Security Events

Security Events

The following article provides an overview of all security events processed by the Barracuda CloudGen Firewall.

Event-ID

Description

Relevance

Severity

Notification

Persistent

Event-ID

Description

Relevance

Severity

Notification

Persistent

53

Duplicate IP Detected 

An IP address living on the system has additionally been detected in the network.

Warning 

2

yes

140

Mail Size Limit Exceeded 

The size of an email has exceeded the configured limit. This event is only reported when parameter Limit Mail Data Size is set to yes.

Notice

2

no

300 

User ID (UID) Invalid 

Invalid system user ID. See log for details.

Security 

3

no

304 

Reserved Login ID Used 

Apple notification. Apple ID was used to sign in to a device.

Security 

3

no

2400

Config Node Change Notice 

A configuration file has been edited in the Barracuda Firewall Control Center configuration tree. "Config node change" events are only reported if event notification has been configured for configuration file changes (CC context menu entry Properties …). The following events apply:

  • Normal Event - Event-ID 2400

  • Notice Event - Event-ID 2401

  • Alert Event - Event-ID 2402

Notice

2

no

2401

Config Node Change Warning 

Warning 

2

no

2402

Config Node Change Alert 

Security 

3

no

2420

NG Firewall Login Notice 

An application has been granted administrative access to the system. Barracuda Networks applications generate "Barracuda Networks Subystem Login" notifications every time a user has successfully logged into an application that interacts with the graphical administration tool Barracuda Firewall Admin (for example: control, event, statistics, config). The severity level for notifications regarding access to box services is configurable in CONFIGURATION > Configuration Tree > Box > Advanced Configuration > Access Notification. Notifications for other services may be customized per service.

Notice

2

no

2421

NG Firewall Login Warning

Warning 

2

no

2422

NG Firewall Login Alert 

Security 

3

no

2510

FW Global Connection Limit Exceeded

The number of total sessions allowed for a request has been exceeded (see: General Firewall Configuration ).

Security

3

yes

2600

DHCP Lease Deleted 

A DHCP lease has been deleted from the database.

Notice 

2

no

3003

VPN Server On Demand Tunnel Activated

An on-demand VPN site-to-site tunnel has been activated.

Notice 

1

no

3004

VPN Server On Demand Tunnel Deactivated

An on-demand VPN site-to-site tunnel has been deactivated. 

Notice 

1

no

3005

VPN Client Connected

A user establishes a client-to-site VPN tunnel.

Notice 

2

no

3006

VPN Client Disconnected

A user terminates a client-to-site VPN tunnel.

Notice 

2

no

3011

CRL Collection Failed 

The collection of the Certificate Revocation List (CRL) has failed. Paths to CRLs are defined in the VPN Settings > Root Certificates > Certificate Revocation. Polling for CRL retrieval is defined through the parameter CRL Poll Time.

Security

3

no

3012

VPN Client Version 

Connection refused due to invalid VPN Client version.

Warning 

2

no

3013

Antivir Pattern Update Failed 

An update to the recent Virus Scanner definitions has not succeeded. 

Security 

3

no

4000

FW Port Scan Detected 

The number of blocked requests has exceeded the port scan threshold within the configured port scan detection interval. Limit values can be customized in the Port Scan Policy section. Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > General Firewall Configuration > Operational

Notice 

2

no

4002

FW Flood Ping Protection
Activated

The minimum delay time for pinging defined in a firewall service object has been under-run and the connection has therefore been blocked by the FW.

Warning

2

no

4004

FW Activating Perimeter
Defense (inbound mode)

The inbound mode threshold (%) value specified in the local firewall settings (see: General Firewall Configuration ) has been exceeded.

Security 

3

no

4006

FW Pending TCP Connection
Limit Reached

The number of pending TCP sessions per source IP exceeds the allowed maximum. Requests initiating further pending sessions will be blocked. The threshold is configurable in the Firewall Forwarding Settings > Firewall tab (parameter Max. Pending Forward Accepts/Src).

Security 

3

no

4008

FW UDP Connection per Source Limit Exceeded

The maximum number of UDP sessions per source IP has been exceeded. The thresholds can be configured in the Local Firewall Settings > Session Limits tab (parameter Max Local-In UDP/Src) and in the Firewall Forwarding Settings > Firewall tab (parameter Max. Forwarding UDP/Src).

Warning

2

no

4009

FW UDP Connection Limit Exceeded

The maximum number of UDP sessions has been exceeded. The threshold can be configured in the Local Firewall Settings > Session Limits tab (parameter Max UDP (%)).

Security

3

no

4010

FW Oversized SYN Packet
Dumped

An oversized SYN packet has been dropped by the firewall. 

Notice 

2

no

4012

FW Large ICMP Packet Dumped 

An ICMP-ECHO packet larger than the configured maximum ping size (see: Service Objects) has been dropped by the firewall.

Notice 

2

no

4014

FW IP Spoofing Attempt Detected

An IP spoofing attempt has been discovered. 

Notice 

4

no

4015

FW Potential IP Spoofing Attempt

A SYN flooding attack has been identified (see: Best Practice - Protect Against TCP SYN Flooding Attacks with TCP Accept Policies).

Notice 

4

no

4016

FW Rule Connection Limit Exceeded

The maximum number of concurrent connections allowed per rule has been exceeded. The maximum value is defined by the parameter Max. Number of Sessions (see: General Firewall Configuration).

Warning

2

no

4018

FW Rule Connection per Source
Limit Exceeded

The maximum number of concurrent connections allowed per rule and source has been exceeded. The maximum value is defined by the parameter Max. Number of Sessions per Source (see: General Firewall Configuration).

Warning

2

no

4020

FW Rule Notice 

A firewall rule equipped with event generation has been processed. The severity level of the generated event is defined by the rule (see: How to Configure Event Notifications).

Notice

2

no

4021

FW Rule Warning 

A firewall rule generating event log type `warning` has been processed.

Warning 

2

no

4022

FW Rule Alert 

A firewall rule generating event log type `alert` has been processed.

Security 

3

no

4023

FW Rule Idle Alert

This event is triggered if an access rule has not been used for a configured period of time.

Security

3

no

4024

FW Global Connection per

Source Limit Exceeded

The maximum number of concurrent connections allowed per source has been exceeded. The maximum value is defined by parameters Max Local-In Session/Src in the Local Firewall Settings and Max. Forwarding Session/Src in the Forwarding Firewall Settings.

Warning

2

no

4026 

FW ICMP-ECHO Connection per

Source Limit Exceeded

The maximum number of concurrent ICMP-ECHO connections allowed per source has been exceeded. The maximum value is defined by parameters Max Local-In Echo/Src in the Local Firewall Settings and Max. Forwarding Echo/Src in the Forwarding Firewall Settings.

Warning

2

no

4027

FW ICMP-ECHO Connection

Limit Exceeded

The maximum number of ICMP-ECHO connections has been exceeded. The threshold can be configured in the Local Firewall Settings > Session Limits tab (parameter Max Echo (%) (see: General Firewall Configuration).

Warning

2

no

 4028

FW OTHER-IP Connection per

Source Limit Exceeded

The maximum number of concurrent OTHER-IP connections (all IP protocols except TCP, UDP, and ICMP) allowed per source has been exceeded. The maximum value is defined by parameters Max Local-In Other/Src in the Local Firewall Settings and Max. Forwarding Other/Src in the Forwarding Firewall Settings.

 

 

Warning

 2

no 

4029

FW OTHER-IP Session Limit
Exceeded

 

The maximum number of OTHER-IP sessions (all IP protocols except TCP, UDP, and ICMP) has been exceeded. The threshold can be configured in the Local Firewall Settings > Session Limits tab (parameter Max Other (%).

 

 

Warning

 2

 no

4050

FW ARP MAC Address Changed 

ARP has detected a MAC address change. 

Notice 

2

no

4051

FW ARP Ambiguous Duplicate
Reply

ARP has detected a duplicate MAC address. 

Notice 

2

no

4052

FW ARP Request Device
Mismatch

ARP has detected a device mismatch. 

Notice 

2

no

4053