Netgear Netgar VPN FIrewall FVS336Gv2 Reference Manual
Have a look at the manual Netgear Netgar VPN FIrewall FVS336Gv2 Reference Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 137 Netgear manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
System Logs and Error Messages 649 ProSAFE Dual WAN Gigabit WAN SSL VPN Firewall FVS336Gv2 •PPTP idle time-out logs •PPP authentication logs Table 26. System logs: WAN status, PPTP idle time-out Message Nov 29 11:19:02 [FVS336Gv2] [pppd] Starting connection Nov 29 11:19:05 [FVS336Gv2] [pppd] CHAP authentication succeeded Nov 29 11:19:05 [FVS336Gv2] [pppd] local IP address 192.168.200.214 Nov 29 11:19:05 [FVS336Gv2] [pppd] remote IP address 192.168.200.1 Nov 29 11:19:05 [FVS336Gv2] [pppd] primary DNS address 202.153.32.2 Nov 29 11:19:05 [FVS336Gv2] [pppd] secondary DNS address 202.153.32.2 Nov 29 11:20:45 [FVS336Gv2] [pppd] No response to 10 echo-requests Nov 29 11:20:45 [FVS336Gv2] [pppd] Serial link appears to be disconnected. Nov 29 11:20:45 [FVS336Gv2] [pppd] Connect time 1.7 minutes. Nov 29 11:20:45 [FVS336Gv2] [pppd] Sent 520 bytes, received 80 bytes. Nov 29 11:20:51 [FVS336Gv2] [pppd] Connection terminated. Explanation Message 1: Starting PPP connection process. Message 2: Message from the server for authentication success. Message 3: Local IP address assigned by the server. Message 4: Server side IP address. Message 6: The primary DNS server that is configured on the WAN ISP Settings screen. Message 7: The secondary DNS server that is configured on the WAN ISP Settings screen. Message 7: Sensing idle link. Message 8: Idle link sensed. Message 9: Data sent and received at the LAN side while the link was up. Message 10: PPP connection terminated after idle time-out. Recommended action To reconnect during idle mode, initiate traffic from the LAN side. Table 27. System logs: WAN status, PPP authentication Message Nov 29 11:29:26 [FVS336Gv2] [pppd] Starting link Nov 29 11:29:29 [FVS336Gv2] [pppd] Remote message: Login incorrect Nov 29 11:29:29 [FVS336Gv2] [pppd] PAP authentication failed Nov 29 11:29:29 [FVS336Gv2] [pppd] Connection terminated.WAN2(DOWN)_ Explanation Starting link: Starting PPPoE connection process. Remote message: Login incorrect: Message from PPPoE server for incorrect login. PAP authentication failed: PPP authentication failed due to incorrect login. Connection terminated: PPP connection terminated. Recommended action If authentication fails, then check the login and password and enter the correct one.
System Logs and Error Messages 650 ProSAFE Dual WAN Gigabit WAN SSL VPN Firewall FVS336Gv2 Resolved DNS Names This section describes the logs of DNS name resolution messages. VPN Log Messages This section explains logs that are generated by IPSec VPN and SSL VPN policies. These logs are generated automatically and do not need to be enabled. •IPSec VPN Logs •SSL VPN Logs IPSec VPN Logs This section describes the log messages generated by IPSec VPN policies. Note:The same IPSec VPN log messages can appear in the logs that are accessible when you select the VPN check box on the Firewall Logs & E-mail screen (see Manage Logging, Alerts, and Event Notifications on page 567) and in the logs on the IPSec VPN Logs screen (see View the VPN Logs on page 593). Table 28. System logs: DNS name resolution messages Message 2000 Jan 1 05:12:00 [FVS336Gv2] [dnsmasq] [DNSRESOLV]:teamf1.com from 192.168.11.2 Explanation This log is generated when the DNS name (that is, teamf1) is resolved. Recommended action None
System Logs and Error Messages 651 ProSAFE Dual WAN Gigabit WAN SSL VPN Firewall FVS336Gv2 Table 29. System logs: IPSec VPN tunnel, tunnel establishment Messages 1 through 5 Messages 6 and 7 Messages 8 through 19 Messages 20 and 21 2000 Jan 1 04:01:39 [FVS336Gv2] [wand] [IPSEC] IPSEC Restarted 2000 Jan 1 04:02:09 [FVS336Gv2] [wand] [FW] Firewall Restarted 2000 Jan 1 04:02:29 [FVS336Gv2] [IKE] IKE stopped_ 2000 Jan 1 04:02:31 [FVS336Gv2] [IKE] IKE started_ 2000 Jan 1 04:02:31 [FVS336Gv2] [wand] [IPSEC] IPSEC Restarted 2000 Jan 1 04:07:04 [FVS336Gv2] [IKE] Adding IPSec configuration with identifier pol1_ 2000 Jan 1 04:07:04 [FVS336Gv2] [IKE] Adding IKE configuration with identifier pol1_ 2000 Jan 1 04:13:39 [FVS336Gv2] [IKE] Configuration found for 20.0.0.1[500]._ 2000 Jan 1 04:13:39 [FVS336Gv2] [IKE] Received request for new phase 1 negotiation: 20.0.0.2[500]20.0.0.1[500]_ 2000 Jan 1 04:13:39 [FVS336Gv2] [IKE] Beginning Identity Protection mode._ 2000 Jan 1 04:13:39 [FVS336Gv2] [IKE] Received Vendor ID: RFC XXXX_ 2000 Jan 1 04:13:39 [FVS336Gv2] [IKE] Received Vendor ID: DPD_ 2000 Jan 1 04:13:39 [FVS336Gv2] [IKE] DPD is Enabled_ 2000 Jan 1 04:13:39 [FVS336Gv2] [IKE] For 20.0.0.1[500], Selected NAT-T version: RFC XXXX_ 2000 Jan 1 04:13:39 [FVS336Gv2] [IKE] Setting DPD Vendor ID_ 2000 Jan 1 04:13:39 [FVS336Gv2] [IKE] Received Vendor ID: KAME/racoon_ 2000 Jan 1 04:13:39 [FVS336Gv2] [IKE] NAT-D payload matches for 20.0.0.2[500]_ 2000 Jan 1 04:13:39 [FVS336Gv2] [IKE] NAT-D payload matches for 20.0.0.1[500]_ 2000 Jan 1 04:13:39 [FVS336Gv2] [IKE] NAT not detected _ 2000 Jan 1 04:13:39 [FVS336Gv2] [IKE] ISAKMP-SA established for 20.0.0.2[500]-20.0.0.1[500] with spi:c56f7a1d42baf28a:68fcf85e3c148bd8_ 2000 Jan 1 04:13:39 [FVS336Gv2] [IKE] Sending Informational Exchange: notify payload[INITIAL-CONTACT]_ Messages 22 and 23 Messages 24 and 25 2000 Jan 1 04:13:40 [FVS336Gv2] [IKE] Responding to new phase 2 negotiation: 20.0.0.2[0]20.0.0.1[0]_ 2000 Jan 1 04:13:40 [FVS336Gv2] [IKE] Using IPSec SA configuration: 192.168.11.0/24192.168.10.0/24_ 2000 Jan 1 04:13:41 [FVS336Gv2] [IKE] IPSec-SA established: ESP/Tunnel 20.0.0.1->20.0.0.2 with spi=34046092(0x207808c)_ 2000 Jan 1 04:13:41 [FVS336Gv2] [IKE] IPSec-SA established: ESP/Tunnel 20.0.0.2->20.0.0.1 with spi=87179451(0x53240bb)_ Explanation Message 1–5: IPSec, IKE, and VPN firewall restart. Message 6–7: IPSec and IKE configurations are added with the identifier “pol1.” Message 8–19: New phase 1 negotiation starts by determining the configuration for the WAN host. Dead Peer Detection (DPD) is enabled and set. NAT payload matching and NAT detection are done. Message 20–21: ISAKMP-SA is established between the two WANs and information is exchanged. Message 22–23: New phase 2 negotiation starts by using IPSec SA configuration pertaining to the LAN hosts. Message 24–25: IPSec-SA VPN tunnel is established.
System Logs and Error Messages 652 ProSAFE Dual WAN Gigabit WAN SSL VPN Firewall FVS336Gv2 Recommended action None Table 30. System logs: IPSec VPN tunnel, SA lifetime (150 sec in phase 1; 300 sec in phase 2), VPN tunnel is reestablished Message 1 Messages 2 through 6 Message 7 Messages 8 through 11 2000 Jan 1 04:32:25 [FVS336Gv2] [IKE] Sending Informational Exchange: delete payload[]_ 2000 Jan 1 04:32:25 [FVS336Gv2] [IKE] purged IPSec-SA proto_id=ESP spi= 181708762._ 2000 Jan 1 04:32:25 [FVS336Gv2] [IKE] purged IPSec-SA proto_id=ESP spi= 153677140._ 2000 Jan 1 04:32:25 [FVS336Gv2] [IKE] an undead schedule has been deleted: pk_recvupdate._ 2000 Jan 1 04:32:25 [FVS336Gv2] [IKE] IPSec configuration with identifier pol1 deleted successfully_ 2000 Jan 1 04:32:25 [FVS336Gv2] [IKE] no phase 2 bounded._ 2000 Jan 1 04:32:25 [FVS336Gv2] [IKE] Sending Informational Exchange: delete payload[]_ 2000 Jan 1 04:32:25 [FVS336Gv2] [IKE] Purged ISAKMP-SA with spi= d67f2be9ca0cb241:8a094623c6811286._ 2000 Jan 1 04:32:25 [FVS336Gv2] [IKE] an undead schedule has been deleted: purge_remote._ 2000 Jan 1 04:32:25 [FVS336Gv2] [IKE] IKE configuration with identifier pol1 deleted successfully_ 2000 Jan 1 04:32:25 [FVS336Gv2] [IKE] Could not find configuration for 20.0.0.1[500]_ Explanation Message 1: Informational exchange for deleting the payload. Message 2–6: Phase 2 configuration is purged and confirms that no phase 2 is bounded. Message 7: Informational exchange for deleting the payload. Message 8–11: Phase 1 configuration. The VPN tunnel is reestablished. Recommended action None Table 29. System logs: IPSec VPN tunnel, tunnel establishment (continued)
System Logs and Error Messages 653 ProSAFE Dual WAN Gigabit WAN SSL VPN Firewall FVS336Gv2 Table 31. System logs: IPSec VPN tunnel, SA lifetime (150 sec in phase 1; 300 sec in phase 2), VPN tunnel not reestablished Message 2000 Jan 1 04:52:33 [FVS336Gv2] [IKE] Using IPSec SA configuration: 192.168.11.0/24192.168.10.0/24_ 2000 Jan 1 04:52:33 [FVS336Gv2] [IKE] Configuration found for 20.0.0.1._ 2000 Jan 1 04:52:59 [FVS336Gv2] [IKE] Phase 1 negotiation failed due to time up for 20.0.0.1[500]. b73efd188399b7f2:0000000000000000_ 2000 Jan 1 04:53:04 [FVS336Gv2] [IKE] Phase 2 negotiation failed due to time up waiting for phase 1. ESP 20.0.0.1->20.0.0.2 _ 2000 Jan 1 04:53:05 [FVS336Gv2] [IKE] Using IPSec SA configuration: 192.168.11.0/24192.168.10.0/24_ 2000 Jan 1 04:53:05 [FVS336Gv2] [IKE] Configuration found for 20.0.0.1._ 2000 Jan 1 04:53:05 [FVS336Gv2] [IKE] Initiating new phase 1 negotiation: 20.0.0.2[500]20.0.0.1[500]_ 2000 Jan 1 04:53:05 [FVS336Gv2] [IKE] Beginning Identity Protection mode._ 2000 Jan 1 04:53:05 [FVS336Gv2] [IKE] Setting DPD Vendor ID_ 2000 Jan 1 04:53:36 [FVS336Gv2] [IKE] Phase 2 negotiation failed due to time up waiting for phase 1. ESP 20.0.0.1->20.0.0.2 _ Explanation Phase 1 and phase 2 negotiations failed because of a mismatch of the WAN IP address in the IPSec VPN policy and the WAN IP address of the remote host attempting to establish the IPSec VPN tunnel. Recommended action None Table 32. System logs: IPSec VPN tunnel, Dead Peer Detection and keep-alive (default 30 sec) Messages 1 through 4 Message 5 Message 6 Message 72000 Jan 1 04:13:39 [FVS336Gv2] [IKE] Received request for new phase 1 negotiation: 20.0.0.2[500]20.0.0.1[500]_ 2000 Jan 1 04:13:39 [FVS336Gv2] [IKE] Beginning Identity Protection mode._ 2000 Jan 1 04:13:39 [FVS336Gv2] [IKE] Received Vendor ID: RFC XXXX_ 2000 Jan 1 04:13:39 [FVS336Gv2] [IKE] Received Vendor ID: DPD_ 2000 Jan 1 04:13:39 [FVS336Gv2] [IKE] DPD is Enabled_ 2000 Jan 1 04:13:39 [FVS336Gv2] [IKE] For 20.0.0.1[500], Selected NAT-T version: RFC XXXX_ 2000 Jan 1 04:13:39 [FVS336Gv2] [IKE] Setting DPD Vendor ID_ Explanation Message 1–4: After receiving a request for phase 1 negotiation, a Dead Peer Detection vendor ID is received. Message 5: DPD is enabled. Message 7: The DPD vendor ID is set. Recommended action None
System Logs and Error Messages 654 ProSAFE Dual WAN Gigabit WAN SSL VPN Firewall FVS336Gv2 Table 33. System logs: IPSec VPN tunnel, Dead Peer Detection and keep-alive (default 30 sec), VPN tunnel torn down Message 1 Message 2 Message 32000 Jan 1 06:01:18 [FVS336Gv2] [VPNKA] Keep alive to peer 192.168.10.2 failed 3 consecutive times and 5 times cumulative_ 2000 Jan 1 06:01:19 [FVS336Gv2] [IKE] DPD R-U-THERE sent to 20.0.0.1[500]_ 2000 Jan 1 06:01:19 [FVS336Gv2] [IKE] DPD R-U-THERE-ACK received from 20.0.0.1[500]_ Explanation Message 1: When the remote host connection is removed and when there are no packets from the remote host, the VPN firewall sends packets to keep the remote host alive. As the connection itself is removed, keep-alive fails. Message 2: The VPN firewall sends packets to check whether the peer is dead. Message 3: The VPN firewall receives an acknowledgment that the peer is dead. The connection is removed. Recommended action None Table 34. System logs: IPSec VPN tunnel, client policy, disconnection from the client side Message 2000 Jan 1 02:34:45 [FVS336Gv2] [IKE] Deleting generated policy for 20.0.0.1[0]_ 2000 Jan 1 02:34:45 [FVS336Gv2] [IKE] an undead schedule has been deleted: pk_recvupdate._ 2000 Jan 1 02:34:45 [FVS336Gv2] [IKE] Purged IPSec-SA with proto_id=ESP and spi=3000608295(0xb2d9a627)._ 2000 Jan 1 02:34:45 [FVS336Gv2] [IKE] Purged IPSec-SA with proto_id=ESP and spi=248146076(0xeca689c)._ 2000 Jan 1 02:34:45 [FVS336Gv2] [IKE] Purged ISAKMP-SA with proto_id= ISAKMP and spi=da1f2efbf0635943:4eb6fae677b2e4f4._ 2000 Jan 1 02:34:46 [FVS336Gv2] [IKE] ISAKMP-SA deleted for 20.0.0.2[500]-20.0.0.1[500] with spi:da1f2efbf0635943:4eb6fae677b2e4f4_ Explanation Phase 2 and phase 1 policies are deleted when the client is disconnected. Recommended action None
System Logs and Error Messages 655 ProSAFE Dual WAN Gigabit WAN SSL VPN Firewall FVS336Gv2 SSL VPN Logs This section describes the log messages that are generated by SSL VPN policies. Table 35. System logs: IPSec VPN tunnel, client policy behind a NAT device Message 3 Message 62000 Jan 1 01:54:21 [FVS336Gv2] [IKE] Floating ports for NAT-T with peer 20.0.0.1[4500]_ 2000 Jan 1 01:54:21 [FVS336Gv2] [IKE] NAT-D payload matches for 20.0.0.2[4500]_ 2000 Jan 1 01:54:21 [FVS336Gv2] [IKE] NAT-D payload does not match for 20.0.0.1[4500]_ 2000 Jan 1 01:54:21 [FVS336Gv2] [IKE] Ignore REPLAY-STATUS notification from 20.0.0.1[4500]._ 2000 Jan 1 01:54:21 [FVS336Gv2] [IKE] Ignore INITIAL-CONTACT notification from 20.0.0.1[4500] because it is only accepted after phase 1._ 2000 Jan 1 01:54:21 [FVS336Gv2] [IKE] NAT detected: Peer is behind a NAT device_ Explanation These logs are generated when the remote WAN host is connected through a device such as the VPN firewall. NAT is detected before phase 1 is established. Message 3: NAT-D does not match the remote host. Message 6: The VPN firewall confirms that the remote host or the peer is behind a NAT device. Recommended action None Table 36. System logs: SSL VPN tunnel, WAN host and interface Message 2000 Jan 1 03:44:55 [FVS336Gv2] [sslvpntunnel] id=FVS336Gv2 time=2000-1-1 3:44:55 fw=20.0.0.2 pri=6 rule=access-policy proto=SSL VPN Tunnel src=20.0.0.1 user=sai dst=20.0.0.2 arg= op= result= rcvd= msg=SSL VPN Tunnel Explanation An SSL VPN tunnel is established for ID FVS336Gv2 with the WAN host 20.0.0.1 through WAN interface 20.0.0.2 and logged in with the user name “sai.” Recommended action None Table 37. System logs: VPN log messages, port forwarding, WAN host and interface Message 2000 Jan 1 01:30:08 [FVS336Gv2] [portforwarding] id=FVS336Gv2 time=2000-1-1 1:30: 8 fw=20.0.0.2 pri=6 rule=access-policy proto=Port Forwarding src=20.0.0.1 user=sai dst=20.0.0.2 arg= op= result= rcvd= msg=Port Forwarding Explanation An SSL VPN tunnel through port forwarding is established for ID FVS336Gv2 with the WAN host 20.0.0.1 through WAN interface 20.0.0.2 and logged in with the user name “sai.” Recommended action None
System Logs and Error Messages 656 ProSAFE Dual WAN Gigabit WAN SSL VPN Firewall FVS336Gv2 Traffic Meter Logs Routing Logs The following sections provide information about routing log messages: •LAN to WAN Logs •LAN to DMZ Logs •DMZ to WAN Logs •WAN to LAN Logs •DMZ to LAN Logs •WAN to DMZ Logs These sections explain the logging messages for the various network segments (such as LAN to WAN) for debugging purposes. These logs might generate a significant volume of messages. Table 38. System logs: VPN log messages, port forwarding, LAN host and interface Message 2000 Jan 1 01:35:41 [FVS336Gv2] [portforwarding] id=FVS336Gv2 time=2000-1-1 1:35:41 fw=192.168.11.1 pri=6 rule=access-policy proto=Virtual Transport (Java) src=192.168.11.2 user=sai dst=192.168.11.1 arg= op= result= rcvd= msg=Virtual Transport (Java) Explanation An SSL VPN tunnel through port forwarding is established for ID FVS336Gv2 from the LAN host 192.168.11.2 with interface 192.168.11.1 and logged in with the user name “sai.” Recommended action None Table 39. System logs: traffic meter Message Jan 23 19:03:44 [TRAFFIC_METER] TRAFFIC_METER: Monthly Limit of 10 MB has reached for WAN1._ Explanation Traffic limit to WAN1 that was set as 10 Mb is reached. This stops all the incoming and outgoing traffic, that is, if you selected the Block All Traffic radio button in the When Limit is Reached section on the WAN TrafficMeter screen. Recommended action To start the traffic, restart the traffic limit counter.
System Logs and Error Messages 657 ProSAFE Dual WAN Gigabit WAN SSL VPN Firewall FVS336Gv2 LAN to WAN Logs LAN to DMZ Logs DMZ to WAN Logs WAN to LAN Logs Table 40. Routing logs: LAN to WAN Message Nov 29 09:19:43 [FVS336Gv2] [kernel] LAN2WAN[ACCEPT] IN=LAN OUT=WAN SRC=192.168.10.10 DST=72.14.207.99 PROTO=ICMP TYPE=8 CODE=0 Explanation • This packet from LAN to WAN is allowed by the firewall. • For other settings, see Table 13 on page 642. Recommended action None Table 41. Routing logs: LAN to DMZ Message Nov 29 09:44:06 [FVS336Gv2] [kernel] LAN2DMZ[ACCEPT] IN=LAN OUT=DMZ SRC=192.168.10.10 DST=192.168.20.10 PROTO=ICMP TYPE=8 CODE=0 Explanation • This packet from LAN to DMZ is allowed by the firewall. • For other settings, see Table 13 on page 642. Recommended action None Table 42. Routing logs: DMZ to WAN Message Nov 29 09:19:43 [FVS336Gv2] [kernel] DMZ2WAN[DROP] IN=DMZ OUT=WAN SRC=192.168.20.10 DST=72.14.207.99 PROTO=ICMP TYPE=8 CODE=0 Explanation • This packet from DMZ to WAN is dropped by the firewall. • For other settings, see Table 13 on page 642. Recommended action None Table 43. Routing logs: WAN to LAN Message Nov 29 10:05:15 [FVS336Gv2] [kernel] WAN2LAN[ACCEPT] IN=WAN OUT=LAN SRC=192.168.1.214 DST=192.168.10.10 PROTO=ICMP TYPE=8 CODE=0 Explanation • This packet from LAN to WAN is allowed by the firewall. • For other settings, see Table 13 on page 642. Recommended action None
System Logs and Error Messages 658 ProSAFE Dual WAN Gigabit WAN SSL VPN Firewall FVS336Gv2 DMZ to LAN Logs WAN to DMZ Logs Other Event Logs The following sections provide information about other event messages: •Session Limit Logs •Source MAC Filter Logs •Bandwidth Limit Logs These sections describe the log messages generated by other events such source MAC filtering, session limiting, and bandwidth limiting. For information about how to select these logs, see Manage Logging, Alerts, and Event Notifications on page 567. Session Limit Logs Table 44. Routing logs: DMZ to WAN Message Nov 29 09:44:06 [FVS336Gv2] [kernel] DMZ2LAN[DROP] IN=DMZ OUT=LAN SRC=192.168.20.10 DST=192.168.10.10 PROTO=ICMP TYPE=8 CODE=0 Explanation • This packet from DMZ to LAN is dropped by the firewall. • For other settings, see Table 13 on page 642. Recommended action None Table 45. Routing logs: WAN to DMZ Message Nov 29 09:19:43 [FVS336Gv2] [kernel] WAN2DMZ[ACCEPT] IN=WAN OUT=DMZ SRC=192.168.1.214 DST=192.168.20.10 PROTO=ICMP TYPE=8 CODE=0 Explanation • This packet from WAN to DMZ is allowed by the firewall. • For other settings, see Table 13 on page 642. Recommended action None Table 46. Other event logs: session limit logs Message 2000 Jan 1 06:53:33 [FVS336Gv2] [kernel] SESS_LIMIT[DROP] IN=LAN OUT= WAN SRC=192.168.11.2 DST=20.0.0.1 PROTO=TCP SPT=50709 DPT=21 Explanation When two FTP sessions are established from the same LAN host at IP address 192.168.11.2 and a session limit (SESS_LIMIT) is set as 1, the FTP packets from the second session are dropped. Recommended action Change the session limit to 2 to prevent packets from being dropped.