TMS zl Management and Configuration Guide ST.1.0.090213
C-11
Log Messages
Log Message Formats and Fields
VPN: IPsec
Log messages from IPsec version 4 (id=vpn_ipsecipv4) may contain these fields
in addition to the VPN fields:
Table C-6. VPN IPsec v4 Message Family Fields
Field Name Value Format Description
bytes_processed_type [PLAIN_TO_ENCRYPTED |
ENCRYPTED_TO_PLAIN]
Indicates the direction of the packet, whether entering the
VPN tunnel (plain-to-encrypted) or exiting the VPN tunnel
(encrypted-to-plain)
no_of_bytesprocessed integer The number of bytes processed on a particular SA
no_of_packets_processed integer The total number of packets processed on this particular SA
packets_processed_type [PLAIN_TO_ENCRYPTED |
ENCRYPTED_TO_PLAIN]
Indicates the direction of the packet, whether entering the
VPN tunnel (plain-to-encrypted) or exiting the VPN tunnel
(encrypted-to-plain)
pathmtu integer The maximum transmission unit of the path, used in Red-side
fragmentation
peer_sgid_type [none | ipv4address | FQDN] The peer security gateway ID type. This field is “none” if you
used IKE to negotiate the IPsec VPN
per_sgid_data [null | x.x.x.x |
subdomain.domain.tld]
The peer security gateway ID data, This field is blank if you
used IKE to negotiate the IPsec VPN
policyid integer IPsec policy number (priority), as shown in the Position
column on IPsec > IPsec > IPsec Policies
secprotocol [IPComp | ESP | AH] The security protocol that was used
sequencenum integer The sequence number, used in the anti-replay check
spi integer The security parameters index number for the IPsec SA
tunnelid integer The ID of the policy in the tunnel database. Used in case of
route-based VPN