ScreenOS 5.4.0 Messages--Text Only P/N 093-1823-000, Rev. A Addresses Alarm SCAN-MGR: Cannot get {AltServer info | Version number | Path_GateLockCE info} from server.ini file. Notification Address for domain address in zone {added | deleted | modified} . Address for ip address in zone {added | deleted | modified} . Address group {added | deleted | modified} . Address group {added | deleted} session. Address for ip address in zone {add | delete | modify} session. Admin Alert ScreenOS .. Serial# : Asset recovery performed ScreenOS .. Serial # : Asset recovery has been aborted System configuration has been erased Critical Multiple login failures occurred for user from IP address : Multiple login failures occurred for user Warning ADMIN AUTH: Local instance of an external admin user's privilege has been changed from to Vsys admin user has logged { on | out } via { Telnet from : | SSH from : } Vsys admin user has logged { on | out } via the console Admin user has logged { on | out } via { Telnet from : | SSH from : } Admin user has logged { on | out } via the console Management session via { serial console | Telnet from : | SSH from : } for [ vsys ] admin has timed out Login attempt to system by admin via { the console | Telnet from : | SSH from : } has failed Admin user has been forced to log out of the serial console session. Admin user has been forced to log out of the SSH session on host : Admin user has been forced to log out of the Telnet session on host : Admin user has been forced to log out of the Web session on host : ADM: Local admin authentication failed for login name : invalid login name ADM: Local admin authentication failed for login name : invalid password Remotely authenticated Admin demoted from ROOT privilege to RW privilege. Remotely authenticated Admin demoted from privilege to privilege. Admin user has been accepted via the server at Admin user has been rejected via the server at Notification Root admin access restriction through console only has been { enabled | disabled } by admin Single use password restriction for read-write administrators has been { disabled | enabled } by admin Root admin password restriction of minimum characters has been { enabled | disabled } by admin The console timeout value changed from to minutes The console page size changed from to The serial console has been { enabled | disabled } by admin The console debug buffer has been {enabled | disabled } Maximum failed login attempts before administrative session disconnects has been modified from to by admin Information Admin name for account has been modified to Admin password for account has been modified Admin account created for Admin account deleted for Admin account modified for Extraneous exit is issued Management restriction for subnet has been { added | removed } ADSL Notification ADSL Line Up. ADSL Line Training. ADSL Line Down. ADSL SOC Firmware Startup Successful. ADSL SOC Firmware Failed (Load Bootrom Failure). ADSL SOC Firmware Failed (Load Image Failure). ADSL SOC Firmware Failed (push configuration failure). ADSL SOC Firmware Reboot (Keepalive timeout). ADSL SOC Firmware Startup Failure (Wait Startup timeout). ADSL SOC Firmware Reset. ADSL Line UP Fast and Interleave Channels. ADSL Line Waiting for Activating. ADSL Line Activating. ADSL Line Down. ADSL Line UP Fast Channel. ADSL Line UP Interleaved Channel. ADSL Line UP Fast Channel, change Utopia address to match it. ADSL Line UP Interleaved Channel, change Utopia address to match it. ADSL Line in an unknown state. ADSL line signal lost detected. Adsl line suicide request received. ADSL line closed. ADSL line close rejected. ADSL line opened (time). ADSL Line Open Failed (Incompatible Line Conditions). ADSL Line Open Failed (Unable to Lock with ATU-C). ADSL Line Open Failed (Protocol Error). ADSL Line Open Failed (Errored Message Received from ATU-C). ADSL Line Open Failed (Spurious ATU Detected). ADSL Line Open Failed (Forced Silence). ADSL Line Open Failed (Unselectable Operation Mode). ADSL line open failed (unknown error code). ADSL line open rejected. Anti-spam Warning Anti-Spam is attached to policy ID . Anti-Spam is detached from policy ID . Anti-Spam: SPAM FOUND ! . Anti-Spam: Exceeded maximum concurrent connections (). Notification Anti-Spam key is expired (expiration date: ; current date: . Anti-Spam blacklist is changed. Anti-Spam whitelist is changed. Anti-Spam SBL server configured: . Anti-Spam action changed. Antivirus Critical SCAN-MGR: Check AV pattern file failed with error code: . SCAN-MGR: Cannot write AV pattern file to flash. SCAN-MGR: Cannot retrieve AV pattern file from :. HTTP status code: SCAN-MGR: AV pattern file size is too large ( bytes). WARNING: Current hardware configuration does not support embedded AV scanning. Please upgrade system memory. SCAN-MGR: Cannot get { AltServer info | Version number | Path_GateLockCE info } from server.ini file. SCAN-MGR: The AV pattern file size is zero in the server.ini file. SCAN-MGR: Alternate AV pattern file server URL is too long: bytes. Max: bytes. SCAN-MGR: Cannot retrieve server.ini file from :. HTTP status code: . SCAN-MGR: Cannot write AV pattern file to RAM. SCAN-MGR: Internal error occurred while retrieving { server.ini | AV pattern } file. SCAN-MGR: Internal error occurred when calling this function: . [ Layer: . | Limit: . | Returned: ] { Error: | Returned a NULL VSC handler | cpapiErrCode: }. ICAP: Input file size is too large ( bytes). Error APPPRY: Suspicious client :->: used percent of AV resources, which exceeded the max of percent. SCAN-MGR: TmIntSetScanMethod failed. Scan Method: Err: . AV scanner version is not v1.5 (number). Warning APP session () ->() is aborted due to with code . APP session -> notification email failed due to with code . AV scan-mgr has been { attached to | detached from } policy ID AV: VIRUS FOUND: :->:, .64sfile virus . AV: Content from :->: is because maximum concurrent messages is exceeded. AV: Content from :->: is because maximum content size is exceeded. AV: Content from :->: is due to scan-engine error or constraint with code for . AV has been {attached | detached} to policy ID AV configures an Extension list with extensions . AV removes extension list . AV configures MIME list with MIME . AV removes MIME list . AV {creates | removes} a profile . AV profile {set | unset} protocol AV profile sets ICAP to . AV profile unsets ICAP . AV pattern type is changed from to due to increasing pattern file size and limited flash space. AV: VIOLATION FOUND: -> .64s total , id : file violation action . AV content from -> .64s is { passed | dropped } due to scan-engine error or constraint with code for . Notification SCAN-MGR: URL for AV pattern update server has been set to , and the update interval to minutes. SCAN-MGR: URL for AV pattern update server has been unset, and the update interval returned to its default. SCAN-MGR: New AV pattern file has been updated. Version: ; size: bytes. SCAN-MGR: Attempted to load AV pattern file created on after the AV license expired on . SCAN-MGR: AV maximum content size is set to KB. AV maximum number of concurrent messages is set to . AV fail mode is set to {drop | pass} unexamined traffic if content size exceeds maximum. AV fail mode is set to unexamined traffic if any error occurs. AV per client allowed resource is set to percent. AV HTTP turns HTTP connection header close modification. AV HTTP turns HTTP webmail scanning. AV HTTP sets webmail pattern . AV HTTP unsets webmail pattern . AV HTTP turns off HTTP trickling. AV HTTP trickling setting to be trickling byte for every MB, if content length is larger than MB. AV object is enabled with timeout . AV queue size is set to . SCAN-MGR: Number of decompression layers is set to . SCAN-MGR: Maximum content size is set to KB. SCAN-MGR: Maximum number of concurrent messages is set to . SCAN-MGR: Fail mode is set to { drop | pass } unexamined traffic if { content size | number of concurrent messages } exceeds max. SCAN-MGR: AV pattern file does not load upon bootup. SCAN-MGR: IP address for dump TFTP server is set to . SCAN-MGR: AV client has exceeded its allowed resources. Remaining available resources: . SCAN-MGR: Out of FD. ICAP server-group is added. ICAP server-group is removed. ICAP server is added to server-group . ICAP server is removed from server-group . ICAP server is set with host address and port . ICAP server is removed. ICAP server is enabled. ICAP server is disabled. ICAP server probe interval is set to . ICAP server probe URL is set to . ICAP server has maximum connections set to . ICAP: Server status changed from to . ARP Critical { arp req | arp reply } detected an IP conflict (IP , MAC ) on interface { arp req | arp reply } detected a duplicate VSD group master (IP , MAC ) on interface Notification ARP detected IP conflict: IP address changed from interface to interface Static ARP entry { added to | deleted from } interface with IP and MAC ARP always on destination enabled ARP always on destination disabled Attack Database Critical Attack database version is rejected because the authentication check failed. Notification Attack database version is saved to flash. Cannot parse attack database. Cannot parse attack database header info. Cannot switch to attack database version . Cannot save attack database version . Cannot download attack database from (error ). Deep Inspection update key is expired. Attack database version is rejected because the authentication check failed. Attack is created . Attack is deleted . Attack is changed to . Attack is added to attack group . Attack is removed from . Attack group is created . Attack group is deleted . Attack group is changed to . Attack group is added to attack group . Attack group is removed from attack group . Attacks Emergency SYN flood! From : to :, proto TCP (zone , int ). Occurred times. Teardrop attack! From : to :, proto { TCP | UDP | } (zone , int ). Occurred times. Ping of Death! From to , proto 1 (zone , int ). Occurred times. Alert WinNuke attack! From : to :139, proto TCP (zone , int ). Occurred times. IP spoofing! From : to :, proto { TCP | UDP | } (zone , int ). Occurred times. Source Route IP option! From : to :, proto { TCP | UDP | } (zone , int ). Occurred times. Land attack! From : to :, proto TCP (zone , int ). Occurred times. ICMP flood! From to , proto 1 (zone , int ). Occurred times. UDP flood! From : to :, proto UDP (zone , int ). Occurred times. Port scan! From : to :, proto { TCP | UDP | } (zone , int ). Occurred times. Address sweep! From to , proto 1 (zone , int ). Occurred times. Critical has overflowed. Malicious URL! From : to :, proto TCP (zone , int ). Occurred times. Src IP session limit! From : to :, proto {TCP | UDP | } (zone , int ). Occurred times. SYN fragment! From : to :, proto TCP (zone , int ). Occurred times. No TCP flag! From : to :, proto { TCP | UDP | } (zone , int ). Occurred times. Unknown protocol! From : to :, proto (zone , int ). Occurred times. Bad IP option! From : to :, proto { TCP | UDP | } (zone , int ). Occurred times. Dst IP session limit! From : to :, proto {TCP | UDP | } (zone , int ). Occurred times. ZIP file blocked! From : to :, proto { TCP | UDP | } (zone , int ). Occurred times. Java applet blocked! From : to :, proto {TCP | UDP | } (zone , int ). Occurred times. EXE file blocked! From : to :, proto { TCP | UDP | } (zone , int ). Occurred times. ActiveX control blocked! From : to :, proto {TCP | UDP | } (zone , int ). Occurred times. ICMP fragment! From to , proto 1 (zone , int ). Occurred times. Large ICMP packet! From to , proto 1 (zone , int ). Occurred times. SYN and FIN bits! From : to :, proto TCP (zone , int ). Occurred times. FIN but no ACK bit! From : to :, proto TCP (zone , int ). Occurred times. SYN-ACK-ACK Proxy DoS! From : to :, proto TCP (zone , int ). Occurred times. Fragmented traffic! From : to :, proto { TCP | UDP | } (zone , int ). Occurred times. attack! From : to :, proto {TCP | UDP}, through policy . Occurred times. Notification is . is set to for zone . Malicious URL is for . Bypass-others-IPSec option is . Bypass non-IP traffic option is . Logging of dropped traffic to self has been . Logging of IKE traffic to self has been . Logging of SNMP traffic to self has been . Logging of ICMP traffic to self has been . Logging of dropped traffic to self (excluding multicast) has been . Screening of all attacks is on . Attack was { created | deleted } Attack was changed to Attack [ group ] was { added to | removed from } Attack group was { created | deleted } Attack group was changed to Information is cleared. Auth Critical Administrator's password minimum length is set to '' by admin ''. Administrator's password complexity is set to scheme '' by admin ''. Minimum length of Auth user's password is set to '' by admin ''. Auth user's password complexity is set to scheme '' by admin ''. Auth user '' authorization failure: password does not comply with password policy. Admin user '' authorization failure: password does not comply with password policy. Warning Authentication for user is denied, (long username). Authentication for user is denied, (long password). User at is accepted via the {RADIUS | SecurID | LDAP | Local} server at . User at is rejected via the {RADIUS | SecurID | LDAP | Local } server at . User at {RADIUS | SecurID | LDAP | Local } authentication attempt has timed out. Authentication for user was denied, (long username). Authentication for user was denied, (long password). User at is accepted via the {RADIUS | SecurID | LDAP | Local} server at . User at is rejected through the {RADIUS | SecurID | LDAP | Local } server at . User at is challenged by the {RADIUS | SecurID | LDAP | Local } server at (Rejected because challenge is not supported for FTP). User at {RADIUS | SecurID | LDAP | Local } authentication attempt has timed out. User at is accepted by the {RADIUS | SecurID | LDAP | Local} server at . User at is rejected by the {RADIUS | SecurID | LDAP | Local } server at . User at is challenged by the {RADIUS | SecurID | LDAP | Local } server at (Rejected because challenge is not supported for Web). User at {RADIUS | SecurID | LDAP | Local } authentication attempt has timed out. Trying primary server . Trying backup1 server . Trying backup2 server . Backup1 , backup2 , and primary servers failed. Backup2 , primary , and backup1 servers failed. Primary , backup1 , and backup2 servers failed. WebAuth user at is accepted by the {RADIUS | SecurID | LDAP | Local } server at . WebAuth user at is rejected/timed out by the {RADIUS | SecurID | LDAP | Local } server at . Local authentication for WebAuth user was denied . Local authentication for WebAuth user is successful. Error in authentication for WebAuth user . Local authentication for user is successful. Local authentication for user was denied. Notification The version of the RADIUS server does not match . User belongs to a different group in the RADIUS server than that allowed in the device. FIPS: Attempt to set RADIUS shared secret with invalid length . The device cannot send data to the SecurID server. The device cannot contact the SecurID server. Cannot get route to SecurID server . User at is challenged by the { RADIUS | SecurID | LDAP | Local } server at . User at must enter "Next Code" for SecurID . User at must enter "New PIN" for SecurID . User at must make a "New PIN" choice for SecurID . User at has selected a system-generated PIN for authentication with SecurID . The new PIN for user at has been { accepted | rejected } by SecurID . WebAuth is set to . Access for firewall user at (accepted at