Skip to main content

Syslog Format for NAT Logging

Document Type Expired Internet-Draft (individual)
Authors Zhonghua Chen , Cathy Zhou , Tina Tsou (Ting ZOU) , Tom Taylor
Last updated 2019-06-04 (Latest revision 2014-01-24)
Replaces draft-zhou-behave-syslog-nat-logging
Stream Internet Engineering Task Force (IETF)
Intended RFC status Proposed Standard
Expired & archived
Stream WG state WG Document
Document shepherd (None)
IESG IESG state Expired (IESG: Dead)
Action Holders
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD Magnus Westerlund
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:


NAT devices are required to log events like creation and deletion of translations and information about the resources the NAT is managing. The logs are required to identify an attacker or a host that was used to launch malicious attacks, and for various other purposes of accounting and management. Since there is no standard way of logging this information, different NAT devices behave differently. The lack of a consistent way makes it difficult to write the collector applications that would receive this data and process it to present useful information. This document describes the information that is required to be logged by the NAT devices. It goes on to standardize formats for reporting these events and parameters using SYSLOG (RFC 5424). A companion document specifies formats for reporting the same events and parameters using IPFIX (RFC 7011). Applicability statements are provided in this document and its companion to guide operators and implementors in their choice of which technology to use for logging.


Zhonghua Chen
Cathy Zhou
Tina Tsou (Ting ZOU)
Tom Taylor

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)