead of the intf-name variable.

Recommended Action    Investigate why the client is reusing the port. After the connection is deleted in the FWSM, if the same port is reused for a new connection, then the connection is established.

106100

Error Message    %FWSM-6-106100: access-list acl_ID {permitted | denied | est-allowed} protocol interface_name/source_address(source_port) -> 
interface_name/dest_address(dest_port) hit-cnt number ({first hit | 
number-second interval})

Explanation    If you configured the log option for the access-list command, the packets matched an ACL statement. The message level depends on the level set in the access-list command.

The message indicates either the initial occurrence or the total number of occurrences during an interval. This message provides more information than Message 106027, which only logs denied non-IP packets, and does not include the hit count or a configurable level. The following list describes the message values:

permitted | denied | est-allowed —These values specify if the packet was permitted or denied by the ACL. If the value is est-allowed, the packet was denied by the ACL but was allowed for an already established session (for example, an internal user is allowed to accesss the Internet, and responding packets that would normally be denied by the ACL are accepted).

protocol—TCP, UDP, ICMP, or an IP protocol number.

interface_name—The interface name for the source or destination of the logged flow. The VLAN interfaces are supported.

source_address—The source IP address of the logged flow.

dest_address—The destination IP address of the logged flow.

source_port—The source port of the logged flow (TCP or UDP). For ICMP, this variable is 0.

dest_port—The destination port of the logged flow (TCP or UDP). For ICMP, this variable is src_addr.

hit-cnt number—The number of times this flow was permitted or denied by this ACL entry in the configured time interval. The value is 1 when the security appliance generates the first syslog message for this flow.

first hit—The first message generated for this flow.

number-second interval—The interval in which the hit count is accumulated. Set this interval using the access-list command with the interval option.

Recommended Action    None required.

106101

Error Message    %FWSM-1-106101 The number of ACL log deny-flows has reached limit 
(number).

Explanation    If you configured the log option for an ACL deny statement (access-list id deny command), and a traffic flow matches the ACL statement, the security appliance caches the flow information. This message indicates that the number of matching flows that are cached on the security appliance exceeds the user-configured limit (using the access-list deny-flow-max command).

number value— The limit configured using the access-list deny-flow-max command.

Recommended Action    None required. This message might be generated as a result of a DoS attack.

107001

Error Message    %FWSM-1-107001: RIP auth failed from IP_address: version=number, 
type=string, mode=string, sequence=number on interface interface_name 

Explanation    The security appliance received a RIP reply message with bad authentication. This message might be caused by a misconfiguration on the router or the ASDM, or by an unsuccessful attempt to attack the routing table of the security appliance.

Recommended Action    This message indicates a possible attack and should be monitored. If you are not familiar with the source IP address listed in this message, change your RIP authentication keys between trusted entities. An attacker might be trying to determine the existing keys.

107002

Error Message    %FWSM-1-107002: RIP pkt failed from IP_address: version=number on 
interface interface_name 

Explanation    This is an alert log message, which could be caused by a router bug, a packet with non-RFC values inside, or a malformed entry. This should not happen, and may be an attempt to exploit the routing table of the security appliance.

Recommended Action    This message indicates a possible attack and should be monitored. The packet has passed authentication, if enabled, and bad data is in the packet. Monitor the situation and change the keys if there are any doubts about the originator of the packet.

108002

Error Message    %FWSM-2-108002: SMTP replaced string: out source_address in 
inside_address data: string 

Explanation    This is a Mail Guard (SMTP) message generated by the fixup protocol smtp command. The security appliance replaces an invalid character in an e-mail address with a space.

Recommended Action    None required.

108003

Error Message    %FWSM-2-108003: Terminating ESMTP/SMTP connection; malicious pattern 
detected in the mail address from source_interface:source_address/source_port to 
dest_interface:dest_address/dset_port. Data:string 

Explanation    This message is generated by Mail Guard (SMTP), which is displayed if the security appliance detects a malicious pattern in an e-mail address and drops the connection. This indicates an attack in progress.

Explanation    None required.

108004

Error Message    %FWSM-4-108004: action_class:action ESMTP req_resp from 
src_ifc:src_ip/src_port to dst_ifc/dest_port. Data:string 

Explanation    This message is generated by MailGuard (ESMTP) and is logged if the FWSM detects a malicious pattern in an e-mail address and drops the connection.

action_class—The class of action. ESMTP classification applies to ESMTP match commands. ESMTP classification applies to ESMTP parameter commands.

action—The action taken, which can be one of the following:

- Dropped

- Dropped connection for

- Reset connection for

- Masked header flags for

req_resp—The request or response.

src_ifc—The source interface name.

src_ip—The source IP address.

src_port—The source port.

dst_ifc—The destination interface address

dst_ip—The destination IP address.

dst_port—The destination port.

string—The offending data.

Recommended Action    None required.

108005

Error Message    %FWSM-6-108005: action_class: Received ESMTP req_resp from src_ifc:sip|sport to dest_ifc:dip|dport;further_info 

Explanation    This event is generated when a ESMTP classification is performed on a ESMTP message and the specified criteria are satisfied. The standalone log action is taken.

action_class—The class of action: "ESMTP Classification" for ESMTP match commands; "ESMTP Parameter" for parameter commands.

req_resp—"Request" or "Response"

src_ifc—Source interface name

sip|sport—Source IP address or source port

dest_ifc—Destination interface name

dip|dport—Destination IP address or destination port

further info—One of the following:

For single match command: matched Class id: match_command (for example, matched Class 1234: match body length 100).

For parameter commands (commands under parameter section): parameter-command: descriptive-message (for example, mail-relay: No Mail Relay allowed).

Recommended Action    None required.

108006

Error Message    %FWSM-7-108006: Detected ESMTP size violation from src_ifc:sip|sport to dest_ifc:dip|dport;declared size is: decl_size, actual size is act_size. 

Explanation    This event is generated when an ESMTP message size exceeds the size declared in the RCPT command.

src_ifc—Source interface name

sip|sport—Source IP address or source port

dest_ifc—Destination interface name

dip|dport—Destination IP address or destination port

decl_size—Declared size

act_size—Actual size

Recommended Action    None required.

108007

Error Message    %FWSM-6-108007: TLS started on ESMTP session between client 
client-side interface-name: client IP address/client port and server server-side interface-name: server IP address/server port 

Explanation    This message indicates that on an ESMTP connection, the server has responded with a 220 reply code to the client STARTTLS command. The ESMTP inspection engine no longer inspects the traffic on this connection.

client-side interface-name—The name for the interface that faces the client side

client IP address—The IP address of the client

client port—The TCP port number for the client

server-side interface-name—The name for the interface that faces the server side

server IP address—The IP address of the server

server port—The TCP port number for the server

Recommended Action    Log and review the message. Check whether the ESMTP policy map associated with this connection has the following setting: "allow-tls action log." If not, contact the Cisco TAC.

109001

Error Message    %FWSM-6-109001: Auth start for user user from 
inside_address/inside_port to outside_address/outside_port 

Explanation    This is an authentication, authorization and accounting (AAA) message, which is displayed if the security appliance is configured for AAA and detects an authentication request by the specified user.

Recommended Action    None required.

109002

Error Message    %FWSM-6-109002: Auth from inside_address/inside_port to 
outside_address/outside_port failed (server IP_address failed) on interface 
interface_name.

Explanation    This is a AAA message and is displayed if an authentication request fails because the specified authentication server cannot be contacted by the module.

Recommended Action    Check that the authentication daemon is running on the specified authentication server.

109003

Error Message    %FWSM-6-109003: Auth from src_ip/src_port to dest_ip/dest_port failed 
(all servers failed) on interface interface_name, so marking all servers ACTIVE 
again

Explanation    This is a AAA message and is displayed when all authentication servers have failed. These servers are automatically marked as ACTIVE again and we continue to send authentication requests to each server, one request at a time.

Recommended Action    Ping the authentication servers from the security appliance. Make sure that the daemons are running.

109005

Error Message    %FWSM-6-109005: Authentication succeeded for user user from 
inside_address/inside_port to outside_address/outside_port on interface 
interface_name.

Explanation    This is a AAA message and is displayed when the specified authentication request succeeds.

Recommended Action    None required.

109006

Error Message    %FWSM-6-109006: Authentication failed for user user from 
inside_address/inside_port to outside_address/outside_port on interface 
interface_name.

Explanation    This is a AAA message and is displayed if the specified authentication request fails, possibly because of an incorrect password.

Recommended Action    None required.

109007

Error Message    %FWSM-6-109007: Authorization permitted for user user from 
inside_address/inside_port to outside_address/outside_port on interface 
interface_name.

Explanation    This is a AAA message and is displayed when the specified authorization request succeeds.

Recommended Action    None required.

109008

Error Message    %FWSM-6-109008: Authorization denied for user user from 
outside_address/outside_port to inside_address/ inside_port on interface 
interface_name. 

Explanation    This is a AAA message and is displayed if a user is not authorized to access the specified address, possibly because of an incorrect password.

Recommended Action    None required.

109010

Error Message    %FWSM-3-109010: Auth from inside_address/inside_port to 
outside_address/outside_port failed (too many pending auths) on interface 
interface_name.

Explanation    This is a AAA message and is displayed if an authentication request cannot be processed because the server has too many requests pending.

Recommended Action    Check to see if the authentication server is too slow to respond to authentication requests. Enable the Flood Defender feature with the floodguard enable command.

109011

Error Message    %FWSM-2-109011: Authen Session Start: user 'user', sid number 

Explanation    An authentication session started between the host and the security appliance and has not yet completed.

Recommended Action    None required.

109012

Error Message    %FWSM-5-109012: Authen Session End: user 'user', sid number, elapsed 
number seconds

Explanation    The authentication cache has timed out. Users must reauthenticate on their next connection. You can change the duration of this timer with the timeout uauth command.

Recommended Action    None required.

109013

Error Message    %FWSM-3-109013: User must authenticate before using this service

Explanation    The user must be authenticated before using the service.

Recommended Action    Authenticate using FTP, Telnet, or HTTP before using the service.

109014

Error Message    %FWSM-7-109014: uauth_lookup_net fail for uauth_in()

Explanation    A request to authenticate did not have a corresponding request for authorization.

Recommended Action    Ensure that both the aaa authentication and aaa authorization command statements are included in the configuration.

109016

Error Message    %FWSM-3-109016: Can't find authorization ACL acl_ID for user 'user'

Explanation    The access control list specified on the AAA server for this user does not exist on the security appliance. This error can occur if you configure the AAA server before you configure the security appliance. The Vendor-Specific Attribute (VSA) on the AAA server might be one of the following values:

acl=acl_ID

shell:acl=acl_ID

ACS:CiscoSecured-Defined-ACL=acl_ID

Recommended Action    Add the ACL to the security appliance, making sure to use the same name specified on the AAA server.

109017

Error Message    %FWSM-4-109017: User at IP_address exceeded auth proxy connection 
limit (max)

Explanation    A user has exceeded the user authentication proxy limit, and has opened too many connections to the proxy.

Recommended Action    Increase the proxy limit by entering the proxy-limit proxy_limit command, or ask the user to close unused connections. If the error persists, it may indicate a possible DoS attack.

109018

Error Message    %FWSM-3-109018: Downloaded ACL acl_ID is empty

Explanation    The downloaded authorization access control list has no ACEs. This situation might be caused by misspelling the attribute string "ip:inacl#" or omitting the access-list command.

junk:junk# 1=permit tcp any any eq junk ip:inacl#1="

Recommended Action    Correct the ACL components that have the indicated error on the AAA server.

109019

Error Message    %FWSM-3-109019: Downloaded ACL acl_ID has parsing error; ACE string 

Explanation    An error is encountered during parsing the sequence number NNN in the attribute string ip:inacl#NNN= of a downloaded authorization access control list. The reason is: - missing = - contains non-numeric, non-space characters between '#' and '=' - NNN is greater than 999999999.

For example:

hostname# 1 permit tcp any any
hostname# 1junk2=permit tcp any any
hostname# 1000000000=permit tcp any any

Recommended Action    Correct the ACL element that has the indicated error on the AAA server.

109020

Error Message    %FWSM-3-109020: Downloaded ACL has config error; ACE

Explanation    One of the components of the downloaded authorization access control list has a configuration error. The entire text of the element is included in the syslog message. An invalid access-list command statement was entered.

Recommended Action    Correct the ACL component that has the indicated error on the AAA server.

109021

Error Message    %FWSM-7-109021: Uauth null proxy error

Explanation    An internal User Authentication error has occurred.

Recommended Action    None required. However, if this error appears repeatedly, contact Cisco TAC.

109022

Error Message    %FWSM-4-109022: exceeded HTTPS proxy process limit

Explanation    For each HTTPS authentication, the security appliance dedicates a process to service the authentication request. When the number of concurrently running processes exceeds the system-imposed limit, the security appliance does not perform the authentication, and this message is displayed.

Recommended Action    None required.

109023

Error Message    %FWSM-3-109023: User from source_address/source_port to 
dest_address/dest_port on interface outside_interface must authenticate before 
using this service.

Explanation    This is a AAA message. Based on the configured policies, you need to be authenticated before you can use this service port.

Recommended Action    Authenticate using Telnet, FTP, or HTTP before attempting to use this service port.

109024

Error Message    %FWSM-6-109024: Authorization denied from source_address/source_port 
to dest_address/dest_port (not authenticated) on interface interface_name using 
protocol 

Explanation    This is a AAA message and appears if the security appliance is configured for AAA and a user attempted to make a TCP connection across the security appliance without prior authentication.

Recommended Action    None required.

109025

Error Message    %FWSM-6-109025: Authorization denied (acl=acl_ID) for user 'user' from 
source_address/source_port to dest_address/dest_port on interface interface_name 
using protocol 

Explanation    The access control list check failed. The check either matched a deny or did not match anything, such as an implicit deny. The connection was denied by the user access control list acl_ID, which was defined according to the AAA authorization policy on the Cisco Secure Access Control Server (ACS).

Recommended Action    None required.

109026

Error Message    %FWSM-3-109026: [aaa protocol] Invalid reply digest received; shared 
server key may be mismatched.

Explanation    The response from the AAA server could not be validated. It is likely that the configured server key is incorrect. This event may be generated during transactions with RADIUS or TACACS+ servers.

Recommended Action    Verify that the server key, configured using the aaa-server command, is correct.

109027

Error Message    %FWSM-4-109027: [aaa protocol] Unable to decipher response message 
Server = server_IP_address, User = user 

Explanation    The response from the AAA server could not be validated. The configured server key is probably incorrect. This message may be displayed during transactions with RADIUS or TACACS+ servers. The server_IP_address is the IP address of the relevant AAA server. The user is the username associated with the connection.

Recommended Action    Verify that the server key, configured using the aaa-server command, is correct.

109028

Error Message    %FWSM-4-109028: aaa bypassed for same-security traffic from ingress_ 
interface:source_address/source_port to 
egress_interface:dest_address/dest_port

Explanation    AAA is being bypassed for same security traffic that matches a configured AAA rule. This can only occur when traffic passes between two interfaces that have the same configured security level, when the same security traffic is permitted, and if the AAA configuration uses the include or exclude syntax.

Recommended Action    None required.

109029

Error Message    %FWSM-5-109029: Parsing downloaded ACL: string 

Explanation    A syntax error was encountered while parsing an access list that was downloaded from a RADIUS server during user authentication.

string—An error message detailing the syntax error that prevented the access list from parsing correctly.

Recommended Action    Use the information presented in this message to identify and correct the syntax error in the access list definition within the RADIUS server configuration.

109030

Error Message    %FWSM-4-109030: Autodetect ACL convert wildcard did not convert ACL 
access_list source | dest netmask netmask 

Explanation    A dynamic ACL that is configured on a RADIUS server is not converted by the mechanism for automatically detecting wildcard netmasks. The problem occurs because this mechanism could not determine if the netmask is a wildcard or a normal netmask.

access_list—The access list that could not be converted.

source—The source IP address.

dest—The destination IP address.

netmask—The subnet mask for the destination or source address in dotted-decimal notation.

Recommended Action    Check the access list netmask on the RADIUS server for a wildcard configuration. If it is supposed to be a wildcard, and if all access list netmasks on that server are wildcard, use the wildcard setting for acl-netmask-convert for the AAA server. Otherwise, change the netmask to a normal netmask or to a wildcard netmask that does not contain holes when the netmask presents consecutive binary 1s. For example, 00000000.00000000.00011111.11111111 or hex 0.0.31.255. If the mask is supposed to be normal and all access list netmasks on that server are normal, use the normal setting acl-netmask-convert for the AAA server.

109031

Error Message    %FWSM-4-109031: NT Domain Authentication Failed: rejecting guest login 
for username 

Explanation    A user tries to authenticate to an NT Auth domain that was configured for guest account access and the username is not a valid username on the NT server. The connection is denied.

Recommended Action    If the user is a valid user, add an account to the NT server. If the user is not allowed access, none required.

109032

Error Message    %FWSM-3-109032: Unable to install ACL access_list, downloaded for user 
username; Error in ACE: ace.

Explanation    An access control list is received from a RADIUS server during the authentication of a network user. The log event indicates a syntax error in one of the elements of the access list. When this occurs, the element is discarded, but the rest of access list is still applied. The entire text of the malformed element is included in the message. This condition does not result in an authentication failure.

access_list—The name assigned to the dynamic access list as it would appear in the output of the show access-list command.

username—The name of the user whose connection will be subject to this access list.

ace—The access list entry that was being processed when the error was detected.

Recommended Action    Correct the access list definition in the RADIUS server configuration.

109035

Error Message    %FWSM-4-109035: Authentication failed for user username as the 
password expired

Explanation    This message indicates that the password entered has expired. The user is prompted to change the password, and enters a new one.

Recommended Action    None required.

109036

Error Message    %FWSM-4-109036: Teardown protocol connection session_id for 
src_if:src_ip/src_port to dest_if:dest_ip/dest_port duration duration bytes bytes 
due to Uauth timeout

Explanation    This message indicates that a connection has been closed because of a uauth timeout.

protocol—The connection protocol

session_id—The connection session ID

src_if—The source interface name

src_ip—The source IP address

src_port—The source port number

dest_if—The destination interface name

dest_ip—The destination IP address

dest_port—The destination port number

duration—The duration of the connection in hh:mm:ss

bytes—The number of bytes transferred

Recommended Action    None required.

109037

Error Message    %FWSM-4-109037: Authentication cannot be done for the user from src_ip 
to dest_ip for application since auth_proto client is too busy

Explanation    This message indicates that the client cannot authenticate when Radius and TACACS+ packet identifiers have run out, because of heavy traffic. The identifier has eight bits in the Radius and TACACS+ packet. Consequently, a maximum of 256 packets can be present at any time.

source_ip—The source IP address

dest_ip—The destination IP address

application—The application to which the client connects (for example, FTP and Telnet)

auth_proto—The authentication protocol used (either Radius or TACACS+)

This syslog message occurs in addition to the following messages on the client:

RADIUS client too busy - try later
TACACS+ client too busy - try later

Recommended Action    None required. This behavior is normal with heavy traffic.

109039

Error Message    %FWSM-4-109039: Func_ID: Uauth Unproxy Failed due to the reason: 
Failed_Reason 

Explanation    This message tracks the "Unproxy Failed" error message on the console and provides additional information about the reason for failure. The Func_ID variable indicates the function for which this message is being generated.

This message may occur in the following scenarios:

A user is connecting through virtual Telnet, but the uauth flag is not set to virtual.

The dupb() call fails, that is, duplicating a block failure.

In the uauth_pickapp() call, an error occurs in calling different uauth modules.

When a user is authenticated, an error occurs when a connection to the server fails.

Recommended Action    None required.

110001

Error Message    %FWSM-6-110001: No route to dest_address from source_address

Explanation    This message indicates a route lookup failure. A packet is looking for a destination IP address that is not in the routing table.

Recommended Action    Check the routing table and make sure that a route to the destination exists.

111002

Error Message    %FWSM-5-111002: Begin configuration: IP_address reading from device 

Explanation    This message is displayed when you enter the <> command to read a configuration from a device (a floppy disk, flash memory, TFTP, the failover standby unit, or the console terminal). The IP_address indicates whether the login was made at the console port or with a Telnet connection.

Recommended Action    None required.

111003

Error Message    %FWSM-5-111003: IP_address Erase configuration

Explanation    This is a management message and is displayed when you erase the contents of flash memory by entering the write erase command at the console. The IP_address value indicates whether the login was made at the console port or through a Telnet connection.

Recommended Action    After erasing the configuration, reconfigure the security appliance and save the new configuration. Alternatively, you can restore information from a configuration that was previously saved, on a floppy disk or on a TFTP server elsewhere on the network.

111004

Error Message    %FWSM-5-111004: IP_address end configuration: {FAILED|OK}

Explanation    This message is displayed when you enter the config floppy/memory/ network command or the write floppy/memory/network/standby command. The IP_address value indicates whether the login was made at the console port or through a Telnet connection.

Recommended Action    None required if the message ends with success. If the message indicates a failure, try to fix the problem. For example, if writing to a floppy disk, ensure that the floppy disk is not write protected; if writing to a TFTP server, ensure that the server is up.

111005

Error Message    %FWSM-5-111005: IP_address end configuration: OK

Explanation    This message is displayed when you exit the configuration mode. The IP_address value indicates whether the login was made at the console port or through a Telnet connection.

Recommended Action    None required.

111007

Error Message    %FWSM-5-111007: Begin configuration: IP_address reading from device.

Explanation    This message is displayed when you enter the reload or configure command to read in a configuration. The device text can be floppy, memory, net, standby, or terminal. The IP_address value indicates whether the login was made at the console port or through a Telnet connection.

Recommended Action    None required.

111008

Error Message    %FWSM-5-111008: User user executed the command string 

Explanation    The user entered a command that modified the configuration.

Recommended Action    None required.

111009

Error Message    %FWSM-7-111009:User user executed cmd:string 

Explanation    The user entered a command that does not modify the configuration.

Recommended Action    None required.

111111

Error Message    %FWSM-1-111111 error_message 

Explanation    A system or an infrastructure error has occurred.

Recommended Action    Copy the error message and submit it to Cisco TAC, along with the configuration and any details about the events leading up to this error.

112001

Error Message    %FWSM-2-112001: (string:dec) Clear complete.

Explanation    A request to clear the module configuration is completed. The source file and line number are identified.

Recommended Action    None required.

113001

Error Message    %FWSM-3-113001: Unable to open AAA session. Session limit [limit] 
reached.

Explanation    A AAA operation on an IPSec tunnel could not be performed because of the unavailability of system resources. The limit value indicates the maximum number of concurrent AAA transactions.

Recommended Action    Reduce the demand for AAA resources if possible.

113003

Error Message    %FWSM-6-113003: AAA group policy for user user is being set to 
policy_name. 

Explanation    The group policy that is associated with the tunnel-group is being overridden with a user-specific policy, policy_name. The policy_name is specified using the username command when LOCAL authentication is configured or is returned in the RADIUS CLASS attribute when RADIUS authentication is configured.

Recommended Action    None required.

113004

Error Message    %FWSM-6-113004: AAA user aaa_type Successful: server = 
server_IP_address, User = user 

Explanation    This is an indication that a AAA operation on an IPSec connection has been completed successfully. The AAA types are authentication, authorization, or accounting. The server_IP_address is the IP address of the relevant AAA server. The user is the username associated with the connection.

Recommended Action    None required.

113005

Error Message    %FWSM-6-113005: AAA user authentication Rejected: reason = string: 
server = server_IP_address, User = user 

Explanation    This is an indication that either an authentication or authorization request for a user associated with an IPSec connection has been rejected. Details of why the request was rejected are provided in the reason variable. server_IP_address is the IP address of the relevant AAA server. user is the username associated with the connection. aaa_operation is either authentication or authorization.

Recommended Action    None required.

113006

Error Message    %FWSM-6-113006: User user locked out on exceeding number successive 
failed authentication attempts

Explanation    A locally configured user is being locked out. This happens when a configured number of consecutive authentication failures have occurred for this user and indicates that all future authentication attempts by this user will be rejected until an administrator unlocks the user using the clear aaa local user lockout command. user is the user that is now locked and number is the consecutive failure threshold configured with the aaa local authentication attempts max-fail command.

Recommended Action    Try unlocking the user using the clear_aaa_local_user_lockout command or adjusting the maximum number of consecutive authentication failures that are tolerated.

113007

Error Message    %FWSM-6-113007: User user unlocked by administrator 

Explanation    A locally configured user that was locked out after exceeding the maximum number of consecutive authentication failures set by the aaa local authentication attempts max-fail command has been unlocked by the indicated administrator.

Recommended Action    None required.

113008

Error Message    %FWSM-6-113008: AAA transaction status ACCEPT: user = user 

Explanation    A AAA transaction for a user associated with an IPSec connection was completed successfully. The user is the username associated with the connection.

Recommended Action    None required.

113009

Error Message    %FWSM-6-113009: AAA retrieved default group policy policy for user user 

Explanation    This message may be generated during the authentication or authorization of an IPSec connection. The attributes of the group policy that were specified with the tunnel-group commands have been retrieved.

Recommended Action    None required.

113010

Error Message    %FWSM-6-113010: AAA challenge received for user user from server 
server_IP_address 

Explanation    This message may be generated during the authentication of an IPSec connection when the authentication is done with a SecurID server. The user will be prompted to provide further information before being authenticated. The server _IP_address is the IP address of the relevant AAA server. The user is the username associated with the connection.

Recommended Action    None required.

113011

Error Message    %FWSM-6-113011: AAA retrieved user specific group policy policy for 
user user 

Explanation    This event may be generated during the authentication or authorization of an IPSec connection. The attributes of the group policy that was specified with the tunnel-group commands have been retrieved.

Recommended Action    None required.

113012

Error Message    %FWSM-6-113012: AAA user authentication Successful: local database: 
user = user 

Explanation    The user associated with a IPSec connection has been successfully authenticated to the local user database. The user is the username associated with the connection.

Recommended Action    None required.

113013

Error Message    %FWSM-6-113013: AAA unable to complete the request Error: reason = reason: user = user 

Explanation    A AAA transaction for a user associated with an IPSec connection has failed because of an error or has been rejected because of a policy violation. Details are provided in the reason variable. The user is the username associated with the connection.

Recommended Action    None required.

113014

Error Message    %FWSM-6-113014: AAA authentication server not accessible: server = 
server_IP_address: user = user 

Explanation    The device was unable to communicate with the configured AAA server during a AAA transaction associated with an IPSec connection. This may or may not result in a failure of the user connection attempt, depending on the backup servers configured in the aaa-server group and the availability of those servers.

Recommended Action    Verify connectivity with the configured AAA servers.

113015

Error Message    %FWSM-6-113015: AAA user authentication Rejected: reason = reason: 
local database: user = user 

Explanation    A request for authentication to the local user database for a user associated with an IPSec connection has been rejected. Details of why the request was rejected are provided in the reason variable. The user is the username associated with the connection.

Recommended Action    None required.

113016

Error Message    %FWSM-6-113016: AAA credentials rejected: reason = reason: server = 
server_IP_address: user = user 

Explanation    A AAA transaction for a user associated with an IPSec connection has failed because of an error or rejected because of a policy violation. Details are provided in the reason variable. The server_IP_address is the IP address of the relevant AAA server. The user is the username associated with the connection.

Recommended Action    None required.

113017

Error Message    %FWSM-6-113017: AAA credentials rejected: reason = reason: local 
database: user = user\ 

Explanation    This is an indication that a AAA transaction for a user associated with an IPSec connection has failed because of an error or rejected because of a policy violation. Details are provided in the reason variable. This event only appears when the AAA transaction is with the local user database rather than with an external AAA server. The user is the username associated with the connection.

Recommended Action    None required.

113018

Error Message    %FWSM-3-113018: User: user, Unsupported downloaded ACL Entry: 
ACL_entry, Action: action 

Explanation    An ACL entry in unsupported format was downloaded from the authentication server. The following list describes the message values:

user—User trying to log in.

ACL_entry—Unsupported ACL entry downloaded from the authentication server.

action—Action taken when encountering the unsupported ACL entry.

Recommended Action    The ACL entry on the authentication server has to be changed appropriately by the administrator to conform with the supported ACL entry formats.

113019

Error Message    %FWSM-4-113019: Group = group, Username = user, IP = peer_address, 
Session disconnected. Session Type: type, Duration: duration, Bytes xmt: count, 
Bytes rcv: count 

Explanation    This is an informational message.

group—Group name.

user—Username.

peer_address—Peer address.

type—Session type (for example, IPSec/UDP).

duration—Connection duration.

count—Number of bytes.

Recommended Action    None required.

199001

Error Message    %FWSM-5-199001: Reload command executed from telnet (remote 
IP_address).

Explanation    This message logs the address of the host that is initiating a security appliance reboot with the reload command.

Recommended Action    None required.

199002

Error Message    %FWSM-6-199002: startup completed. Beginning operation.

Explanation    The security appliance finished its initial boot and the flash memory reading sequence, and is ready to begin operating normally.


Note This message cannot be blocked by using the no logging message command.


Recommended Action    None required.

199003

Error Message    %FWSM-6-199003: Reducing link MTU dec.

Explanation    The security appliance received a packet from the outside network that uses a larger MTU than the inside network. The security appliance then sent an ICMP message to the outside host to negotiate an appropriate MTU. The log message includes the sequence number of the ICMP message.

Recommended Action    None required.

199005

Error Message    %FWSM-6-199005: Startup begin

Explanation    The security appliance started.

Recommended Action    None required.

199006

Error Message    %FWSM-5-199006: Orderly reload started at when by whom. Reload reason: 
reason 

Explanation    A reload operation is started.

when—The time at which orderly reload operation begins. The time is in the format of hh:mm:ss timezone weekday month day year, for example "13:23:45 UTC Sun Dec 28 2003."

whom—The user or system that scheduled the reload.

reason—The reload reason. String will be unspecified if a more complete reason is not displayed.

Recommended Action    None required.

199907

Error Message    %FWSM-5-1999007:IP detected an attached application using port port 
while removing context

Explanation    When an interface or context is removed, all applications should close all channels for that context or interface. This message indicates that an application had not closed all channels for a removed interface or application and is doing so now.

Recommended Action    None required.

199908

Error Message    %FWSM-5-1999008:Protocol detected an attached application using local 
port local_port and destination port dest_port 

Explanation    When an interface or context is removed, all applications should close all channels for that context or interface. This message indicates that an application had not closed all channels for a removed interface or application and is doing so now.

Recommended Action    None required.

199909

Error Message    %FWSM-7-199009: ICMP detected an attached application while removing 
a context

Explanation    When an interface or context is removed, all applications should close all channels for that context or interface. This message indicates that an application had not closed all channels for a removed interface or application and is doing so now.

Recommended Action    None required.

Messages 201002 to 217001

This section contains messages from 201002 to 217001.

201002

Error Message    %FWSM-3-201002: Too many TCP connections on {static|xlate} 
global_address! econns nconns 

Explanation    This is a connection-related message and is displayed when the maximum number of TCP connections to the specified global address was exceeded. The econns variable is the maximum number of embryonic connections and the nconns variable is the maximum number of connections permitted for the static or xlate.

Recommended Action    Use the show static or show nat command to check the limit imposed on connections to a static address. The limit is configurable.

201003

Error Message    %FWSM-2-201003: Embryonic limit exceeded nconns/elimit for 
outside_address/outside_port (global_address) inside_address/inside_port on 
interface interface_name 

Explanation    This is a connection-related message regarding traffic to the security appliance and is displayed when the number of embryonic connections from the specified foreign address with the specified static global address to the specified local address exceeds the embryonic limit. When the limit on embryonic connections to the security appliance is reached, the security appliance attempts to accept them anyway, but puts a time limit on the connections. This situation allows some connections to succeed even if the security appliance is very busy. The nconns variable lists the number of embryonic connections received and the elimit variable lists the maximum number of embryonic connections specified in the static or nat command.

Recommended Action    This message indicates a more serious overload than message 201002. It could be caused by a SYN attack, or by a very heavy load of legitimate traffic. Use the show static command to check the limit imposed on embryonic connections to a static address.

201004

Error Message    %FWSM-3-201004: Too many UDP connections on {static|xlate} 
global_address! udp connections limit 

Explanation    This is a connection-related message and is displayed when the maximum number of UDP connections to the specified global address was exceeded. The udp conn limit variable is the maximum number of UDP connections permitted for the static or translation.

Recommended Action    Use the show static or show nat command to check the limit imposed on connections to a static address. You can configure the limit.

201005

Error Message    %FWSM-3-201005: FTP data connection failed for IP_address IP_address 

Explanation    The security appliance could not allocate a structure to track the data connection for FTP because of insufficient memory.

Recommended Action    Reduce the amount of memory usage or purchase additional memory.

201006

Error Message    %FWSM-3-201006: RCMD backconnection failed for IP_address/port 

Explanation    This is a connection-related message and is displayed if the security appliance is unable to preallocate connections for inbound standard output for rsh commands because of insufficient memory.

Recommended Action    Check the rsh command client version; the security appliance only supports the Berkeley rsh command version. You can also reduce the amount of memory usage, or purchase additional memory.

201009

Error Message    %FWSM-3-201009: TCP connection limit of number for host IP_address on 
interface_name exceeded

Explanation    This is a connection-related message and is displayed when the maximum number of connections to the specified static address was exceeded. The number variable is the maximum of connections permitted for the host specified by the IP_address variable.

Recommended Action    Use the show static and show nat commands to check the limit imposed on connections to an address. The limit is configurable.

202001

Error Message    %FWSM-3-202001: Out of address translation slots!

Explanation    This is a connection-related message and is displayed if the security appliance has no more address translation slots available.

Recommended Action    Check the size of the global pool compared to the number of inside network clients. A PAT address may be necessary. Alternatively, shorten the timeout interval of translates and connections. This error message could also be caused by insufficient memory; reduce the amount of memory usage, or purchase additional memory usage if possible.

202005

Error Message    %FWSM-3-202005: Non-embryonic in embryonic list 
outside_address/outside_port inside_address/inside_port 

Explanation    This is a connection-related message and is displayed when a connection object (xlate) is in the wrong list.

Recommended Action    Contact Cisco TAC.

202011

Error Message    %FWSM-3-202011: Connection limit exceeded econns/limit for dir packet 
from source_address/source_port to dest_address/dest_port on interface 
interface_name 

Explanation    An attempt to create a TCP or UDP connection fails because of an exceeded connection limit, which is configured with the set connection conn-max MPF command for a traffic class.

econns— The current count of embryonic connections associated to the configured traffic class.

limit—The configured embryonic connection limit for the traffic class.

dir:
input— The first packet that initiates the connection is an input packet on the interface interface_name.
output— The first packet that initiates the connection is an output packet on the interface interface_name.

source_address/source_port—The source IP address and the source port of the packet initiating the connection.

dest_address/dest_port—The destination IP address and the destination port of the packet initiating the connection.

interface_name—The name of the interface on which the policy limit is enforced.

Recommended Action    None required.

202012

Error Message    %FWSM-3-202012: Connection rate limit exceeded conns/rate-limit (per 
seconds) for dir packet from source_address/source_port to dest_address/dest_port 
on interface interface_name 

Explanation    An attempt to create a TCP or UDP connection fails because of an exceeded connection rate limit, which is configured with the set connection conn-rate-limit MPC command for a traffic class.

conns—The current count of connections associated with the configured class of traffic.

rate-limit—The configured connection rate-limit for the class of traffic.

dir—The direction of the packet (inbound or outbound).

source_address/source_port—The source IP address and the source port of the packet initiating the connection.

dest_address/dest_port—The destination IP address and the destination port of the packet initiating the connection.

interface_name—The name of the interface on which the policy limit is enforced.

Recommended Action    None required.

208005

Error Message    %FWSM-3-208005: (function:line_num) clear command return code 

Explanation    The security appliance received a nonzero value (an internal error) when attempting to clear the configuration in flash memory. The message includes the reporting subroutine filename and line number.

Recommended Action    For performance reasons, the end host should be configured to not inject IP fragments. This configuration change is probably because of NFS. Set the read and write size equal to the interface MTU for NFS.

209003

Error Message    %FWSM-4-209003: Fragment database limit of number exceeded: src = 
source_address, dest = dest_address, proto = protocol, id = number 

Explanation    Too many IP fragments are currently awaiting reassembly. By default, the maximum number of fragments is 200 (refer to the fragment size command in the Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Command Reference to raise the maximum). The security appliance limits the number of IP fragments that can be concurrently reassembled. This restriction prevents memory depletion at the security appliance under abnormal network conditions. In general, fragmented traffic should be a small percentage of the total traffic mix. An exception is in a network environment with NFS over UDP where a large percentage is fragmented traffic; if this type of traffic is relayed through the security appliance, consider using NFS over TCP instead. To prevent fragmentation, see the sysopt connection tcpmss bytes command in the Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Command Reference.

Recommended Action    If this message persists, a denial of service (DoS) attack might be in progress. Contact the remote peer administrator or upstream provider.

209004

Error Message    %FWSM-4-209004: Invalid IP fragment, size = bytes exceeds maximum 
size = bytes: src = source_address, dest = dest_address, proto = protocol, id = 
number 

Explanation    An IP fragment is malformed. The total size of the reassembled IP packet exceeds the maximum possible size of 65,535 bytes.

Recommended Action    A possible intrusion event may be in progress. If this message persists, contact the remote peer administrator or upstream provider.

209005

Error Message    %FWSM-4-209005: Discard IP fragment set with more than number elements: 
src = Too many elements are in a fragment set. 

Explanation    The security appliance disallows any IP packet that is fragmented into more than 24 fragments. For more information, see the fragment command in the Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Command Reference.

Recommended Action    A possible intrusion event may be in progress. If the message persists, contact the remote peer administrator or upstream provider. You can change the number of fragments per packet by using the fragment chain xxx interface_name command.

210001

Error Message    %FWSM-3-210001: LU sw_module_name error = number 

Explanation    A stateful failover error occurred.

Recommended Action    If this error persists after traffic lessens through the security appliance, report this error to Cisco TAC.

210002

Error Message    %FWSM-3-210002: LU allocate block (bytes) failed.

Explanation    Stateful failover could not allocate a block of memory to transmit stateful information to the standby security appliance.

Recommended Action    Check the failover interface using the show interface command to make sure its transmission is normal. Also check the current block memory using the show block command. If the current available count is 0 within any of the blocks of memory, reload the security appliance software to recover the lost blocks of memory.

210003

Error Message    %FWSM-3-210003: Unknown LU Object number 

Explanation    Stateful failover received an unsupported Logical Update object and was unable to process it. This could be caused by corrupted memory, LAN transmissions, and other events.

Recommended Action    If you see this error infrequently, none required. If this error occurs frequently, check the stateful failover link LAN connection. If the error was not caused by a faulty failover link LAN connection, determine if an external user is trying to compromise the protected network. Check for misconfigured clients.

210005

Error Message    %FWSM-3-210005: LU allocate connection failed

Explanation    Stateful failover cannot allocate a new connection on the standby unit. This may be caused by little or no RAM memory available within the security appliance.

Recommended Action    Check the available memory using the show memory command to make sure that the security appliance has free memory in the system. If there is no available memory, add more physical memory to the security appliance.

210006

Error Message    %FWSM-3-210006: LU look NAT for IP_address failed

Explanation    Stateful failover was unable to locate a NAT group for the IP address on the standby unit. The active and standby security appliance units may be out of sync.

Recommended Action    Use the write standby command on the active unit to synchronize system memory with the standby unit.

210007

Error Message    %FWSM-3-210007: LU allocate xlate failed

Explanation    Stateful failover failed to allocate a translation (xlate) slot record.

Recommended Action    Check the available memory by using the show memory command to make sure that the security appliance has free memory in the system. If no memory is available, add more memory.

210008

Error Message    %FWSM-3-210008: LU no xlate for inside_address/inside_port 
outside_address/outside_port 

Explanation    Unable to find a translation slot (xlate) record for a stateful failover connection; unable to process the connection information.

Recommended Action    Enter the write standby command on the active unit to synchronize system memory between the active and standby units.

210010

Error Message    %FWSM-3-210010: LU make UDP connection for 
outside_address:outside_port inside_address:inside_port failed

Explanation    Stateful failover was unable to allocate a new record for a UDP connection.

Recommended Action    Check the available memory by using the show memory command to make sure that the security appliance has free memory in the system. If no memory is available, add more memory.

210020

Error Message    %FWSM-3-210020: LU PAT port port reserve failed

Explanation    Stateful failover is unable to allocate a specific PAT address which is in use.

Recommended Action    Enter the write standby command on the active unit to synchronize system memory between the active and standby units.

210021

Error Message    %FWSM-3-210021: LU create static xlate global_address ifc interface_name failed

Explanation    Stateful failover is unable to create a translation slot (xlate).

Recommended Action    Enter the write standby command on the active unit to synchronize system memory between the active and standby units.

210022

Error Message    %FWSM-6-210022: LU missed number updates

Explanation    Stateful failover assigns a sequence number for each record sent to the standby unit. When a received record sequence number is out of sequence with the last updated record, the information in-between is assumed lost and this error message is sent.

Recommended Action    Unless there are LAN interruptions, check the available memory on both security appliance units to ensure that enough memory is available to process the stateful information. Use the show failover command to monitor the quality of stateful information updates.

211001

Error Message    %FWSM-3-211001: Memory allocation Error

Explanation    The security appliance failed to allocate RAM system memory.

Recommended Action    If this message occurs periodically, it can be ignored. If it repeats frequently, contact Cisco TAC.

211003

Error Message    %FWSM-3-211003: CPU utilization for number seconds = percent 

Explanation    The percentage of CPU usage is greater than 100 percent for the number of seconds.

Recommended Action    If this message occurs periodically, it can be ignored. If it repeats frequently, contact Cisco TAC.

212001

Error Message    %FWSM-3-212001: Unable to open SNMP channel (UDP port port) on 
interface interface_number, error code = code 

Explanation    This is an SNMP message, which reports that the security appliance is unable to receive SNMP requests destined for the security appliance from SNMP management stations located on this interface. This does not affect the SNMP traffic passing through the security appliance through any interface.

An error code of -1 indicates that the security appliance could not open the SNMP transport for the interface, which can occur when the user attempts to change the port on which SNMP accepts queries to one that is already in use by another feature. In this case, the port used by SNMP will be reset to the default port for incoming SNMP queries (UDP/161).

An error code of -2 indicates that the security appliance could not bind the SNMP transport for the interface.

Recommended Action    After the security appliance reclaims some of its resources when traffic is lighter, reenter the snmp-server host command for that interface.

212002

Error Message    %FWSM-3-212002: Unable to open SNMP trap channel (UDP port port) on 
interface interface_number, error code = code 

Explanation    This is an SNMP message, which reports that the security appliance is unable to send its SNMP traps from the security appliance to SNMP management stations located on this interface. This does not affect the SNMP traffic passing through the security appliance through any interface.

An error code of -1 indicates that the security appliance could not open the SNMP trap transport for the interface.

An error code of -2 indicates that the security appliance could not bind the SNMP trap transport for the interface.

Recommended Action    After the security appliance reclaims some of its resources when traffic is lighter, reenter the snmp-server host command for that interface.

212003

Error Message    %FWSM-3-212003: Unable to receive an SNMP request on interface 
interface_number, error code = code, will try again

Explanation    This is an SNMP message, which is displayed because of an internal error in receiving an SNMP request destined for the security appliance on the specified interface.

Recommended Action    None required. The security appliance SNMP agent waits for the next SNMP request.

212004

Error Message    %FWSM-3-212004: Unable to send an SNMP response to IP Address 
IP_address Port port interface interface_number, error code = code 

Explanation    This is an SNMP message, which is displayed because an internal error occurred in sending an SNMP response from the security appliance to the specified host on the specified interface. Valid error codes are -1 through -5.

Recommended Action    None required.

212005

Error Message    %FWSM-3-212005: incoming SNMP request (number bytes) on interface 
interface_name exceeds data buffer size, discarding this SNMP request.

Explanation    This is an SNMP message, which reports that the length of the incoming SNMP request destined for the security appliance exceeds the size of the internal data buffer (512 bytes) used for storing the request during internal processing. The security appliance is unable to process this request. This situation does not affect the SNMP traffic passing through the security appliance using any interface.

Recommended Action    Have the SNMP management station resend the request with a shorter length. For example, instead of querying multiple MIB variables in one request, try querying only one MIB variable in a request. You may need to modify the configuration of the SNMP management software.

212006

Error Message    %FWSM-3-212006: Dropping SNMP request from source_address/source_port 
to interface_name:dest_address/dest_port because: reason 

Explanation    This is a SNMP message, which is displayed if the device is unable to process a SNMP request for the following reasons:

The SNMP server is disabled.

SNMPv3 is not supported.

Recommended Action    Make sure that the SNMP daemon can respond by issuing the snmp-server enable command. Only SNMPv1 and v2c packets are handled by the device.

213007

Error Message    %FWSM-3-213007: Error in linkin_connudp for Conn (0xc106540) with 
lport 61394, gport 61934, fport 53, xlate inVpif 0x170001, outVpif 0x170002, flags 
0x4000, xid 0xd0639FD, local-addr IP_addr, global-addr IP_addr, Conn vcid is 31 
and xlate 53, dnat-gaddr IP_addr, laddr IP_addr, fw_id

Explanation    This message is triggered when the CP gets a packet that is classified under the wrong virtual context.

Recommended Action    Run the debug fixup udp command to determine the affect on performance. Also run the clear dispatch statistics command and show dispatch statistics command to obtain more performance details.

214001

Error Message    %FWSM-2-214001: Terminating manager session from IP_address on 
interface interface_name. Reason: incoming encrypted data (number bytes) longer 
than number bytes

Explanation    An incoming encrypted data packet destined for the security appliance management port indicates a packet length exceeding the specified upper limit. This may be a hostile event. The security appliance immediately terminates this management connection.

Recommended Action    Ensure that the management connection was initiated by Cisco Secure Policy Manager.

215001

Error Message    %FWSM-2-215001:Bad route_compress() call, sdb= number 

Explanation    An internal software error occurred.

Recommended Action    Contact Cisco TAC.

217001

Error Message    %FWSM-2-217001: No memory for string in string 

Explanation    An operation failed because of low memory.

Recommended Action    If sufficient memory exists, copy the error message, the configuration, and any details about the events leading up to the error and send them to Cisco TAC.

Messages 302003 to 336011

This section contains messages from 302003 to 336011.

302003

Error Message    %FWSM-6-302003: Built H245 connection for foreign_address 
outside_address/outside_port local_address inside_address/inside_port 

Explanation    This is a connection-related message and is displayed when an H.245 connection is started from the outside_address to the inside_address. This message only occurs if the security appliance detects the use of an Intel Internet phone. The foreign port (outside port) only displays on connections from outside the security appliance. The local port value (inside port) only appears on connections started on an internal interface.

Recommended Action    None required.

302004

Error Message    %FWSM-6-302004: Pre-allocate H323 UDP backconnection for 
foreign_address outside_address/outside_port to local_address 
inside_address/inside_port 

Explanation    A connection-related message that is displayed when an H.323 UDP back-connection is preallocated to the foreign address (outside_address) from the local address (inside_address). This message only occurs if the security appliance detects the use of an Intel Internet phone. The foreign port (outside_port) only displays on connections from outside the security appliance. The local port value (inside_port) only appears on connections started on an internal interface.

Recommended Action    None required.

302009

Error Message    %FWSM-6-302009: Rebuilt TCP connection number for foreign_address 
outside_address/outside_port global_address global_address/global_port 
local_address inside_address/inside_port 

Explanation    A connection-related message that appears after a TCP connection is rebuilt after a failover. A sync packet is not sent to the other security appliance. The outside_address IP address is the foreign host, the global_address IP address is a global address on the lower security level interface, and the inside_address IP address is the local IP address "behind" the security appliance on the higher security level interface.

Recommended Action    None required.

302010

Error Message    %FWSM-6-302010: connections in use, connections most used

Explanation    This is a connection-related message. This message appears after a TCP connection restarts. connections is the number of connections.

Recommended Action    None required.

302012

Error Message    %FWSM-6-302012: Pre-allocate H225 Call Signalling Connection for faddr 
IP_address/port to laddr IP_address 

Explanation    An H.225 secondary channel has been preallocated.

Recommended Action    None required.

302013

Error Message    %FWSM-6-302013: Built {inbound|outbound} TCP connection_id for 
interface:real-address/real-port (mapped-address/mapped-port) to 
interface:real-address/real-port (mapped-address/mapped-port) [(user)]

Explanation    A TCP connection slot between two hosts was created.

connection_id is a unique identifier.

interface, real-address, and real-port identify the actual sockets.

mapped-address and mapped-port identify the mapped sockets.

user is the AAA name of the user.

If inbound is specified, the original control connection was initiated from the outside. For example, for FTP, all data transfer channels are inbound if the original control channel is inbound. If outbound is specified, the original control connection was initiated from the inside.

Recommended Action    None required.

302014

Error Message    %FWSM-6-302014: Teardown TCP connection id for 
interface:real-address/real-port to interface:real-address/real-port duration 
hh:mm:ss bytes bytes [reason] [(user)]

Explanation    A TCP connection between two hosts was deleted. The following list describes the message values:

id is an unique identifier.

interface, real-address, and real-port identify the actual sockets.

duration is the lifetime of the connection.

bytes is the data transfer of the connection.

user is the AAA name of the user.

The reason variable presents the action that causes the connection to terminate. Set the reason variable to one of the TCP termination reasons listed in Table 1-2.

Table 1-2 TCP Termination Reasons 

Reason
Description

CONN_CLOSE_TCP_CONTROL_CLOSE

The FTP data control channel timed out, so the FWSM must delete all data channels attached to it.

CONN_CLOSE_TCP_DNS_CLOSE

Because the DNS guard is on when the DNS reply appears, the connection must close.

CONN_CLOSE_TCP_RES_LIMIT

The connection must be torn down because the resource limit has been reached. The resource limit is user-defined (for example, no more than 100 connections per context per firewall.

Conn-timeout

Connection ended because it was idle longer than the configured idle timeout.

Deny Terminate

Flow was terminated by application inspection.

FIN Timeout

Force termination after 10 minutes awaiting the last ACK or after half-closed timeout.

Flow closed by inspection

Flow was terminated by inspection feature.

Flow terminated by IPS

Flow was terminated by IPS.

Flow reset by IPS

Flow was reset by IPS.

Invalid SYN

SYN packet not valid.

Idle Timeout

Connection timed out because it was idle longer than timeout value.

IPS fail-close

Flow was terminated because the IPS card is down.

SYN Control

Back channel initiation from wrong side.

SYN Timeout

Force termination after 2 minutes (default), awaiting three-way handshake completion. For many protocols (for example, DCERPC), the pin hole timeout is configurable.

TCP bad retransmission

Connection terminated because of bad TCP retransmission.

TCP FINs

Normal close-down sequence.

TCP Invalid SYN

Invalid TCP SYN packet.

TCP Reset

FWSM is tearing down a connection, which could occur for the following reasons:

A software error occurred while trying to establish that connection, and the FWSM is unable to handle the new connection.

As the result of an inspection policy for connections that are generated and handled by the protocol inspection (secondary channels).

TCP Reset-I

Reset was from the inside.

TCP Reset-O

Reset was from the outside.

TCP segment partial overlap

Detected a partially overlapping segment.

TCP unexpected window size variation

Connection terminated because of variation in the TCP window size.

Tunnel has been torn down

Flow terminated because tunnel is down.

Unauth Deny

Denied by URL filter.

Unknown

Catch-all error.

Xlate Clear

Command-line removal.


Recommended Action    None required.

302015

Error Message    %FWSM-6-302015: Built {inbound|outbound} UDP connection number for 
interface_name:real_address/real_port (mapped_address/mapped_port) to 
interface_name:real_address/real_port (mapped_address/mapped_port) [(user)]

Explanation    A UDP connection slot between two hosts is created. The following list describes the message values:

number—A unique identifier.

interface, real_address, and real_port—The actual sockets.

mapped_address and mapped_port—The mapped sockets.

user—The AAA name of the user.

If inbound is specified, the original control connection is initiated from the outside. For example, for UDP, all data transfer channels are inbound if the original control channel is inbound. If outbound is specified, the original control connection is initiated from the inside.

Recommended Action    None required.

302016

Error Message    %FWSM-6-302016: Teardown UDP connection number for 
interface:real-address/real-port to interface:real-address/real-port duration 
hh:mm:ss bytes bytes [(user)]

Explanation    A UDP connection slot between two hosts was deleted. The following list describes the message values:

number is an unique identifier.

interface, real_address, real_port are the actual sockets.

time is the lifetime of the connection.

bytes is the data transfer of the connection.

id is an unique identifier.

interface, real-address, and real-port are the actual sockets.

duration is the lifetime of the connection.

bytes is the data transfer of the connection.

user is the AAA name of the user.

Recommended Action    None required.

302017

Error Message    %FWSM-6-302017: Built {inbound|outbound} 
GRE connection id from
interface:real_address (translated_address) to
interface:real_address/real_cid
(translated_address/translated_cid)[(user)

Explanation    A GRE connection slot between two hosts is created. The id is an unique identifier. The interface, real_address, real_cid tuple identifies one of the two simplex PPTP GRE streams. The parenthetical translated_address, translated_cid tuple identifies the translated value with NAT.

If inbound is indicated, the connection can only be used inbound. If outbound is indicated, the connection can only be used for outbound. The following list shows the message values:

id—Unique number identifying the connection.

inbound—Control connection is for inbound PPTP GRE flow.

outbound—Control connection is for outbound PPTP GRE flow.

interface_name—The interface name.

real_address—IP address of the actual host.

real_cid—Untranslated call-ID for the connection.

translated_address—IP address after translation.

translated_cid—Translated call.

user—AAA username.

Recommended Action    This is an informational message.

302018

Error Message    %FWSM-6-302018: Teardown GRE connection id from
interface:real_address (translated_address) to
interface:real_address/real_cid
(translated_address/translated_cid)
duration hh:mm:ss bytes bytes [(user)]

Explanation    A GRE connection slot between two hosts is deleted. The interface, real_address, real_port tuple identifies the actual sockets. Duration accounts the lifetime of the connection. The following list shows the message values:

id—Unique number identifying the connection.

interface—The interface name.

real_address—IP address of the actual host.

real_port—Port number of the actual host.

hh:mm:ss—Time in hour:minute:second format.

bytes—Number of PPP bytes transferred in the GRE session.

reason—Reason why the connection was terminated.

user—AAA username.

Recommended Action    This is an informational message.

302019

Error Message    %FWSM-3-302019: H.323 library_name ASN Library failed to initialize, 
error code number 

Explanation    The specified ASN library that the security appliance uses for decoding the H.323 messages failed to initialize; the security appliance cannot decode or inspect the arriving H.323 packet. The security appliance allows the H.323 packet to pass through without any modification. When the next H.323 message arrives, the security appliance attempts to initialize the library again.

Recommended Action    If this message is generated consistently for a particular library, contact Cisco TAC and provide them with all syslog messages (preferably with timestamps).

302020

Error Message    %FWSM-6-302020: Built {in | out}bound ICMP connection for faddr 
{faddr | icmp_seq_num} gaddr {gaddr | cmp_type} laddr laddr

Explanation    An ICMP session was established in fast-path when stateful ICMP is enabled using the fixup protocol icmp command.

Recommended Action    None required.

302021

Error Message    %FWSM-6-302021: Teardown ICMP connection for faddr {faddr | 
icmp_seq_num} gaddr {gaddr | cmp_type} laddr laddr 

Explanation    An ICMP session was removed in fast-path when stateful ICMP is enabled using the fixup protocol icmp command.

Recommended Action    None required.

302022

Error Message    %FWSM-6-302022: Built IP protocol 103 connection 219025360 for 
int_112:172.16.2.1 (172.16.2.1) to int_102:172.16.112.2 (172.16.112.2)

Explanation    A non-TCP/UDP connection slot between two hosts was created.

Recommended Action    None required.

302023

Error Message    %FWSM-6-302023: Teardown IP protocol 103 connection 219025359 for 
int_102:172.16.2.1 to int_112:172.16.112.2 duration 0:00:35 bytes 74 

Explanation    A non-TCP/UDP connection slot between two hosts was deleted.

Recommended Action    None required.

302024

Error Message    %FWSM-6-302024: Pre-allocated H323 GUP connection for faddr intf: {foreign-address /foreign-port} to laddr intf: {local-address/local-port}

Explanation    A connection-related message that is displayed when a GUP connection is started from the foreign address to the local address. The foreign (outside) port only displays on connections outside the FWSM. The local (inside) port value only appears on connections that are started on an internal interface.

Recommended Action    None required.

302025

Error Message    %FWSM-4-302025: Unable to Pre-allocate H323 GUP Connection for faddr 
intf: {foreign-address/foreign-port} to laddr intf: {local-address/local-port}

Explanation    The module failed to allocate RAM system memory while starting a connection or has no more address translation slots available.

Recommended Action    If this message occurs periodically, ignore it. If this message occurs frequently, contact Cisco TAC. You can check the size of the global pool compared to the number of inside network clients. Alternatively, you can shorten the timeout interval of translations and connections. Insufficient memory may also cause this message; try reducing the amount of memory used or purchasing more memory.

302302

Error Message    %FWSM-3-302302: ACL = deny; no sa created

Explanation    IPSec proxy mismatches. Proxy hosts for the negotiated SA correspond to a deny access-list command policy.

Recommended Action    Check the access-list command statement in the configuration. Contact the administrator for the peer.

303002

Error Message    %FWSM-6-303002: source_address {Stored|Retrieved} dest_address: mapped_address 

Explanation    This is an FTP/URL message and is displayed when the specified host attempts to store or retrieve data from the specified FTP site.

Recommended Action    None required.

303003

Error Message    %FWSM-6-303003: FTP cmd_name command denied - failed strict 
inspection, terminating connection from 
source_interface:source_address/source_port to 
dest_interface:dest_address/dest_port 

Explanation    An FTP request command is denied by the strict FTP inspection policy from the ftp-map command.

Recommended Action    None required.

303004

Error Message    %FWSM-5-303004: FTP cmd_string command unsupported - failed strict 
inspection, terminating connection from 
source_interface:source_address/source_port to 
dest_interface:dest_address/dest_interface 

Explanation    This message appears when using strict FTP inspection on FTP traffic. It is displayed if an FTP request message contains a command that is not recognized by the device.

Recommended Action    None required.

304001

Error Message    %FWSM-5-304001: user source_address Accessed {JAVA URL|URL} 
dest_address: url.

Explanation    This is an FTP/URL message that is generated for HTTPS traffic when it is inspected using the filter https command. The source and destination IP addresses are included in the message, but the URL is not included because it cannot be decrypted through inspection.

Recommended Action    None required.

304002

Error Message    %FWSM-5-304002: Access denied URL chars SRC IP_address DEST 
IP_address: chars 

Explanation    This is an FTP/URL message and is displayed if access from the source address to the specified URL or FTP site is denied.

Recommended Action    None required.

304003

Error Message    %FWSM-3-304003: URL Server IP_address timed out URL url 

Explanation    A URL server timed out.

Recommended Action    None required.

304004

Error Message    %FWSM-6-304004: URL Server IP_address request failed URL url 

Explanation    This is an FTP/URL message and is displayed if a Websense server request fails.

Recommended Action    None required.

304005

Error Message    %FWSM-7-304005: URL Server IP_address request pending URL url 

Explanation    This is an FTP/URL message and is displayed when a Websense server request is pending.

Recommended Action    None required.

304006

Error Message    %FWSM-3-304006: URL Server IP_address not responding

Explanation    This is an FTP/URL message. The Websense server is unavailable for access, and the security appliance tries to access either the same server if it is the only server installed or another server if there is more than one.

Recommended Action    None required.

304007

Error Message    %FWSM-2-304007: URL Server IP_address not responding, ENTERING ALLOW 
mode.

Explanation    This is an FTP/URL message and is displayed when you use the allow option of the filter command, and the Websense servers are not responding. The security appliance allows all web requests to continue without filtering while the servers are not available.

Recommended Action    None required.

304008

Error Message    %FWSM-2-304008: LEAVING ALLOW mode, URL Server is up.

Explanation    This is an FTP/URL message and is displayed when you use the allow option of the filter command, and the security appliance receives a response message from a Websense server that previously was not responding. With this response message, the security appliance exits the allow mode, which enables the URL filtering feature again.

Recommended Action    None required.

304009

Error Message    %FWSM-7-304009: Ran out of buffer blocks specified by url-block command

Explanation    The URL pending buffer block is running out of space.

Recommended Action    Change the buffer block size by entering the url-block block block_size command.

305005

Error Message    %FWSM-3-305005: No translation group found for protocol src 
interface_name:dest_address/dest_port dst 
interface_name:source_address/source_port 

Explanation    A packet does not match any of the outbound nat command rules.

Recommended Action    This message indicates a configuration error. If dynamic NAT is desired for the source host, ensure that the nat command matches the source IP address. If static NAT is desired for the source host, ensure that the local IP address of the static command matches. If no NAT is desired for the source host, check the ACL bound to the NAT 0 ACL.

305006

Error Message    %FWSM-3-305006: {outbound static|identity|portmap|regular) 
translation creation failed for protocol src 
interface_name:source_address/source_port dst 
interface_name:dest_address/dest_port 

Explanation    A protocol (UDP, TCP, or ICMP) failed to create a translation through the firewall. The firewall provides this checking for addresses that are explicitly identified with static command statements. With the change, for inbound traffic, the firewall denies translations for a destined IP address identified as a network or broadcast address.

The firewall does not apply PAT to all ICMP message types; it only applies PAT ICMP echo and echo-reply packets (types 8 and 0). Specifically, only ICMP echo or echo-reply packets create a PAT xlate. So, when the other ICMP messages types are dropped, this message is generated.

The firewall uses the global IP and mask from configured static command statements to differentiate regular IP addresses from network or broadcast IP addresses. If the global IP address is a valid network address with a matching network mask, the firewall does not create a translation for network or broadcast IP addresses with inbound packets.

For example:

static (inside,outside) 10.2.2.128 10.1.1.128 netmask 255.255.255.128

Global address 10.2.2.128 is responded to as a network address and 10.2.2.255 is responded to as the broadcast address. Without an existing translation, the firewall denies inbound packets destined for 10.2.2.128 or 10.2.2.255, and generates this syslog message.

When the suspected IP is a host IP, configure a separated static command statement with a host mask in front of the subnet static (first match rule for static command statements). The following static command statements cause the firewall to respond to 10.2.2.128 as a host address:

static (inside,outside) 10.2.2.128 10.2.2.128 netmask 255.255.255.255 
static (inside,outside) 10.2.2.128 10.2.2.128 netmask 255.255.255.128

The translation may be created by traffic started with the inside host with the questioned IP address. Because the firewall views a network or broadcast IP address as a host IP address with overlapped subnet static configuration, the network address translation for both static command statements must be the same.

Recommended Action    None required.

305007

Error Message    %FWSM-6-305007: addrpool_free(): Orphan IP IP_address on interface 
interface_number 

Explanation    The security appliance has attempted to translate an address that it cannot find in any of its global pools. The security appliance assumes that the address was deleted and drops the request.

Recommended Action    None required.

305008

Error Message    %FWSM-3-305008: Free unallocated global IP address.

Explanation    The security appliance kernel detected an inconsistency condition when trying to free an unallocated global IP address back to the address pool. This abnormal condition may occur if the security appliance is running a stateful failover setup and some of the internal states are momentarily out of sync between the active unit and the standby unit. This condition is not catastrophic, and the synchronization recovers automatically.

Recommended Action    Report this condition to Cisco TAC if you continue to see this message.

305009

Error Message    %FWSM-6-305009: Built {dynamic|static} translation from interface_name [(acl-name)]:real_address to interface_name:mapped_address 

Explanation    An address translation slot was created. The slot translates the source address from the local side to the global side. In reverse, the slot translates the destination address from the global side to the local side.

Recommended Action    None required.

305010

Error Message    %FWSM-6-305010: Teardown {dynamic|static} translation from 
interface_name:real_address to interface_name:mapped_address duration time 

Explanation    The address translation slot was deleted.

Recommended Action    None required.

305011

Error Message    %FWSM-6-305011: Built {dynamic|static} {TCP|UDP|ICMP} translation from 
interface_name:real_address/real_port to 
interface_name:mapped_address/mapped_port 

Explanation    A TCP, UDP, or ICMP address translation slot was created. The slot translates the source socket from the local side to the global side. In reverse, the slot translates the destination socket from the global side to the local side.

Recommended Action    None required.

305012

Error Message    %FWSM-6-305012: Teardown {dynamic|static} {TCP|UDP|ICMP} translation 
from interface_name [(acl-name)]:real_address/{real_port|real_ICMP_ID} to 
interface_name:mapped_address/{mapped_port|mapped_ICMP_ID} duration time 

Explanation    The address translation slot was deleted.

Recommended Action    None required.

308001

Error Message    %FWSM-6-308001: console enable password incorrect for number tries 
(from IP_address)

Explanation    This is a security appliance management message and is displayed after the specified number of times a user incorrectly types the password to enter privileged mode. The maximum is three attempts.

Recommended Action    Verify the password and try again.

308002

Error Message    %FWSM-4-308002: static global_address inside_address netmask netmask overlapped with global_address inside_address 

Explanation    The IP addresses in one or more static command statements overlap. global_address is the global address, which is the address on the lower security interface, and inside_address is the local address, which is the address on the higher security-level interface.

Recommended Action    Use the show static command to view the static command statements in your configuration and fix the commands that overlap. The most common overlap occurs if you specify a network address such as 10.1.1.0, and in another static command you specify a host within that range such as 10.1.1.5.

311001

Error Message    %FWSM-6-311001: LU loading standby start

Explanation    Stateful failover update information was sent to the standby security appliance when the standby security appliance is first to be online.

Recommended Action    None required.

311002

Error Message    %FWSM-6-311002: LU loading standby end

Explanation    Stateful failover update information is no longer being sent to the standby security appliance.

Recommended Action    None required.

311003

Error Message    %FWSM-6-311003: LU recv thread up

Explanation    An update acknowledgment was received from the standby security appliance.

Recommended Action    None required.

311004

Error Message    %FWSM-6-311004: LU xmit thread up

Explanation    This message appears when a stateful failover update is transmitted to the standby security appliance.

Recommended Action    None required.

312001

Error Message    %FWSM-6-312001: RIP hdr failed from IP_address: cmd=string, 
version=number domain=string on interface interface_name 

Explanation    The security appliance received a RIP message with an operation code other than reply, the message has a version number different from what is expected on this interface, and the routing domain entry was nonzero.

Recommended Action    This message is informational, but it may also indicate that another RIP device is not configured correctly to communicate with the security appliance.

313001

Error Message    %FWSM-3-313001: Denied ICMP type=number, code=code from IP_address on 
interface interface_name 

Explanation    When using the icmp command with an access list, if the first matched entry is a permit entry, the ICMP packet continues processing. If the first matched entry is a deny entry or an entry is not matched, the security appliance discards the ICMP packet and generates this syslog message. The icmp command enables or disables pinging to an interface. With pinging disabled, the security appliance cannot be detected on the network. This feature is also referred to as configurable proxy pinging.

Recommended Action    Contact the administrator of the peer device.

313003

Error Message    %FWSM-4-313003: Invalid destination for ICMP error

Explanation    The destination for the ICMP error message differs from the source of the IP packet that induced the ICMP error message.

Recommended Action    If the message occurs frequently, this could be an active network probe, an attempt to use the ICMP error message as a covert channel, or a misbehaving IP host. Contact the administrator of the host that originated the ICMP error message.

313004

Error Message    %FWSM-4-313004:Denied ICMP type=icmp_type, from source_address 
oninterface interface_name to dest_address:no matching session

Explanation    ICMP packets were dropped by the security appliance because of security checks added by the stateful ICMP feature that are usually either ICMP echo replies without a valid echo request already passed across the security appliance or ICMP error messages not related to any TCP, UDP, or ICMP session already established in the security appliance.

Recommended Action    None required.

314001

Error Message    %FWSM-6-314001: Pre-allocate RTSP UDP backconnection for 
foreign_address outside_address/outside_port to local_address 
inside_address/inside_port 

Explanation    The security appliance opened an RTSP connection for the specified IP addresses and ports.

Recommended Action    None required.

315004

Error Message    %FWSM-3-315004: Fail to establish SSH session because RSA host key 
retrieval failed.

Explanation    The security appliance could not find the security appliance RSA host key, which is required for establishing an SSH session. The security appliance host key may be absent because it was not generated or because the license for this security appliance does not allow DES or 3DES.

Recommended Action    From the console, enter the show ca mypubkey rsa command to verify that the security appliance RSA host key is present. If not, also enter the show version command to check whether the security appliance license allows DES or 3DES.

315011

Error Message    %FWSM-6-315011: SSH session from IP_address on interface 
interface_name for user user disconnected by SSH server, reason: reason 

Explanation    This message appears after an SSH session completes. If a user enters quit or exit, the terminated normally message displays. If the session disconnected for another reason, the text describes the reason. Table 1-3 lists the possible reasons why a session disconnected.

Table 1-3 Reasons for Sessions Disconnecting 

Text String
Explanation
Action

Bad checkbytes

A mismatch was detected in the check bytes during an SSH key exchange.

Restart the SSH session.

CRC check failed

The CRC value computed for a particular packet does not match the CRC value embedded in the packet; the packet is bad.

None required. If this message persists, contact Cisco TAC.

Decryption failure

Decryption of an SSH session key failed during an SSH key exchange.

Check the RSA host key and try again.

Format error

A non-protocol version message was received during an SSH version exchange.

Check the SSH client to ensure that it is a supported version.

Internal error

This message indicates either an error internal to SSH on the security appliance or an RSA key may not have been entered on the security appliance or cannot be retrieved.

From the security appliance console, enter the show ca mypubkey rsa command to verify that the RSA host key is present. If not, also enter the show version command to verify whether DES or 3DES is allowed. If an RSA host key is present, restart the SSH session.

Invalid cipher type

The SSH client requested an unsupported cipher.

Enter the show version command to determine what features your license supports, reconfigure the SSH client to use the supported cipher.

Invalid message length

The length of SSH message arriving at the security appliance exceeds 262,144 bytes or is shorter than 4096 bytes. The data may be corrupted.

None required.

Invalid message type

The security appliance received a non-SSH message, or an unsupported or unwanted SSH message.

Check whether the peer is an SSH client. If it is a client supporting SSHv1, and this message persists, from the security appliance serial console, enter the debug ssh command and capture the debugging messages. Then contact Cisco TAC.

Out of memory

This message appears when the security appliance cannot allocate memory for use by the SSH server, probably when the security appliance is busy with high traffic.

Restart the SSH session later.

Rejected by server

User authentication failed.

Ask the user to verify username and password.

Reset by client

An SSH client sent the SSH_MSG_DISCONNECT message to the security appliance.

None required.

status code: hex (hex)

Users closed the SSH client window (running on Windows) instead of entering quit or exit at the SSH console.

None required. Encourage users to exit the client gracefully instead of just exiting.

Terminated by operator

The SSH session was terminated by entering the ssh disconnect command at the security appliance console.

None required.

Time-out activated

The SSH session timed out because the duration specified by the ssh timeout command was exceeded.

Restart the SSH connection. You can use the ssh timeout command to increase the default value of 5 minutes up to 60 minutes if required.


Recommended Action    None required.

316001

Error Message    %FWSM-3-316001: Denied new tunnel to IP_address. VPN peer limit 
(platform_vpn_peer_limit) exceeded

Explanation    If more VPN tunnels (ISAKMP/IPSec) are concurrently attempting to be established than are supported by the platform VPN peer limit, the excess tunnels are aborted.

Recommended Action    None required.

317001

Error Message    %FWSM-3-317001: No memory available for limit_slow

Explanation    The requested operation failed because of a low-memory condition.

Recommended Action    Reduce other system activity to ease memory demands. If conditions warrant, upgrade to a larger memory configuration.

317002

Error Message    %FWSM-3-317002: Bad path index of number for IP_address, number max

Explanation    A software error occurred.

Recommended Action    To determine the cause of the problem, contact Cisco TAC for assistance.

317003

Error Message    %FWSM-3-317003: IP routing table creation failure - reason 

Explanation    An internal software error occurred, which prevented the creation of new IP routing table.

Recommended Action    Copy the message exactly as it appears, and report it to Cisco TAC.

317004

Error Message    %FWSM-3-317004: IP routing table limit warning

Explanation    The number of routes in the named IP routing table has reached the configured warning limit.

Recommended Action    Reduce the number of routes in the table, or reconfigure the limit.

317005

Error Message    %FWSM-3-317005: IP routing table limit exceeded - reason, IP_address 
netmask 

Explanation    Additional routes will be added to the table.

Recommended Action    Reduce the number of routes in the table, or reconfigure the limit.

318001

Error Message    %FWSM-3-318001: Internal error: reason 

Explanation    An internal software error occurred. This message occurs at five-second intervals.

Recommended Action    To determine the cause of the problem, contact Cisco TAC for assistance.

318002

Error Message    %FWSM-3-318002: Flagged as being an ABR without a backbone area

Explanation    The router was flagged as an area border router (ABR) without a backbone area configured in the router. This message occurs at five-second intervals.

Recommended Action    Restart the OSPF process.

318003

Error Message    %FWSM-3-318003: Reached unknown state in neighbor state machine

Explanation    An internal software error occurred. This message occurs at five-second intervals.

Recommended Action    None required.

318004

Error Message    %FWSM-3-318004: area string lsid IP_address mask netmask adv 
IP_address type number 

Explanation    OSPF had a problem locating the link state advertisement (LSA), which might lead to a memory leak.

Recommended Action    To determine the cause of the problem, contact Cisco TAC for assistance.

318005

Error Message    %FWSM-3-318005: lsid ip_address adv IP_address type number gateway 
gateway_address metric number network IP_address mask netmask protocol hex attr 
hex net-metric number 

Explanation    OSPF found an inconsistency between its database and the IP routing table.

Recommended Action    To determine the cause of the problem, contact Cisco TAC for assistance.

318006

Error Message    %FWSM-3-318006: if interface_name if_state number 

Explanation    An internal error occurred.

Recommended Action    To determine the cause of the problem, contact Cisco TAC for assistance.

318007

Error Message    %FWSM-3-318007: OSPF is enabled on interface_name during idb 
initialization

Explanation    An internal error occurred.

Recommended Action    To determine the cause of the problem, contact Cisco TAC for assistance.

318008

Error Message    %FWSM-3-318008: OSPF process number is changing router-id. Reconfigure 
virtual link neighbors with our new router-id

Explanation    The OSPF process is being reset, and it is going to select a new router ID. This action will bring down all virtual links.

Recommended Action    Change virtual link configuration on all of the virtual link neighbors to reflect the new router ID.

319001

Error Message    %FWSM-3-319001: Acknowledge for arp update for IP address dest_address 
not received (number).

Explanation    The ARP process in the security appliance lost internal synchronization because the system was overloaded.

Recommended Action    No immediate action is required. The failure is only temporary. Check the average load of the system and make sure it is not used beyond its capabilities.

319002

Error Message    %FWSM-3-319002: Acknowledge for route update for IP address 
dest_address not received (number).

Explanation    The routing module in the security appliance lost internal synchronization because the system was overloaded.

Recommended Action    No immediate action required. The failure is only temporary. Check the average load of the system and make sure it is not used beyond its capabilities.

319003

Error Message    %FWSM-3-319003: Arp update for IP address address to NPn failed. 

Explanation    When an ARP entry has to be updated, a message is sent to the network processor (NP) to update the internal ARP table. If the module is experiencing high utilization of memory or if the internal table is full, the message to the NP may be rejected and this message generated.

Recommended Action    Verify if the ARP table is full. If it is not full, check the load of the module with respect to the CPU utilization and connections per second. If CPU utilization is high and/or there is a large number of connections per second, normal operations will resume when the load returns to normal.

319004

Error Message    %FWSM-3-319004: Route update for IP address dest_address failed 
(number)

Explanation    The routing module in the FWSM lost internal synchronization because the system was overloaded.

Recommended Action    No immediate action required. The failure is only temporary. Check the average load of the system and make sure it is not used beyond its capabilities.

320001

Error Message    %FWSM-3-320001: The subject name of the peer cert is not allowed for 
connection

Explanation    When the security appliance is an easy FWSM remote device or server, the peer certificate contains a subject name that does not match the ca verifycertdn command.

Recommended Action    This message might indicate a "man-in-the-middle" attack, where a device spoofs the peer IP address and attempts to intercept a VPN connection from the security appliance.

321001

Error Message    %FWSM-5-321001: Resource var1 limit of var2 reached.

Explanation    A configured resource usage or rate limit for the indicated resource was reached.

Recommended Action    None required.

321002

Error Message    %FWSM-5-321002: Resource var1 rate limit of var2 reached.

Explanation    A configured resource usage or rate limit for the indicated resource was reached.

Recommended Action    None required.

321003

Error Message    %FWSM-6-321003: Resource var1 log level of var2 reached.

Explanation    A configured resource usage or rate log level for the indicated resource was reached.

Recommended Action    None required.

321004

Error Message    %FWSM-6-321004: Resource var1 rate log level of var2 reached

Explanation    A configured resource usage or rate log level for the indicated resource was reached.

Recommended Action    None required.

322001

Error Message    %FWSM-3-322001: Deny MAC address MAC_address, possible spoof attempt 
on interface interface 

Explanation    The security appliance received a packet from the offending MAC address on the specified interface, but the source MAC address in the packet is statically bound to another interface in your configuration. This could be caused by either be a MAC-spoofing attack or a misconfiguration.

Recommended Action    Check the configuration and take appropriate action by either finding the offending host or correcting the configuration.

322002

Error Message    %FWSM-3-322002: ARP inspection check failed for arp {request|response} 
received from host MAC_address on interface interface. This host is advertising 
MAC Address MAC_address_1 for IP Address IP_address, which is 
{statically|dynamically} bound to MAC Address MAC_address_2.

Explanation    If the ARP inspection module is enabled, it checks whether a new ARP entry advertised in the packet conforms to the statically configured or dynamically learned IP-MAC address binding before forwarding ARP packets across the security appliance. If this check fails, the ARP inspection module drops the ARP packet and generates this message. This situation may be caused by either ARP spoofing attacks in the network or an invalid configuration (IP-MAC binding).

Recommended Action    If the cause is an attack, you can deny the host using the ACLs. If the cause is an invalid configuration, correct the binding.

322003

Error Message    %FWSM-3-322003:ARP inspection check failed for arp {request|response} 
received from host MAC_address on interface interface. This host is advertising 
MAC Address MAC_address_1 for IP Address IP_address, which is not bound to any MAC 
Address. 

Explanation    If the ARP inspection module is enabled, it checks whether a new ARP entry advertised in the packet conforms to the statically configured IP-MAC address binding before forwarding ARP packets across the security appliance. If this check fails, the ARP inspection module drops the ARP packet and generates this message. This situation may be caused by either ARP spoofing attacks in the network or an invalid configuration (IP-MAC binding).

Recommended Action    If the cause is an attack, you can deny the host using the ACLs. If the cause is an invalid configuration, correct the binding.

322004

Error Message    %FWSM-6-322004: No management IP address configured for transparent 
firewall. Dropping protocol protocol packet from 
interface_in:source_address/source_port to interface_out:dest_address/dest_port 

Explanation    The security appliance dropped a packet because no management IP address was configured in the transparent mode.

protocol—Protocol string or value.

interface_in—Input interface name.

source_address—Source IP address of the packet.

source_port—Source port of the packet.

interface_out—Output interface name.

dest_address—Destination IP address of the packet.

dest_port—Destination port of the packet.

Recommended Action    Configure the device with management IP address and mask values.

323004

Error Message    %FWSM-3-323004: Module in slot slotnum failed to write software vnewver 
(currently vver), reason. Hw-module reset is required before further use.

Explanation    The module in the specified slot number failed to accept a software version, and will be transitioned to an UNRESPONSIVE state. The module is not usable until the software is updated.

slotnum—The slot number containing the module.

newver—The new version number of software that was not successfully written to the module (for example, 1.0(1)0)

ver—The current version number of the software on the module (for example, 1.0(1)0).

reason—The reason the new version could not be written to the module. The possible values for reason include the following:

—write failure.

—failed to create a thread to write the image.

Recommended Action    The module must be reset by using the hw-module module slotnum reset command before further upgrade attempts will be made. Ensure the module is completely seated in the chassis. Contact Cisco TAC if further attempts to update the module software are not successful.

323005

Error Message    %FWSM-3-323005: Module in slot slotnum cannot be powered on completely

Explanation    This message indicates that the module cannot be powered up completely. The module remains in the UNRESPONSIVE state until this condition is corrected. A likely cause of this error is a module that is not fully seated in the slot.

slotnum—The slot number containing the module.

Recommended Action    Verify that the module is fully seated in the slot and check if any status LEDs on the module are on. It may take a minute after fully reseating the module for the system to recognize that it is powered up. If this message appears after verifying that the module is seated and after resetting the module using the hw-module module slotnum reset command, contact Cisco  TAC.

324000

Error Message    %FWSM-3-324000: Drop GTPv version message msg_type from 
source_interface:source_address/source_port to 
dest_interface:dest_address/dest_port Reason: reason 

Explanation    The packet being processed did not meet the filtering requirements as described in the reason variable and is being dropped.

Recommended Action    None required.

324001

Error Message    %FWSM-3-324001: GTPv0 packet parsing error from 
source_interface:source_address/source_port to 
dest_interface:dest_address/dest_port, TID: tid_value, Reason: reason 

Explanation    There was an error processing the packet. The following are possible reasons:

Mandatory IE is missing

Mandatory IE incorrect

IE out of sequence

Invalid message format

Optional IE incorrect

Invalid TEID

Unknown IE

Bad length variable

Unknown GTP message

Message too short

Unexpected message seen

Null TID

Version not supported

Recommended Action    If this message is seen periodically, it can be ignored. If it is seen frequently, the endpoint may be sending out bad packets as part of an attack.

324002

Error Message    %FWSM-3-324002: No PDP[MCB] exists to process GTPv0 msg_type from 
source_interface:source_address/source_port to dest_interface:dest_address/dest_port, TID: tid_value 

Explanation    If this message was preceded by message 321100: Memory Allocation Error, the message indicates that there were not enough resources to create the PDP Context. If it was not preceded by message 321100, for GTP version 0 it indicates that the corresponding PDP context could not be found. For GTP version 1, if this message was preceded by message 324001, a packet-processing error occurred, and the operation stopped.

Recommended Action    If this message repeats frequently because of the memory allocation error, contact Cisco TAC.

324003

Error Message    %FWSM-3-324003: No matching request to process GTPv version msg_type 
from source_interface:source_address/source_port to 
source_interface:dest_address/dest_port 

Explanation    The response received does not have a matching request in the request queue and should not be processed further.

Recommended Action    If this message is seen periodically, it can be ignored. But if it is seen frequently, the endpoint may be sending out bad packets as part of an attack.

324004

Error Message    %FWSM-3-324004: GTP packet with version%d from 
source_interface:source_address/source_port to 
dest_interface:dest_address/dest_port is not supported 

Explanation    The packet being processed has a version other than the currently supported version, which is 0 or 1. If the version number printed out is an incorrect number and is seen frequently, the endpoint may be sending out bad packets as part of an attack.

Recommended Action    None required.

324005

Error Message    %FWSM-3-324005: Unable to create tunnel from 
source_interface:source_address/source_port to 
dest_interface:dest_address/dest_port 

Explanation    An error occurred while trying to create the tunnel for the TPDUs.

Recommended Action    If this message occurs periodically, it can be ignored. If it repeats frequently, collect the necessary debugging messages and contact Cisco TAC.

324006

Error Message    %FWSM-3-324006:GSN IP_address tunnel limit tunnel_limit exceeded, PDP 
Context TID tid failed

Explanation    The GSN sending the request has exceeded the maximum allowed tunnels created, so no tunnel will be created.

Recommended Action    Check to see whether the tunnel limit should be increased or a possible attack on the network has occurred.

324007

Error Message    %FWSM-3-324007: Unable to create GTP connection for response from 
source_interface:source_address/0 to dest_interface:dest_address/dest_port 

Explanation    An error occurred while trying to create the tunnel for the TPDUs for a different SGSN or GGSN.

Recommended Action    Check debugging messages to see why the connection was not created properly. If you are unable to resolve the problem, collect the necessary information and contact Cisco TAC.

325001

Error Message    %FWSM-3-325001: Router ipv6_address on interface has conflicting ND 
(Neighbor Discovery) settings

Explanation    Another router on the link sent router advertisements with conflicting parameters. ipv6_address is the IPv6 address of the other router. interface is the interface name of the link with the other router.

Recommended Action    Verify that all IPv6 routers on the link have the same parameters in the router advertisement for hop_limit, managed_config_flag, other_config_flag, reachable_time and ns_interval, and that preferred and valid lifetimes for the same prefix, advertised by several routers are the same. To list the parameters per interface, enter the show ipv6 interface command.

325002

Error Message    %FWSM-4-325002: Duplicate address ipv6_address/MAC_address on 
interface 

Explanation    Another system is using your IPv6 address. ipv6_address is the IPv6 address of the other router. MAC_address is the MAC address of the other system if known, otherwise "unknown." interface is the interface name of the link with the other system.

Recommended Action    Change the IPv6 address of one of the two systems.

326001

Error Message    %FWSM-3-326001: Unexpected error in the timer library: error_message 

Explanation    A managed timer event was received without a context or a proper type or no handler exists. This message will also be displayed if the number of events queued exceed a system limit and will be attempted to be processed at a later time.

Recommended Action    Copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326002

Error Message    %FWSM-3-326002: Error in error_message: error_message 

Explanation    The IGMP process failed to shut down upon request. Events that are performed in preparation for this shutdown may be out of synchronization.

Recommended Action    Copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326004

Error Message    %FWSM-3-326004: An internal error occurred while processing a packet 
queue

Explanation    The IGMP packet queue received a signal without a packet.

Recommended Action    Copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326005

Error Message    %FWSM-3-326005: Mrib notification failed for (IP_address, IP_address)

Explanation    A packet triggering a data-driven event was received, and the attempt to notify the MRIB failed.

Recommended Action    If this message persists after the system is up, copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326006

Error Message    %FWSM-3-326006: Entry-creation failed for (IP_address, IP_address)

Explanation    The MFIB received an entry update from the MRIB, but failed to create the entry related to the addresses displayed, which can cause insufficient memory.

Recommended Action    If sufficient memory exists, copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326007

Error Message    %FWSM-3-326007: Entry-update failed for (IP_address, IP_address)

Explanation    The MFIB received an interface update from the MRIB, but failed to create the interface related to the addresses displayed. The likely result is insufficient memory.

Recommended Action    If sufficient memory exists, copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326008

Error Message    %FWSM-3-326008: MRIB registration failed

Explanation    The MFIB failed to register with the MRIB.

Recommended Action    Copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326009

Error Message    %FWSM-3-326009: MRIB connection-open failed

Explanation    The MFIB failed to open a connection to the MRIB.

Recommended Action    Copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326010

Error Message    %FWSM-3-326010: MRIB unbind failed

Explanation    The MFIB failed to unbind from the MRIB.

Recommended Action    Copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326011

Error Message    %FWSM-3-326011: MRIB table deletion failed

Explanation    The MFIB failed to retrieve the table that was supposed to be deleted.

Recommended Action    Copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326012

Error Message    %FWSM-3-326012: Initialization of string functionality failed

Explanation    The initialization of a functionality failed. This component might still operate without the functionality.

Recommended Action    Copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326013

Error Message    %FWSM-3-326013: Internal error: string in string line %d (%s) 

Explanation    A fundamental error occurred in the MRIB.

Recommended Action    Copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326014

Error Message    %FWSM-3-326014: Initialization failed: error_message error_message 

Explanation    The MRIB failed to initialize.

Recommended Action    Copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326015

Error Message    %FWSM-3-326015: Communication error: error_message error_message 

Explanation    The MRIB received a malformed update.

Recommended Action    Copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326016

Error Message    %FWSM-3-326016: Failed to set un-numbered interface for interface_name (string)

Explanation    The PIM tunnel is not usable without a source address. This situation occurs because a numbered interface could not be found, or because of some internal error.

Recommended Action    Copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326017

Error Message    %FWSM-3-326017: Interface Manager error - string in string: string 

Explanation    An error occurred while creating a PIM tunnel interface.

Recommended Action    Copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326019

Error Message    %FWSM-3-326019: string in string: string 

Explanation    An error occurred while creating a PIM RP tunnel interface.

Recommended Action    Copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326020

Error Message    %FWSM-3-326020: List error in string: string 

Explanation    An error occurred while processing a PIM interface list.

Recommended Action    Copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326021

Error Message    %FWSM-3-326021: Error in string: string 

Explanation    An error occurred while setting the SRC of a PIM tunnel interface.

Recommended Action    Copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326022

Error Message    %FWSM-3-326022: Error in string: string 

Explanation    The PIM process failed to shut down upon request. Events that are performed in preparation for this shut down may be out of synchronization.

Recommended Action    Copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326023

Error Message    %FWSM-3-326023: string - IP_address: string 

Explanation    An error occurred while processing a PIM group range.

Recommended Action    Copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326024

Error Message    %FWSM-3-326024: An internal error occurred while processing a packet 
queue. 

Explanation    The PIM packet queue received a signal without a packet.

Recommended Action    Copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326025

Error Message    %FWSM-3-326025: string 

Explanation    An internal error occurred while trying to send a message. Events scheduled to happen on receipt of the message such as deletion of the PIM tunnel IDB may not take place.

Recommended Action    Copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326026

Error Message    %FWSM-3-326026: Server unexpected error: error_message 

Explanation    The MRIB failed to register a client.

Recommended Action    Copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326027

Error Message    %FWSM-3-326027: Corrupted update: error_message 

Explanation    The MRIB received a corrupt update.

Recommended Action    Copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

326028

Error Message    %FWSM-3-326028: Asynchronous error: error_message 

Explanation    An unhandled asynchronous error occurred in the MRIB API.

Recommended Action    Copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

329001

Error Message    %FWSM-3-329001: The string0 subblock named string1 was not removed

Explanation    A software error has occurred. This message displays when IDB subblocks cannot be removed.

string0—SWIDB or HWIDB.

string1—The name of the subblock.

Recommended Action    If the problem persists, contact the Cisco TAC.

336001

Error Message    %FWSM-3-336001 Route desination_network stuck-in-active state in 
EIGRP-ddb_name as_num. Cleaning up

Explanation    The stuck-in-active (SIA) state means that an EIGRP router has not received a reply to a query from one or more neighbors within the time allotted (about three minutes). When this happens, EIGRP clears the neighbors that did not send a reply and logs an error message for the route that went active.

desination_network—The route that went active

ddb_name—IPv4

as_num—The EIGRP router

Recommended Action    Check to see why the router did not get a response from all its neighbors and why the route disappeared. For more information about this type of problem, see the Technote at: http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a008010f016.shtml

336002

Error Message    %FWSM-3-336002: Handle handle_id is not allocated in pool.

Explanation    The EIGRP router is unable to find the handle for the next hop.

handle_id—The identity of the unfound handle.

Recommended Action    If the problem persists, contact the Cisco TAC.

336003

Error Message    %FWSM-3-336003: No buffers available for bytes byte packet

Explanation    The Diffusing Update Algorithm (DUAL) software was unable to allocate a packet buffer. The system may be out of memory.

bytes—The number of bytes in the packet.

Recommended Action    Check to see if the system is out of memory by entering the show mem or show tech command. If the problem persists, contact the Cisco TAC.

336004

Error Message    %FWSM-3-336004: Negative refcount in pakdesc pakdesc. 

Explanation    The reference count packet count that became negative.

pakdesc—The packet identifier.

Recommended Action    If the problem persists, contact the Cisco TAC.

336005

Error Message    %FWSM-3-336005: Flow control error, error, on interface_name. 

Explanation    The interface is flow-blocked for multicast. Qelm is the queue element, in this case, the last multicast packet on the queue for this particular interface.

error—The error statement "Qelm on flow ready."

interface_name—The name of the interface on which the error occurred.

Recommended Action    If the problem persists, contact the Cisco TAC.

336006

Error Message    %FWSM-3-336006: num peers exist on IIDB interface_name. 

Explanation    Peers still exist on a particular interface during or after clean up of the IDB of the EIGRP.

num—The number of peers.

interface_name—The interface name.

Recommended Action    If the problem persists, contact the Cisco TAC.

336007

Error Message    %FWSM-3-336007: Anchor count negative

Explanation    An error occurred and the count of the anchor became negative when it was released.

Recommended Action    If the problem persists, contact the Cisco TAC.

336008

Error Message    %FWSM-3-336008: Lingering DRDB deleting IIDB, dest network, nexthop 
address (interface), origin origin_str 

Explanation    An interface is being deleted and some lingering DRDB exists.

network—The destination network.

address—The nexthop address.

interface—The nexthop interface.

origin_str—The string defining the origin.

Recommended Action    If the problem persists, contact the Cisco TAC.

336009

Error Message    %FWSM-3-336009 ddb_name as_id: Internal Error

Explanation    An internal error occurred.

ddb_name—Protocol Dependent Module (PDM) name, for example, IPv4 PDM.

as_id—The autonomous system ID.

Recommended Action    If the problem persists, contact the Cisco TAC.

336010

Error Message    %FWSM-5-336010 EIGRP-<ddb_name> tableid as_id: Neighbor address 
(%interface) is event_msg: msg 

Explanation    A neighbor went up or down.

ddb_name—IPv4.

tableid— The internal ID for the RIB.

as_id—The autonomous system ID.

address—The IP address of the neighbor.

interface—The name of the interface.

event_msg— The event that is occurring for the neighbor (that is, "up" or "down").

msg—Reason for the event. Possible event_msg and msg value pairs include:

resync: peer graceful-restart

down: holding timer expired

up: new adjacency

down: Auth failure

down: Stuck in Active

down: Interface PEER-TERMINATION received

down: K-value mismatch

down: Peer Termination received

down: stuck in INIT state

down: peer info changed

down: summary configured

down: Max hopcount changed

down: metric changed

down: [No reason]

Recommended Action    Check to see why the link on the neighbor is going down or is flapping. This may be a sign of a problem, or a problem might start occurring because of this.

336011

Error Message    %FWSM-6-336011: event event 

Explanation    A dual event occurred. The events can be one of the following:

Redist rt change

SIA Query while Active

Recommended Action    If the problem persists, contact the Cisco TAC.

Messages 400000 to 431002

This section contains messages from 400000 to 431002.

401004

Error Message    %FWSM-4-401004: Shunned packet: IP_address = IP_address on interface 
interface_name 

Explanation    A packet was dropped because the host defined by IP SRC is a host in the shun database. A shunned host cannot pass traffic on the interface on which it is shunned. For example, an external host on the Internet can be shunned on the outside interface.

Recommended Action    None required. This message provides a record of the activity of shunned hosts. This message and message %FWSM-4-401005 can be used to evaluate further risk concerning this host.

401005

Error Message    %FWSM-4-401005: Shun add failed: unable to allocate resources for 
IP_address IP_address port port 

Explanation    The ASDM is out of memory; a shun could not be applied.

Recommended Action    The Cisco Intrusion Detection System should continue to attempt to apply this rule. Try to reclaim memory and reapply a shun manually, or wait for the Cisco Intrusion Detection System to do this.

402101

Error Message    %FWSM-4-402101: decaps: rec'd IPSEC packet has invalid spi for 
destaddr=dest_address, prot=protocol, spi=number 

Explanation    The received IPSec packet specifies a security parameters index (SPI) that does not exist in the security association database (SADB). This may be a temporary condition, because of one of the following:

Slight differences in aging of SAs between the IPSec peers

The clearing of the local SAs

Incorrect packets sent by the IPSec peer

An attack

Recommended Action    The peer may not acknowledge that the local SAs have been cleared. If a new connection is established from the local router, the two peers may then reestablish successfully. If the problem occurs for more than a brief period, try to establish a new connection or contact the peer administrator.

402102

Error Message    %FWSM-4-402102: decapsulate: packet missing {AH|ESP}, 
destadr=dest_address, actual prot=protocol 

Explanation    The received IPSec packet is missing an expected AH or ESP header. The peer is sending packets that do not match the negotiated security policy, which may indicate an attack.

Recommended Action    Contact the peer administrator.

402103

Error Message    %FWSM-4-402103: identity doesn't match negotiated identity (ip) 
dest_address= dest_address, src_addr= source_address, prot= protocol, (ident) 
local=inside_address, remote=remote_address, 
local_proxy=IP_address/IP_address/port/port, 
remote_proxy=IP_address/IP_address/port/port 

Explanation    An unencapsulated IPSec packet does not match the negotiated identity. The peer is sending other traffic through this security association because of a security association selection error by the peer. This may be a hostile event.

Recommended Action    Contact the peer administrator to compare policy settings.

402106

Error Message    %FWSM-4-402106: Rec'd packet not an IPSEC packet (ip) dest_address= 
dest_address, src_addr= source_address, prot= protocol 

Explanation    The received packet matched the crypto map ACL, but it is not IPSec-encapsulated; the IPSec peer is sending unencapsulated packets. This error can occur because of a policy setup error on the peer. For example, the security appliance only accepts encrypted Telnet traffic to the outside interface port 23. If you attempt to Telnet without IPSec encryption to the outside interface on port 23, this message appears. This error can also signify a hostile event. This syslog message is not generated except under the conditions cited (for example, it is not generated for traffic to the security appliance interfaces themselves). To track TCP and UDP requests, see Messages 701001, 701002, and 710003.

Recommended Action    Contact the peer administrator to compare policy settings.

404101

Error Message    %FWSM-4-404101: ISAKMP: Failed to allocate address for client from pool 
string 

Explanation    ISAKMP failed to allocate an IP address for the VPN client from the pool that you specified with the ip local pool command.

Recommended Action    Use the ip local pool command to specify additional IP addresses for the pool.

404102

Error Message    %FWSM-3-404102: ISAKMP: Exceeded embryonic limit

Explanation    More than 500 embryonic security associations (SAs) exist, which could mean a DoS attack.

Recommended Action    Enter the show crypto isakmp ca command to determine the origin of the attack. After the source is identified, deny access to the offending IP address or network.

402117

Error Message    %FWSM-4-402117: IPSEC: Received a non-IPSec packet (protocol=tcp) from 
src_ip to dest_ip 

Explanation    A host is trying to connect to FWSM via Telnet on the least secure interface. The FWSM does not allow Telnet connections on the least secure interface unless it is over an IPSec VPN tunnel

Recommended Action    Disable Telnet on the least secure interface or create an IPSec VPN tunnel to use Telnet..

405001

Error Message    %FWSM-4-405001: Received ARP {request | response} collision from 
IP_address/MAC_address on interface interface_name 

Explanation    The security appliance received an ARP packet, and the MAC address in the packet differs from the ARP cache entry.

Recommended Action    This traffic might be legitimate, or it might indicate that an ARP poisoning attack is in progress. Check the source MAC address to determine where the packets are coming from and check to see if it belongs to a valid host.

405101

Error Message    %FWSM-4-405101: Unable to Pre-allocate H225 Call Signalling Connection 
for foreign_address outside_address[/outside_port] to local_address 
inside_address[/inside_port]

Explanation    The module failed to allocate RAM system memory while starting a connection or has no more address translation slots available.

Recommended Action    If this message occurs periodically, it can be ignored. If it repeats frequently, contact Cisco TAC. You can check the size of the global pool compared to the number of inside network clients. A PAT address may be necessary. Alternatively, shorten the timeout interval of translates and connections. This error message may also be caused by insufficient memory; try reducing the amount of memory usage, or purchasing additional memory.

405002

Error Message    %FWSM-4-405002: Received mac mismatch collision from 
IP_address/MAC_address for authenticated host

Explanation    This packet appears for one of the following conditions:

The security appliance received a packet with the same IP address but a different MAC address from one of its uauth entries.

You configured the vpnclient mac-exempt command on the security appliance, and the security appliance receives a packet with an exempt MAC address but a different IP address from the corresponding uauth entry.

Recommended Action    This traffic might be legitimate, or it might indicate that a spoofing attack is in progress. Check the source MAC address and IP address to determine where the packets are coming from and whether they belong to a valid host.

405101

Error Message    %FWSM-4-405101: Unable to Pre-allocate H225 Call Signalling Connection 
for foreign_address outside_address[/outside_port] to local_address 
inside_address[/inside_port]

Explanation    The security appliance failed to allocate RAM system memory while starting a connection or has no more address translation slots available.

Recommended Action    Check the size of the global pool compared to the number of inside network clients. A PAT address may be necessary. Alternatively, shorten the timeout interval of xlates and connections. This could also be caused by insufficient memory; reduce the amount of memory usage, or purchase additional memory. If this message occurs periodically, it can be ignored. If it repeats frequently, contact Cisco TAC.

405102

Error Message    %FWSM-4-405102: Unable to Pre-allocate H245 Connection for 
foreign_address outside_address[/outside_port] to local_address 
inside_address[/inside_port]

Explanation    The security appliance failed to allocate RAM system memory while starting a connection or has no more address translation slots available.

Recommended Action    Check the size of the global pool compared to the number of inside network clients. A PAT address may be necessary. Alternatively, shorten the timeout interval of xlates and connections. This could also be caused by insufficient memory; reduce the amount of memory usage, or purchase additional memory. If this message occurs periodically, it can be ignored. If it repeats frequently, contact Cisco TAC.

405103

Error Message    %FWSM-4-405103: H225 message from source_address/source_port to 
dest_address/dest_port contains bad protocol discriminator hex 

Explanation    The security appliance is expecting the protocol discriminator, 0x08, but it received something other than 0x08. This might happen because the endpoint is sending a bad packet, or received a message segment other than the first segment.

Recommended Action    None required. The packet is allowed through.

405104

Error Message    %FWSM-4-405104: H225 message received from 
outside_address/outside_port to inside_address/inside_port before SETUP

Explanation    This message appears after an H.225 message is received out of order. The H.225 message was received before the initial SETUP message, which is not allowed. The security appliance must receive an initial SETUP message for that H.225 call signalling channel before accepting any other H.225 messages.

Recommended Action    None required.

405105

Error Message    %FWSM-4-405105: H323 RAS message AdmissionConfirm received from 
source_address/source_port to dest_address/dest_port without an AdmissionRequest 

Explanation    A gatekeeper has sent an admission confirm (ACF), but the security appliance did not send an admission request (ARQ) to the gatekeeper.

Recommended Action    Check the gatekeeper with the specified source_address to determine why it sent an ACF without receiving an ARQ from the security appliance.

405201

Error Message    %FWSM-4-405201: ILS ILS_message_type from 
inside_interface:source_IP_address to outside_interface:/destination_IP_address 
has wrong embedded address embedded_IP_address 

Explanation    The embedded address in the ILS packet payload is not the same as the source IP address of the IP packet header.

Recommended Action    Check the host with the specified source_IP_address to determine why it sent an ILS packet with an incorrect embedded IP address.

406001

Error Message    %FWSM-4-406001: FTP port command low port: IP_address/port to 
IP_address on interface interface_name 

Explanation    A client entered an FTP port command and supplied a port less than 1024 (in the well-known port range typically devoted to server ports). This message indicates an attempt to avert the site security policy. The security appliance drops the packet, terminates the connection, and logs the event.

Recommended Action    None required.

406002

Error Message    %FWSM-4-406002: FTP port command different address: 
IP_address(IP_address) to IP_address on interface interface_name 

Explanation    A client issued an FTP port command and supplied an address other than the address used in the connection. This error message indicates an attempt to avert the site security policy. For example, an attacker might attempt to hijack an FTP session by changing the packet on the way, and entering different source information instead of the correct source information. The security appliance drops the packet, terminates the connection, and logs the event. The address in parentheses is the address from the port command.

Recommended Action    None required.

407001

Error Message    %FWSM-4-407001: Deny traffic for local-host 
interface_name:inside_address, license limit of number exceeded

Explanation    The host limit was exceeded. An inside host is counted toward the limit when one of the following conditions is true:

The inside host has forwarded traffic through the security appliance within the last five minutes.

The inside host currently reserved an xlate connection or user authentication at the security appliance.

Recommended Action    The host limit is enforced on the low-end platforms. Use the show version command to view the host limit. Use the show local-host command to view the current active hosts and the inside users that have sessions at the security appliance. To forcefully disconnect one or more users, use the clear local-host command. To expire the inside users more quickly from the limit, set the xlate, connection, and uauth timeouts to the recommended values or lower, as shown in Table 1-4.

Table 1-4 Timeouts and Recommended Values

Timeout
Recommended Value

xlate

00:05:00 (five minutes)

conn

00:01:00 (one hour)

uauth

00:05:00 (five minutes)


407002

Error Message    %FWSM-3-407002: Embryonic limit nconns/elimit for through connections 
exceeded.outside_address/outside_port to global_address 
(inside_address)/inside_port on interface interface_name 

Explanation    The number of connections from a specified foreign address over a specified global address to the specified local address exceeds the maximum embryonic limit for that state. The security appliance attempts to accept the connection if it can allocate memory for that connection. It proxies on behalf of local host and sends a SYN_ACK packet to the foreign host. The security appliance retains pertinent state information, drops the packet, and waits for the client's acknowledgment.

Recommended Action    The message might indicate legitimate traffic, or indicate that a denial of service (DoS) attack is in progress. Check the source address to determine where the packets are coming from and whether it is a valid host.

407003

Error Message    %FWSM-4-407003: Established limit for RPC services exceeded number 

Explanation    The security appliance tried to open a new hole for a pair of RPC servers or services that have already been configured after the maximum number of holes has been met.

Recommended Action    Wait for other holes to be closed (through associated timeout expiration) or limit the number of active pairs of servers or services.

408001

Error Message    %FWSM-4-408001: IP route counter negative - reason, IP_address 
Attempt: number 

Explanation    An attempt to decrement the IP route counter into a negative value failed.

Recommended Action    Enter the clear ip route * command to reset the route counter. If the message continues to appear consistently, copy the message exactly as it appears, and report it to Cisco TAC.

408002

Error Message    %FWSM-4-408002: ospf process id route type update address1 netmask1 
[distance1/metric1] via source IP:interface1 address2 netmask2 
[distance2/metric2] interface2 

Explanation    A network update was received from a different interface with the same distance and a better metric than the existing route. The new route overrides the existing route that was installed through another interface. The new route is for redundancy purposes only and means that a path has shifted in the network. This change must be controlled through network topology and redistribution. Any existing connections affected by this change are probably disabled and will time out. This path shift only occurs if the network topology has been specifically designed to support path redundancy, in which case it is expected.

Recommended Action    None required.

409001

Error Message    %FWSM-4-409001: Database scanner: external LSA IP_address netmask is 
lost, reinstalls

Explanation    The software detected an unexpected condition. The router will take corrective action and continue.

Recommended Action    None required.

409002

Error Message    %FWSM-4-409002: db_free: external LSA IP_address netmask 

Explanation    An internal software error occurred.

Recommended Action    None required.

409003

Error Message    %FWSM-4-409003: Received invalid packet: reason from IP_address, 
interface_name 

Explanation    An invalid OSPF packet was received. Details are included in the error message. The cause might be an incorrect OSPF configuration or an internal error in the sender.

Recommended Action    Check the OSPF configuration of the receiver and the sender configuration for inconsistency.

409004

Error Message    %FWSM-4-409004: Received reason from unknown neighbor IP_address 

Explanation    The OSPF hello, database description, or database request packet was received, but the router could not identify the sender.

Recommended Action    None required.

409005

Error Message    %FWSM-4-409005: Invalid length number in OSPF packet from IP_address (ID IP_address), interface_name 

Explanation    The system received an OSPF packet with a variable length of less than normal header size or inconsistent with the size of the IP packet in which it arrived. This indicates a configuration error in the sender of the packet.

Recommended Action    From a neighboring address, locate the problem router and reboot it.

409006

Error Message    %FWSM-4-409006: Invalid lsa: reason Type number, LSID IP_address from 
IP_address, IP_address, interface_name 

Explanation    The router received an LSA with an invalid LSA type. The cause is either memory corruption or unexpected behavior on a router.

Recommended Action    From a neighboring address, locate the problem router and reboot it. To determine what is causing this problem, contact Cisco TAC for assistance.

409007

Error Message    %FWSM-4-409007: Found LSA with the same host bit set but using 
different mask LSA ID IP_address netmask New: Destination IP_address netmask 

Explanation    An internal software error occurred.

Recommended Action    To determine what is causing this problem, contact Cisco TAC for assistance.

409008

Error Message    %FWSM-4-409008: Found generating default LSA with non-zero mask LSA 
type : number Mask: netmask metric: number area: string 

Explanation    The router tried to generate a default LSA with the wrong mask and possibly wrong metric because of an internal software error.

Recommended Action    To determine what is causing this problem, contact Cisco TAC for assistance.

409009

Error Message    %FWSM-4-409009: OSPF process number cannot start. There must be at 
least one up IP interface, for OSPF to use as router ID

Explanation    OSPF failed while attempting to allocate a router ID from the IP address of one of its interfaces.

Recommended Action    Make sure that there is at least one interface that is up and has a valid IP address. If there are multiple OSPF processes running on the router, each requires a unique router ID. You must have enough interfaces up so that each of them can obtain a router ID.

409010

Error Message    %FWSM-4-409010: Virtual link information found in non-backbone area: 
string 

Explanation    An internal error occurred.

Recommended Action    To determine what is causing this problem, contact Cisco TAC for assistance.

409011

Error Message    %FWSM-4-409011: OSPF detected duplicate router-id IP_address from 
IP_address on interface interface_name 

Explanation    OSPF received a hello packet from a neighbor that has the same router ID as this routing process. A full adjacency cannot be established.

Recommended Action    The OSPF router ID should be unique. Change the neighboring router ID.

409012

Error Message    %FWSM-4-409012: Detected router with duplicate router ID IP_address in 
area string 

Explanation    OSPF received a hello packet from a neighbor that has the same router ID as this routing process. A full adjacency cannot be established.

Recommended Action    The OSPF router ID should be unique. Change the neighboring router ID.

409013

Error Message    %FWSM-4-409013: Detected router with duplicate router ID IP_address in 
Type-4 LSA advertised by IP_address 

Explanation    OSPF received a hello packet from a neighbor that has the same router ID as this routing process. A full adjacency cannot be established.

Recommended Action    The OSPF router ID should be unique. Change the neighboring router ID.

409023

Error Message    %FWSM-4-409023: Attempting AAA Fallback method method_name for 
request_type request for user user: Auth-server group server_tag unreachable

Explanation    An authentication or authorization attempt to an external server has failed and will now be performed using the local user database. The method_name is either authentication or authorization. The user is the user associated with the connection. The server_tag is the name of the AAA server group whose servers were unreachable.

Recommended Action    Investigate any connectivity problems with the AAA servers configured in the first method. Ping the authentication servers from the security appliance. Make sure that the daemons are running on your AAA server.

410001

Error Message    %FWSM-4-410001: UDP DNS request from 
source_interface:source_address/source_port to 
dest_interface:dest_address/dest_port; (label length | domain-name length) 52 
bytes exceeds remaining packet length of 44 bytes. 

Explanation    The domain-name length exceeds 255 bytes in a UDP DNS packet. For more information, see RFC 1035, section 3.1.

Recommended Action    None required.

411001

Error Message    %FWSM-4-411001:Line protocol on interface interface_name changed state 
to up

Explanation    The status of the line protocol has changed from down to up. If interface_name is a logical interface name such as "inside" and "outside," this message indicates that the logical interface line protocol has changed from down to up. If interface_name is a physical interface name such as "Ethernet0" and "GigabitEthernet0/1," this message indicates that the physical interface line protocol has changed from down to up.

Recommended Action    None required.

411002

Error Message    %FWSM-4-411002:Line protocol on interface interface_name changed state 
to down

Explanation    The status of the line protocol has changed from up to down. If interface_name is a logical interface name such as "inside" and "outside," this message indicates that the logical interface line protocol has changed from up to down. In this case, the physical interface line protocol status is not affected. If interface_name is a physical interface name such as "Ethernet0" and "GigabitEthernet0/1," this message indicates that the physical interface line protocol has changed from up to down.

Recommended Action    If this is an unexpected event on the interface, check the physical line.

411003

Error Message    %FWSM-4-411003: Configuration status on interface interface_name 
changed state to administratively down

Explanation    The configuration status of the interface has changed from up to administratively down.

Recommended Action    None required.

411004

Error Message    %FWSM-4-411004: Configuration status on interface interface_name 
changed state to up

Explanation    The configuration status of the interface has changed from down to up.

Recommended Action    None required.

412001

Error Message    %FWSM-4-412001:MAC MAC_address moved from interface_1 to interface_2 

Explanation    A host move is detected from one module interface to another. In a security appliance in transparent mode, mapping between the host (MAC) and security appliance port is maintained in a Layer 2 forwarding table. The table dynamically binds packet source MAC addresses to a security appliance port. In this process, whenever movement of a host from one interface to another interface is detected, this message is generated.

Recommended Action    The host move might be valid or the host move might be an attempt to spoof host MACs on other interfaces. If it is a MAC spoof attempt, you can either locate vulnerable hosts on your network and remove them or configure static MAC entries, which will not allow MAC address and port binding to change. If it is a genuine host move, none required.

412002

Error Message    %FWSM-4-412002:Detected bridge table full while inserting MAC 
MAC_address on interface interface. Number of entries = num 

Explanation    The bridge table is full and an attempt is made to add one more entry. The security appliance maintains a separate Layer 2 forwarding table per context and the message is generated whenever a context exceeds its size limit. The MAC address will be added, but it will replace the oldest existing dynamic entry (if available) in the table.

Recommended Action    This might be an attempted attack. Make sure that the new bridge table entries are valid. In case of attack, use EtherType ACLs to access control vulnerable hosts.

413001

Error Message    %FWSM-4-413001: Module in slot slotnum cannot shut down. Module 
Error: errnum message 

Explanation    The module in slotnum could incomplete with a request from the FWSM system module to shut down. It may be performing a task that could not be interrupted, like a software upgrade. The errnum and message text describes the reason why the module could not shut down, and recommends action.

Recommended Action    Wait for the task on the module to complete before shutting down the module, or use the session command to access the module CLI and stop the task that is preventing the module from shutting down.

413002

Error Message    %FWSM-4-413002: Module in slot slotnum cannot reload. Module Error: 
errnum message 

Explanation    The module in slotnum could incomplete with a request from the FWSM system module to reload. It may be performing a task that could not be interrupted, like a software upgrade. The errnum and message text describes the reason why the module could not reload, and the recommended action.

Recommended Action    Wait for the task on the module to complete before reloading the module, or use the session command to access the module's CLI and stop the task that is preventing the module from reloading.

413003

Error Message    %FWSM-4-413003: Module in slot slotnum is not a recognized type

Explanation    Generated whenever a card is detected that is not recognized as a valid card type.

Recommended Action    Upgrade to a version of FWSM system software that supports the module type installed.

413004

Error Message    %FWSM-4-413004: Module in slot slotnum failed to write software vnewver 
(currently vver), reason. Trying again.

Explanation    The module in the specified slot number failed to accept a software version, and will be transitioned to an UNRESPONSIVE state. Another attempt will be made to update the module software.

slotnum—The slot number containing the module.

newver—The new version number of software that was not successfully written to the module (for example, 1.0(1)0).

ver—The current version number of the software on the module (for example, 1.0(1)0).

reason—The reason the new version could not be written to the module. The possible values for reason include the following:

—write failure

—failed to create a thread to write the image

Recommended Action    None required. Subsequent attempts will either generate a message indicating a successful update or failure. You may verify the module transitions to UP after a subsequent update attempt by using the show module slotnum command.

414001

Error Message    %FWSM-3-414001: Failed to save logging buffer using file name filename 
to FTP server ftp_server_address on interface interface_name: [fail_reason]

Explanation    A logging module failed to save the logging buffer to an external FTP server.

Recommended Action    Take appropriate action based on the reason for failure:

Protocol error—Make sure no connectivity issue exists between the FTP server and security appliance, and the FTP sever can accept an FTP PORT command and put request.

Invalid username or password—Make sure that the configured FTP client username and password are correct.

All other errors—Contact Cisco TAC for further assistance.

414002

Error Message    %FWSM-3-414002: Failed to save logging buffer to flash:/syslog 
directory using file name: filename: [fail_reason]

Explanation    A logging module failed to save the logging buffer to the system flash memory.

Recommended Action    If the failure is because of insufficient space, check the system flash free space, make sure that the configured limits of the logging flash-size command are set properly. If the error is a flash file system IO error, contact Cisco TAC for assistance.

415001

Error Message    %FWSM-6-415001: HTTP - matched matched_string in policy-map map_name, 
header field count exceeded connection_action from int_type:IP_address/port_num 
to int_type:IP_address/port_num 

Explanation    This syslog message is generated when one of the following occurs:

The total number of fields in the HTTP header exceeds the user-configured number of header fields. The relevant command is match {request | response} header count num.

The appearance of a specified field in the HTTP header exceeds the user-configured number for this header field. The relevant command is match {request | response} header header-name count num.

matched_string—The matched string is one of the following:

- The class map ID, followed by the name of the class map. This string displays when the class map is user configured.

- The actual match command that initiated the syslog message. This string displays when the class map is internal.

map_name—The name of the policy map.

connection_action—"Dropping connection" or "Resetting connection."

interface_type—The type of interface (for example, DMZ, outside, and so on).

IP_address—The IP address of the interface.

port_num—The port number.

Recommended Action    Enter the match {request | response} header command to reconfigure the HTTP header field value.

415002

Error Message    %FWSM-6-415002: HTTP - matched matched_string in policy-map map_name, header field length exceeded connection_action from int_type:IP_address/port_num to int_type:IP_address/port_num 

Explanation    The specified HTTP header field length exceeds the user-configured length.

matched_string—The matched string is one of the following:

- The class map ID, followed by the name of the class map. This string displays when the class map is user configured.

- The actual match command that initiated the syslog message. This string displays when the class map is internal.

map_name—The name of the policy map.

connection_action—"Dropping connection" or "Resetting connection."

interface_type—The type of interface (for example, DMZ, outside, and so on).

IP_address—The IP address of the interface.

port_num—The port number.

Recommended Action    Enter the match {request | response} header header_name length gt num command to change the HTTP header field length.

415003

Error Message    %FWSM-6-415003: HTTP - matched matched_string in policy-map map_name, 
body length exceeded connection_action from int_type:IP_address/port_num to 
int_type:IP_address/port_num 

Explanation    The length of the message body exceeds the user-configured length.

matched_string—The matched string is one of the following:

- The class map ID, followed by the name of the class map. This string displays when the class map is user configured.

- The actual match command that initiated the syslog message. This string displays when the class map is internal.

map_name—The name of the policy map.

connection_action—"Dropping connection" or "Resetting connection."

interface_type—The type of interface (for example, DMZ, outside, and so on).

IP_address—The IP address of the interface.

port_num—The port number.

Recommended Action    Enter the match {request | response} body length gt num command to change the length of the message body.

415004

Error Message    %FWSM-5-415004: HTTP - matched matched_string in policy-map map_name, 
content-type verification failed connection_action from 
int_type:IP_address/port_num to int_type:IP_address/port_num 

Explanation    The "magic number" in the body of the HTTP message is not the correct magic number for the MIME-type specified in the "content-type" field in the HTTP message header.

matched_string—The matched string is one of the following:

- The class map ID, followed by the name of the class map. This string displays when the class map is user configured.

- The actual match command that initiated the syslog message. This string displays when the class map is internal.

map_name—The name of the policy map.

connection_action—"Dropping connection" or "Resetting connection."

interface_type—The type of interface (for example, DMZ, outside, and so on).

IP_address—The IP address of the interface.

port_num—The port number.

Recommended Action    Enter the match {request | response} header content-type violation command to correct the error.

415005

Error Message    %FWSM-5-415005: HTTP - matched matched_string in policy-map map_name, 
URI length exceeded connection_action from int_type:IP_address/port_num to 
int_type:IP_address/port_num 

Explanation    The length of the URI exceeds the user-configured length.

matched_string—The matched string is one of the following:

- The class map ID, followed by the name of the class map. This string displays when the class map is user configured.

- The actual match command that initiated the syslog message. This string displays when the class map is internal.

map_name—The name of the policy map.

connection_action—"Dropping connection" or "Resetting connection."

interface_type—The type of interface, for example, DMZ, outside, and so on.

IP_address—The IP address of the interface.

port_num—The port number.

Recommended Action    Enter the match request uri length gt num command to change the length of the URI.

415006

Error Message    %FWSM-5-415006: HTTP - matched matched_string in policy-map map_name, URI matched connection_action from int_type:IP_address/port_num to 
int_type:IP_address/port_num 

Explanation    The URI matches the regular expression that the user configured. See the match request uri regex {regex-name | class class-name} command for more information.

matched_string—The matched string is one of the following:

- The class map ID, followed by the name of the class map. This string displays when the class map is user configured.

- The actual match command that initiated the syslog message. This string displays when the class map is internal.

map_name—The name of the policy map.

connection_action—"Dropping connection" or "Resetting connection."

interface_type—The type of interface, for example, DMZ, outside, and so on.

IP_address—The IP address of the interface.

port_num—The port number.

Recommended Action    None required.

415007

Error Message    %FWSM-5-415007: HTTP - matched matched_string in policy-map map_name, 
Body matched connection_action from int_type:IP_address/port_num to 
int_type:IP_address/port_num 

Explanation    The message body matches the regular expression that the user configured. See the match {request | response} body regex {regex-name | class class-name} command for more information.

matched_string—The matched string is one of the following:

- The class map ID, followed by the name of the class map. This string displays when the class map is user configured.

- The actual match command that initiated the syslog message. This string displays when the class map is internal.

map_name—The name of the policy map.

connection_action—"Dropping connection" or "Resetting connection."

interface_type—The type of interface (for example, DMZ, outside, and so on).

IP_address—The IP address of the interface.

port_num—The port number.

Recommended Action    None required.

415008

Error Message    %FWSM-5-415008: HTTP - matched matched_string in policy-map map_name, 
header matched connection_action from int_type:IP_address/port_num to 
int_type:IP_address/port_num 

Explanation    A value in a user-specified field in the message header matches the regular expression that the user configured. See the match {request | response } header header-field-name {regex-name | class class-name} command for more information.

matched_string—The matched string is one of the following:

- The class map ID, followed by the name of the class map. This string displays when the class map is user configured.

- The actual match command that initiated the syslog message. This string displays when the class map is internal.

map_name—The name of the policy map.

connection_action—"Dropping connection" or "Resetting connection."

interface_type—The type of interface (for example, DMZ, outside, and so on).

IP_address—The IP address of the interface.

port_num—The port number.

Recommended Action    None required.

415009

Error Message    %FWSM-5-415009: HTTP - matched matched_string in policy-map map_name, 
method matched connection_action from int_type:IP_address/port_num to 
int_type:IP_address/port_num 

Explanation    The HTTP method matches the user-configured regular expression. See the match request method {regex-name | class class-name} command for more information.

matched_string—The matched string is one of the following:

- The class map ID, followed by the name of the class map. This string displays when the class map is user configured.

- The actual match command that initiated the syslog message. This string displays when the class map is internal.

map_name—The name of the policy map.

connection_action—"Dropping connection" or "Resetting connection."

interface_type—The type of interface (for example, DMZ, outside, and so on).

IP_address—The IP address of the interface.

port_num—The port number.

Recommended Action    None required.

415010

Error Message    %FWSM-5-415010: matched matched_string in policy-map map_name, transfer 
encoding matched connection_action from int_type:IP_address/port_num to 
int_type:IP_address/port_num 

Explanation    The value in the "transfer encoding" field matches the user-configured regular expression or keyword. See the match {request | response} header transfer-encoding {{regex-name | class class-name} | keyword} command for more information.

matched_string—The matched string is one of the following:

- The class map ID, followed by the name of the class map. This string displays when the class map is user configured.

- The actual match command that initiated the syslog message. This string displays when the class map is internal.

map_name—The name of the policy map.

connection_action—"Dropping connection" or "Resetting connection."

interface_type—The type of interface (for example, DMZ, outside, and so on).

IP_address—The IP address of the interface.

port_num—The port number.

Recommended Action    None required.

415011

Error Message    %FWSM-5-415011: HTTP - policy-map map_name:Protocol violation 
connection_action from int_type:IP_address/port_num to 
int_type:IP_address/port_num 

Explanation    The HTTP parser cannot detect a valid HTTP message in the first few bytes of an HTTP message.

map_name—The name of the policy map.

connection_action—"Dropping connection" or "Resetting connection."

interface_type—The type of interface (for example, DMZ, outside, and so on).

IP_address—The IP address of the interface.

port_num—The port number.

Recommended Action    Enter the protocol-violation action {drop | reset} log command to correct the problem.

415012

Error Message    %FWSM-5-415012: HTTP - matched matched_string in policy-map map_name, 
Unknown mime-type connection_action from int_type:IP_address/port_num to 
int_type:IP_address/port_num 

Explanation    The "content-type" field does not contain a MIME type that matches a built-in MIME type.

matched_string—The matched string is one of the following:

- The class map ID, followed by the name of the class map. This string displays when the class map is user configured.

- The actual match command that initiated the syslog message. This string displays when the class map is internal.

map_name—The name of the policy map.

connection_action—"Dropping connection" or "Resetting connection."

interface_type—The type of interface, for example, DMZ, outside, and so on.

IP_address—The IP address of the interface.

port_num—The port number.

Recommended Action    Enter the match {request | response} header content-type unknown command to correct the problem.

415013

Error Message    %FWSM-5-415013: HTTP - policy-map map-name: Malformed chunked encoding 
connection_action from int_type:IP_address/port_num to 
int_type:IP_address/port_num 

Explanation    A chunked encoding is malformed and the HTTP message cannot be parsed, and logging for the protocol-violation command is configured.

map-name— The name of the policy map.

connection_action—"Dropping connection" or "Resetting connection."

interface_type—The type of interface, for example, DMZ, outside, and so on.

IP_address—The IP address of the interface.

port_num—The port number.

Recommended Action    Enter the protocol-violation action {drop | reset} log command to correct the problem.

415014

Error Message    %FWSM-5-415014: HTTP - matched matched_string in policy-map map_name, 
Mime-type in response wasn't found in the accept-types of the request 
connection_action from int_type:IP_address/port_num to 
int_type:IP_address/port_num 

Explanation    The MIME type in an HTTP response is not in the "accept" field of the request.

matched_string—The matched string is one of the following:

- The class map ID, followed by the name of the class map. This string displays when the class map is user configured.

- The actual match command that initiated the syslog message. This string displays when the class map is internal.

map_name—The name of the policy map.

connection_action—"Dropping connection" or "Resetting connection."

interface_type—The type of interface, for example, DMZ, outside, and so on.

IP_address—The IP address of the interface.

port_num—The port number.

Recommended Action    Enter the match req-resp content-type mismatch command to correct the problem.

415015

Error Message    %FWSM-5-415015: HTTP - matched matched_string in policy-map map_name, transfer-encoding unknown connection_action from int_type:IP_address/port_num to 
int_type:IP_address/port_num 

Explanation    An empty transfer encoding has occurred.

matched_string—The matched string is one of the following:

- The class map ID, followed by the name of the class map. This string displays when the class map is user configured.

- The actual match command that initiated the syslog message. This string displays when the class map is internal.

map_name—The name of the policy map.

connection_action—"Dropping connection" or "Resetting connection."

interface_type—The type of interface, for example, DMZ, outside, and so on.

IP_address—The IP address of the interface.

port_num—The port number.

Recommended Action    Enter the match {request | response} header transfer-encoding empty command to correct the problem.

415016

Error Message    %FWSM-4-415016: policy-map map_name:Maximum number of unanswered HTTP 
requests exceeded connection_action from int_type:IP_address/port_num to 
int_type:IP_address/port_num 

Explanation    The number of unanswered HTTP requests exceeds the internal number of requests allowed.

map_name—The name of the policy map.

connection_action—"Dropping connection" or "Resetting connection."

interface_type—The type of interface, for example, DMZ, outside, and so on.

IP_address—The IP address of the interface.

port_num—The port number.

Recommended Action    Enter the protocol-violation action {drop | reset} log command to correct the problem.

415017

Error Message    %FWSM-6-415017: HTTP - matched_string in policy-map map_name, 
arguments matched connection_action from int_type:IP_address/port_num to 
int_type:IP_address/port_num 

Explanation    A pattern in the arguments matches the user-configured regular expression or keyword. See the match request args regex {regex-name | class class-name} command for more information.

matched_string—The matched string is one of the following:

- The class map ID, followed by the name of the class map. This string displays when the class map is user configured.

- The actual match command that initiated the syslog message. This string displays when the class map is internal.

map_name—The name of the policy map.

connection_action—"Dropping connection" or "Resetting connection."

interface_type—The type of interface, for example, DMZ, outside, and so on.

IP_address—The IP address of the interface.

port_num—The port number.

Recommended Action    None required.

415018

Error Message    %FWSM-5-415018: HTTP - matched matched_string in policy-map map_name, 
Header length exceeded connection_action from int_type:IP_address/port_num to 
int_type:IP_address/port_num 

Explanation    The total header length exceeds the user-configured length for the header.

matched_string—The matched string is one of the following:

- The class map ID, followed by the name of the class map. This string displays when the class map is user configured.

- The actual match command that initiated the syslog message. This string displays when the class map is internal.

map_name—The name of the policy map.

connection_action—"Dropping connection" or "Resetting connection."

interface_type—The type of interface, for example, DMZ, outside, and so on.

IP_address—The IP address of the interface.

port_num—The port number.

Recommended Action    Enter the match {request | response} header length gt num command to reduce the length of the header.

415019

Error Message    %FWSM-5-415019: HTTP - matched matched_string in policy-map map_name, 
status line matched connection_action from int_type:IP_address/port_num to 
int_type:IP_address/port_num 

Explanation    The status line in a response matches the user-configured regular expression. See the match response status-line regex {regex-name | class class-name} command for more information.

matched_string—The matched string is one of the following:

- The class map ID, followed by the name of the class map. This string displays when the class map is user configured.

- The actual match command that initiated the syslog message. This string displays when the class map is internal.

map_name—The name of the policy map.

connection_action—"Dropping connection" or "Resetting connection."

interface_type—The type of interface, for example, DMZ, outside, and so on.

IP_address—The IP address of the interface.

port_num—The port number.

Recommended Action    None required.

415020

Error Message    %FWSM-5-415020: HTTP - matched matched_string in policy-map map_name, 
a non-ASCII character was matched connection_action from int_type:IP_address/port_num to int_type:IP_address/port_num 

Explanation    Aa non-ASCII character is found.

matched_string—The matched string is one of the following:

- The class map ID, followed by the name of the class map. This string displays when the class map is user configured.

- The actual match command that initiated the syslog message. This string displays when the class map is internal.

map_name—The name of the policy map.

connection_action—"Dropping connection" or "Resetting connection."

interface_type—The type of interface, for example, DMZ, outside, and so on.

IP_address—The IP address of the interface.

port_num—The port number.

Recommended Action    Enter the match {request | response} header non-ascii command to correct the problem.

416001

Error Message    %FWSM-4-416001: Dropped UDP SNMP packet from source_interface: 
source_IP/source_port to dest_interface:dest_address/dest_port; version 
(prot_version) is not allowed through the firewall

Explanation    An SNMP packet was denied passage through the security appliance because of a bad packet format or because the prot_version is not allowed through the security appliance. The variable prot_version can be one of the following values: 1, 2, 2c, or 3.

Recommended Action    Change the settings for SNMP inspection using the snmp-map command, which allows the user to permit or deny specific protocol versions.

417001

Error Message    %FWSM-4-417001: Unexpected event received: number 

Explanation    A process received a signal but no handler was found for the event.

Recommended Action    Copy the error message, the configuration, and any details about the events leading up to this error and submit them to Cisco TAC.

417004

Error Message    %FWSM-4-417004: Filter violation error: conn number (string:string) in 
string 

Explanation    A client tried to modify a route attribute that the client does not own.

Recommended Action    Copy the error message, the configuration, and any details about the events leading up to this error and submit them to Cisco TAC.

417006

Error Message    %FWSM-4-417006: No memory for string) in string. Handling: string 

Explanation    An operation failed because of low memory but will be handled with another mechanism.

Explanation    If sufficient memory exists, copy the error message, the configuration, and any details about the events leading up to this error and submit them to Cisco TAC.

418001

Error Message    %FWSM-4-418001: Through-the-device packet to/from management-only 
network is denied: protocol_string from interface_name IP_address (port) to 
interface_name IP_address (port)

Explanation    A packet from the specified source to the destination is dropped because it is traversing the security appliance to and from the management-only network.

protocol_string—TCP, UDP, ICMP, or the protocol ID as a decimal number.

interface_name— Interface name.

IP_address—IP address.

port—Port number.

Recommended Action    Investigate who is generating the packet and why.

431001

Error Message    %FWSM-4-431001: RTP conformance: Dropping RTP packet from 
in_ifc:src_ip/src_port to out_ifc:dest_ip/dest_port, Drop reason: drop_reason 
value 

Explanation    The RTP packet was dropped.

in_ifc—The input interface.

src_ip—The source IP address of the packet.

src_port—The source port of the packet.

out_ifc—The output interface.

dest_ip—The destination IP address of the packet.

dest_port—The destination port of the packet.

drop_reason—One of the following drop reasons:

- Incorrect version value—The version number from the packet is incorrect.

- Invalid payload-type value—The payload type from the packet is invalid.

- Incorrect SSRC value—The SSRC from the packet is incorrect.

- Out of range sequence number value sequence number from the packet.

- Out of sequence in packet in probation value sequence number from the packet.

Recommended Action    Examine the dropped RTP packets to determine which field the RTP source is setting incorrectly. Also examine the source to verify that it is legitimate and not an attacker trying to misuse an opening in the ASDM.

431002

Error Message    %FWSM-4-431002: RTCP conformance: Dropping RTCP packet from 
in_ifc:src_ip/src_port to out_ifc:dest_ip/dest_port, Drop reason: drop_reason 
value 

Explanation    The RTP packet was dropped.

in_ifc—The input interface.

src_ip—The source IP address of the packet.

src_port—The source port of the packet.

out_ifc—The output interface.

dest_ip—The destination IP address of the packet.

dest_port—The destination port of the packet.

drop_reason—One of the following drop reasons:

- Incorrect version value—The version number from the packet is incorrect.

- Invalid payload-type value—The payload type from the packet is incorrect.

Recommended Action    Examine the dropped RTP packets to determine which field the RTP source is setting incorrectly. Also examine the source to verify that it is legitimate and not an attacker trying to misuse an opening in the ASDM.

Messages 500001 to 510002

This section contains messages from 500001 to 510002.

500001

Error Message    %FWSM-5-500001: ActiveX content modified src IP_address dest 
IP_address on interface interface_name.

Explanation    This message is displayed after you turn on the activex option using the filter command, and the security appliance detects an ActiveX object. The activex option allows the security appliance to filter out ActiveX content by modifying it so that it no longer is tagged as an HTML object.

Recommended Action    None required.

500002

Error Message    %FWSM-5-500002: Java content modified src IP_address dest IP_address on interface interface_name.

Explanation    This message is displayed after you turn on the java option using the filter command, and the security appliance detects a Java applet. The java option allows the security appliance to filter out Java content by modifying it so that it no longer is tagged as an HTML object.

Recommended Action    None required.

500003

Error Message    %FWSM-5-500003: Bad TCP hdr length (hdrlen=bytes, pktlen=bytes) from 
source_address/source_port to dest_address/dest_port, flags: tcp_flags, on 
interface interface_name 

Explanation    This message indicates that a header length in TCP is incorrect. Some operating systems do not handle TCP resets (RSTs) correctly when responding to a connection request to a disabled socket. If a client tries to connect to an FTP server outside the security appliance and FTP is not listening, the server sends an RST. Some operating systems send incorrect TCP header lengths, which causes this problem. UDP uses ICMP port unreachable messages.

The TCP header length may indicate that it is larger than the packet length, which results in a negative number of bytes being transferred. A negative number is displayed by syslog messages as an unsigned number, which makes it appear much larger than it would be normally; for example, it may show 4 GB transferred in 1 second.

Recommended Action    None required. This message should occur infrequently.

500004

Error Message    %FWSM-4-500004: Invalid transport variable for protocol=protocol, from 
source_address/source_port to dest_address/dest_port 

Explanation    This message appears when there is an invalid transport number, in which the source or destination port number for a protocol is zero. The protocol value is 6 for TCP and 17 for UDP.

Recommended Action    If these messages persist, contact the peer's administrator.

501101

Error Message    %FWSM-5-501101: User transitioning priv level

Explanation    The privilege level of a command was changed.

Recommended Action    None required.

502101

Error Message    %FWSM-5-502101: New user added to local dbase: Uname: user Priv: 
privilege_level Encpass: string 

Explanation    A new username record was created. The message lists the username, privilege level, and encrypted password.

Recommended Action    None required.

502102

Error Message    %FWSM-5-502102: User deleted from local dbase: Uname: user Priv: 
privilege_level Encpass: string 

Explanation    A username record was deleted. The message lists the username, privilege level, and encrypted password.

Recommended Action    None required.

502103

Error Message    %FWSM-5-502103: User priv level changed: Uname: user From: 
privilege_level To: privilege_level 

Explanation    The privilege level of a user changed.

Recommended Action    None required.

502111

Error Message    %FWSM-5-502111: New group policy added: name: policy_name Type: 
policy_type 

Explanation    This is an indication that a group policy has been configured using the group-policy CLI command. The policy_name is the name of the group policy. The value for policy_type is either "internal" or "external."

Recommended Action    None required.

502112

Error Message    %FWSM-5-502112: Group policy deleted: name: policy_name Type: 
policy_type 

Explanation    A group policy has been removed using the group-policy CLI command. The policy_name is the name of the group policy. The value for policy_type is either "internal" or "external."

Recommended Action    None required.

503001

Error Message    %FWSM-5-503001: Process number, Nbr IP_address on interface_name from 
string to string, reason 

Explanation    An OSPF neighbor has changed its state. The message describes the change and the reason for it. This message appears only if the log-adjacency-changes command is configured for the OSPF process.

Recommended Action    To determine what is causing this problem, contact Cisco TAC for assistance.

504001

Error Message    %FWSM-5-504001: Security context context_name was added to the system

Explanation    A security context was successfully added to the system.

Recommended Action    None required.

504002

Error Message    %FWSM-5-504002: Security context context_name was removed from the 
system

Explanation    A security context was successfully removed from the system.

Recommended Action    None required.

506001

Error Message    %FWSM-5-506001: event_source_string event_string

Explanation    Status of a file system has changed. The message describes the event and the source of the event that caused a file system to become available or unavailable. Examples of sources and events that could cause a file system status change are as follows:

External Compact Flash removed.

External Compact Flash inserted.

External Compact Flash-unknown event.

Recommended Action    None required

507001

Error Message    %FWSM-5-507001: Terminating TCP-Proxy connection from 
interface_inside:source_address/source_port to 
interface_outside:dest_address/dest_port - reassembly limit of limit bytes 
exceeded

Explanation    The reassembly buffer limit is exceeded while assembling TCP segments.

source_address/source_port—The source IP address and the source port of the packet initiating the connection.

dest_address/dest_port—The destination IP address and the destination port of the packet initiating the connection.

interface_inside—The name of the interface on which the packet that initiated the connection arrives.

interface_outside—The name of the interface on which the packet that initiated the connection exits.

limit—The configured embryonic connection limit for the traffic class.

Recommended Action    None required.

510001

Error Message    %FWSM-5-510001: Route-inject IP IP mask mask next-hop nexthop_IP has 
been [added to | removed from} interface if_name 

Explanation    This message indicates that a route or NAT pool has been injected from the FWSM to the Supervisor. The route or NAT pool is either added to or removed from the routing table on the Supervisor.

IP—The destination IP of the route or NAT pool.

mask—The netmask of the route or NAT pool.

nexthop—The IP address of the nexthop route or gateway.

if_name—The name of the interface for which the route or NAT pool will be added or removed.

Recommended Action    None required.

510002

Error Message    %FWSM-5-510002: Route-inject IP IP mask mask next-hop nexthop_IP 
failed to be [added to | removed from} interface if_name 

Explanation    This message indicates that a route or NAT pool failed to be injected from the FWSM to the Supervisor.

IP—The destination IP of the route or NAT pool.

mask—The netmask of the route or NAT pool.

nexthop—The IP address of the nexthop route or gateway.

if_name—The name of the interface for which the route or NAT pool will be added or removed.

Recommended Action    Try to remove the route-inject redistribute configuration and add it back in to retry the injection or removal.

Messages 602101 to 609002

This section contains messages from 602101 to 609002.

602101

Error Message    %FWSM-6-602101: PMTU-D packet number bytes greater than effective mtu 
number dest_addr=dest_address, src_addr=source_address, prot=protocol 

Explanation    This message occurs when the security appliance sends an ICMP destination unreachable message and fragmentation is needed, but the "don't-fragment" bit is set.

Recommended Action    Ensure that the data is sent correctly.

602102

Error Message    %FWSM-6-602102: Adjusting IPSec tunnel mtu...

Explanation    The MTU for an IPSec tunnel is adjusted from Path MTU Discovery.

Recommended Action    Check the MTU of the IPSec tunnels. If the effective MTU is smaller than normal, check the intermediate links.

602201

Error Message    %FWSM-6-602201: ISAKMP Phase 1 SA created (local IP_address/port 
(initiator|responder), remote IP_address/port, authentication=auth_type, 
encryption=encr_alg, hash=hash_alg, group=DH_grp, lifetime=seconds)

Explanation    An ISAKMP SA has been created.

Recommended Action    None required.

602202

Error Message    %FWSM-6-602202: ISAKMP session connected (local IP_address 
(initiator|responder), remote IP_address)

Explanation    An ISAKMP peer has connected.

Recommended Action    None required.

602203

Error Message    %FWSM-6-602203: ISAKMP session disconnected (local IP_address 
(initiator|responder), remote IP_address)

Explanation    An ISAKMP peer has disconnected.

Recommended Action    None required.

602301

Error Message    %FWSM-6-602301: sa created... 

Explanation    A new security association (SA) was created.

Recommended Action    None required.

602302

Error Message    %FWSM-6-602302: deleting sa

Explanation    An SA was deleted.

Recommended Action    None required.

602303

Error Message    %FWSM-6-602303: IPSEC: An direction tunnel_type SA (SPI=spi) between 
local_IP and remote_IP (username) has been created.

Explanation    A new security association (SA) was created.

direction—SA direction (inbound or outbound).

tunnel_type—SA type (remote access or L2L).

spi—IPSec Security Parameters Index.

local_IP—IP address of the tunnel local endpoint.

remote_IP—IP address of the tunnel remote endpoint.

username—Username associated with the IPSec tunnel.

Recommended Action    None required.

602304

Error Message    %FWSM-6-602304: IPSEC: An direction tunnel_type SA (SPI=spi) between 
local_IP and remote_IP (username) has been deleted.

Explanation    An SA has been deleted.

direction—SA direction (inbound or outbound).

tunnel_type—SA type (remote access or L2L).

spi—IPSec Security Parameters Index.

local_IP—IP address of the tunnel local endpoint.

remote_IP—IP address of the tunnel remote endpoint.

username—Username associated with the IPSec tunnel.

Recommended Action    None required.

604101

Error Message    %FWSM-6-604101: DHCP client interface interface_name: Allocated ip = 
IP_address, mask = netmask, gw = gateway_address 

Explanation    The security appliance DHCP client successfully obtained an IP address from a DHCP server. The dhcpc command statement allows the security appliance to obtain an IP address and network mask for a network interface from a DHCP server, as well as a default route. The default route statement uses the gateway address as the address of the default router.

Recommended Action    None required.

604102

Error Message    %FWSM-6-604102: DHCP client interface interface_name: address released

Explanation    The security appliance DHCP client released an allocated IP address to the DHCP server.

Recommended Action    None required.

604103

Error Message    %FWSM-6-604103: DHCP daemon interface interface_name: address granted 
MAC_address (IP_address)

Explanation    The security appliance DHCP server granted an IP address to an external client.

Recommended Action    None required.

604104

Error Message    %FWSM-6-604104: DHCP daemon interface interface_name: address released

Explanation    An external client released an IP address to the security appliance DHCP server.

Recommended Action    None required.

605005

Error Message    %FWSM-6-605005: Login permitted from IP_address/telnet to outside 
IP_address/ssh for user "pix"

Explanation    An external user logged in by using Telnet or SSH.

Recommended Action    None required.

606001

Error Message    %FWSM-6-606001: ASDM session number number from IP_address started

Explanation    This message indicates that an administrator has been authenticated successfully and an ASDM session was started.

Recommended Action    None required.

606002

Error Message    %FWSM-6-606002: ASDM session number number from IP_address ended

Explanation    This message indicates that an ASDM session ended.

Recommended Action    None required.

606003

Error Message    %FWSM-6-606003: ASDM logging session number id from IP_address started 
id session ID assigned

Explanation    An ASDM logging connection is started by a remote management client.

IP_address—IP address of the remote management client.

Recommended Action    None required.

606004

Error Message    %FWSM-6-606004: ASDM logging session number id from IP_address ended

Explanation    An ASDM logging connection is terminated.

id—Assigned session ID.

IP_address—IP address of the remote management client.

Recommended Action    None required.

607001

Error Message    %FWSM-6-607001: Pre-allocate SIP connection_type secondary channel for 
interface_name:IP_address/port to interface_name:IP_address from string message 

Explanation    This message indicates that the fixup sip command preallocated a SIP connection after inspecting a SIP message. The connection_type is one of the following strings:

Route

RTCP

RTP

SIGNALLING TCP

SIGNALLING UDP

SUBSCRIBE TCP

SUBSCRIBE UDP

Via UDP

Recommended Action    None required.

607002

Error Message    %FWSM-4-607002: action_class: action SIP req_resp req_resp_info from 
src_ifc:sip/sport to dest_ifc:dip/dport; further_info 

Explanation    A SIP classification is performed on a SIP message, and the specified criteria are satisfied. Then the configured action occurs.

action_class—The class of the action: "SIP Classification" for SIP match commands or "SIP Parameter" for parameter commands.

action—The action taken: "Dropped," "Dropped connection for," "Reset connection for," or "Masked header flags for."

req_resp—"Request" or "Response."

req_resp_info—The SIP method name if the type is "Request": INVITE, CANCEL, and so on. The SIP response code if type is "Response": 100, 183, 200, and so on.

src_ifc—The source interface name.

sip—The source IP address.

sport—The source port number.

dest_ifc—The destination interface name.

dip—The destination IP address.

dport—The destination port number.

further_info—Displays more information for SIP match and SIP parameter commands, as follows:

- For single match commands:

matched Class id: match_command—For example:

matched Class 1234: content len lt 100

- For match commands in a class-map:

matched Class id: classnameFor example:

matched Class 4567: my_sip_class

- For parameter commands:

parameter-command: descriptive-message—For example:

strict-header-validation: Mandatory header field `Via' is missing
state-checking: Message CANCEL is not permitted to create a Dialog.

Recommended Action    None required.

607003

Error Message    %FWSM-6-607003: action_class: Received SIP req_resp req_resp_info from 
src_ifc:sip/sport to dest_ifc:dip/dport; further_info 

Explanation    This event is generated when a SIP classification is performed on a SIP message and the specified criteria are satisfied. Then the standalone log action occurs.

action_class—SIP Classification for SIP match commands or SIP Parameter for parameter commands.

req_resp—"Request" or "Response."

req_resp_info—The SIP method name if the type is "Request": INVITE, CANCEL, and so on.

The SIP response code if type is "Response": 100, 183, 200, and so on.

src_ifc—The source interface name.

sip—The source IP address.

sport—The source port.

dest_ifc—The destination interface name.

dip—The destination IP address.

dport—The destination port.

further_info—Displays more information for SIP match and SIP parameter commands, as follows:

- For single match commands:

matched Class id: match_command—For example:

matched Class 1234: content len lt 100

- For match commands in a class-map:

matched Class id: classnameFor example:

matched Class 4567: my_sip_class

- For parameter commands:

parameter-command: descriptive-message—For example:

strict-header-validation: Mandatory header field `Via' is missing
state-checking: Message CANCEL is not permitted to create a Dialog.

Recommended Action    None required.

608001

Error Message    %FWSM-6-608001: Pre-allocate Skinny connection_type secondary channel 
for interface_name:IP_address to interface_name:IP_address/port from string 
message 

Explanation    This message indicates that the fixup skinny command preallocated a Skinny connection after inspecting a Skinny message. The connection_type is one of the following strings:

Route

RTCP

RTP

SIGNALLING TCP

SIGNALLING UDP

SUBSCRIBE TCP

SUBSCRIBE UDP

Via UDP

Recommended Action    None required.

609001

Error Message    %FWSM-6-609001: Built local-host interface_name:IP_address 

Explanation    A network state container is reserved for host IP_address connected to interface interface_name. This is an informational message.

Recommended Action    None required.

609002

Error Message    %FWSM-6-609002: Teardown local-host interface_name:IP_address 
duration time 

Explanation    A network state container for host IP_address connected to interface interface_name is removed. This is an informational message.

Recommended Action    None required.

610001

Error Message    %FWSM-3-610001: NTP daemon interface interface_name: Packet denied 
from IP_address 

Explanation    An NTP packet was received from a host that does not match one of the configured NTP servers. The security appliance is only an NTP client; it is not a time server and does not respond to NTP requests.

Recommended Action    None required.

610002

Error Message    %FWSM-3-610002: NTP daemon interface interface_name: Authentication 
failed for packet from IP_address 

Explanation    The received NTP packet failed the authentication check.

Recommended Action    Ensure that both the security appliance and the NTP server are set to use authentication, and the same key number and value.

610101

Error Message    %FWSM-6-610101: Authorization failed: Cmd: command Cmdtype: 
command_modifier 

Explanation    Command authorization failed for the specified command. The command_modifier is one of the following strings:

cmd (this string means the command has no modifier)

clear

no

show

Explanation    If the security appliance encounters any other value other than the four command types listed, the message "unknown command type" is displayed.

Recommended Action    None required.

612001

Error Message    %FWSM-5-612001: Auto Update succeeded:filename, version:number 

Explanation    An update from an Auto Update server was successful. The filename variable may be image, ASDM file, or configuration. The version number variable is the version number of the update.

Recommended Action    None required.

612002

Error Message    %FWSM-4-612002: Auto Update failed:filename, version:number, 
reason:reason 

Explanation    This message indicates that an update from an Auto Update server failed. The filename variable may be image, ASDM file, or configuration. The version number variable is the version number of the update. The reason variable describes why the update failed. Possible reasons for the failure include an invalid image file, a connection to the server was lost, configuration errors, and so on.

Recommended Action    Check the configuration of the Auto Update server.

612003

Error Message    %FWSM-4-612003:Auto Update failed to contact:url, reason:reason 

Explanation    This indicates that the Auto Update daemon was unable to contact the specified URL url. This could be the URL of the Auto Update server or one of the file server URLs returned by the Auto Update server. The reason variable describes why the contact failed. Possible reasons for the failure include no response from the server, authentication failed, a file was not found, and so on.

Recommended Action    Check the configuration of the Auto Update server.

613001

Error Message    %FWSM-6-613001: Checksum Failure in database in area string Link State 
Id IP_address Old Checksum number New Checksum number 

Explanation    OSPF has detected a checksum error in the database because of memory corruption.

Recommended Action    Restart the OSPF process.

613002

Error Message    %FWSM-6-613002: interface interface_name has zero bandwidth

Explanation    The interface reports its bandwidth as zero.

Recommended Action    To determine what is causing this problem, contact Cisco TAC for assistance.

613003

Error Message    %FWSM-6-613003: IP_address netmask changed from area string to area 
string 

Explanation    An OSPF configuration change has caused a network range to change areas.

Recommended Action    Reconfigure OSPF with the correct network range.

614001

Error Message    %FWSM-6-614001: Split DNS: request patched from server: IP_address to 
server: IP_address 

Explanation    Split DNS is redirecting DNS queries from the original destination server to the primary enterprise DNS server.

Recommended Action    None required.

614002

Error Message    %FWSM-6-614002: Split DNS: reply from server:IP_address reverse 
patched back to original server:IP_address 

Explanation    Split DNS is redirecting DNS queries from the enterprise DNS server to the original destination server.

Recommended Action    None required.

615001

Error Message    %FWSM-6-615001: vlan number not available for firewall interface

Explanation    The switch removed the VLAN from the FWSM.

Recommended Action    None required.

615002

Error Message    %FWSM-6-615002: vlan number available for firewall interface 

Explanation    The switch added the VLAN to the FWSM.

Recommended Action    None required.

616001

Error Message    %FWSM-6-616001:Pre-allocate MGCP data_channel connection for 
inside_interface:inside_address to outside_interface:outside_address/port from 
message_type message 

Explanation    An MGCP data channel connection, RTP, or RTCP is preallocated. The message text also specifies which message has triggered the connection preallocation.

Recommended Action    None required.

617001

Error Message    %FWSM-6-617001: GTPv version msg_type from 
source_interface:source_address/source_port not accepted by 
source_interface:dest_address/dest_port 

Explanation    This message appears when a request was not accepted by the peer. This is usually seen with a Create PDP Context request.

Recommended Action    None required.

617002

Error Message    %FWSM-6-617002: Removing v1 PDP Context with TID tid from GGSN IP_address and 
SGSN IP_address, Reason: reason or Removing v1 primary|secondary PDP Context with 
TID tid from GGSN IP_address and SGSN IP_address, Reason: reason 

Explanation    This message appears when a PDP context is removed from the database either because it expired, a Delete PDP Context Request/Response was exchanged, or a user removed it using the CLI.

Recommended Action    None required.

617003

Error Message    %FWSM-6-617003: GTP Tunnel created from 
source_interface:source_address/source_port to 
source_interface:dest_address/dest_port 

Explanation    This message appears when a GTP tunnel was created after receiving a Create PDP Context Response that accepted the request.

Recommended Action    None required.

617004

Error Message    %FWSM-6-617004: GTP connection created for response from 
source_interface:source_address/0 to source_interface:dest_address/dest_port 

Explanation    This message appears when the SGSN or GGSN signaling address in the Create PDP Context Request or Response, respectively, is different than the SGSN/GGSN sending it.

Recommended Action    None required.

620001

Error Message    %FWSM-6-620001: Pre-allocate CTIQBE {RTP | RTCP} secondary channel for 
interface_name:outside_address[/outside_port] to 
interface_name:inside_address[/inside_port] from CTIQBE_message_name message 

Explanation    The security appliance preallocates a connection object for the specified CTIQBE media traffic. This message is rate limited to one message every 10 seconds.

Recommended Action    None required.

620002

Error Message    %FWSM-4-620002: Unsupported CTIQBE version: hex: from 
interface_name:IP_address/port to interface_name:IP_address/port 

Explanation    The security appliance received a CTIQBE message with an unsupported version number. The security appliance drops the packet. This message is rate limited to one message every 10 seconds.

Recommended Action    If the version number captured in the log message is unreasonably large (greater than 10), the packet could be malformed, a non-CTIQBE packet, or corrupted before it arrives at the security appliance. We recommend that you determine the source of the packets. If the version number is reasonably small (less than or equal to 10), contact Cisco TAC to see if a new security appliance image that supports this CTIQBE version is available.

621001

Error Message    %FWSM-6-621001: Interface interface_name does not support multicast, 
not enabled

Explanation    This message appears when an attempt was made to enable PIM on an interface that does not support multicast.

Recommended Action    Copy this error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

621002

Error Message    %FWSM-6-621002: Interface interface_name does not support multicast, 
not enabled

Explanation    This message appears when an attempt was made to enable IGMP on an interface that does not support multicast.

Recommended Action    Copy this error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

621003

Error Message    %FWSM-6-621003: The event queue size has exceeded number 

Explanation    This message appears when the number of event managers created has exceeded the expected amount.

Recommended Action    Copy this error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

621006

Error Message    %FWSM-6-621006: Mrib disconnected, (IP_address,IP_address) event 
cancelled

Explanation    This message appears when a packet triggering a data-driven event was received but the connection to the MRIB was down. The notification was cancelled.

Recommended Action    If this message persists after the system is up, copy the error message and submit it, the configuration, and any details about the events leading up to this error to Cisco TAC.

621007

Error Message    %FWSM-6-621007: Bad register from interface_name:IP_address to 
IP_address for (IP_address, IP_address)

Explanation    This message appears when a PIM router configured as a rendezvous point or with network address translation (NAT) has received a PIM register packet from another PIM router. The data encapsulated in this packet is invalid.

Recommended Action    It is likely that the source router is erroneously sending non-RFC registers. Upgrade the source router.

622001

Error Message    FWSM-6-622001:%d: Built BGP Peering session with %A and AS #%d\n, 
BGP_PEER_SES_ESTABLISH

Explanation    This message informs users that a BGP session has been established with its peer. The message displays the configured neighboring IP address and AS number.

%A—The peer IP address

%d—The peer AS number

Recommended Action    None required.

622002

Error Message    FWSM-6-622002:%d: Teardown BGP Peering session with %A and AS #%d\n, 
BGP_PEER_SES_TEAR_DOWN

Explanation    This message informs users that a BGP session has been disconnected with its peer. The message displays the configured neighboring IP address and AS number.

%A—The peer IP address

%d—The peer AS number

Recommended Action    None required.

Messages 701001 to 720073

This section contains messages from 701001 to 720073.

Most of the ISAKMP syslog messages have a common set of prepended objects to help identify the tunnel. These objects precede the descriptive text of a syslog message when available. If the object is not known at the time that the syslog message is generated, the specific "heading = value" combination is not displayed.

The objects are prepended as follows:

"Group = groupname, Username = user, IP = IP_address,..."

Where the group identifies the tunnel-group, the username is the username from the local database or AAA server, and the IP address is the public IP address of the remote access client or L2L peer.

701001

Error Message    %FWSM-7-701001: alloc_user() out of Tcp_user objects

Explanation    This is a AAA message, which is displayed if the user authentication rate is too high for the module to handle new AAA requests.

Recommended Action    Enable Flood Defender with the floodguard enable command.

701002

Error Message    %FWSM-7-701002: alloc_user() out of Tcp_proxy objects

Explanation    This is a AAA message, which is displayed if the user authentication rate is too high for the module to handle new AAA requests.

Recommended Action    Enable Flood Defender with the floodguard enable command.

702201

Error Message    %FWSM-7-702201: ISAKMP Phase 1 delete received (local IP_address 
(initiator|responder), remote IP_address) 

Explanation    An ISAKMP delete message has been received.

Recommended Action    None required.

702202

Error Message    %FWSM-7-702202: ISAKMP Phase 1 delete sent (local IP_address 
(initiator|responder), remote IP_address)

Explanation    An ISAKMP delete message has been sent.

Recommended Action    None required.

702203

Error Message    %FWSM-7-702203: ISAKMP DPD timed out (local IP_address 
(initiator|responder), remote IP_address)

Explanation    The remote peer is not responding, and DPD has timed out the peer.

Recommended Action    Check network connectivity to the remote host.

702204

Error Message    %FWSM-7-702204: ISAKMP Phase 1 retransmission (local IP_address 
(initiator|responder), remote IP_address)

Explanation    The remote peer is not responding, and ISAKMP is retransmitting the previous packet.

Recommended Action    Check network connectivity to the remote host, and VPN configuration of local and remote devices.

702205

Error Message    %FWSM-7-702205: ISAKMP Phase 2 retransmission (local IP_address 
(initiator|responder), remote IP_address)

Explanation    The remote peer is not responding, and ISAKMP is retransmitting the previous packet.

Recommended Action    Check network connectivity to the remote host, and the VPN configuration of local and remote devices.

702206

Error Message    %FWSM-7-702206: ISAKMP malformed payload received (local IP_address 
(initiator|responder), remote IP_address)

Explanation    ISAKMP received an illegal or malformed message, which may indicate an out-of-synchronization problem with the remote peer, a problem decrypting a message, or a message received out of order.

Recommended Action    If using a preshared key, verify that the local preshared key is configured correctly on local and remote devices. Check local and remote configurations. Additional troubleshooting may be required if SA fails to come up.

702207

Error Message    %FWSM-7-702207: ISAKMP duplicate packet detected (local IP_address 
(initiator|responder), remote IP_address)

Explanation    ISAKMP received a duplicate of the previously received packet. This message may occur during normal operation, or as a side effect of previous errors in an ISAKMP exchange.

Recommended Action    Check network connectivity, and local and remote configurations.

702208

Error Message    %FWSM-7-702208: ISAKMP Phase 1 exchange started (local IP_address 
(initiator|responder), remote IP_address)

Explanation    ISAKMP has started a new Phase 1 message exchange with the remote peer.

Recommended Action    None required.

702209

Error Message    %FWSM-7-702209: ISAKMP Phase 2 exchange started (local IP_address 
(initiator|responder), remote IP_address)

Explanation    ISAKMP has started a new Phase 2 message exchange with the remote peer.

Recommended Action    None required.

702210

Error Message    %FWSM-7-702210: ISAKMP Phase 1 exchange completed(local IP_address 
(initiator|responder), remote IP_address)

Explanation    ISAKMP has finished a Phase 1 exchange.

Recommended Action    None required.

702211

Error Message    %FWSM-7-702211: ISAKMP Phase 2 exchange completed(local IP_address 
(initiator|responder), remote IP_address)

Explanation    ISAKMP has finished a Phase 2 exchange.

Recommended Action    None required.

702212

Error Message    %FWSM-7-702212: ISAKMP Phase 1 initiating rekey (local IP_address 
(initiator|responder), remote IP_address)

Explanation    ISAKMP is initiating Phase 1 rekeying.

Recommended Action    None required.

702301

Error Message    %FWSM-7-702301: lifetime expiring... 

Explanation    An SA lifetime has expired.

Recommended Action    None required.

702302

Error Message    %FWSM-3-702302: replay rollover detected...

Explanation    More than 4 billion packets have been received in the IPSec tunnel and a new tunnel is being negotiated.

Recommended Action    Contact the peer administrator to compare the SA lifetime setting.

702303

Error Message    %FWSM-7-702303: sa_request...

Explanation    IPSec has requested IKE for new SAs.

Recommended Action    None required.

703001

Error Message    %FWSM-7-703001: H.225 message received from 
interface_name:IP_address/port to interface_name:IP_address/port is using an 
unsupported version number 

Explanation    The security appliance received an H.323 packet with an unsupported version number. The security appliance might re-encode the protocol version variable of the packet to the highest supported version.

Recommended Action    Use the version of H.323 that the security appliance supports in the VoIP network.

703002

Error Message    %FWSM-7-703002: Received H.225 Release Complete with 
newConnectionNeeded for interface_name:IP_address to 
interface_name:IP_address/port 

Explanation    This debugging message indicates that the security appliance received the specified H.225 message, and that the security appliance opened a new signaling connection object for the two specified H.323 endpoints.

Recommended Action    None required.

709001, 709002

Error Message    %FWSM-7-709001: FO replication failed: cmd=command returned=code 
Error Message    %FWSM-7-709002: FO unreplicable: cmd=command 

Explanation    These failover messages appear only during the development debug testing phase.

Recommended Action    None required.

709003

Error Message    %FWSM-1-709003: (Primary) Beginning configuration replication: Sending 
to mate.

Explanation    This is a failover message and is displayed when the active unit starts replicating its configuration to the standby unit. (Primary) can also be listed as (Secondary) for the secondary unit.

Recommended Action    None required.

709004

Error Message    %FWSM-1-709004: (Primary) End Configuration Replication (ACT)

Explanation    This is a failover message and is displayed when the active unit completes replicating its configuration on the standby unit. (Primary) can also be listed as (Secondary) for the secondary unit.

Recommended Action    None required.

709005

Error Message    %FWSM-1-709005: (Primary) Beginning configuration replication: 
Receiving from mate.

Explanation    This message indicates that the standby security appliance received the first part of the configuration replication from the active security appliance. (Primary) can also be listed as (Secondary) for the secondary unit.

Recommended Action    None required.

709006

Error Message    %FWSM-1-709006: (Primary) End Configuration Replication (STB)

Explanation    This is a failover message and is displayed when the standby unit completes replicating a configuration sent by the active unit. (Primary) can also be listed as (Secondary) for the secondary unit.

Recommended Action    None required.

709007

Error Message    %FWSM-2-709007: Configuration replication failed for command command 

Explanation    This is a failover message and is displayed when the standby unit is unable to complete replicating a configuration sent by the active unit. The command that caused the failure displays at the end of the message.

Recommended Action    Write down the command name and inform Cisco TAC.

709008

Error Message    %FWSM-2-709008: Configuration may be out of sync between 
Active/Standby units

Explanation    This message appears when you try to enter configuration changes on a standby unit.

Recommended Action    None required.

710001

Error Message    %FWSM-7-710001: TCP access requested from source_address/source_port 
to interface_name:dest_address/service 

Explanation    This message appears when the first TCP packet sent to the security appliance requests a TCP session. This packet is the first SYN packet of the three-way handshake. This message appears when the respective access control list (Telnet, HTTP, or SSH) has permitted the packet. However, the SYN cookie verification is not yet completed and no state is reserved.

Recommended Action    None required.

710002

Error Message    %FWSM-7-710002: {TCP|UDP} access permitted from 
source_address/source_port to interface_name:dest_address/service 

Explanation    For a TCP connection, this message appears when the second TCP packet sent to the security appliance requests a TCP session. This packet is the final ACK packet of the three-way handshake. This message appears when the respective access control list (Telnet, HTTP, or SSH) has permitted the packet. Also, the SYN cookie verification is successful and the state is reserved for the TCP session.

For a UDP connection, the connection was permitted. For example, this message appears (when the service is snmp) when the module receives an SNMP request from an authorized SNMP management station, and the request has been processed. This message is rate limited to one message every 10 seconds.

Recommended Action    None required.

710003

Error Message    %FWSM-3-710003: {TCP|UDP} access denied by ACL from 
source_IP/source_port to interface_name:dest_IP/service 

The following is an example:

%FWSM-3-710003: UDP access denied by ACL from 95.1.1.14/5000 to outside:95.1.1.13/1005

Explanation    The ASDM denies an attempt to connect to the interface service. For example, this message may occur when the firewall receives an SNMP request from an unauthorized SNMP management station.

Recommended Action    Use the show run http, show run ssh, or show run telnet commands to verify that the ASDM is configured to permit the service access from the host or network. If this message appears frequently, it can indicate an attack.

710004

Error Message    %FWSM-7-710004: TCP connection limit exceeded from 
source_address/source_port to interface_name:dest_address/service 

Explanation    The maximum number of security appliance management connections for the service was exceeded. The security appliance permits at most five concurrent management connections per management service.

Recommended Action    From the console, use the kill command to release the unwanted session.

710005

Error Message    %FWSM-7-710005: {TCP|UDP} request discarded from 
source_address/source_port to interface_name:dest_address/service 

Explanation    This message appears when the security appliance does not have a UDP server that services the UDP request. The message can also indicate a TCP packet that does not belong to any session on the security appliance. In addition, this message appears when the security appliance receives an SNMP request with an empty payload, even if it is from an authorized host. When the service is snmp, this message occurs a maximum of 1 time every 10 seconds so that the log receiver is not overwhelmed.

Recommended Action    In networks that use broadcasting services such as DHCP, RIP or NetBIOS, the frequency of this message can be high. If this message appears in excessive numbers, it may indicate an attack.

710006

Error Message    %FWSM-7-710006: protocol request discarded from source_address to 
interface_name:dest_address 

Explanation    This message appears when the security appliance does not have an IP server that services the IP protocol request; for example, the security appliance receives IP packets that are not TCP or UDP, and the security appliance cannot service the request.

Recommended Action    In networks that use broadcasting services such as DHCP, RIP or NetBIOS, the frequency of this message can be high. If this message appears in excessive numbers, it may indicate an attack.

711001

Error Message    %FWSM-7-711001: debug_trace_msg

Explanation    This syslog message appears after you enter the logging debug-trace command for the logging feature. When logging debug-trace is enabled, all debug messages will be redirected to the syslog message for processing. For security reasons, the syslog message output must be encrypted or sent over a secure out-of-band network.

Recommended Action    None required.

711002

Error Message    %FWSM-7-711002: Task ran for elapsed_time msecs, process = 
process_name 

Explanation    This message appears when a process uses the CPU for more than 100 milliseconds and is used for debugging purposes to flag the CPU process being used.

Recommended Action    None required.

711003

Error Message    %FWSM-7-711003: Unknown/Invalid interface identifier (vpifnum) 
detected

Explanation    This message appears when the FWSM detects an invalid vpifnum in any of the vpif APIs. The message indicates an internal inconsistency that should not occur during normal operation.

vpifnum—The 32-bit value specified in the interface.

Recommended Action    Enter the debug pix vpifapi command and provide the output to Cisco TAC. In addition, provide details of the events leading up to this error.

713004

Error Message    %FWSM-3-713004: device scheduled for reboot or shutdown, IKE key 
acquire message on interface interface num, for Peer IP_address ignored

Explanation    This message appears when the ASDM has received an IKE packet from a remote entity trying to initiate a tunnel. Because the ASDM is scheduled for a reboot or shutdown, it does not allow any more tunnels to be established. The IKE packet is ignored and dropped.

Explanation    None required.

713006

Error Message    %FWSM-5-713006: Failed to obtain state for message Id message_number, 
Peer Address: IP_address 

Explanation    This message indicates that the security appliance does not know about the received message ID. The message ID is used to identify a specific IKE Phase 2 negotiation. This is most likely an error condition on the security appliance, but may indicate that the two IKE peers are out of synchronization.

Recommended Action    None required.

713008

Error Message    %FWSM-3-713008: Key ID in ID payload too big for pre-shared IKE tunnel

Explanation    This message indicates that a key ID value was received in the ID payload which was longer than the maximum allowed size of a groupname for this IKE session using preshared keys authentication. This is an invalid value and the session is rejected. Note that the key ID specified would never work because a groupname of that size cannot be created in the security appliance. Notify the user to change the incorrect groupname on the client.

Recommended Action    Make sure that the client peer (most likely an RA Client) specifies a valid groupname. The current maximum length for a groupname is 32.

713009

Error Message    %FWSM-3-713009: OU in DN in ID payload too big for Certs IKE tunnel

Explanation    This message indicates that an OU value in the DN was received in the ID payload, which was longer than the maximum allowed size of a groupname for this IKE session using Certs authentication. This OU is skipped and another OU or other criteria may find a matching group.

Recommended Action    For the client to be able to use an OU to find a group in the security appliance, the groupname must be a valid length. The current maximum length for a groupname is 32.

713010

Error Message    %FWSM-5-713010: IKE area: failed to find centry for message Id 
message_number 

Explanation    This message appears when an attempt is made to locate a conn_entry (IKE phase 2 structure that corresponds to an IPSec SA) by the unique Message ID failed. The internal structure was not found, which can occur if a session is terminated in a non-standard way. It is more likely an internal error.

Recommended Action    If this problem persists, investigate the peer.

713012

Error Message    %FWSM-3-713012: Unknown protocol (protocol). Not adding SA w/spi=SPI value 

Explanation    This message appears when an illegal or unsupported IPSec protocol has been received from the peer.

Recommended Action    Verify that the ISAKMP Phase 2 configuration on peer(s) is compatible with the security appliance.

713014

Error Message    %FWSM-3-713014: Unknown Domain of Interpretation (DOI): DOI value 

Explanation    This message appears when the ISAKMP Domain of Interpretation received from the peer is unsupported.

Recommended Action    Verify that the ISAKMP DOI configuration on peer(s) is supported.

713016

Error Message    %FWSM-3-713016: Unknown identification type, Phase 1 or 2, Type ID_Type 

Explanation    This message indicates that the ID received from the peer is unknown. The ID could be an unfamiliar valid ID or an invalid or corrupted ID.

Recommended Action    Verify the configuration on the headend and peer(s).

713017

Error Message    %FWSM-3-713017: Identification type not supported, Phase 1 or 2, Type 
ID_Type 

Explanation    This message indicates that the Phase 1 or Phase 2 ID received from the peer is legal but not supported.

Recommended Action    Verify the configuration on the headend and peer(s) is supported.

713018

Error Message    %FWSM-3-713018: Unknown ID type during find of group name for certs, 
Type ID_Type 

Explanation    This message indicates that an internal software error has occurred.

Recommended Action    Copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

713020

Error Message    %FWSM-3-713020: No Group found by matching OU(s) from ID payload: 
OU_value 

Explanation    This message indicates that an internal software error has occurred.

Recommended Action    Copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support and provide the gathered information.

713022

Error Message    %FWSM-3-713022: No Group found matching peer_ID or IP_address for 
Pre-shared key peer IP_address 

Explanation    This message indicates that there was no group in the group database with the same name as the value (key ID or IP address) specified by the peer.

Recommended Action    Verify the configuration on the peer.

713024

Error Message    %FWSM-7-713024: Received local Proxy Host data in ID Payload: Address 
IP_address, Protocol protocol, Port port 

Explanation    This message indicates that the security appliance has received the remote peer's Phase 2 local proxy ID payload.

Recommended Action    None required.

713025

Error Message    %FWSM-7-713025: Received remote Proxy Host data in ID Payload: Address 
IP_address, Protocol protocol, Port port 

Explanation    This message indicates that the security appliance has received the remote peer's Phase 2 remote proxy ID payload.

Recommended Action    None required.

713026

Error Message    %FWSM-7-713026: Transmitted local Proxy Host data in ID Payload: 
Address IP_address, Protocol protocol, Port port 

Explanation    This message indicates that the security appliance has transmitted the Phase 2 local proxy ID payload.

Recommended Action    None required.

713027

Error Message    %FWSM-7-713027: Transmitted remote Proxy Host data in ID Payload: 
Address IP_address, Protocol protocol, Port port 

Explanation    This message indicates that the security appliance has transmitted the Phase 2 remote proxy ID payload.

Recommended Action    None required.

713028

Error Message    %FWSM-7-713028: Received local Proxy Range data in ID Payload: 
Addresses IP_address - IP_address, Protocol protocol, Port port 

Explanation    This message indicates that the security appliance has received the remote peer's Phase 2 local proxy ID payload and it contained an IP address range.

Recommended Action    None required.

713029

Error Message    %FWSM-7-713029: Received remote Proxy Range data in ID Payload: 
Addresses IP_address - IP_address, Protocol protocol, Port port 

Explanation    This message indicates that the security appliance has received the remote peer's Phase 2 remote proxy ID payload and it contained an IP address range.

Recommended Action    None required.

713030

Error Message    %FWSM-7-713030: Transmitted local Proxy Range data in ID Payload: 
Addresses IP_address - IP_address, Protocol protocol, Port port 

Explanation    This message indicates that the security appliance has transmitted the Phase 2 local proxy ID payload.

Recommended Action    None required.

713031

Error Message    %FWSM-7-713031: Transmitted remote Proxy Range data in ID Payload: 
Addresses IP_address - IP_address, Protocol protocol, Port port 

Explanation    This message indicates that the security appliance has transmitted the Phase 2 remote proxy ID payload.

Recommended Action    None required.

713032

Error Message    %FWSM-3-713032: Received invalid local Proxy Range IP_address - 
IP_address 

Explanation    This message appears when the local ID payload contained the range ID type and the specified low address was not less than the high address, which may indicate a configuration problem.

Recommended Action    Verify that the configuration of ISAKMP Phase 2 parameters is valid.

713033

Error Message    %FWSM-3-713033: Received invalid remote Proxy Range IP_address - 
IP_address 

Explanation    This message appears when the remote ID payload contained the range ID type and the specified low address was not less than the high address, which may indicate a configuration problem.

Recommended Action    Verify that the configuration of ISAKMP Phase 2 parameters is valid.

713034

Error Message    %FWSM-7-713034: Received local IP Proxy Subnet data in ID Payload: 
Address IP_address, Mask netmask, Protocol protocol, Port port 

Explanation    This message appears when the local IP Proxy Subnet data has been received in the Phase 2 ID Payload.

Recommended Action    None required.

713035

Error Message    %FWSM-7-713035: Received remote IP Proxy Subnet data in ID Payload: 
Address IP_address, Mask netmask, Protocol protocol, Port port 

Explanation    This message appears when the remote IP Proxy Subnet data has been received in the Phase 2 ID Payload.

Recommended Action    None required.

713036

Error Message    %FWSM-7-713036: Transmitted local IP Proxy Subnet data in ID Payload: 
Address IP_address, Mask netmask, Protocol protocol, Port port 

Explanation    This message appears when the local IP Proxy Subnet data in has been transferred in the Phase 2 ID Payload.

Recommended Action    None required.

713037

Error Message    %FWSM-7-713037: Transmitted remote IP Proxy Subnet data in ID Payload: 
Address IP_address, Mask netmask, Protocol protocol, Port port 

Explanation    This message appears when the remote IP Proxy Subnet data has been transferred in the Phase 2 ID Payload.

Recommended Action    None required.

713039

Error Message    %FWSM-7-713039: Send failure: Bytes (number), Peer: IP_address 

Explanation    This message appears when an internal software error has occurred and the ISAKMP packet could not be transmitted.

Recommended Action    Copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

713040

Error Message    %FWSM-7-713040: Could not find connection entry and cannot encrypt: 
msgid message_number 

Explanation    This message indicates that an internal software error has occurred, and a Phase 2 data structure could not be found.

Recommended Action    Copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

713041

Error Message    %FWSM-5-713041: IKE Initiator: new or rekey Phase 1 or 2, Intf 
interface_number, IKE Peer IP_address local Proxy Address IP_address, remote Proxy 
Address IP_address, Crypto map (crypto map tag)

Explanation    This message indicates that the security appliance is negotiating a tunnel as the initiator.

Recommended Action    None required.

713042

Error Message    %FWSM-3-713042: IKE Initiator unable to find policy: Intf 
interface_number, Src: source_address, Dst: dest_address 

Explanation    This message indicates that the IPSec fast path processed a packet that triggered IKE, but IKE's policy lookup failed. This error could be timing related. The ACLs that triggered IKE might have been deleted before IKE processed the initiation request. This problem will most likely correct itself.

Explanation    If the condition persists, verify the L2L configuration, paying special attention to the ACLs associated with crypto maps.

713043

Error Message    %FWSM-3-713043: Cookie/peer address IP_address session already in 
progress

Explanation    This message indicates that IKE has been triggered again while the original tunnel is in progress.

Recommended Action    None required.

713047

Error Message    %FWSM-3-713047: Unsupported Oakley group: Group Diffie-Hellman group 

Explanation    This message indicates that the security appliance does not support the Diffie-Hellman group sent by the remote peer. The Diffie-Hellman group is used during Phase 1 to generate the Diffie-Hellman keys, and during Phase 2 to generate the Diffie-Hellman keys for perfect forward secrecy (PFS).

Explanation    Verify that the configuration of the Diffie-Hellman keys on the peer is correct and that there is Diffie-Hellman support on the security appliance.

713048

Error Message    %FWSM-3-713048: Error processing payload: Payload ID: id 

Explanation    This message indicates that a packet has been received with a payload that could not be processed.

Recommended Action    If this problem persists, there might be a misconfiguration on the peer.

713049

Error Message    %FWSM-5-713049: Security negotiation complete for tunnel_type type 
(group_name) Initiator/Responder, Inbound SPI = SPI, Outbound SPI = SPI 

Explanation    This message indicates the start of an IPSec tunnel.

Recommended Action    None required.

713050

Error Message    %FWSM-5-713050: Connection terminated for peer IP_address. Reason: 
termination reason Remote Proxy IP_address, Local Proxy IP_address 

Explanation    This message indicates the termination of an IPSec tunnel.

Recommended Action    None required.

713051

Error Message    %FWSM-3-713051: Terminating connection attempt: IPSEC not permitted 
for group (group_name)

Explanation    This message indicates that the user, group, or interface policy is rejecting IPSec tunnels.

Recommended Action    To use IPSec, select the appropriate tunneling protocol in the policy.

713052

Error Message    %FWSM-7-713052: User (user) authenticated.

Explanation    This message indicates that the remote access user was authenticated.

Recommended Action    None required.

713056

Error Message    %FWSM-3-713056: Tunnel rejected: SA (SA_name) not found for group 
(group_name)!

Explanation    This message indicates that the IPSec SA was not found.

Recommended Action    If this is a remote access tunnel, check the group and user configuration and verify that a tunnel group and group policy has been configured for the user group. For externally authenticated users and groups, verify the returned authentication attributes.

713059

Error Message    %FWSM-3-713059: Tunnel Rejected: User (user) matched with group name, 
group-lock check failed.

Explanation    This message indicates that the user tried to authenticate by using the same string for both the tunnel group and username.

Recommended Action    The group and username must be different for the user to be authenticated.

713060

Error Message    %FWSM-3-713060: Tunnel Rejected: User (user) not member of group 
(group_name), group-lock check failed.

Explanation    This message indicates that the user is configured for a different group than what was sent in the IPSec negotiation.

Recommended Action    If you are using the Cisco VPN client and preshared keys, make sure that the group configured on the client is the same as the group associated with the user on the security appliance. If using digital certificates, the group is dictated either by the OU variable of the certificate or defaults to the remote access default group associated with the user.

713061

Error Message    %FWSM-3-713061: Tunnel rejected: Crypto Map Policy not found for 
Src:source_address, Dst: dest_address!

Explanation    This message indicates that the security appliance could notifying security policy information for the private networks or hosts indicated in the message. These networks or hosts were sent by the initiator and do not match any crypto ACLs at the security appliance. This is most likely a misconfiguration.

Recommended Action    Check the protected network configuration in the crypto ACLs on both sides and make sure that the local network on the initiator is the remote network on the responder and vice-versa. Pay special attention to wildcard masks, host addresses, network addresses, and so on. Non-Cisco implementations may have the private addresses labeled as proxy addresses or red networks.

713062

Error Message    %FWSM-3-713062: IKE Peer address same as our interface address 
IP_address 

Explanation    The IP address configured as the IKE peer is the same as the IP address configured on one of the security appliance IP interfaces.

Recommended Action    Check the L2L configuration and configuration of IP interface(s).

713063

Error Message    %FWSM-3-713063: IKE Peer address not configured for destination 
IP_address 

Explanation    This message appears when the IKE peer address is not configured for an L2L tunnel.

Recommended Action    Check the L2L configuration.

713065

Error Message    %FWSM-3-713065: IKE Remote Peer did not negotiate the following: 
proposal attribute 

Explanation    This message indicates that an internal software error has occurred.

Recommended Action    Copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

713066

Error Message    %FWSM-7-713066: IKE Remote Peer configured for SA: SA_name 

Explanation    This message indicates the peer crypto policy settings.

Recommended Action    None required.

713068

Error Message    %FWSM-5-713068: Received non-routine Notify message: notify_type 
(notify_value)

Explanation    This message indicates that notification messages that cause this event are not explicitly handled in the notify processing code.

Recommended Action    Examine the specific reason information to determine the action to take. Many notification messages indicate a configuration mismatch between the IKE peers.

713072

Error Message    %FWSM-3-713072: Password for user (user) too long, truncating to number 
characters

Explanation    This message indicates that the user password is too long.

Recommended Action    Correct password lengths on the authentication server.

713073

Error Message    %FWSM-5-713073: Responder forcing change of Phase 1/Phase 2 rekeying 
duration from larger_value to smaller_value seconds

Explanation    Rekeying durations are always set to the lower of the values proposed by IKE peers. This message indicates that the initiator value is the lower one.

Recommended Action    None required.

713074

Error Message    %FWSM-5-713074: Responder forcing change of IPSec rekeying duration 
from larger_value to smaller_value Kbs

Explanation    Rekeying durations are always set to the lower of the values proposed by IKE peers. This message indicates that the initiator value is the lower one.

Recommended Action    None required.

713075

Error Message    %FWSM-5-713075: Overriding Initiator's IPSec rekeying duration from 
larger_value to smaller_value seconds

Explanation    Rekeying durations are always set to the lower of the values proposed by IKE peers. This message indicates that the responder value is the lower one.

Recommended Action    None required.

713076

Error Message    %FWSM-5-713076: Overriding Initiator's IPSec rekeying duration from 
larger_value to smaller_value Kbs

Explanation    Rekeying durations are always set to the lower of the values proposed by IKE peers. This message indicates that the responder value is the lower one.

Recommended Action    None required.

713078

Error Message    %FWSM-2-713078: Temp buffer for building mode config attributes 
exceeded: bufsize available_size, used value 

Explanation    This message indicates that an internal software error has occurred while processing modecfg attributes.

Recommended Action    Disable any unnecessary tunnel group attributes or shorten any text messages that are excessively long. If the problem persists, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information along with your configuration file.

713081

Error Message    %FWSM-3-713081: Unsupported certificate encoding type encoding_type 

Explanation    This message indicates that one of the loaded certificates is unreadable, and could be an unsupported encoding scheme.

Recommended Action    Check the configuration of digital certificates and trustpoints.

713082

Error Message    %FWSM-3-713082: Failed to retrieve identity certificate

Explanation    This message indicates that the security appliance could not find the identity certificate for this tunnel.

Recommended Action    Check the configuration of digital certificates and trustpoints.

713083

Error Message    %FWSM-3-713083: Invalid certificate handle

Explanation    This message indicates that the identity certificate for this tunnel was incorrect.

Recommended Action    Check the configuration of digital certificates and trustpoints.

713084

Error Message    %FWSM-3-713084: Received invalid phase 1 port value (port) in ID 
payload

Explanation    This message indicates that the port value received in the IKE phase 1 ID payload was incorrect. Acceptable values are 0 or 500 (ISAKMP or IKE).

Recommended Action    This may indicate a peer that does not conform to the IKE standards or a network problem that results in corrupted packets.

713085

Error Message    %FWSM-3-713085: Received invalid phase 1 protocol (protocol) in ID 
payload

Explanation    This message indicates that the protocol value received in the IKE phase 1 ID payload was incorrect. Acceptable values are 0 or 17 (UDP).

Recommended Action    This may indicate a peer that does not conform to the IKE standards or a network problem that results in corrupted packets.

713086

Error Message    %FWSM-3-713086: Received unexpected Certificate payload Possible 
invalid Auth Method (Auth method (auth numerical value))

Explanation    This message appears when a cert payload was received, but our internal certificate handle indicates that we do not have an identity certificate. This could mean that the certificate handle was not obtained through a normal enrollment method. One likely reason this can happen is that the authentication method is not RSA or DSS signatures, although the IKE SA negotiation should fail if each side is misconfigured.

Recommended Action    Check the trustpoint and ISAKMP configuration settings on the security appliance and peer.

713088

Error Message    %FWSM-3-713088: Set Cert filehandle failure: no IPSec SA in group 
group_name 

Explanation    This message indicates that the tunnel group could not be found based on the digital certificate information.

Recommended Action    Verify that the tunnel group is set up appropriately to handle the peer's certificate information.

713092

Error Message    %FWSM-5-713092: Failure during phase 1 rekeying attempt due to 
collision

Explanation    This message indicates that an internal software error has occurred.

Recommended Action    This is often a benign event, but if it has serious repercussions. Copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

713094

Error Message    %FWSM-7-713094: Cert validation failure: handle invalid for 
Main/Aggressive Mode Initiator/Responder!

Explanation    This message indicates that an internal software error has occurred.

Recommended Action    You may have to reenroll the trustpoint. If the problem persists, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

713098

Error Message    %FWSM-3-713098: Aborting: No identity cert specified in IPSec SA 
(SA_name)!

Explanation    This message appears when an attempt is made to establish a certificate-based IKE session, but no identity certificate has been specified in the crypto policy.

Recommended Action    Specify the identity certificate or trustpoint that you want to transmit to peers.

713099

Error Message    %FWSM-7-713099: Tunnel Rejected: Received NONCE length number is out 
of range!

Explanation    This message indicates that an internal software error has occurred.

Recommended Action    Copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

713102

Error Message    %FWSM-3-713102: Phase 1 ID Data length number too long - reject tunnel!

Explanation    This message indicates that IKE has received an ID payload containing an Identification Data variable of size 2K or greater.

Recommended Action    None required.

713103

Error Message    %FWSM-7-713103: Invalid (NULL) secret key detected while computing 
hash

Explanation    This message indicates that an internal software error has occurred.

Recommended Action    Copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

713104

Error Message    %FWSM-7-713104: Attempt to get Phase 1 ID data failed while hash computation 

Explanation    This message indicates that an internal software error has occurred.

Recommended Action    Copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

713105

Error Message    %FWSM-3-713105: Zero length data in ID payload received during phase 
1 or 2 processing

Explanation    This message indicates that a peer sent an ID payload without including any ID data, which is invalid.

Recommended Action    Check the configuration of the peer.

713107

Error Message    %FWSM-3-713107: IP_Address request attempt failed!

Explanation    This message indicates that an internal software error has occurred.

Recommended Action    Copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

713109

Error Message    %FWSM-3-713109: Unable to process the received peer certificate

Explanation    This message indicates that the security appliance was unable to process the certificate received from the remote peer, which can occur if the certificate data was malformed or if the data in the certificate could not be stored by the appliance. One such possibility is if the public key size is larger than 4096 bits.

Recommended Action    Try to reestablish the connection using a different certificate on the remote peer.

713112

Error Message    %FWSM-3-713112: Failed to process CONNECTED notify (SPI SPI_value)!

Explanation    This message indicates that the security appliance was unable to successfully process the notify payload that contained notify type CONNECTED, which could occur if the IKE phase 2 structure could not be found using the SPI to locate it, or the commit bit had not been set in the received ISAKMP header. The latter case could indicate a non-conforming IKE peer.

Recommended Action    If the problem persists, check the peer configuration and/or disable commit bit processing.

713113

Error Message    %FWSM-7-713113: Deleting IKE SA with associated IPSec connection 
entries. IKE peer: IP_address, SA address: internal_SA_address, tunnel count: 
count 

Explanation    This message indicates that an IKE SA is being deleted with a non-zero tunnel count. This means that either the IKE SA tunnel count has lost synchronization with the associated connection entries or the associated connection entries' cookie variables have lost synchronization with the cookie variables of the IKE SA to which the connection entry points. If this occurs, the IKE SA and its associated data structures will not be freed, so that the entries that may point to it will not have a stale pointer.

Recommended Action    None required. Error recovery is built-in.

713114

Error Message    %FWSM-7-713114: Connection entry (conn entry internal address) points 
to IKE SA (SA_internal_address) for peer IP_address, but cookies don't match

Explanation    This message indicates that an internal software error has occurred.

Recommended Action    Copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

713115

Error Message    %FWSM-5-713115: Client rejected NAT enabled IPSec request, falling 
back to standard IPSec

Explanation    This message indicates the client rejected an attempt by the security appliance to use IPSec over UDP. IPSec over UDP is used to allow multiple clients to establish simultaneous tunnels to the security appliance through a NAT device. The client may have rejected the request either because it does not support this feature or because it is configured to not use it.

Recommended Action    Verify the configuration on the headend and peer.

713116

Error Message    %FWSM-3-713116: Terminating connection attempt: L2TP-over-IPSEC 
attempted by group (group_name) but L2TP disabled

Explanation    This message indicates that the user or group entity has attempted an L2TP-over-IPSec connection, but the L2TP protocol is not enabled for this security appliance.

Recommended Action    Verify the L2TP configuration.

713117

Error Message    %FWSM-7-713117: Received Invalid SPI notify (SPI SPI_Value)!

Explanation    This message indicates the IPSec SA identified by the SPI value is no longer active on the remote peer. This might indicate that the remote peer has rebooted or been reset.

Recommended Action    This problem should correct itself once DPDs recognize that the peer no longer has the appropriate SAs established. If DPD is not enabled, this may require a manual reestablishment of the affected tunnel.

713118

Error Message    %FWSM-3-713118: Detected invalid Diffie-Helmann group_descriptor 
group_number, in IKE area 

Explanation    This message indicates that the group_descriptor variable contains an unsupported value. Currently only groups 1, 2, 5, and 7 are supported. In the case of a centry, the group_descriptor variable may also be set to 0, to indicate that Perfect Forward Secrecy (PFS) is disabled.

Recommended Action    Check the peer Diffie-Hellman configuration.

713119

Error Message    %FWSM-3-713119: PHASE 1 COMPLETED

Explanation    This message appears when IKE Phase 1 has completed successfully.

Recommended Action    None required.

713120

Error Message    %FWSM-5-713120: PHASE 2 COMPLETED (msgid=msg_id)

Explanation    This message appears when IKE Phase 2 has completed successfully.

Recommended Action    None required.

713121

Error Message    %FWSM-7-713121: Keep-alive type for this connection: keepalive_type 

Explanation    This message indicates the type of keep-alive mechanism being used for this tunnel.

Recommended Action    None required.

713122

Error Message    %FWSM-3-713122: Keep-alives configured keepalive_type but peer 
IP_address support keep-alives (type = keepalive_type)

Explanation    This message indicates that keep-alives are configured on or off for this device, but the IKE peer does or does not support keep-alives.

Recommended Action    If this configuration is intentional, none required. If it is not intentional, change the keep-alive configuration on both devices.

713123

Error Message    %FWSM-3-713123: IKE lost contact with remote peer, deleting connection 
(keepalive type: keepalive_type)

Explanation    This message indicates that the remote IKE peer did not respond to keep-alives within the expected window of time, so the connection to the IKE peer was terminated. The message includes the keep-alive mechanism used.

Recommended Action    None required.

713124

Error Message    %FWSM-3-713124: Received DPD sequence number rcv_sequence_# in DPD Action, description expected seq # 

Explanation    This message indicates that the remote IKE peer sent a DPD with a sequence number that did not match the expected sequence number. The packet is discarded.

Recommended Action    This might indicate a packet loss problem with the network.

713127

Error Message    %FWSM-3-713127: Xauth required but selected Proposal does not support 
xauth, Check priorities of ike xauth proposals in ike proposal list

Explanation    This message appears when the peer wants to perform an xauth, but the security appliance did not choose the xauth IKE proposal.

Recommended Action    Check the priorities of the IKE xauth proposals in IKE proposal list.

713128

Error Message    %FWSM-3-713128: Connection attempt to VCPIP redirected to VCA peer 
IP_address via load balancing

Explanation    This message appears when a connection attempt has been made to the VCPIP and has been redirected to a less loaded peer using load balancing.

Recommended Action    None required.

713129

Error Message    %FWSM-3-713129: Received unexpected Transaction Exchange payload type: 
payload_id 

Explanation    This message indicates that an unexpected payload has been received during xauth or modecfg. This may indicate that the two peers are out of synchronization, that the xauth or modecfg versions do not match, or that the remote peer is not complying to the appropriate RFCs.

Recommended Action    Verify the configuration between peers.

713130

Error Message    %FWSM-5-713130: Received unsupported transaction mode attribute: 
attribute id 

Explanation    This message indicates that the device received a request for a valid transaction mode attribute (xauth or modecfg) that is currently not supported. This condition is generally benign.

Recommended Action    None required.

713131

Error Message    %FWSM-5-713131: Received unknown transaction mode attribute: 
attribute_id 

Explanation    This message indicates that the security appliance has received a request for a transaction mode attribute (xauth or modecfg) that is outside the range of known attributes. The attribute may be valid but only supported in later versions of the configuration mode, or the peer may be sending an illegal or proprietary value. This should not cause connectivity problems but may affect the functionality of the peer.

Recommended Action    None required.

713132

Error Message    %FWSM-3-713132: Cannot obtain an IP_address for remote peer

Explanation    This message indicates that a request for an IP address for a remote access client from the internal utility that provides these addresses could not be satisfied.

Recommended Action    Check the configuration of IP address assignment methods.

713133

Error Message    %FWSM-3-713133: Mismatch: Overriding phase 2 DH Group(DH group DH group_id) with phase 1 group(DH group DH group_number 

Explanation    The configured Phase 2 PFS Group differs from the DH group that was negotiated for phase 1.

Recommended Action    None required.

713134

Error Message    %FWSM-3-713134: Mismatch: P1 Authentication algorithm in the crypto 
map entry different from negotiated algorithm for the L2L connection

Explanation    This message appears when the configured LAN-to-LAN proposal is different from the one accepted for the LAN-to-LAN connection. Depending on which side is the initiator, different proposals will be used.

Recommended Action    None required.

713135

Error Message    %FWSM-5-713135: message received, redirecting tunnel to IP_address.

Explanation    This message indicates that the tunnel is being redirected because of load balancing on the remote security appliance. This message will be seen when a REDIRECT_CONNECTION notify packet is received.

Recommended Action    None required.

713136

Error Message    %FWSM-5-713136: IKE session establishment timed out [IKE_state_name], 
aborting!

Explanation    This message occurs when the reaper has detected an SA stuck in a non-active state. The reaper will try to remove the hung SA.

Recommended Action    None required.

713137

Error Message    %FWSM-5-713137: Reaper overriding refCnt [ref_count] and tunnelCnt 
[tunnel_count] -- deleting SA!

Explanation    This message indicates that an internal software error has occurred.

Recommended Action    Copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

713138

Error Message    %FWSM-3-713138: Group group_name not found and BASE GROUP default 
preshared key not configured

Explanation    This message appears when there is no group in the group database with the same name as the IP address of the peer. In Main Mode, the security appliance will fall back and try to use the default preshared key configured in one of the default groups. The default preshared key is not configured.

Recommended Action    Verify the configuration of the preshared keys.

713139

Error Message    %FWSM-5-713139: group_name not found, using BASE GROUP default 
preshared key

Explanation    There was no tunnel group in the group database with the same name as the IP address of the peer. In Main Mode, the security appliance will fall back and use the default preshared key configured in the default group.

Recommended Action    None required.

713140

Error Message    %FWSM-3-713140: Split Tunneling Policy requires network list but none 
configured

Explanation    This message appears when split tunneling policy is set to either split tunneling or allow local LAN access, a split tunneling ACL must be defined to represent the information required by the VPN client.

Recommended Action    Check the configuration of the ACLs.

713141

Error Message    %FWSM-3-713141: Client-reported firewall does not match configured 
firewall: action tunnel. Received -- Vendor: vendor(id), Product product(id), 
Caps: capability_value. Expected -- Vendor: vendor(id), Product: product(id), 
Caps: capability_value 

Explanation    This message indicates that the security appliance installed on the client does not match the configured required security appliance. This message lists the actual and expected values, and whether the tunnel is terminated or allowed.

Recommended Action    You may need to install a different personal security appliance on the client or a change of configuration on the security appliance.

713142

Error Message    %FWSM-3-713142: Client did not report firewall in use, but there is a 
configured firewall: action tunnel. Expected -- Vendor: vendor(id), Product 
product(id), Caps: capability_value 

Explanation    This message appears when the client did not report a security appliance in use with modecfg, but one is required. The event lists the expected values, and whether the tunnel is terminated or allowed. The number following the product string is a bitmask of all the allowed products.

Recommended Action    You may need to install a different personal security appliance on the client or a change of configuration on the security appliance.

713143

Error Message    %FWSM-7-713143: Processing firewall record. Vendor: vendor(id), 
Product: product(id), Caps: capability_value, Version Number: version_number, 
Version String: version_text 

Explanation    This message provides debugging information about the security appliance installed on the client.

Recommended Action    None required.

713144

Error Message    %FWSM-5-713144: Ignoring received malformed firewall record; reason - 
error_reason TLV type attribute_value correction 

Explanation    This message indicates that bad security appliance information was received from the client.

Recommended Action    Check the personal security appliance configuration on the client and the security appliance.

713145

Error Message    %FWSM-6-713145: Detected Hardware Client in network extension mode, 
adding static route for address: IP_address, mask: netmask 

Explanation    This message indicates that a tunnel with a hardware client in network extension mode has been negotiated and a static route is being added for the private network behind the hardware client. This enables the security appliance to make the remote network known to all the routers on the private side of the headend.

Recommended Action    None required.

713146

Error Message    %FWSM-3-713146: Could not add route for Hardware Client in network 
extension mode, address: IP_address, mask: netmask 

Explanation    This message indicates that an internal software error has occurred. A tunnel with a hardware client in network extension mode has been negotiated and an attempt to add the static route for the private network behind the hardware client failed. This could indicate that the routing table is full or a possible addressing error.

Recommended Action    Copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

713147

Error Message    %FWSM-6-713147: Terminating tunnel to Hardware Client in network 
extension mode, deleting static route for address: IP_address, mask: netmask 

Explanation    This message indicates that a tunnel to a hardware client in network extension mode is being removed and the static route for the private network is being deleted behind the hardware client.

Recommended Action    None required.

713148

Error Message    %FWSM-5-713148: Terminating tunnel to Hardware Client in network 
extension mode, unable to delete static route for address: IP_address, mask: 
netmask 

Explanation    This message indicates that while a tunnel to a hardware client in network extension mode was being removed, a route to the private network behind the hardware client could not be deleted.

Recommended Action    This might indicate an addressing or software problem. Check the routing table to ensure that the route is not there. If it is, it may have to be removed manually, but only if the tunnel to the hardware client has been completely removed.

713149

Error Message    %FWSM-3-713149: Hardware client security attribute attribute_name was 
enabled but not requested.

Explanation    This message indicates that the headend security appliance has the specified hardware client security attribute enabled, but the attribute was not requested by the VPN 3002 hardware client.

Recommended Action    Check the configuration on the hardware client.

713152

Error Message    %FWSM-3-713152: Unable to obtain any rules from filter ACL_tag to send 
to client for CPP, terminating connection.

Explanation    This message indicates that the client is required to use CPP to provision its security appliance, but the headend device was unable to obtain any ACLs to send to the client. This is probably because of a misconfiguration.

Recommended Action    Check the ACLs specified for CPP in the client's group policy.

713154

Error Message    %FWSM-4-713154: DNS lookup for peer_description Server [server_name] 
failed!

Explanation    This message appears when the DNS lookup for the specified server has not been resolved.

Recommended Action    Check the DNS server configuration on the security appliance. Also check the DNS server to ensure that it is operational and has the hostname to IP address mapping.

713155

Error Message    %FWSM-5-713155: DNS lookup for Primary VPN Server [server_name] 
successfully resolved after a previous failure. Resetting any Backup Server init.

Explanation    A previous DNS lookup failure for the primary server might have caused the system to initialize a backup peer. This message indicates that a later DNS lookup on the primary server finally succeeded and is resetting any backup server initializations. A tunnel initiated after this point will be aimed at the primary server.

Recommended Action    None required.

713156

Error Message    %FWSM-5-713156: Initializing Backup Server [server_name or IP_address]

Explanation    This message indicates that the client is failing over to a backup server or a failed DNS lookup for the primary server caused the system to initialize a backup server. A tunnel initiated after this point will be aimed at the specified backup server.

Recommended Action    None required.

713157

Error Message    %FWSM-4-713157: Timed out on initial contact to server [server_name or IP_address] Tunnel could not be established.

Explanation    This message indicates that the client tried to initiate a tunnel by sending IKE MSG1, but did not receive a response from the security appliance on the other end. If backup servers are available, the client will attempt to connect to one of them.

Recommended Action    Verify connectivity to the headend security appliance.

713158

Error Message    %FWSM-5-713158: Client rejected NAT enabled IPSec Over UDP request, 
falling back to IPSec Over TCP

Explanation    This message indicates that the client is configured to use IPSec over TCP. The client rejected the attempt by the security appliance to use IPSec over UDP.

Recommended Action    If TCP is desired, none required. Otherwise, check the client configuration.

713159

Error Message    %FWSM-3-713159: TCP Connection to Firewall Server has been lost, 
restricted tunnels are now allowed full network access

Explanation    This message indicates that the TCP connection to the security appliance server was lost for some reason. Possible reasons are that the server has rebooted, has a network problem, has an SSL mismatch, and so on.

Recommended Action    If the server connection was lost after the initial connection was made, the server and network connections must be checked. If the initial connection is lost immediately, this could indicate an SSL authentication problem.

713160

Error Message    %FWSM-7-713160: Remote user (session Id - id) has been granted access 
by the Firewall Server

Explanation    This message indicates normal authentication of the remote user to the security appliance server.

Recommended Action    None required.

713161

Error Message    %FWSM-3-713161: Remote user (session Id - id) network access has been 
restricted by the Firewall Server

Explanation    The security appliance server has sent the security appliance a message indicating that this user must be restricted. There are several reasons for this, including security appliance software upgrades, changes in permissions, and so on. The security appliance server will transition the user back into full access mode as soon as the operation has been completed.

Recommended Action    None required unless the user is never transitioned back into full access state. If this does not happen, see the security appliance server for more information on the operation that is being performed and the state of the security appliance software running on the remote machine.

713162

Error Message    %FWSM-3-713162: Remote user (session Id - id) has been rejected by the 
Firewall Server

Explanation    This message indicates that the security appliance server has rejected this user.

Recommended Action    Check the policy information on the security appliance server to make sure that the user is configured correctly.

713163

Error Message    %FWSM-3-713163: Remote user (session Id - id) has been terminated by 
the Firewall Server

Explanation    This message indicates that the security appliance server has terminated this user session. This can happen if the integrity agent stops running on the client machine or if the security policy is modified by the remote user in any way.

Recommended Action    Verify that the security appliance software on the client machine is still running and that the policy is correct.

713164

Error Message    %FWSM-7-713164: The Firewall Server has requested a list of active user 
sessions

Explanation    This message indicates that the security appliance server will request the session information if it detects that it has stale data or if it loses the session data (as in a reboot).

Recommended Action    None required.

713165

Error Message    %FWSM-3-713165: Client IKE Auth mode differs from the group's 
configured Auth mode

Explanation    This message indicates that the client negotiated with preshared keys while its tunnel group points to a policy that is configured to use digital certificates.

Recommended Action    Check the client configuration.

713166

Error Message    %FWSM-3-713166: Headend security gateway has failed our user 
authentication attempt - check configured username and password

Explanation    This message indicates that the hardware client has failed extended authentication. This is most likely a username or password problem or authentication server issue.

Recommended Action    Verify that the configured username and password values on each side match. Also verify that the authentication server at the headend is operational.

713167

Error Message    %FWSM-3-713167: Remote peer has failed user authentication - check 
configured username and password

Explanation    This message indicates that the remote user has failed to extend authentication. This is most likely a username or password problem or authentication server issue.

Recommended Action    Verify that the configured username and password values on each side match. Also verify that the authentication server being used to authenticate the remote user is operational.

713168

Error Message    %FWSM-3-713168: Re-auth enabled, but tunnel must be authenticated 
interactively!

Explanation    This message indicates that reauthentication on rekey has been enabled, but the tunnel authentication requires manual intervention.

Recommended Action    If manual intervention is desired, none required. Otherwise, check the interactive authentication configuration.

713169

Error Message    %FWSM-7-713169: IKE Received delete for rekeyed SA IKE peer: 
IP_address, SA address: internal_SA_address, tunnelCnt: tunnel_count 

Explanation    This message indicates that IKE has received a delete message from the remote peer to delete its old IKE SA after a rekey has completed.

Recommended Action    None required.

713170

Error Message    %FWSM-7-713170: IKE Received delete for rekeyed centry IKE peer: IP_address, centry address: internal_address, msgid: id 

Explanation    IKE receives a delete message from the remote peer to delete its old centry after Phase 2 rekeying is completed.

Recommended Action    None required.

713171

Error Message    %FWSM-7-713171: NAT-Traversal sending NAT-Original-Address payload 

Explanation    UDP-Encapsulated-Transport was either proposed or selected during Phase 2. Send this payload for NAT-Traversal in this case.

Recommended Action    None required.

713172

Error Message    %FWSM-6-713172: Automatic NAT Detection Status: Remote end is|is not behind a NAT device This end is|is_not behind a NAT device 

Explanation    This message results from NAT auto-detection by NAT-Traversal.

Recommended Action    None required.

713174

Error Message    %FWSM-3-713174: Hardware Client connection rejected! Network Extension Mode is not allowed for this group! 

Explanation    A hardware client is attempting to tunnel in using the network extension mode, but this mode is not allowed.

Recommended Action    Verify the configuration of the network extension mode and PAT mode.

713176

Error Message    %FWSM-2-713176: Device_type memory resources are critical, IKE key acquire message on interface interface_number, for Peer IP_address ignored 

Explanation    This event indicates that the appliance is processing data intended to trigger an IPSec tunnel to the indicated peer. Because memory resources are at a critical state, it is not initiating any more tunnels. The data packet has been ignored and dropped.

Recommended Action    If this condition persists, verify that the appliance is efficiently configured. This event could indicate that an appliance with increased memory is required for this application.

713177

Error Message    %FWSM-6-713177: Received remote Proxy Host FQDN in ID Payload: Host Name: host_name Address IP_address, Protocol protocol, Port port 

Explanation    A Phase 2 ID payload containing an FQDN has been received from the peer.

Recommended Action    None required.

713178

Error Message    %FWSM-5-713178: IKE Initiator received a packet from its peer without a Responder cookie 

Explanation    An internal software error has occurred.

Recommended Action    Copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

713179

Error Message    %FWSM-5-713179: IKE AM Initiator received a packet from its peer without a payload_type payload 

Explanation    An internal software error has occurred.

Recommended Action    Copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

713182

Error Message    %FWSM-3-713182: IKE could not recognize the version of the client! IPSec Fragmentation Policy will be ignored for this connection! 

Explanation    An internal software error has occurred.

Recommended Action    Copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

713184

Error Message    %FWSM-6-713184: Client Type: Client_type Client Application Version: Application_version_string 

Explanation    This event indicates the client operating system and application version. If the information is not available, N/A will be indicated.

Recommended Action    None required.

713185

Error Message    %FWSM-3-713185: Error: Username too long - connection aborted 

Explanation    The client returned an invalid length username and the tunnel was torn down.

Recommended Action    Check the username and make changes, if necessary.

713186

Error Message    %FWSM-3-713186: Invalid secondary domain name list received from the authentication server. List Received: list_text Character index (value) is illegal 

Explanation    An invalid secondary domain name list was received from an external RADIUS authentication server. When split tunnelling is used, this list identifies the domains that the client should resolve through the tunnel.

Recommended Action    Correct the specification of the Secondary-Domain-Name-List attribute (vendor-specific attribute 29) on the RADIUS server. The list must be specified as a comma- delimited list of domain names. Domain names may not include any characters other than alphanumerical, the hyphen, underscore, and period.

713187

Error Message    %FWSM-7-713187: Tunnel Rejected: IKE peer does not match remote peer as defined in L2L policy IKE peer address: IP_address, Remote peer address: IP_address 

Explanation    The IKE peer that is attempting to bring up this tunnel is not the one that is configured in the ISAKMP configuration that is bound to the received remote subnet(s).

Recommended Action    Verify L2L settings are correct on the headend and peer.

713189

Error Message    %FWSM-3-713189: Attempted to assign network or broadcast IP_address, removing (IP_address) from pool. 

Explanation    The IP address from the pool is either the network or broadcast address for this subnet. This address will be marked as unavailable.

Recommended Action    This error is generally benign, but the IP address pool configuration should be checked.

713190

Error Message    %FWSM-7-713190: Got bad refCnt (ref_count_value) assigning IP_address (IP_address) 

Explanation    The reference counter for this SA is invalid.

Recommended Action    This issue should correct itself.

713193

Error Message    %FWSM-3-713193: Received packet with missing payload, Expected payload: payload_id 

Explanation    The appliance received an encrypted or unencrypted packet of the specified exchange type that had one or more missing payloads. This usually indicates a problem on the peer.

Recommended Action    Verify that the peer is sending valid IKE messages.

713194

Error Message    %FWSM-3-713194: IKE|IPSec Delete With Reason message: termination_reason 

Explanation    Indicates that a delete message with a termination reason code was received.

Recommended Action    None required.

713195

Error Message    %FWSM-3-713195: Tunnel rejected: Originate-Only: Cannot accept incoming tunnel yet! 

Explanation    The Originate-Only peer can accept incoming connections only after it brings up the first P2 tunnel. At that point, data from either direction can initiate additional Phase 2 tunnels.

Recommended Action    If a different behavior is desired, the originate-only configuration needs to be revisited.

713196

Error Message    %FWSM-5-713196: Remote L2L Peer IP_address initiated a tunnel with same outer and inner addresses.Peer could be Originate Only - Possible misconfiguration! 

Explanation    The remote L2L peer has initiated a Public-Public tunnel. It expects an answer-only peer at the other end and does not find one. There may be a possible misconfiguration.

Recommended Action    Check the L2L configuration on both sides.

713197

Error Message    %FWSM-5-713197: The configured Confidence Interval of number seconds is invalid for this tunnel_type connection. Enforcing the second default. 

Explanation    The configured Confidence Interval in the group is outside of the valid range.

Recommended Action    Check the Confidence Setting in the group to make sure it is within the valid range.

713198

Error Message    %FWSM-3-713198: User Authorization failed: user User authorization failed. 

Explanation    This event will contain a reason string.

Recommended Action    Check the group configuration and client authorization.

713199

Error Message    %FWSM-5-713199: Reaper corrected an SA that has not decremented the concurrent IKE negotiations counter (counter_value)! 

Explanation    The reaper corrected an internal software error.

Recommended Action    If condition persists, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

713203

Error Message    %FWSM-3-713203: IKE Receiver: Error reading from socket.

Explanation    This message indicates that there was an error while reading a received IKE packet. This is generally an internal error and might indicate a software problem.

Recommended Action    This problem is usually benign and the system will correct itself. If this problem persists, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information

713204

Error Message    %FWSM-7-713204: Adding static route for client address: IP_address 

Explanation    This message indicates that a route to the peer-assigned address or to the networks protected by a hardware client was added to the routing table.

Recommended Action    None required.

713205

Error Message    %FWSM-3-713205: Could not add static route for client address: 
IP_address 

Explanation    This message indicates a failed attempt to add a route to the client-assigned address or to the networks protected by a hardware client. This could indicate duplicate routes in the routing table or a corrupted network address. The duplicate routes could be caused by routes not cleaned up properly or by having multiple clients sharing networks or addresses.

Recommended Action    Check the IP local pool configuration as well as any other IP address-assigning mechanism being used (for example: DHCP or RADIUS). Ensure that routes are being cleared from the routing table. Also check the configuration of networks and/or addresses on the peer system.

713206

Error Message    %FWSM-3-713206: Tunnel Rejected: Conflicting protocols specified by 
tunnel-group and group-policy

Explanation    This message appears when a tunnel is dropped because the allowed tunnel specified in the group policy is different than the allowed tunnel in the tunnel-group configuration.

Recommended Action    Check the tunnel-group and group-policy configuration.

713208

Error Message    %FWSM-3-713208: Cannot create dynamic rule for Backup L2L entry rule 
rule_id 

Explanation    This message indicates that there was a failure in creating the ACLs that trigger IKE and allow IPSec data to be processed properly. The failure was specific to the backup L2L configuration. This may indicate a configuration error, a capacity error, or an internal software error.

Recommended Action    If the device is running at the maximum number of security appliance connections and the maximum number of VPN tunnels, there may be a memory issue. If not, check the backup L2L and crypto map configuration, specifically the ACLs associated with the crypto maps.

713209

Error Message    %FWSM-3-713209: Cannot delete dynamic rule for Backup L2L entry rule id 

Explanation    This message indicates that there was a failure in deleting the ACLs that trigger IKE and allow IPSec data to be processed properly. The failure was specific to the backup L2L configuration. This may indicate an internal software error.

Recommended Action    Copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

713210

Error Message    %FWSM-3-713210: Cannot create dynamic map for Backup L2L entry rule_id 

Explanation    This message indicates that there was a failure in creating a run-time instance of the dynamic crypto map associated with the backup L2L configuration. This may indicate a configuration error, a capacity error, or an internal software error.

Recommended Action    If the device is running at the maximum number of security appliance connections and the maximum number of VPN tunnels, there may be a memory issue. If not, check the backup L2L and crypto map configuration, specifically the ACLs associated with the crypto maps.

713211

Error Message    %FWSM-6-713211: Adding static route for L2L peer coming in on a dynamic 
map. address: IP_address, mask: netmask 

Explanation    This message indicates that the security appliance is adding a route for the private address or networks of the peer. In this case, the peer is either a client or an L2L peer with an unknown address. Both of these cases use dynamic crypto maps to allow the tunnel.

Recommended Action    None required.

713212

Error Message    %FWSM-3-713212: Could not add route for L2L peer coming in on a dynamic 
map. address: IP_address, mask: netmask 

Explanation    This message appears when the security appliance failed while attempting to add a route for the private address or networks of the peer. In this case, the peer is either a client or an L2L peer with an unknown address. Both of these cases use dynamic crypto maps to allow the tunnel. This could indicate duplicate routes, a full routing table, or a failure of the security appliance to remove previously used routes.

Recommended Action    Check the routing table to make sure there is room for additional routes and that obsolete routes are not present. If the table is full or contains obsolete routes, remove the routes and try again. If the problem persists, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

713213

Error Message    %FWSM-6-713213: Deleting static route for L2L peer that came in on a 
dynamic map. address: IP_address, mask: netmask 

Explanation    This message indicates that the security appliance is deleting a route for the private address or networks of the peer. In this case, the peer is either a client or a L2L peer with an unknown address. Both of these cases use dynamic crypto maps to allow the tunnel.

Recommended Action    None required.

713214

Error Message    %FWSM-3-713214: Could not delete route for L2L peer that came in on a 
dynamic map. address: IP_address, mask: netmask 

Explanation    This message indicates that the security appliance experienced a failure while deleting a route for the private address or networks of the peer. In this case, the peer is either a client or an L2L peer with an unknown address. Both of these cases use dynamic crypto maps to allow the tunnel. This event may indicate that the route has already been deleted or that an internal software error has occurred.

Recommended Action    If the route has already been deleted, the condition is benign and the device will function normally. If the problem persists or can be linked to routing issues over VPN tunnels, verify the routing and addressing portions of the VPN L2L configuration. Verify the reverse route injection and the ACLs associated with the appropriate crypto map. If the problem persists, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

713215

Error Message    %FWSM-6-713215: No match against Client Type and Version rules. Client: 
type version is/is not allowed by default

Explanation    This message indicates that the client type and the version of a client did not match any of the rules configured on the security appliance. The default action is displayed.

Recommended Action    Determine what the default action and deployment requirements are and make the appropriate changes.

713216

Error Message    %FWSM-5-713216: Rule: action Client type: version Client: type version 
is/is not allowed

Explanation    This message indicates that the client type and the version of a client has matched one of the rules. The result of the match and the rule are displayed.

Recommended Action    Determine what the deployment requirements are and make the appropriate changes.

713217

Error Message    %FWSM-3-713217: Skipping unrecognized rule: action: action client 
type: client_type client version: client_version 

Explanation    This message indicates that there is a malformed client type and version rule. The required format is action client type | client version action; either "permit" or "deny" client type and client version are displayed under Session Management. Only one wildcard per parameter (*) is supported.

Recommended Action    Correct the rule.

713218

Error Message    %FWSM-3-713218: Tunnel Rejected: Client Type or Version not allowed.

Explanation    This message indicates that the client was rejected access according to the configured rules.

Recommended Action    None required.

713219

Error Message    %FWSM-6-713219: Queueing KEY-ACQUIRE messages to be processed when P1 
SA is complete.

Explanation    This message indicates that Phase 2 messages are being enqueued after Phase 1 completes.

Recommended Action    None required.

713220

Error Message    %FWSM-6-713220: De-queueing KEY-ACQUIRE messages that were left 
pending.

Explanation    This message indicates that queued Phase 2 messages are now being processed.

Recommended Action    None required.

713221

Error Message    %FWSM-7-713221: Static Crypto Map check, checking map = 
crypto_map_tag, seq = seq_number...

Explanation    This message indicates that the security appliance is iterating through the crypto maps looking for configuration information.

Recommended Action    None required.

713222

Error Message    %FWSM-7-713222: Static Crypto Map check, map = crypto_map_tag, seq = 
seq_number, ACL does not match proxy IDs src:source_address dst:dest_address 

Explanation    This message indicates that while iterating through the configured crypto maps, the security appliance could not match any of the associated ACLs. This generally means that an ACL was misconfigured.

Recommended Action    Check the ACLs associated with this tunnel peer and make sure they specify the appropriate private networks from both sides of the VPN tunnel.

713223

Error Message    %FWSM-7-713223: Static Crypto Map check, map = crypto_map_tag, seq = 
seq_number, no ACL configured

Explanation    This message indicates that the crypto map associated with this peer is not linked to an ACL.

Recommended Action    Make sure there is an ACL associated with this crypto map and that the ACL contains the appropriate private addresses or network from both sides of the VPN tunnel.

713224

Error Message    %FWSM-7-713224: Static Crypto Map Check by-passed: Crypto map entry 
incomplete!

Explanation    This message indicates that the crypto map associated with this VPN tunnel is missing critical information.

Recommended Action    Verify that the crypto map is configured correctly with both the VPN peer, a transform set, and an associated ACL.

713225

Error Message    %FWSM-7-713225: [IKEv1], Static Crypto Map check, map map_name, seq = 
sequence_number is a successful match

Explanation    This message indicates that the security appliance found a valid matching crypto map for this VPN tunnel.

Recommended Action    None required.

713226

Error Message    %FWSM-3-713226: Connection failed with peer IP_address, no trust-point 
defined in tunnel-group tunnel_group 

Explanation    When the device is configured to use digital certificates, a trustpoint must be specified in the configuration. When the trustpoint is missing from the configuration, this message is generated to flag an error.

IP_address—IP address of the peer.

tunnel_group—Tunnel group for which the trustpoint was missing in the configuration.

Recommended Action    The administrator of the device has to specify a trustpoint in the configuration.

713229

Error Message    %FWSM-5-713229: Auto Update - Notification to client client_ip of 
update string: message_string.

Explanation    A VPN remote access client is notified that updated software is available for download. The remote client user is responsible for choosing to update the client access software.

client_ip—The IP address of the remote client.

message_string—The message text sent to the remote client.

Recommended Action    None required.

713236

Error Message    %FWSM-7-713236: IKE_DECODE tx/rx Message (msgid=msgid) with 
payloads:payload1 (payload1_len) + payload2 (payload2_len)...total length: tlen 

Explanation    IKE sends or receives various messages.

The following example shows the output when IKE receives a message with an 8-byte hash payload, an 11-byte notify payload, and two 13-byte vendor-specific payloads:

%FWSM-7-713236: IKE_DECODE RECEIVED Message msgid=0) with payloads: HDR + HASH (8) + 
NOTIFY (11) + VENDOR (13) + VENDOR (13) + NONE (0) 

Recommended Action    None required.

713229

Error Message    %FWSM-5-713229: Auto Update - Notification to client client_ip of 
update string: message_string.

Explanation    A VPN remote access client is notified that updated software is available for download. The remote client user is responsible for choosing to update the client access software.

client_ip—The IP address of the remote client.

message_string—The message text sent to the remote client.

Recommended Action    None required.

713900

Error Message    %FWSM-7-713900:Descriptive_event_string. 

Explanation    A message with several possible text strings describing a serious event or failure.

Recommended Action    If the problem persists, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support and provide the gathered information.

713901

Error Message    %FWSM-7-713901:Descriptive_event_string. 

Explanation    A message with several possible text strings describing an error which has occurred. This may be the result of a configuration error on the headend or remote access client. The event string provides details about the error that occurred.

Recommended Action    You may need to troubleshoot to determine what caused the error. Check the ISAKMP and crypto map configurations on both peers.

713902

Error Message    %FWSM-3-713902 Descriptive_event_string 

Explanation    This syslog message could have several possible text strings describing an error. This may be the result of a configuration error either on the headend or remote access client.

Recommended Action    It might be necessary to troubleshoot the configuration to determine the cause of the error. Check the ISAKMP and crypto map configurations on both peers.

713903

Error Message    %FWSM-4-713903:Descriptive_event_string. 

Explanation    This message has several possible text strings providing a warning. This may be the result of unexpected behavior of a peer (for example, loss of connectivity).

Recommended Action    Informational only.

713904

Error Message    %FWSM-5-713904:Descriptive_event_string. 

Explanation    This message has several possible text strings describing some general status information. These messages are used to keep track of events that have occurred.

Recommended Action    None required.

713905

Error Message    %FWSM-7-713905:Descriptive_event_string. 

Explanation    This message has several possible text strings describing some general status information. These messages are used to keep track of events that have occurred.

Recommended Action    Informational only.

713906

Error Message    %FWSM-7-713906: debug_message 

Explanation    This message is used for various VPN debugging events.

Recommended Action    None required. This message is provided for debugging purposes.

714001

Error Message    %FWSM-7-714001: Description of event or packet 

Explanation    This message describes an IKE protocol event or packet.

Recommended Action    Informational only.

714002

Error Message    %FWSM-7-714002: IKE Initiator starting QM: msg id = message_number 

Explanation    The security appliance has sent the first packet of the Quick Mode exchange as the Phase 2 initiator.

Recommended Action    Informational only.

714003

Error Message    %FWSM-7-714003: IKE Responder starting QM: msg id = message_number 

Explanation    The security appliance has received the first packet of the Quick Mode exchange as the Phase 2 responder.

Recommended Action    Informational only.

714004

Error Message    %FWSM-7-714004: IKE Initiator sending 1st QM pkt: msg id = 
message_number 

Explanation    The protocol is decoding the first Quick Mode packet.

Recommended Action    None required.

714005

Error Message    %FWSM-7-714005: IKE Responder sending 2nd QM pkt: msg id = 
message_number 

Explanation    The protocol is decoding the second Quick Mode packet.

Recommended Action    None required.

714006

Error Message    %FWSM-7-714006: IKE Initiator sending 3rd QM pkt: msg id = 
message_number 

Explanation    The protocol is decoding the third Quick Mode packet.

Recommended Action    None required.

714007

Error Message    %FWSM-7-714007: IKE Initiator sending Initial Contact

Explanation    The security appliance is building and sending the initial contact payload.

Recommended Action    None required.

714011

Error Message    %FWSM-7-714011: Description of received ID values 

Explanation    The security appliance received the displayed ID information during the negotiation.

Recommended Action    Informational only.

715001

Error Message    %FWSM-7-715001: Descriptive statement 

Explanation    This message provides a description of an event or problem encountered by the security appliance.

Recommended Action    The action depends on the description.

715004

Error Message    %FWSM-7-715004: subroutine name() Q Send failure: RetCode (return_code)

Explanation    This message indicates that there was an internal error when attempting to put messages in a queue.

Recommended Action    This is often a benign condition but if the problem persists, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

715005

Error Message    %FWSM-7-715005: subroutine name() Bad message code: Code (message_code)

Explanation    This message indicates that an internal subroutine received a bad message code.

Recommended Action    This is often a benign condition but if the problem persists, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

715006

Error Message    %FWSM-7-715006: IKE got SPI from key engine: SPI = SPI_value 

Explanation    This message indicates that the IKE subsystem received an SPI value from IPSec.

Recommended Action    None required.

715007

Error Message    %FWSM-7-715007: IKE got a KEY_ADD msg for SA: SPI = SPI_value 

Explanation    This message indicates that IKE has completed tunnel negotiation and has successfully loaded the appropriate encryption and hashing keys for IPSec use.

Recommended Action    None required.

715008

Error Message    %FWSM-7-715008: Could not delete SA SA_address, refCnt = number, caller 
= calling_subroutine_address 

Explanation    This message indicates that the calling subroutine could not delete the IPSec SA. This could indicate a reference count problem.

Recommended Action    If the number of stale SAs grows as a result of this event, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

715009

Error Message    %FWSM-7-715009: IKE Deleting SA: Remote Proxy IP_address, Local Proxy 
IP_address 

Explanation    This message indicates that SA is being deleted with the listed proxy addresses.

Recommended Action    None required.

715013

Error Message    %FWSM-7-715013: Tunnel negotiation in progress for destination 
IP_address, discarding data

Explanation    This message indicates that IKE is in the process of establishing a tunnel for this data. All packets to be protected by this tunnel will be dropped until the tunnel is fully established.

Recommended Action    None required.

715019

Error Message    %FWSM-7-715019: IKEGetUserAttributes: Attribute name = name 

Explanation    This message displays the modecfg attribute name and value pair being processed by the security appliance.

Recommended Action    None required.

715020

Error Message    %FWSM-7-715020: construct_cfg_set: Attribute name = name 

Explanation    This message displays the modecfg attribute name and value pair being transmitted by the security appliance.

Recommended Action    None required.

715021

Error Message    %FWSM-7-715021: Delay Quick Mode processing, Cert/Trans Exch/RM DSID in 
progress

Explanation    This message indicates that quick mode processing is being delayed until all Phase 1 processing has been completed (transaction mode and so on).

Recommended Action    None required.

715022

Error Message    %FWSM-7-715022: Resume Quick Mode processing, Cert/Trans Exch/RM DSID 
completed

Explanation    This message indicates that Phase 1 processing has completed and quick mode is being resumed.

Recommended Action    None required.

715027

Error Message    %FWSM-7-715027: IPSec SA Proposal # chosen_proposal, Transform # 
chosen_transform acceptable Matches global IPSec SA entry # crypto_map_index 

Explanation    This message appears when the indicated IPSec SA proposal and transform were selected from the payloads that the responder received. This data can be useful when attempting to debug IKE negotiation issues.

Recommended Action    None required.

715028

Error Message    %FWSM-7-715028: IKE SA Proposal # 1, Transform # chosen_transform 
acceptable Matches global IKE entry # crypto_map_index 

Explanation    This message appears when the indicated IKE SA transform was selected from the payloads that the responder received. This data can be useful when attempting to debug IKE negotiation issues.

Recommended Action    None required.

715033

Error Message    %FWSM-7-715033: Processing CONNECTED notify (MsgId message_number)

Explanation    The security appliance is processing a message containing a notify payload with the notify type CONNECTED (16384). The CONNECTED notify is used to complete the commit bit processing and should be included in the fourth overall quick mode packet, which is sent from the responder to the initiator.

Recommended Action    None required.

715034

Error Message    %FWSM-7-715034: action IOS keep alive payload: proposal=time 1/time 2 
sec.

Explanation    Processing for sending or receiving a keep-alive payload message is being performed.

Recommended Action    None required.

715035

Error Message    %FWSM-7-715035: Starting IOS keepalive monitor: seconds sec.

Explanation    The keep-alive timer monitors for a variable number of seconds for keep-alive messages.

Recommended Action    None required.

715036

Error Message    %FWSM-7-715036: Sending keep-alive of type notify_type (seq number 
number)

Explanation    Processing for sending a keep-alive notify message is being performed.

Recommended Action    None required.

715037

Error Message    %FWSM-7-715037: Unknown IOS Vendor ID version: major.minor.variance 

Explanation    The capabilities of this version of the Cisco IOS software are not known.

Recommended Action    There may be interoperability issues with features like IKE keep-alives. If this results in this type of interoperability problem, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information along with the version information for the Cisco IOS software and the security appliance.

715038

Error Message    %FWSM-7-715038: action Spoofing_information Vendor ID payload (version: 
major.minor.variance, capabilities: value)

Explanation    Processing for the Cisco IOS software Vendor ID payload has been performed. The processing being performed could be the spoofing Cisco IOS software.

Recommended Action    None required.

715039

Error Message    %FWSM-7-715039: Unexpected cleanup of tunnel table entry during SA 
delete.

Explanation    There was an entry in the IKE tunnel table that was never removed when the SA was freed. This indicates a defect in the state machine.

Recommended Action    If the problem persists, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

715040

Error Message    %FWSM-7-715040: Deleting active auth handle during SA deletion: handle 
= internal_authentication_handle 

Explanation    This message indicates that the auth handle was still active during SA deletion. This is part of cleanup recovery during the error condition.

Recommended Action    None required.

715041

Error Message    %FWSM-7-715041: Received keep-alive of type keepalive_type, not the 
negotiated type

Explanation    This indicates that a keep-alive of the type indicated in the message was received unexpectedly.

Recommended Action    Check the keep-alive configuration on both peers.

715042

Error Message    %FWSM-7-715042: IKE received response of type failure_type to a request 
from the IP_address utility

Explanation    This indicates that a request for an IP address for a remote access client from the internal utility that provides these addresses could not be satisfied. Variable text in the message string indicates more specifically what went wrong.

Recommended Action    Check the IP address assignment configuration and adjust accordingly.

715044

Error Message    %FWSM-7-715044: Ignoring Keepalive payload from vendor not support 
KeepAlive capability 

Explanation    The security appliance received the Cisco IOS software Keep-alive payload from the vendor without KA capabilities set. The payload is ignored.

Recommended Action    Informational only.

715045

Error Message    %FWSM-7-715045: ERROR: malformed Keepalive payload 

Explanation    The security appliance received a malformed Keep-alive payload. The payload is ignored.

Recommended Action    Informational only.

715046

Error Message    %FWSM-7-715046: Group = groupname, Username = username, IP = 
IP_address, constructing payload_description payload 

Explanation    This message indicates that an IP address from a remote client for a specific group and user displays details about the IKE payload being constructed.

Recommended Action    Informational only.

715047

Error Message    %FWSM-7-715047: processing payload_description payload 

Explanation    This message displays details about the IKE payload received and being processed.

Recommended Action    Informational only.

715048

Error Message    %FWSM-7-715048: Send VID_type VID 

Explanation    This message displays the type of vendor ID payload being sent.

Recommended Action    Informational only.

715049

Error Message    %FWSM-7-715049: Received VID_type VID 

Explanation    This message displays the type of vendor ID payload received.

Recommended Action    Informational only.

715050

Error Message    %FWSM-7-715050: Claims to be IOS but failed authentication 

Explanation    This message looks like a Cisco IOS vendor ID, but does not match hmac_sha.

Recommended Action    Check the Cisco IOS vendor ID configuration on both peers. If this issue affects interoperability, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

715051

Error Message    %FWSM-7-715051: Received unexpected TLV type TLV_type while processing 
FWTYPE ModeCfg Reply 

Explanation    An unknown TLV was received in a security appliance record while a FWTYPE mode configuration reply was being processed. This will be discarded. This could occur either because of packet corruption or because the connecting client supports a later version of the security appliance protocol.

Recommended Action    Check the firewall installed on the Cisco VPN client and the firewall configuration on the security appliance. This may also indicate a version mismatch between the VPN client and the security appliance.

715052

Error Message    %FWSM-7-715052: Old P1 SA is being deleted but new SA is DEAD, cannot 
transition centries 

Explanation    The old P1 SA is being deleted, but it has no new SA to transition to because it was marked for deletion as well. This generally indicates that the two IKE peers are out of synchronization and may be using different rekey times. The problem should correct itself, but there may be some small amount of data loss until a fresh P1 SA is reestablished.

Recommended Action    Informational only.

715053

Error Message    %FWSM-7-715053: MODE_CFG: Received request for attribute_info! 

Explanation    The security appliance received a mode configuration message requesting the specified attribute.

Recommended Action    Informational only.

715054

Error Message    %FWSM-7-715054: MODE_CFG: Received attribute_name reply: value 

Explanation    The security appliance received a mode configuration reply from the remote peer.

Recommended Action    Informational only.

715055

Error Message    %FWSM-7-715055: Send attribute_name 

Explanation    The security appliance sent a mode configuration attribute to the remote peer.

Recommended Action    Informational only.

715056

Error Message    %FWSM-7-715056: Client is configured for TCP_transparency 

Explanation    Because the remote end (client) is configured for IPSec over TCP, the headend security appliance must not negotiate IPSec over UDP or IPSec over NAT-T with the client.

Recommended Action    The NAT transparency configuration of one of the peers may require adjustment if the tunnel does not come up. Otherwise, this is an informational message.

715057

Error Message    %FWSM-7-715057: Auto-detected a NAT device with NAT-Traversal. 
Ignoring IPSec-over-UDP configuration.

Explanation    IPSec-over-UDP mode configuration information will not be exchanged because NAT-Traversal was detected.

Recommended Action    Informational only.

715058

Error Message    %FWSM-7-715058: NAT-Discovery payloads missing. Aborting 
NAT-Traversal.

Explanation    The remote end did not provide NAT-D payloads required for NAT-Traversal after exchanging NAT-Traversal VIDs. At least two NAT-D payloads must be received.

Recommended Action    This may indicate a non-conforming NAT-T implementation. If the offending peer is a Cisco product, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information along with product numbers and software versions. If the offending peer is not a Cisco product, contact the manufacturer support team.

715059

Error Message    %FWSM-7-715059: Proposing/Selecting only UDP-Encapsulated-Tunnel and 
UDP-Encapsulated-Transport modes defined by NAT-Traversal 

Explanation    You must use the UDP-Encapsulated-Tunnel and UDP--Encapsulated-Transport modes instead of the usual transport and tunnel modes defined in the SA to successfully negotiate NAT-Traversal.

Recommended Action    Informational only.

715060

Error Message    %FWSM-7-715060: Dropped received IKE fragment. Reason: reason 

Explanation    The reason for dropping the fragment will be shown.

Recommended Action    The action depends on the reason, but this message could indicate a problem with an intervening NAT device or a non-conforming peer.

715061

Error Message    %FWSM-7-715061: Rcv'd fragment from a new fragmentation set. Deleting 
any old fragments. 

Explanation    This message could be either a resend of the same packet but fragmented to a different MTU, or another packet.

Recommended Action    Informational only.

715062

Error Message    %FWSM-7-715062: Error assembling fragments! Fragment numbers are 
non-continuous.

Explanation    There is a gap in fragment numbers.

Recommended Action    This message could indicate a network problem. If the condition results in dropped tunnels or prevents certain peers from negotiating with the security appliance, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information along with product numbers and software versions.

715063

Error Message    %FWSM-7-715063: Successfully assembled an encrypted pkt from rcv'd 
fragments! 

Explanation    Assembly for a fragmented packet that was received was successful.

Recommended Action    Informational only.

715064

Error Message    %FWSM-7-715064 -- IKE Peer included IKE fragmentation capability 
flags: Main Mode: true/false Aggressive Mode: true/false 

Explanation    The peer supports IKE fragmentation based on the information provided in the message.

Recommended Action    Informational only.

715065

Error Message    %FWSM-7-715065: IKE state_machine subtype FSM error history (struct 
data_structure_address) state, event: state/event pairs 

Explanation    A phase 1 error occurred and the state, event history pairs will be displayed in reverse chronological order.

Recommended Action    Most of these errors are benign. If these messages are associated with undesirable behavior, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support and provide the gathered information.

715066

Error Message    %FWSM-7-715066: Can't load an IPSec SA! The corresponding IKE SA 
contains an invalid logical ID.

Explanation    The logical ID in the IKE SA is NULL. The phase II negotiation will be torn down.

Recommended Action    An internal error has occurred. If the device does not recover and operate normally, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support and provide the gathered information.

715067

Error Message    %FWSM-7-715067: QM IsRekeyed: existing sa from different peer, 
rejecting new sa 

Explanation    The LAN-to-LAN SA that is being established already exists, that is, an SA within the same remote network, but is sourced from a different peer. This new SA will be deleted because this is not a legal configuration.

Recommended Action    Check the LAN-to-LAN configuration on all associated peers. Multiple peers should not be sharing private networks.

715068

Error Message    %FWSM-7-715068: QM IsRekeyed: duplicate sa found by address, deleting 
old sa 

Explanation    The remote access SA that is being established already exists, that is, an SA within the same remote network, but is sourced from a different peer. The old SA will be deleted, because the peer may have changed its IP address.

Recommended Action    This may be a benign condition, especially if a client tunnel was terminated abruptly. If the message is associated with undesirable behavior, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

715069

Error Message    %FWSM-7-715069: Invalid ESP SPI size of SPI_size 

Explanation    The security appliance received an IPSec SA proposal with an invalid ESP SPI size. This proposal will be skipped.

Recommended Action    Generally, this is a benign condition but could indicate that a peer may be non-conforming. If the problem persists and prevents peers from negotiating a tunnel successfully, copy the error message exactly as it appears on the console or in the system log, contact Cisco  TAC for further support, and provide the gathered information.

715070

Error Message    %FWSM-7-715070: Invalid IPComp SPI size of SPI_size 

Explanation    The security appliance received an IPSec SA proposal with an invalid IPComp SPI size. This proposal will be skipped.

Recommended Action    Generally, this is a benign condition but could indicate that a peer is non-conforming. If the problem persists and prevents peers from negotiating a tunnel successfully, copy the error message exactly as it appears on the console or in the system log, contact the Cisco TAC for further support, and provide the gathered information.

715071

Error Message    %FWSM-7-715071: AH proposal not supported

Explanation    The IPSec AH proposal is not supported. This proposal will be skipped.

Recommended Action    Informational only.

715072

Error Message    %FWSM-7-715072: Received proposal with unknown protocol ID protocol_ID 

Explanation    The security appliance received an IPSec SA proposal with an unknown protocol ID. This proposal will be skipped.

Recommended Action    Generally, this is a benign condition, but it could indicate that a peer is non-conforming. If the problem persists and prevents peers from negotiating a tunnel successfully, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

715074

Error Message    %FWSM-7-715074: Could not retrieve authentication attributes for peer 
IP_address 

Explanation    The security appliance could not get authorization information for the remote user.

Recommended Action    Ensure that all authentication and authorization configuration is set correctly. If the problem persists and prevents peers from negotiating a tunnel successfully, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

715075

Error Message    %FWSM-7-715075: Group = group_name, Username = client, IP = IP_address Received keep-alive of type message_type (seq number number)

Explanation    This message is paired with 715036, the "DPD R-U-THERE" message, which logs the DPD messages sent.

group_name—The peer's VPN group name.

client—The peer's username.

IP_address—IP address of the VPN peer.

message_type—The message type ("DPD R-U-THERE" or "DPD R-U-THERE-ACK").

number—The DPD sequence number.

The two possible cases are as follows:

Case 1—The received peer sends the "DPD R-U-THERE" message.

The "DPD R-U-THERE" message is received, and its sequence number matches the outgoing DPD reply.

If f1 sends a "DPD R-U-THERE-ACK" message before receiving the "DPD R-U-THERE" message from the peer, it is likely experiencing a security breech.

Case 2—The received peer replies with the "DPD R-U-THERE-ACK" message.

The received "DPD R-U-THERE-ACK" message's sequence number matches the previous DPD message sent.

If f1 did not receive a "DPD R-U-THERE-ACK" message for a reasonable time after sending the "DPD R-U-THERE" message to the peer, the tunnel is most likely down.

Recommended Action    None required.

715076

Error Message    %FWSM-7-715076: Computing hash for ISAKMP

Explanation    IKE computes various hash values.

This object is prepended as follows:

Group = groupname, Username = username, IP = ip_address,...

Recommended Action    None required.

715077

Error Message    %FWSM-7-715077: Pitcher: msg string, spi spi 

Explanation    Various messages are sent to IKE.

msg_string can be one of the following:

Received a key acquire message.

Received SPI for a non-existent SA.

Received a key delete msg

Received KEY_UPDATE.

received KEY_REKEY_IB.

Received KEY_REKEY_OB.

Received KEY_SA_ACTIVE.

Could not find IKE SA to activate IPSEC (OB).

Could not find IKE SA to rekey IPSEC (OB).

KEY_SA_ACTIVE no centry found.

KEY_ADD centry not found.

KEY_UPDATE centry not found.

Like other ISAKMP, the following statement applies:

This object will be prepended as follows:

Group = groupname, Username = username, IP = ip_address

Recommended Action    None required.

717001

Error Message    %FWSM-3-717001: Querying keypair failed. 

Explanation    A required keypair was not found during an enrollment request.

Recommended Action    Verify that a valid keypair exists in the trustpoint configuration and resubmit enrollment.

717002

Error Message    %FWSM-3-717002: Certificate enrollment failed for trustpoint 
trustpoint_name. Reason: reason_string. 

Explanation    An enrollment request for this trustpoint_name trustpoint has failed.

trustpoint name—Trustpoint name that the enrollment request was for.

reason_string—The reason the enrollment request failed.

Recommended Action    Check the CA server for the reason.

717003

Error Message    %FWSM-6-717003: Certificate received from Certificate Authority for 
trustpoint trustpoint_name. 

Explanation    A certificate was successfully received from the CA for this trustpoint_name trustpoint.

Recommended Action    None required.

717004

Error Message    %FWSM-6-717004: PKCS #12 export failed for trustpoint trustpoint_name.

Explanation    The trustpoint trustpoint_name failed to export. It is likely that only a CA certificate exists and an identity certificate does not exist for the trustpoint or a required keypair is missing.

Recommended Action    Ensure that required certificates and keypairs are present for the given trustpoint.

717005

Error Message    %FWSM-6-717005: PKCS #12 export succeeded for trustpoint 
trustpoint_name. 

Explanation    Trustpoint trustpoint_name was successfully exported.

Recommended Action    None required.

717006

Error Message    %FWSM-6-717006: PKCS #12 import failed for trustpoint trustpoint_name. 

Explanation    Import of the requested trustpoint trustpoint_name failed to be processed.

Recommended Action    Ensure the integrity of the imported data, make sure that the entire PKCS 12 record is correctly entered, and resubmit the import.

717007

Error Message    %FWSM-6-717007: PKCS #12 import succeeded for trustpoint 
trustpoint_name. 

Explanation    Import of the requested trustpoint trustpoint_name was successfully completed.

Recommended Action    None required.

717008

Error Message    %FWSM-2-717008: Insufficient memory to process_requiring_memory. 

Explanation    An internal error occurred while attempting to allocate memory for process_requiring_memory. Other processes may experience problems allocating memory and prevent further processing.

Recommended Action    Collect memory statistics and logs for further debugging and reload system software.

717009

Error Message    %FWSM-3-717009: Certificate validation failed. Reason: reason_string. 

Explanation    A certificate validation failed because of reason_string. The reason_string specifies the reason for the failure, which could be because of a validation attempt of a revoked certificate, invalid certificate attributes, or configuration issues.

reason_string—The reason the certificate validation failed.

Recommended Action    Ensure the configuration has a valid trustpoint configured for validation if the reason_string indicates that no suitable trustpoints are found. Check system time to ensure it is accurate according to the CA time. Check the reason_string and correct any issues that are indicated.

717010

Error Message    %FWSM-3-717010: CRL polling failed for trustpoint trustpoint_name.

Explanation    CRL polling has failed and may cause connections to be denied if CRL checking is required.

trustpoint_name—The name of the trustpoint that requested the CRL.

Recommended Action    Verify that connectivity with the configured CRL distribution point and ensure manual CRL retrieval also functions correctly.

717011

Error Message    %FWSM-2-717011: Unexpected event event event_ID 

Explanation    This log message indicates that an event that is not expected under normal conditions has occurred.

Recommended Action    Log the event and notify Cisco TAC.

717012

Error Message    %FWSM-3-717012: Failed to refresh CRL cache entry from the server for 
trustpoint trustpoint_name at time_of_failure 

Explanation    This log message indicates that an attempt to refresh a cached CRL entry has failed for the specified trustpoint trustpoint_name, at the indicated time_of_failure. This may result in obsolete CRLs on the system that may cause connections that require a valid CRL to be denied.

Recommended Action    Check connectivity issues to the server including network down, server down, and so on. Try to retrieve the CRL manually using the crypto ca crl retrieve command.

717013

Error Message    %FWSM-5-717013: Removing a cached CRL to accommodate an incoming CRL. 
Issuer: issuer 

Explanation    When the device is configured to authenticate IPSec tunnels using digital certificates, CRLs may be cached in memory to avoid requiring a CRL download during each connection. If the cache fills to the point where an incoming CRL cannot be accommodated, older CRLs will be removed until the required space is made available. This log event will be generated for each CRL that is purged.

Recommended Action    None required.

717014

Error Message    %FWSM-5-717014: Unable to cache a CRL received from CDP due to size 
limitations (CRL size = size, available cache space = space) 

Explanation    When the device is configured to authenticate IPSec tunnels using digital certificates, CRLs may be cached in memory to avoid requiring a CRL download during each connection. This log event will be generated if a received CRL is too large to fit in the cache.

Recommended Action    None required. The large CRLs are still supported, although they are not cached. This means that the CRL will be downloaded with each IPSec connection, which may affect performance during IPSec connection bursts.

717015

Error Message    %FWSM-3-717015: CRL received from issuer is too large to process (CRL 
size = crl_size, maximum CRL size = max_crl_size) 

Explanation    This log event will be generated when an IPSec connection causes a CRL that is larger than the maximum permitted CRL size, max_crl_size, to be downloaded. This is an error condition that will cause the connection to fail. This message is rate limited to one message every 10 seconds.

Recommended Action    Scalability is the most significant drawback to the CRL method of revocation checking. The only options to solve this problem are to investigate a CA-based solution to reduce the CRL size or configure the device not to require CRL validation.

717016

Error Message    %FWSM-6-717016: Removing expired CRL from the CRL cache. Issuer: issuer 

Explanation    When the device is configured to authenticate IPSec tunnels using digital certificates, CRLs may be cached in memory to avoid requiring a CRL download during each connection. This log event is generated when either the CA specified expiration time or the configured cache-time has lapsed and the CRL is removed from the cache.

Recommended Action    None required. This is a routine occurrence.

717017

Error Message    %FWSM-3-717017: Failed to query CA certificate for trustpoint 
trustpoint_name from enrollment_url 

Explanation    An attempt is made to authenticate a trustpoint by requesting a CA certificate from a CA.

Recommended Action    Ensure that an enrollment URL is configured with this trustpoint, ensure connectivity with the CA server, and retry the request.

717018

Error Message    %FWSM-3-717018: CRL received from issuer has too many entries to 
process (number of entries = number_of_entries, maximum number allowed = 
max_allowed)

Explanation    This log event will be generated when an IPSec connection causes a CRL that contains more revocation entries than can be supported, to be downloaded. This is an error condition that will cause the connection to fail. This message is rate limited to one message every 10 seconds.

issuer—The X.500 name of the CRL issuer.

number_of_entries—The number of revocation entries in the received CRL.

max_allowed—The maximum number of CRL entries that the device supports.

Recommended Action    Scalability is the most significant drawback to the CRL method of revocation checking. The only options to solve this problem are to investigate a CA-based solution to reduce the CRL size or configure the device not to require CRL validation.

717019

Error Message    %FWSM-3-717019: Failed to insert CRL for trustpoint trustpoint_name. 
Reason: failure_reason.

Explanation    This log event will be generated when a CRL is retrieved, but it is found to be invalid and cannot be inserted into the cache because of the failure_reason.

trustpoint_name—The name of the trustpoint that requested the CRL.

failure_reason—The reason that the CRL failed to be inserted into cache.

Recommended Action    Ensure the current system time is correct according to the CA time. If the NextUpdate variable is missing, configure the trustpoint to ignore this variable.

717022

Error Message    %FWSM-6-717022 Certificate was successfully validated. certificate identifiers 

Explanation    The identified certificate is successfully validated.

certificate identifiers—Information to identify the certificate that was validated successfully, which may include a reason, serial number, subject name, and so forth.

Recommended Action    None required.

717025

Error Message    %FWSM-7-717025 Validating certificate chain containing number of certs 
certificate(s).

Explanation    A chain of certificates is being validated.

number of certs—Number of certificates in the chain.

Recommended Action    None required.

717028

Error Message    %FWSM-6-717028 Certificate chain was successfully validated additional info. 

Explanation    A certificate chain was successfully validated.

additional info—Additional information for how the certificate chain was validated, such as "with warning," indicating that a CRL check was not performed.

Recommended Action    None required.

717029

Error Message    %FWSM-7-717029 Identified client certificate within certificate chain. 
serial number: serial_number, subject name: subject_name.

Explanation    This message identifies the certificate that is found to be the client certificate.

serial_number—Serial number of the certificate that is identified as the client certificate.

subject_name—Subject name contained in the certificate that is identified as the client certificate.

Recommended Action    None required.

718001

Error Message    %FWSM-7-718001: Internal interprocess communication queue send 
failure: code error_code 

Explanation    An internal software error has occurred while attempting to enqueue a message on the VPNLB queue.

Recommended Action    This is generally a benign condition but if the problem persists, or is linked to undesirable behavior, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

718002

Error Message    %FWSM-5-718002: Create peer IP_address failure, already at maximum of 
number_of_peers 

Explanation    The maximum number of load balancing peers was exceeded. The new peer is ignored.

Recommended Action    Check your load balancing and network configuration to ensure that the number of load balancing peers does not exceed the maximum allowed.

718003

Error Message    %FWSM-6-718003: Got unknown peer message message_number from 
IP_address, local version version_number, remote version version_number 

Explanation    An unrecognized load balancing message was received from one of the load balancing peers. This could indicate a version mismatch between peers, but is most likely caused by an internal software error.

Recommended Action    Verify that all load balancing peers are compatible. If they are and this condition persists, or is linked to undesirable behavior, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

718004

Error Message    %FWSM-6-718004: Got unknown internal message message_number 

Explanation    The security appliance received an unknown internal message. This generally indicates an internal software error.

Recommended Action    This is generally a benign condition but if the problem persists, or is linked to undesirable behavior, copy the error message exactly as it appears on the console or in the system log, contact the Cisco TAC for further support, and provide the gathered information.

718005

Error Message    %FWSM-5-718005: Fail to send to IP_address, port port 

Explanation    An internal software error has occurred while attempting to send a packet on the load balancing socket. This could indicate a network problem or an internal software error.

Recommended Action    Check the network-based configuration on the security appliance and verify that interfaces are active and protocol data is flowing through the device. If the problem persists, or is linked to undesirable behavior, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

718006

Error Message    %FWSM-5-718006: Invalid load balancing state transition 
[cur=state_number][event=event_number]

Explanation    A state machine error has occurred. This could indicate an internal software error.

Recommended Action    This is generally a benign condition but if the problem persists, or is linked to undesirable behavior, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

718007

Error Message    %FWSM-5-718007: Socket open failure failure_code 

Explanation    An error has occurred while attempting to open the load balancing socket. This could indicate a network problem or an internal software error.

Recommended Action    Check the network-based configuration on the security appliance and verify that interfaces are active and protocol data is flowing through the device. If the problem persists, or is linked to undesirable behavior, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

718008

Error Message    %FWSM-5-718008: Socket bind failure failure_code 

Explanation    An error has occurred while attempting to bind to the load balancing socket. This could indicate a network problem or an internal software error.

Recommended Action    Check the network-based configuration on the security appliance and verify that interfaces are active and protocol data is flowing through the device. If the problem persists, or is linked to undesirable behavior, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

718009

Error Message    %FWSM-5-718009: Send HELLO response failure to IP_address 

Explanation    An error has occurred while attempting to send a Hello Response message to one of the load balancing peers. This could indicate a network problem or an internal software error.

Recommended Action    Check the network-based configuration on the security appliance and verify that interfaces are active and protocol data is flowing through the device. If the problem persists, or is linked to undesirable behavior, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

718010

Error Message    %FWSM-5-718010: Sent HELLO response to IP_address 

Explanation    The security appliance transmitted a Hello Response message to a load balancing peer.

Recommended Action    Informational only.

718011

Error Message    %FWSM-5-718011: Send HELLO request failure to IP_address 

Explanation    An error has occurred while attempting to send a Hello Request message to one of the load balancing peers. This could indicate a network problem or an internal software error.

Recommended Action    Check the network-based configuration on the security appliance and verify that interfaces are active and protocol data is flowing through the device. If the problem persists, or is linked to undesirable behavior, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

718012

Error Message    %FWSM-5-718012: Sent HELLO request to IP_address 

Explanation    The security appliance transmitted a Hello Request message to a load balancing peer.

Recommended Action    Informational only.

718013

Error Message    %FWSM-6-718013: Peer IP_address is not answering HELLO

Explanation    The load balancing peer is not answering Hello.

Recommended Action    Check the status of the LBSSF peer and the network connections.

718014

Error Message    %FWSM-5-718014: Master peer IP_address is not answering HELLO

Explanation    The load balancing master peer is not answering Hello.

Recommended Action    Check the status of the load balancing SSF master peer and the network connections.

718015

Error Message    %FWSM-5-718015: Received HELLO request from IP_address 

Explanation    The security appliance received a Hello Request message from a load balancing peer.

Recommended Action    Informational only.

718016

Error Message    %FWSM-5-718016: Received HELLO response from IP_address 

Explanation    The security appliance received a Hello Response packet from a load balancing peer.

Recommended Action    Informational only.

718017

Error Message    %FWSM-7-718017: Got timeout for unknown peer IP_address msg type 
message_type 

Explanation    The security appliance processed a timeout for an unknown peer. The message was ignored because the peer may have already been removed from the active list.

Recommended Action    If the message persists or is linked to undesirable behavior, check load balancing peers and verify that all are configured correctly.

718018

Error Message    %FWSM-7-718018: Send KEEPALIVE request failure to IP_address 

Explanation    An error has occurred while attempting to send a Keep-alive Request message to one of the load balancing peers. This could indicate a network problem or an internal software error.

Recommended Action    Check the network-based configuration on the security appliance and verify that interfaces are active and protocol data is flowing through the device. If the problem persists, or is linked to undesirable behavior, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

718019

Error Message    %FWSM-7-718019: Sent KEEPALIVE request to IP_address 

Explanation    The security appliance transmitted a Keep-alive Request message to a load balancing peer.

Recommended Action    Informational only.

718020

Error Message    %FWSM-7-718020: Send KEEPALIVE response failure to IP_address 

Explanation    An error has occurred while attempting to send a Keep-alive Response message to one of the load balancing peers. This could indicate a network problem or an internal software error.

Recommended Action    Check the network-based configuration on the security appliance and verify that interfaces are active and protocol data is flowing through the device. If the problem persists, or is linked to undesirable behavior, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

718021

Error Message    %FWSM-7-718021: Sent KEEPALIVE response to IP_address 

Explanation    The security appliance transmitted a Keep-alive Response message to a load balancing peer.

Recommended Action    Informational only.

718022

Error Message    %FWSM-7-718022: Received KEEPALIVE request from IP_address 

Explanation    The security appliance received a Keep-alive Request message from a load balancing peer.

Recommended Action    Informational only.

718023

Error Message    %FWSM-7-718023: Received KEEPALIVE response from IP_address 

Explanation    The security appliance received a Keepalive Response message from a load balancing peer.

Recommended Action    Informational only.

718024

Error Message    %FWSM-5-718024: Send CFG UPDATE failure to IP_address 

Explanation    An error has occurred while attempting to send a Configuration Update message to one of the load balancing peers. This could indicate a network problem or an internal software error.

Recommended Action    Check the network-based configuration on the security appliance and verify that interfaces are active and protocol data is flowing through the device. If the problem persists, or is linked to undesirable behavior, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

718025

Error Message    %FWSM-7-718025: Sent CFG UPDATE to IP_address 

Explanation    The security appliance transmitted a Configuration Update message to a load balancing peer.

Recommended Action    Informational only.

718026

Error Message    %FWSM-7-718026: Received CFG UPDATE from IP_address 

Explanation    The security appliance received a Configuration Update message from a load balancing peer.

Recommended Action    None required.

718027

Error Message    %FWSM-6-718027: Received unexpected KEEPALIVE request from IP_address 

Explanation    The security appliance received an unexpected keepalive request from a load balancing server.

Recommended Action    If the problem persists or is linked with undesirable behavior, verify that all load balancing peers are configured and discovered correctly.

718028

Error Message    %FWSM-5-718028: Send OOS indicator failure to IP_address 

Explanation    An error has occurred while attempting to send an OOS Indicator message to one of the load balancing peers. This could indicate a network problem or an internal software error.

Recommended Action    Check the network-based configuration on the security appliance and verify that interfaces are active and protocol data is flowing through the device. If the problem persists, or is linked to undesirable behavior, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

718029

Error Message    %FWSM-7-718029: Sent OOS indicator to IP_address 

Explanation    The security appliance transmitted an OOS Indicator message to a load balancing peer.

Recommended Action    Informational only.

718030

Error Message    %FWSM-6-718030: Received planned OOS from IP_address 

Explanation    The security appliance received a planned OOS message from a load balancing peer.

Recommended Action    Informational only.

718031

Error Message    %FWSM-5-718031: Received OOS obituary for IP_address 

Explanation    The security appliance received an OOS Obituary message from a load balancing peer.

Recommended Action    Informational only.

718032

Error Message    %FWSM-5-718032: Received OOS indicator from IP_address 

Explanation    The security appliance received an OOS Indicator message from a load balancing peer.

Recommended Action    Informational only.

718033

Error Message    %FWSM-5-718033: Send TOPOLOGY indicator failure to IP_address 

Explanation    An error has occurred while attempting to send a Topology Indicator message to one of the load balancing peers. This could indicate a network problem or an internal software error.

Recommended Action    Check the network-based configuration on the security appliance and verify that interfaces are active and protocol data is flowing through the device. If the problem persists, or is linked to undesirable behavior, copy the error message exactly as it appears on the console or in the system log, contact Cisco TAC for further support, and provide the gathered information.

718034

Error Message    %FWSM-7-718034: Sent TOPOLOGY indicator to IP_address 

Explanation    The security appliance sent a Topology Indicator message to a load balancing peer.

Recommended Action    Informational only.

718035

Error Message    %FWSM-7-718035: Received TOPOLOGY indicator from IP_address 

Explanation    The security appliance received a Topology Indicator message from a load balancing peer.

Recommended Action    Informational only.

718036

Error Message    %FWSM-7-718036: Process timeout for req-type type_value, exid 
exchange_ID, peer IP_address 

Explanation    The security appliance processed a peer timeout.

Recommended Action    Verify that the peer should have timed out. If not, check the peer load balancing configuration and the network connection between the peer and the security appliance.

718037

Error Message    %FWSM-6-718037: Master processed number_of_timeouts timeouts

Explanation    The security appliance in the master role processed the specified number of peer timeouts.

Recommended Action    Verify that the timeouts are legitimate. If not, check the peer load balancing configuration and the network connection between the peer and the security appliance.

718038

Error Message    %FWSM-6-718038: Slave processed number_of_timeouts timeouts

Explanation    The security appliance in the slave role processed the specified number of peer timeouts.

Recommended Action    Verify that the timeouts are legitimate. If not, check the peer load balancing configuration and the network connection between the peer and the security appliance.

718039

Error Message    %FWSM-6-718039: Process dead peer IP_address 

Explanation    The security appliance has detected a down peer.

Recommended Action    Verify that the down peer detection is legitimate. If not, check the peer load balancing configuration and the network connection between the peer and the security appliance.

718040

Error Message    %FWSM-6-718040: Timed-out exchange ID exchange_ID not found

Explanation    The security appliance has detected a down peer, but the exchange ID is not recognized.

Recommended Action    Informational only.

718041

Error Message    %FWSM-7-718041: Timeout [msgType=type] processed with no callback

Explanation    The security appliance has detected a down peer, but a call back was not used in the processing.

Recommended Action    Informational only.

718042

Error Message    %FWSM-5-718042: Unable to ARP for IP_address 

Explanation    The security appliance experienced an ARP failure when attempting to contact a peer.

Recommended Action    Verify that the network is operational and all peers can communicate with each other.

718043

Error Message    %FWSM-5-718043: Updating/removing duplicate peer entry IP_address 

Explanation    The security appliance found and is removing a duplicate peer entry.

Recommended Action    Informational only.

718044

Error Message    %FWSM-5-718044: Deleted peer IP_address 

Explanation    The security appliance deleted a load balancing peer.

Recommended Action    Informational only.

718045

Error Message    %FWSM-5-718045: Created peer IP_address 

Explanation    The security appliance has detected a load balancing peer.

Recommended Action    Informational only.

718046

Error Message    %FWSM-7-718046: Create group policy policy_name 

Explanation    The security appliance has created a group policy to securely communicate to the load balancing peers.

Recommended Action    Informational only.

718047

Error Message    %FWSM-7-718047: Fail to create group policy policy_name 

Explanation    The security appliance experienced a failure when attempting to create a group policy for securing the communication between load balancing peers.

Recommended Action    Verify that the load balancing configuration is correct.

718048

Error Message    %FWSM-5-718048: Create of secure tunnel failure for peer IP_address 

Explanation    The security appliance experienced a failure when attempting to establish an IPSec tunnel to a load balancing peer.

Recommended Action    Verify that the load balancing configuration is correct and that the network is operational.

718049

Error Message    %FWSM-7-718049: Created secure tunnel to peer IP_address 

Explanation    The security appliance successfully established an IPSec tunnel to a load balancing peer.

Recommended Action    Informational only.

718050

Error Message    %FWSM-5-718050: Delete of secure tunnel failure for peer IP_address 

Explanation    The security appliance experienced a failure when attempting to terminate an IPSec tunnel to a load balancing peer.

Recommended Action    Verify that the load balancing configuration is correct and that the network is operational.

718051

Error Message    %FWSM-6-718051: Deleted secure tunnel to peer IP_address 

Explanation    The security appliance successfully terminated an IPSec tunnel to a load balancing peer.

Recommended Action    Informational only.

718052

Error Message    %FWSM-5-718052: Received GRAT-ARP from duplicate master MAC_address 

Explanation    The security appliance received a gratuitous ARP from a duplicate master.

Recommended Action    Check the load balancing configuration and verify that the network is operational.

718053

Error Message    %FWSM-5-718053: Detected duplicate master, mastership stolen 
MAC_address 

Explanation    The security appliance detected a duplicate master, with a mastership stolen.

Recommended Action    Check the load balancing configuration and verify that the network is operational.

718054

Error Message    %FWSM-5-718054: Detected duplicate master MAC_address and going to 
SLAVE

Explanation    The security appliance detected a duplicate master and is switching to slave mode.

Recommended Action    Check the load balancing configuration and verify that the network is operational.

718055

Error Message    %FWSM-5-718055: Detected duplicate master MAC_address and staying 
MASTER

Explanation    The security appliance detected a duplicate master and is staying in slave mode.

Recommended Action    Check the load balancing configuration and verify that the network is operational.

718056

Error Message    %FWSM-7-718056: Deleted Master peer, IP IP_address 

Explanation    The security appliance deleted the load balancing master from its internal tables.

Recommended Action    Informational only.

718057

Error Message    %FWSM-5-718057: Queue send failure from ISR, msg type failure_code 

Explanation    An internal software error has occ