Messages 715001 to 715080
This section includes messages from 715001 to 715080.
715001
Error Message
%FTD-7-715001: Descriptive statement
Explanation A description of an event or problem encountered by the Secure Firewall Threat Defense device appears.
Recommended Action The action depends on the description.
715004
Error Message
%FTD-7-715004: subroutine name () Q Send failure: RetCode (return_code )
Explanation An internal error occurred when attempting to put messages in a queue.
Recommended Action This is often a benign condition. If the problem persists, contact the Cisco TAC.
715005
Error Message
%FTD-7-715005: subroutine name() Bad message code: Code (message_code )
Explanation An internal subroutine received a bad message code.
Recommended Action This is often a benign condition. If the problem persists, contact the Cisco TAC.
715006
Error Message
%FTD-7-715006: IKE got SPI from key engine: SPI = SPI_value
Explanation The IKE subsystem received an SPI value from IPsec.
Recommended Action None required.
715007
Error Message
%FTD-7-715007: IKE got a KEY_ADD msg for SA: SPI = SPI_value
Explanation IKE has completed tunnel negotiation and has successfully loaded the appropriate encryption and hashing keys for IPsec use.
Recommended Action None required.
715008
Error Message
%FTD-7-715008: Could not delete SA SA_address, refCnt = number , caller = calling_subroutine_address
Explanation The calling subroutine cannot delete the IPsec SA. This might indicate a reference count problem.
Recommended Action If the number of stale SAs grows as a result of this event, contact the Cisco TAC.
715009
Error Message
%FTD-7-715009: IKE Deleting SA: Remote Proxy IP_address , Local Proxy IP_address
Explanation SA is being deleted with the listed proxy addresses.
Recommended Action None required.
715013
Error Message
%FTD-7-715013: Tunnel negotiation in progress for destination IP_address , discarding data
Explanation IKE is in the process of establishing a tunnel for this data. All packets to be protected by this tunnel will be dropped until the tunnel is fully established.
Recommended Action None required.
715018
Error Message
%FTD-7-715018: IP Range type id was loaded: Direction %s, From: %a, Through: %a
Explanation This syslog message is generated while updating IPSEC SA details.
Recommended Action None required.
715019
Error Message
%FTD-7-715019: Group group Username username IP ip IKEGetUserAttributes: Attribute name = name
Explanation The modecfg attribute name and value pair being processed by the Secure Firewall Threat Defense device appear.
Recommended Action None required.
715020
Error Message
%FTD-7-715020: construct_cfg_set: Attribute name = name
Explanation The modecfg attribute name and value pair being transmitted by the Secure Firewall Threat Defense device appear.
Recommended Action None required.
715021
Error Message
%FTD-7-715021: Delay Quick Mode processing, Cert/Trans Exch/RM DSID in progress
Explanation Quick mode processing is being delayed until all Phase 1 processing has been completed (for transaction mode).
Recommended Action None required.
715022
Error Message
%FTD-7-715022: Resume Quick Mode processing, Cert/Trans Exch/RM DSID completed
Explanation Phase 1 processing has completed, and quick mode is being resumed.
Recommended Action None required.
715027
Error Message
%FTD-7-715027: IPsec SA Proposal # chosen_proposal , Transform # chosen_transform acceptable Matches global IPsec SA entry # crypto_map_index
Explanation The indicated IPsec SA proposal and transform were selected from the payloads that the responder received. This data can be useful when attempting to debug IKE negotiation issues.
Recommended Action None required.
715028
Error Message
%FTD-7-715028: IKE SA Proposal # 1, Transform # chosen_transform acceptable Matches global IKE entry # crypto_map_index
Explanation The indicated IKE SA transform was selected from the payloads that the responder received. This data can be useful when attempting to debug IKE negotiation issues.
Recommended Action None required.
715031
Error Message
%FTD-7-715031: Obtained IP addr (%s) prior to initiating Mode Cfg (XAuth %s)
Explanation This syslog is generated when the IP address is assigned by the IP util subsystem.
Recommended Action None required.
715032
Error Message
%FTD-7-715032: Sending subnet mask (%s) to remote client
Explanation This syslog is generated when the IP address is assigned by the IP util subsystem.
Recommended Action None required.
715033
Error Message
%FTD-7-715033: Processing CONNECTED notify (MsgId message_number )
Explanation The Secure Firewall Threat Defense device is processing a message containing a notify payload with the notify type CONNECTED (16384). The CONNECTED notify type is used to complete the commit bit processing and should be included in the fourth overall quick mode packet, which is sent from the responder to the initiator.
Recommended Action None required.
715034
Error Message
%FTD-7-715034: action IOS keep alive payload: proposal=time 1 /time 2 sec.
Explanation Processing for sending or receiving a keepalive payload message is being performed.
Recommended Action None required.
715035
Error Message
%FTD-7-715035: Starting IOS keepalive monitor: seconds sec.
Explanation The keepalive timer will monitor for a variable number of seconds for keepalive messages.
Recommended Action None required.
715036
Error Message
%FTD-7-715036: Sending keep-alive of type notify_type (seq number number )
Explanation Processing for sending a keepalive notify message is being performed.
Recommended Action None required.
715037
Error Message
%FTD-7-715037: Unknown IOS Vendor ID version: major.minor.variance
Explanation The capabilities of this version of the Cisco IOS are not known.
Recommended Action There may be interoperability issues with features such as IKE keepalives. If the problem persists, contact the Cisco TAC.
715038
Error Message
%FTD-7-715038: action Spoofing_information Vendor ID payload (version: major.minor.variance , capabilities: value )
Explanation Processing for the Cisco IOS vendor ID payload has been performed. The action being performed might be Altiga spoofing the Cisco IOS.
Recommended Action None required.
715039
Error Message
%FTD-7-715039: Unexpected cleanup of tunnel table entry during SA delete.
Explanation An entry in the IKE tunnel table was never removed when the SA was freed. This indicates a defect in the state machine.
Recommended Action If the problem persists, contact the Cisco TAC.
715040
Error Message
%FTD-7-715040: Deleting active auth handle during SA deletion: handle = internal_authentication_handle
Error Message The authentication handle was still active during SA deletion. This is part of cleanup recovery during the error condition.
Recommended Action None required.
715041
Error Message
%FTD-7-715041: Received keep-alive of type keepalive_type , not the negotiated type
Explanation A keepalive of the type indicated in the message was received unexpectedly.
Recommended Action Check the keepalive configuration on both peers.
715042
Error Message
%FTD-7-715042: IKE received response of type failure_type to a request from the IP_address utility
Explanation A request for an IP address for a remote access client from the internal utility that provides these addresses cannot be satisfied. Variable text in the message string indicates more specifically what went wrong.
Recommended Action Check the IP address assignment configuration and adjust accordingly.
715044
Error Message
%FTD-7-715044: Ignoring Keepalive payload from vendor not support KeepAlive capability
Explanation A Cisco IOS keepalive payload from a vendor was received without keepalive capabilities being set. The payload is ignored.
Recommended Action None required.
715045
Error Message
%FTD-7-715045: ERROR: malformed Keepalive payload
Explanation A malformed keepalive payload has been received. The payload is ignored.
Recommended Action None required.
715046
Error Message
%FTD-7-715046: Group = groupname , Username = username , IP = IP_address , constructing payload_description payload
Explanation An IP address from a remote client for a specific group and user shows details about the IKE payload being constructed.
Recommended Action None required.
715047
Error Message
%FTD-7-715047: processing payload_description payload
Explanation Details of the IKE payload received and being processed appear.
Recommended Action None required.
715048
Error Message
%FTD-7-715048: Send VID_type VID
Explanation The type of vendor ID payload being sent appears.
Recommended Action None required.
715049
Error Message
%FTD-7-715049: Received VID_type VID
Explanation The type of vendor ID payload received appears.
Recommended Action None required.
715050
Error Message
%FTD-7-715050: Claims to be IOS but failed authentication
Explanation The vendor ID received looks like a Cisco IOS VID, but does not match hmac_sha.
Recommended Action Check the vendor ID configuration on both peers. If this issue affects interoperability and the problem persists, contact the Cisco TAC.
715051
Error Message
%FTD-7-715051: Received unexpected TLV type TLV_type while processing FWTYPE ModeCfg Reply
Explanation An unknown TLV was received in an Secure Firewall Threat Defense record while an FWTYPE ModeCfg Reply was being processed. The TLV will be discarded. This might occur either because of packet corruption or because the connecting client supports a later version of the Secure Firewall Threat Defense protocol.
Recommended Action Check the personal FW installed on the Cisco VPN client and the personal firewall configuration on the Secure Firewall Threat Defense device. This may also indicate a version mismatch between the VPN client and the Secure Firewall Threat Defense device.
715052
Error Message
%FTD-7-715052: Old P1 SA is being deleted but new SA is DEAD, cannot transition centries
Explanation The old P1 SA is being deleted, but has no new SA to transition to because it was marked for deletion as well. This generally indicates that the two IKE peers are out-of-sync with each other and may be using different rekey times. The problem should correct itself, but there may be some small amount of data loss until a fresh P1 SA is reestablished.
Recommended Action None required.
715053
Error Message
%FTD-7-715053: MODE_CFG: Received request for attribute_info !
Explanation The Secure Firewall Threat Defense device received a mode configuration message requesting the specified attribute.
Recommended Action None required.
715054
Error Message
%FTD-7-715054: MODE_CFG: Received attribute_name reply: value
Explanation The Secure Firewall Threat Defense received a mode configuration reply message from the remote peer.
Recommended Action None required.
715055
Error Message
%FTD-7-715055: Send attribute_name
Explanation The Secure Firewall Threat Defense device sent a mode configuration message to the remote peer.
Recommended Action None required.
715056
Error Message
%FTD-7-715056: Client is configured for TCP_transparency
Explanation Because the remote end (client) is configured for IPsec over TCP, the headend Secure Firewall Threat Defense device must not negotiate IPsec over UDP or IPsec over NAT-T with the client.
Recommended Action The NAT transparency configuration may require adjustment of one of the peers if the tunnel does not come up.
715057
Error Message
%FTD-7-715057: Auto-detected a NAT device with NAT-Traversal. Ignoring IPsec-over-UDP configuration.
Explanation IPsec-over-UDP mode configuration information will not be exchanged because NAT-Traversal was detected.
Recommended Action None required.
715058
Error Message
%FTD-7-715058: NAT-Discovery payloads missing. Aborting NAT-Traversal.
Explanation The remote end did not provide NAT-Discovery payloads required for NAT-Traversal after exchanging NAT-Traversal VIDs. At least two NAT-Discovery payloads must be received.
Recommended Action This may indicate a nonconforming NAT-T implementation. If the offending peer is a Cisco product and the problem persists, contact the Cisco TAC. If the offending peer is not a Cisco product, then contact the manufacturer support team.
715059
Error Message
%FTD-7-715059: Proposing/Selecting only UDP-Encapsulated-Tunnel and UDP-Encapsulated-Transport modes defined by NAT-Traversal
Explanation You need to use these modes instead of the usual transport and tunnel modes defined in the SA to successfully negotiate NAT-Traversal.
Recommended Action None required.
715060
Error Message
%FTD-7-715060: Dropped received IKE fragment. Reason: reason
Explanation The reason for dropping the fragment appears.
Recommended Action The recommended action depends on the drop reason, but might indicate a problem with an intervening NAT device or a nonconforming peer.
715061
Error Message
%FTD-7-715061: Rcv'd fragment from a new fragmentation set. Deleting any old fragments.
Explanation A resend of the same packet occurred, but fragmented to a different MTU, or another packet altogether.
Recommended Action None required.
715062
Error Message
%FTD-7-715062: Error assembling fragments! Fragment numbers are non-continuous.
Explanation There is a gap in fragment numbers.
Recommended Action This might indicate a network problem. If the condition persists and results in dropped tunnels or prevents certain peers from negotiating with the Secure Firewall Threat Defense device, contact the Cisco TAC.
715063
Error Message
%FTD-7-715063: Successfully assembled an encrypted pkt from rcv'd fragments!
Explanation Assembly for a fragmented packet that was received was successful.
Recommended Action None required.
715064
Error Message
%FTD-7-715064 -- IKE Peer included IKE fragmentation capability flags: Main Mode: true /false Aggressive Mode: true /false
Explanation The peer supports IKE fragmentation based on the information provided in the message.
Recommended Action None required.
715065
Error Message
%FTD-7-715065: IKE state_machine subtype FSM error history (struct data_structure_address ) state , event : state /event pairs
Explanation A Phase 1 error occurred and the state, event history pairs will be displayed in reverse chronological order.
Recommended Action Most of these errors are benign. If the problem persists, contact the Cisco TAC.
715066
Error Message
%FTD-7-715066: Can't load an IPsec SA! The corresponding IKE SA contains an invalid logical ID.
Explanation The logical ID in the IKE SA is NULL. The Phase II negotiation will be torn down.
Recommended Action An internal error has occurred. If the problem persists, contact the Cisco TAC.
715067
Error Message
%FTD-7-715067: QM IsRekeyed: existing sa from different peer, rejecting new sa
Explanation The LAN-TO-LAN SA that is being established already exists, that is, an SA with the same remote network, but is sourced from a different peer. This new SA will be deleted, because this is not a legal configuration.
Recommended Action Check the LAN-TO-LAN configuration on all associated peers. Specifically, multiple peers should not be sharing private networks.
715068
Error Message
%FTD-7-715068: QM IsRekeyed: duplicate sa found by address , deleting old sa
Explanation The remote access SA that is being established already exists, that is, an SA with the same remote network, but is sourced from a different peer. The old SA will be deleted, because the peer may have changed its IP address.
Recommended Action This may be a benign condition, especially if a client tunnel was terminated abruptly. If the problem persists, contact the Cisco TAC.
715069
Error Message
%FTD-7-715069: Invalid ESP SPI size of SPI_size
Explanation The Secure Firewall Threat Defense device received an IPsec SA proposal with an invalid ESP SPI size. This proposal will be skipped.
Recommended Action Generally, this is a benign condition but might indicate that a peer may be nonconforming. If the problem persists, contact the Cisco TAC.
715070
Error Message
%FTD-7-715070: Invalid IPComp SPI size of SPI_size
Explanation The Secure Firewall Threat Defense device received an IPsec SA proposal with an invalid IPComp SPI size. This proposal will be skipped.
Recommended Action Generally, this is a benign condition but might indicate that a peer is nonconforming. If the problem persists, contact the Cisco TAC.
715071
Error Message
%FTD-7-715071: AH proposal not supported
Explanation The IPsec AH proposal is not supported. This proposal will be skipped.
Recommended Action None required.
715072
Error Message
%FTD-7-715072: Received proposal with unknown protocol ID protocol_ID
Explanation The Secure Firewall Threat Defense device received an IPsec SA proposal with an unknown protocol ID. This proposal will be skipped.
Recommended Action Generally, this is a benign condition, but might indicate that a peer is nonconforming. If the problem persists, contact the Cisco TAC.
715074
Error Message
%FTD-7-715074: Could not retrieve authentication attributes for peer IP_address
Explanation The Secure Firewall Threat Defense device cannot get authorization information for the remote user.
Recommended Action Make sure that authentication and authorization settings have been configured correctly. If the problem persists, contact the Cisco TAC.
715075
Error Message
%FTD-7-715075: Group = group_name , IP = IP_address Received keep-alive of type message_type (seq number number )
Explanation This message is paired with DPD R-U-THERE message 715036, which logs the DPD sending messages.
- group_name—The VPN group name of the peer
- IP_address—IP address of the VPN peer
- message_type—The message type (DPD R-U-THERE or DPD R-U-THERE-ACK)
- number—The DPD sequence number
Two possible cases:
- Received peer sending DPD R-U-THERE message
- Received peer reply DPD R-U-THERE-ACK message
Be aware of the following:
- The DPD R-U-THERE message is received and its sequence number matches the outgoing DPD reply messages.
If the Secure Firewall Threat Defense device sends a DPD R-U-THERE-ACK message without first receiving a DPD R-U-THERE message from the peer, it is likely experiencing a security breech.
- The received DPD R-U-THERE-ACK message's sequence number is matched with previously sent DPD messages.
If the Secure Firewall Threat Defense device did not receive a DPD R-U-THERE-ACK message within a reasonable amount of time after sending a DPD R-U-THERE message to the peer, the tunnel is most likely down.
Recommended Action None required.
715076
Error Message
%FTD-7-715076: Computing hash for ISAKMP
Explanation IKE computed various hash values.
This object will be prepended as follows:
Group = >groupname , Username = >username , IP = >ip_address ...
Recommended Action None required.
715077
Error Message
%FTD-7-715077: Pitcher: msg string , spi spi
Explanation Various messages have been sent to IKE.
msg_string can be one of the following:
- Received a key acquire message
- Received SPI for nonexistent SA
- Received key delete msg
- Received KEY_UPDATE
- Received KEY_REKEY_IB
- Received KEY_REKEY_OB
- Received KEY_SA_ACTIVE
- Could not find IKE SA to activate IPSEC (OB)
- Could not find IKE SA to rekey IPSEC (OB)
- KEY_SA_ACTIVE no centry found
- KEY_ADD centry not found
- KEY_UPDATE centry not found
This object will be prepended as follows:
Group = >groupname , Username = >username , IP = >ip_address ,...
Recommended Action None required.
715078
Error Message
%FTD-7-715078: Received %s LAM attribute
Explanation This syslog is generated during parsing of challenge/response payload.
Recommended Action None required.
715079
Error Message
%FTD-7-715079: INTERNAL_ADDRESS: Received request for %s
Explanation This syslog is generated during processing of internal address payload.
Recommended Action None required.
715080
Error Message
%FTD-7-715080: VPN: Starting P2 rekey timer: 28800 seconds.
Error Message An IKE rekey timer has started.
Recommended Action None required.