Skip to main content
Skip table of contents

V 2.0 Flood/Packet Threat Messages 1

Vendor Documentation

Classification

Rule Name

Rule Type

Common Event

Classification

V 2.0 Flood/Packet Threat Messages

Base Rule

General Threat Message

Activity

V 2.0 Potential Denial Of Service DetectedSub RuleNetwork Denial Of Service

Denial Of Service

V 2.0 Potential Denial Of Service BlockedSub RuleFailed Network Denial Of ServiceFailed Denial of Service
V 2.0 Potentially Threatening Packet DroppedSub RuleFailed General Attack ActivityFailed Attack
V 2.0 Potentially Threatening Packet AllowedSub RuleGeneral Attack ActivityAttack

Mapping with LogRhythm Schema  

Device Key in Log MessageLogRhythm SchemaData TypeSchema Description
Type (type)<vmid>Text/StringSpecifies the type of log; the value is THREAT.
Threat/Content Type (subtype)<vendorinfo>
<tag1>
Text/StringA subtype of threat log. Values include the following:
  • data—Data pattern matching a Data Filtering profile.
  • file—File type matching a File Blocking profile.
  • flood—Flood detected via a Zone Protection profile.
  • packet—Packet-based attack protection triggered by a Zone Protection profile.
  • scan—Scan detected via a Zone Protection profile.
  • spyware —Spyware detected via an Anti-Spyware profile.
  • url—URL filtering log.
  • ml-virus—Virus detected by WildFire Inline ML via an Antivirus profile.
  • virus—Virus detected via an Antivirus profile.
  • vulnerability —Vulnerability exploit detected via a Vulnerability Protection profile.
  • wildfire —A WildFire verdict is generated when the firewall submits a file to WildFire per a WildFire Analysis profile and a verdict (malware, phishing, grayware, or benign, depending on what you are logging) is logged in the WildFire Submissions log.
  • wildfire-virus—Virus detected via an Antivirus profile.
Source address (src)<sip>IP AddressOriginal session source IP address
Destination address (dst)<dip>IP AddressOriginal session destination IP address
NAT Source IP (natsrc)<snatip>IP AddressIf Source NAT is performed, the post-NAT Source IP address
NAT Destination IP (natdst)<dnatip>IP AddressIf Destination NAT is performed, the post-NAT Destination IP address
Rule Name (rule)<policy>Text/StringName of the rule that the session matched
Inbound Interface (inbound_if)<sinterface>Text/StringInterface that the session was sourced from
Outbound Interface (outbound_if)<dinterface>Text/StringInterface that the session was destined to
IP Protocol (proto)<protname>Text/StringIP protocol associated with the session
Action (action)<action>
<tag2>
Text/StringAction is taken for the session; values are alert, allow, deny, drop, drop-all-packets, reset-client, reset-server, reset-both, block-url.
alert—threat or URL detected but not blocked
allow— flood detection alert
deny—flood detection mechanism activated and deny traffic based on configuration
drop— threat detected and associated session was dropped
reset-client —threat detected and a TCP RST is sent to the client
reset-server —threat detected and a TCP RST is sent to the server
reset-both —threat detected and a TCP RST is sent to both the client and the server
block-url —URL request was blocked because it matched a URL category that was set to be blocked
block-ip—threat detected and client IP is blocked
random-drop—flood detected and the packet was randomly dropped
sinkhole—DNS sinkhole activated
syncookie-sent—syncookie alert
block-continue (URL subtype only)—an HTTP request is blocked and redirected to a Continue page with a button for confirmation to proceed
continue (URL subtype only)—response to a block-continue URL continue page indicating a block-continue request was allowed to proceed
block-override (URL subtype only)—an HTTP request is blocked and redirected to an Admin override page that requires a passcode from the firewall administrator to continue
override-lockout (URL subtype only)—too many failed admin override passcode attempts from the source IP. IP is now blocked from the block-override redirect page
override (URL subtype only)—response to a block-override page where a correct passcode is provided and the request is allowed
block (Wildfire only)—file was blocked by the firewall and uploaded to Wildfire
Threat/Content Name (threatID)<threatname>
<threatid>
Text/String/NumberPalo Alto Networks identifier for the threat. It is a description string followed by a 64-bit numerical identifier in parentheses for some Subtypes
Severity (severity)<severity>Text/StringSeverity associated with the threat; values are informational, low, medium, high, critical.
Device Name (device_name)<objectname>Text/StringThe hostname of the firewall on which the session was logged.
Application Characteristic (characteristic_of_app)**<result>Text/StringComma-separated list of applicable characteristics of the application
JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.