H3C S6550XE-HI Switch Serie System Log Messages Reference-R60xx-6W100

HomeSupportResource CenterSwitchesH3C S6550X Switch SeriesH3C S6550X-HI Switch SeriesTechnical DocumentsReference GuidesLog Message ReferencesH3C S6550XE-HI Switch Serie System Log Messages Reference-R60xx-6W100

 

H3C S6550XE-HI Switch Series

System Log Messages Reference

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Document version: 6W100-20220415

Software version: Release 6008 and later

 

Copyright © 2022 New H3C Technologies Co., Ltd. All rights reserved.

No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of New H3C Technologies Co., Ltd.

Except for the trademarks of New H3C Technologies Co., Ltd., any trademarks that may be mentioned in this document are the property of their respective owners.

The information in this document is subject to change without notice.


Contents

Introduction· 1

System log message format 1

Managing and obtaining system log messages· 3

Obtaining log messages from the console terminal 4

Obtaining log messages from a monitor terminal 4

Obtaining log messages from the log buffer 4

Obtaining log messages from the log file· 4

Obtaining log messages from a log host 5

Software module list 5

Using this document 9

AAA messages· 10

AAA_FAILURE· 11

AAA_LAUNCH· 11

AAA_SUCCESS· 12

ACL messages· 12

ACL_ACCELERATE_NO_RES· 12

ACL_ACCELERATE_NONCONTIGUOUSMASK· 13

ACL_ACCELERATE_NOT_SUPPORT· 13

ACL_ACCELERATE_NOT_SUPPORTHOPBYHOP· 13

ACL_ACCELERATE_NOT_SUPPORTMULTITCPFLAG·· 14

ACL_ACCELERATE_UNK_ERR· 14

ACL_IPV6_STATIS_INFO·· 14

ACL_NO_MEM·· 15

ACL_STATIS_INFO·· 15

ANCP messages· 15

ANCP_INVALID_PACKET· 16

APMGR messages· 16

APMGR_AC_MEM_ALERT· 16

APMGR_ADD_AP_FAIL· 17

APMGR_ADDBAC_INFO·· 17

APMGR_AP_OFFLINE· 17

APMGR_AP_ONLINE· 18

APMGR_CWC_IMG_DOWNLOAD_COMPLETE· 18

APMGR_CWC_IMG_DOWNLOAD_START· 18

APMGR_CWC_IMG_NO_ENOUGH_SPACE· 19

APMGR_CWC_LOCAL_AC_DOWN· 19

APMGR_CWC_LOCAL_AC_UP· 20

APMGR_CWC_REBOOT· 20

APMGR_CWC_RUN_DOWNLOAD_COMPLETE· 20

APMGR_CWC_RUN_DOWNLOAD_START· 21

APMGR_CWC_RUN_NO_ENOUGH_SPACE· 21

APMGR_CWC_TUNNEL_DOWN· 22

APMGR_CWC_TUNNEL_UP· 22

APMGR_CWS_IMG_DOWNLOAD_COMPLETE· 23

APMGR_CWS_IMG_DOWNLOAD_START· 23

APMGR_CWS_LOCAL_AC_DOWN· 24

APMGR_CWS_LOCAL_AC_UP· 24

APMGR_CWS_RUN_DOWNLOAD_COMPLETE· 25

APMGR_CWS_RUN_DOWNLOAD_START· 25

APMGR_CWS_TUNNEL_DOWN· 26

APMGR_CWS_TUNNEL_UP· 26

APMGR_DELBAC_INFO·· 27

APMGR_LOCAL_AC_OFFLINE· 27

APMGR_LOCAL_AC_ONLINE· 27

ARP messages· 27

ARP_ACTIVE_ACK_NO_REPLY· 28

ARP_ACTIVE_ACK_NOREQUESTED_REPLY· 28

ARP_BINDRULETOHW_FAILED·· 29

ARP_DETECTION_LOG·· 30

ARP_DUPLICATE_IPADDR_DETECT· 30

ARP_DYNAMIC· 31

ARP_DYNAMIC_IF· 31

ARP_DYNAMIC_SLOT· 32

ARP_ENTRY_CONFLICT· 33

ARP_HOST_IP_CONFLICT· 33

ARP_LOCALPROXY_ENABLE_FAILED·· 34

ARP_RATE_EXCEEDED·· 34

ARP_RATELIMIT_NOTSUPPORT· 35

ARP_SENDER_IP_INVALID·· 35

ARP_SENDER_MAC_INVALID·· 36

ARP_SENDER_SMACCONFLICT· 36

ARP_SENDER_SMACCONFLICT_VSI 37

ARP_SRC_MAC_FOUND_ATTACK· 37

ARP_SUP_ENABLE_FAILED·· 38

ARP_TARGET_IP_INVALID·· 38

ARP_THRESHOLD_REACHED·· 38

ARP_USER_DUPLICATE_IPADDR_DETECT· 39

ARP_USER_MOVE_DETECT· 40

DUPIFIP· 40

DUPIP· 41

DUPVRRPIP· 41

ATK messages· 41

ATK_ICMP_ADDRMASK_REQ·· 42

ATK_ICMP_ADDRMASK_REQ_RAW·· 43

ATK_ICMP_ADDRMASK_REQ_RAW_SZ· 44

ATK_ICMP_ADDRMASK_REQ_SZ· 45

ATK_ICMP_ADDRMASK_RPL· 46

ATK_ICMP_ADDRMASK_RPL_RAW·· 47

ATK_ICMP_ADDRMASK_RPL_RAW_SZ· 48

ATK_ICMP_ADDRMASK_RPL_SZ· 49

ATK_ICMP_ECHO_REQ·· 50

ATK_ICMP_ECHO_REQ_RAW·· 51

ATK_ICMP_ECHO_REQ_RAW_SZ· 52

ATK_ICMP_ECHO_REQ_SZ· 53

ATK_ICMP_ECHO_RPL· 54

ATK_ICMP_ECHO_RPL_RAW·· 55

ATK_ICMP_ECHO_RPL_RAW_SZ· 56

ATK_ICMP_ECHO_RPL_SZ· 57

ATK_ICMP_FLOOD·· 58

ATK_ICMP_FLOOD_SZ· 58

ATK_ICMP_INFO_REQ·· 59

ATK_ICMP_INFO_REQ_RAW·· 60

ATK_ICMP_INFO_REQ_RAW_SZ· 61

ATK_ICMP_INFO_REQ_SZ· 62

ATK_ICMP_INFO_RPL· 63

ATK_ICMP_INFO_RPL_RAW·· 64

ATK_ICMP_INFO_RPL_RAW_SZ· 65

ATK_ICMP_INFO_RPL_SZ· 66

ATK_ICMP_LARGE· 67

ATK_ICMP_LARGE_RAW·· 68

ATK_ICMP_LARGE_RAW_SZ· 68

ATK_ICMP_LARGE_SZ· 69

ATK_ICMP_PARAPROBLEM·· 70

ATK_ICMP_PARAPROBLEM_RAW·· 71

ATK_ICMP_PARAPROBLEM_RAW_SZ· 72

ATK_ICMP_PARAPROBLEM_SZ· 73

ATK_ICMP_PINGOFDEATH· 74

ATK_ICMP_PINGOFDEATH_RAW·· 75

ATK_ICMP_PINGOFDEATH_RAW_SZ· 76

ATK_ICMP_PINGOFDEATH_SZ· 77

ATK_ICMP_REDIRECT· 78

ATK_ICMP_REDIRECT_RAW·· 79

ATK_ICMP_REDIRECT_RAW_SZ· 80

ATK_ICMP_REDIRECT_SZ· 81

ATK_ICMP_SMURF· 82

ATK_ICMP_SMURF_RAW·· 83

ATK_ICMP_SMURF_RAW_SZ· 84

ATK_ICMP_SMURF_SZ· 85

ATK_ICMP_SOURCEQUENCH· 86

ATK_ICMP_SOURCEQUENCH_RAW·· 87

ATK_ICMP_SOURCEQUENCH_RAW_SZ· 88

ATK_ICMP_SOURCEQUENCH_SZ· 89

ATK_ICMP_TIMEEXCEED·· 90

ATK_ICMP_TIMEEXCEED_RAW·· 91

ATK_ICMP_TIMEEXCEED_RAW_SZ· 92

ATK_ICMP_TIMEEXCEED_SZ· 93

ATK_ICMP_TRACEROUTE· 94

ATK_ICMP_TRACEROUTE_RAW·· 95

ATK_ICMP_TRACEROUTE_RAW_SZ· 95

ATK_ICMP_TRACEROUTE_SZ· 96

ATK_ICMP_TSTAMP_REQ·· 97

ATK_ICMP_TSTAMP_REQ_RAW·· 98

ATK_ICMP_TSTAMP_REQ_RAW_SZ· 99

ATK_ICMP_TSTAMP_REQ_SZ· 100

ATK_ICMP_TSTAMP_RPL· 101

ATK_ICMP_TSTAMP_RPL_RAW·· 102

ATK_ICMP_TSTAMP_RPL_RAW_SZ· 103

ATK_ICMP_TSTAMP_RPL_SZ· 104

ATK_ICMP_TYPE· 105

ATK_ICMP_TYPE_RAW·· 106

ATK_ICMP_TYPE_RAW_SZ· 107

ATK_ICMP_TYPE_SZ· 108

ATK_ICMP_UNREACHABLE· 109

ATK_ICMP_UNREACHABLE_RAW·· 110

ATK_ICMP_UNREACHABLE_RAW_SZ· 111

ATK_ICMP_UNREACHABLE_SZ· 112

ATK_ICMPV6_DEST_UNREACH· 113

ATK_ICMPV6_DEST_UNREACH_RAW·· 114

ATK_ICMPV6_DEST_UNREACH_RAW_SZ· 114

ATK_ICMPV6_DEST_UNREACH_SZ· 115

ATK_ICMPV6_ECHO_REQ·· 116

ATK_ICMPV6_ECHO_REQ_RAW·· 117

ATK_ICMPV6_ECHO_REQ_RAW_SZ· 117

ATK_ICMPV6_ECHO_REQ_SZ· 118

ATK_ICMPV6_ECHO_RPL· 119

ATK_ICMPV6_ECHO_RPL_RAW·· 120

ATK_ICMPV6_ECHO_RPL_RAW_SZ· 120

ATK_ICMPV6_ECHO_RPL_SZ· 121

ATK_ICMPV6_FLOOD·· 122

ATK_ICMPV6_FLOOD_SZ· 122

ATK_ICMPV6_GROUPQUERY· 123

ATK_ICMPV6_GROUPQUERY_RAW·· 124

ATK_ICMPV6_GROUPQUERY_RAW_SZ· 124

ATK_ICMPV6_GROUPQUERY_SZ· 125

ATK_ICMPV6_GROUPREDUCTION· 126

ATK_ICMPV6_GROUPREDUCTION_RAW·· 127

ATK_ICMPV6_GROUPREDUCTION_RAW_SZ· 127

ATK_ICMPV6_GROUPREDUCTION_SZ· 128

ATK_ICMPV6_GROUPREPORT· 129

ATK_ICMPV6_GROUPREPORT_RAW·· 130

ATK_ICMPV6_GROUPREPORT_RAW_SZ· 130

ATK_ICMPV6_GROUPREPORT_SZ· 131

ATK_ICMPV6_LARGE· 132

ATK_ICMPV6_LARGE_RAW·· 132

ATK_ICMPV6_LARGE_RAW_SZ· 133

ATK_ICMPV6_LARGE_SZ· 133

ATK_ICMPV6_PACKETTOOBIG·· 134

ATK_ICMPV6_PACKETTOOBIG_RAW·· 135

ATK_ICMPV6_PACKETTOOBIG_RAW_SZ· 135

ATK_ICMPV6_PACKETTOOBIG_SZ· 136

ATK_ICMPV6_PARAPROBLEM·· 137

ATK_ICMPV6_PARAPROBLEM_RAW·· 138

ATK_ICMPV6_PARAPROBLEM_RAW_SZ· 138

ATK_ICMPV6_PARAPROBLEM_SZ· 139

ATK_ICMPV6_TIMEEXCEED·· 140

ATK_ICMPV6_TIMEEXCEED_RAW·· 141

ATK_ICMPV6_TIMEEXCEED_RAW_SZ· 141

ATK_ICMPV6_TIMEEXCEED_SZ· 142

ATK_ICMPV6_TRACEROUTE· 143

ATK_ICMPV6_TRACEROUTE_RAW·· 144

ATK_ICMPV6_TRACEROUTE_RAW_SZ· 145

ATK_ICMPV6_TRACEROUTE_SZ· 146

ATK_ICMPV6_TYPE· 147

ATK_ICMPV6_TYPE _RAW_SZ· 148

ATK_ICMPV6_TYPE_RAW·· 148

ATK_ICMPV6_TYPE_SZ· 149

ATK_IP_OPTION· 150

ATK_IP_OPTION_RAW·· 151

ATK_IP_OPTION_RAW_SZ· 152

ATK_IP_OPTION_SZ· 153

ATK_IP4_ACK_FLOOD·· 154

ATK_IP4_ACK_FLOOD_SZ· 154

ATK_IP4_DIS_PORTSCAN· 155

ATK_IP4_DIS_PORTSCAN_SZ· 155

ATK_IP4_DNS_FLOOD·· 156

ATK_IP4_DNS_FLOOD_SZ· 156

ATK_IP4_FIN_FLOOD·· 157

ATK_IP4_FIN_FLOOD_SZ· 157

ATK_IP4_FRAGMENT· 158

ATK_IP4_FRAGMENT_RAW·· 159

ATK_IP4_FRAGMENT_RAW_SZ· 160

ATK_IP4_FRAGMENT_SZ· 161

ATK_IP4_HTTP_FLOOD·· 162

ATK_IP4_HTTP_FLOOD_SZ· 162

ATK_IP4_IMPOSSIBLE· 163

ATK_IP4_IMPOSSIBLE_RAW·· 164

ATK_IP4_IMPOSSIBLE_RAW_SZ· 165

ATK_IP4_IMPOSSIBLE_SZ· 166

ATK_IP4_IPSWEEP· 167

ATK_IP4_IPSWEEP_SZ· 167

ATK_IP4_PORTSCAN· 168

ATK_IP4_PORTSCAN_SZ· 168

ATK_IP4_RST_FLOOD·· 169

ATK_IP4_RST_FLOOD_SZ· 169

ATK_IP4_SYN_FLOOD·· 170

ATK_IP4_SYN_FLOOD_SZ· 170

ATK_IP4_SYNACK_FLOOD·· 171

ATK_IP4_SYNACK_FLOOD_SZ· 171

ATK_IP4_TCP_ALLFLAGS· 172

ATK_IP4_TCP_ALLFLAGS_RAW·· 173

ATK_IP4_TCP_ALLFLAGS_RAW_SZ· 173

ATK_IP4_TCP_ALLFLAGS_SZ· 174

ATK_IP4_TCP_FINONLY· 175

ATK_IP4_TCP_FINONLY_RAW·· 176

ATK_IP4_TCP_FINONLY_RAW_SZ· 176

ATK_IP4_TCP_FINONLY_SZ· 177

ATK_IP4_TCP_INVALIDFLAGS· 178

ATK_IP4_TCP_INVALIDFLAGS_RAW·· 179

ATK_IP4_TCP_INVALIDFLAGS_RAW_SZ· 180

ATK_IP4_TCP_INVALIDFLAGS_SZ· 181

ATK_IP4_TCP_LAND·· 182

ATK_IP4_TCP_LAND_RAW·· 183

ATK_IP4_TCP_LAND_RAW_SZ· 184

ATK_IP4_TCP_LAND_SZ· 185

ATK_IP4_TCP_NULLFLAG·· 186

ATK_IP4_TCP_NULLFLAG_RAW·· 187

ATK_IP4_TCP_NULLFLAG_RAW_SZ· 187

ATK_IP4_TCP_NULLFLAG_SZ· 188

ATK_IP4_TCP_SYNFIN· 189

ATK_IP4_TCP_SYNFIN_RAW·· 190

ATK_IP4_TCP_SYNFIN_RAW_SZ· 190

ATK_IP4_TCP_SYNFIN_SZ· 191

ATK_IP4_TCP_WINNUKE· 192

ATK_IP4_TCP_WINNUKE_RAW·· 193

ATK_IP4_TCP_WINNUKE_RAW_SZ· 194

ATK_IP4_TCP_WINNUKE_SZ· 195

ATK_IP4_TEARDROP· 196

ATK_IP4_TEARDROP_RAW·· 197

ATK_IP4_TEARDROP_RAW_SZ· 198

ATK_IP4_TEARDROP_SZ· 199

ATK_IP4_TINY_FRAGMENT· 200

ATK_IP4_TINY_FRAGMENT_RAW·· 201

ATK_IP4_TINY_FRAGMENT_RAW_SZ· 202

ATK_IP4_TINY_FRAGMENT_SZ· 203

ATK_IP4_UDP_BOMB· 204

ATK_IP4_UDP_BOMB_RAW·· 205

ATK_IP4_UDP_BOMB_RAW_SZ· 206

ATK_IP4_UDP_BOMB_SZ· 207

ATK_IP4_UDP_FLOOD·· 208

ATK_IP4_UDP_FLOOD_SZ· 208

ATK_IP4_UDP_FRAGGLE· 209

ATK_IP4_UDP_FRAGGLE_RAW·· 210

ATK_IP4_UDP_FRAGGLE_RAW_SZ· 211

ATK_IP4_UDP_FRAGGLE_SZ· 212

ATK_IP4_UDP_SNORK· 213

ATK_IP4_UDP_SNORK_RAW·· 214

ATK_IP4_UDP_SNORK_RAW_SZ· 215

ATK_IP4_UDP_SNORK_SZ· 216

ATK_IP6_ACK_FLOOD·· 217

ATK_IP6_ACK_FLOOD_SZ· 217

ATK_IP6_DIS_PORTSCAN· 218

ATK_IP6_DIS_PORTSCAN_SZ· 218

ATK_IP6_DNS_FLOOD·· 219

ATK_IP6_DNS_FLOOD_SZ· 219

ATK_IP6_FIN_FLOOD·· 220

ATK_IP6_FIN_FLOOD_SZ· 220

ATK_IP6_FRAGMENT· 221

ATK_IP6_FRAGMENT_RAW·· 222

ATK_IP6_FRAGMENT_RAW_SZ· 223

ATK_IP6_FRAGMENT_SZ· 224

ATK_IP6_HTTP_FLOOD·· 225

ATK_IP6_HTTP_FLOOD_SZ· 225

ATK_IP6_IMPOSSIBLE· 226

ATK_IP6_IMPOSSIBLE_RAW·· 227

ATK_IP6_IMPOSSIBLE_RAW_SZ· 228

ATK_IP6_IMPOSSIBLE_SZ· 229

ATK_IP6_IPSWEEP· 229

ATK_IP6_IPSWEEP_SZ· 230

ATK_IP6_PORTSCAN· 230

ATK_IP6_PORTSCAN_SZ· 231

ATK_IP6_RST_FLOOD·· 231

ATK_IP6_RST_FLOOD_SZ· 232

ATK_IP6_SYN_FLOOD·· 232

ATK_IP6_SYN_FLOOD_SZ· 233

ATK_IP6_SYNACK_FLOOD·· 233

ATK_IP6_SYNACK_FLOOD_SZ· 234

ATK_IP6_TCP_ALLFLAGS· 235

ATK_IP6_TCP_ALLFLAGS_RAW·· 235

ATK_IP6_TCP_ALLFLAGS_RAW_SZ· 236

ATK_IP6_TCP_ALLFLAGS_SZ· 236

ATK_IP6_TCP_FINONLY· 237

ATK_IP6_TCP_FINONLY_RAW·· 237

ATK_IP6_TCP_FINONLY_RAW_SZ· 238

ATK_IP6_TCP_FINONLY_SZ· 238

ATK_IP6_TCP_INVALIDFLAGS· 239

ATK_IP6_TCP_INVALIDFLAGS_RAW·· 240

ATK_IP6_TCP_INVALIDFLAGS_RAW_SZ· 241

ATK_IP6_TCP_INVALIDFLAGS_SZ· 242

ATK_IP6_TCP_LAND·· 243

ATK_IP6_TCP_LAND_RAW·· 244

ATK_IP6_TCP_LAND_RAW_SZ· 244

ATK_IP6_TCP_LAND_SZ· 245

ATK_IP6_TCP_NULLFLAG·· 246

ATK_IP6_TCP_NULLFLAG_RAW·· 246

ATK_IP6_TCP_NULLFLAG_RAW_SZ· 247

ATK_IP6_TCP_NULLFLAG_SZ· 247

ATK_IP6_TCP_SYNFIN· 248

ATK_IP6_TCP_SYNFIN_RAW·· 248

ATK_IP6_TCP_SYNFIN_RAW_SZ· 249

ATK_IP6_TCP_SYNFIN_SZ· 249

ATK_IP6_TCP_WINNUKE· 250

ATK_IP6_TCP_WINNUKE_RAW·· 251

ATK_IP6_TCP_WINNUKE_RAW_SZ· 251

ATK_IP6_TCP_WINNUKE_SZ· 252

ATK_IP6_UDP_FLOOD·· 253

ATK_IP6_UDP_FLOOD_SZ· 253

ATK_IP6_UDP_FRAGGLE· 254

ATK_IP6_UDP_FRAGGLE_RAW·· 255

ATK_IP6_UDP_FRAGGLE_RAW_SZ· 255

ATK_IP6_UDP_FRAGGLE_SZ· 256

ATK_IP6_UDP_SNORK· 257

ATK_IP6_UDP_SNORK_RAW·· 258

ATK_IP6_UDP_SNORK_RAW_SZ· 258

ATK_IP6_UDP_SNORK_SZ· 259

ATK_IPOPT_ABNORMAL· 260

ATK_IPOPT_ABNORMAL_RAW·· 261

ATK_IPOPT_ABNORMAL_RAW_SZ· 262

ATK_IPOPT_ABNORMAL_SZ· 263

ATK_IPOPT_LOOSESRCROUTE· 264

ATK_IPOPT_LOOSESRCROUTE_RAW·· 265

ATK_IPOPT_LOOSESRCROUTE_RAW_SZ· 266

ATK_IPOPT_LOOSESRCROUTE_SZ· 267

ATK_IPOPT_RECORDROUTE· 268

ATK_IPOPT_RECORDROUTE_RAW·· 269

ATK_IPOPT_RECORDROUTE_RAW_SZ· 270

ATK_IPOPT_RECORDROUTE_SZ· 271

ATK_IPOPT_ROUTEALERT· 272

ATK_IPOPT_ROUTEALERT_RAW·· 273

ATK_IPOPT_ROUTEALERT_RAW_SZ· 274

ATK_IPOPT_ROUTEALERT_SZ· 275

ATK_IPOPT_SECURITY· 276

ATK_IPOPT_SECURITY_RAW·· 277

ATK_IPOPT_SECURITY_RAW_SZ· 278

ATK_IPOPT_SECURITY_SZ· 279

ATK_IPOPT_STREAMID·· 280

ATK_IPOPT_STREAMID_RAW·· 281

ATK_IPOPT_STREAMID_RAW_SZ· 282

ATK_IPOPT_STREAMID_SZ· 283

ATK_IPOPT_STRICTSRCROUTE· 284

ATK_IPOPT_STRICTSRCROUTE_RAW·· 285

ATK_IPOPT_STRICTSRCROUTE_RAW_SZ· 286

ATK_IPOPT_STRICTSRCROUTE_SZ· 287

ATK_IPOPT_TIMESTAMP· 288

ATK_IPOPT_TIMESTAMP_RAW·· 289

ATK_IPOPT_TIMESTAMP_RAW_SZ· 290

ATK_IPOPT_TIMESTAMP_SZ· 291

ATK_IPV6_EXT_HEADER· 292

ATK_IPV6_EXT_HEADER_RAW·· 293

ATK_IPV6_EXT_HEADER_RAW_SZ· 293

ATK_IPV6_EXT_HEADER_SZ· 294

ATM·· 294

ATM_PVCDOWN· 294

ATM_PVCUP· 295

BFD·· 295

DrvDebug· 296

DrvDebug· 296

BFD messages· 296

BFD_CHANGE_FSM·· 297

BFD_REACHED_UPPER_LIMIT· 297

BGP messages· 298

BGP_EXCEED_ROUTE_LIMIT· 298

BGP_REACHED_THRESHOLD·· 298

BGP_LOG_ROUTE_FLAP· 299

BGP_MEM_ALERT· 299

BGP_PEER_LICENSE_REACHED·· 299

BGP_ROUTE_LICENSE_REACHED·· 300

BGP_STATE_CHANGED·· 300

BGP_STATE_CHANGED_REASON· 301

BLS messages· 301

BLS_ENTRY_ADD·· 302

BLS_ENTRY_DEL· 302

BLS_IPV6_ENTRY_ADD·· 303

BLS_IPV6_ENTRY_DEL· 303

CFD messages· 303

CFD_CROSS_CCM·· 304

CFD_ERROR_CCM·· 304

CFD_LOST_CCM·· 305

CFD_RECEIVE_CCM·· 305

CFGMAN messages· 306

CFGMAN_ARCHIVE_SCP_FAIL· 306

CFGMAN_CFGCHANGED·· 306

CFGMAN_EXIT_FROM_CONFIGURE· 307

CFGMAN_OPTCOMPLETION· 307

CONNLMT messages· 308

CONNLMT_IPV4_OVERLOAD·· 309

CONNLMT_IPV4_RECOVER· 310

CONNLMT_IPV6_OVERLOAD·· 311

CONNLMT_IPV6_RECOVER· 312

DEV messages· 312

BOARD_INSERTED·· 313

BOARD_REBOOT· 313

BOARD_REMOVED·· 313

BOARD_STATE_FAULT· 314

BOARD_STATE_NORMAL· 314

BOARD_STATE_STARTING·· 314

CFCARD_INSERTED·· 315

CFCARD_REMOVED·· 315

CHASSIS_REBOOT· 315

DEV_CLOCK_CHANGE· 316

DEV_FAULT_TOOLONG·· 316

FAN_ABSENT· 317

FAN_DIRECTION_NOT_PREFERRED·· 317

FAN_FAILED·· 318

FAN_RECOVERED·· 318

MAD_DETECT· 319

MAD_PROC· 319

POWER_ABSENT· 320

POWER_FAILED·· 320

POWER_MONITOR_ABSENT· 321

POWER_MONITOR_FAILED·· 321

POWER_MONITOR_RECOVERED·· 322

POWER_RECOVERED·· 322

RPS_ABSENT· 323

RPS_FAILED·· 323

RPS_NORMAL· 324

SUBCARD_FAULT· 324

SUBCARD_INSERTED·· 325

SUBCARD_REBOOT· 325

SUBCARD_REMOVED·· 325

SYSTEM_REBOOT· 326

TEMPERATURE_ALARM·· 327

TEMPERATURE_LOW·· 328

TEMPERATURE_NORMAL· 329

TEMPERATURE_SHUTDOWN· 330

TEMPERATURE_WARNING·· 331

VCHK_VERSION_INCOMPATIBLE· 332

DHCP·· 332

DHCP_NOTSUPPORTED·· 332

DHCP_NORESOURCES· 333

DHCPR·· 333

DHCPR_SERVERCHANGE· 333

DHCPR_SWITCHMASTER· 334

DHCPS messages· 334

DHCPS_ALLOCATE_IP· 334

DHCPS_CONFLICT_IP· 335

DHCPS_EXTEND_IP· 335

DHCPS_FILE· 336

DHCPS_RECLAIM_IP· 336

DHCPS_VERIFY_CLASS· 336

DHCPS6 messages· 337

DHCPS6_ALLOCATE_ADDRESS· 337

DHCPS6_ALLOCATE_PREFIX· 337

DHCPS6_CONFLICT_ADDRESS· 338

DHCPS6_EXTEND_ADDRESS· 338

DHCPS6_EXTEND_PREFIX· 339

DHCPS6_FILE· 339

DHCPS6_RECLAIM_ADDRESS· 340

DHCPS6_RECLAIM_PREFIX· 340

DHCPSP4· 340

DHCPSP4_FILE· 341

DHCPSP6· 341

DHCPSP6_FILE· 341

DIAG·· 341

PARITY_ERROR· 342

PARITY_INCONSISTENT· 342

PARITY_RECOVER_FAIL· 343

PARITY_UNRECOVER_AUTO_REBOOT· 343

PARITY_UNRECOVER_REBOOT· 344

DIAG messages· 344

CPU_MINOR_RECOVERY· 344

CPU_MINOR_THRESHOLD·· 345

CPU_SEVERE_RECOVERY· 346

CPU_SEVERE_THRESHOLD·· 347

CPU_USAGE_LASTMINUTE· 348

MEM_ALERT· 349

MEM_BELOW_THRESHOLD·· 350

MEM_EXCEED_THRESHOLD·· 351

MEM_USAGE· 351

DLDP messages· 351

DLDP_AUTHENTICATION_FAILED·· 352

DLDP_LINK_BIDIRECTIONAL· 352

DLDP_LINK_SHUTMODECHG·· 353

DLDP_LINK_UNIDIRECTIONAL· 353

DLDP_NEIGHBOR_AGED·· 354

DLDP_NEIGHBOR_CONFIRMED·· 354

DLDP_NEIGHBOR_DELETED·· 355

DOT1X messages· 355

DOT1X_CONFIG_NOTSUPPORT· 355

DOT1X_LOGIN_FAILURE· 356

DOT1X_LOGIN_SUCC· 356

DOT1X_LOGIN_SUCC (in open mode) 357

DOT1X_LOGOFF· 357

DOT1X_LOGOFF (in open mode) 358

DOT1X_LOGOFF_ABNORMAL· 359

DOT1X_LOGOFF_ABNORMAL (in open mode) 360

DOT1X_MACBINDING_EXIST· 360

DOT1X_NOTENOUGH_EADFREEIP_RES· 361

DOT1X_NOTENOUGH_EADFREERULE_RES· 361

DOT1X_NOTENOUGH_EADMACREDIR_RES· 361

DOT1X_NOTENOUGH_EADPORTREDIR_RES· 362

DOT1X_NOTENOUGH_ENABLEDOT1X_RES· 362

DOT1X_PEXAGG_NOMEMBER_RES· 362

DOT1X_SMARTON_FAILURE· 363

DOT1X_UNICAST_NOT_EFFECTIVE· 363

DRNI 363

DRNI_AUTORECOVERY_TIMEOUT· 364

DRNI_GLBCHECK_CONSISTENCY· 364

DRNI_GLBCHECK_INCONSISTENCY· 364

DRNI_IFCHECK_CONSISTENCY· 365

DRNI_IFCHECK_INCONSISTENCY· 365

DRNI_IFEVENT_DR_BIND·· 365

DRNI_IFEVENT_DR_GLOBALDOWN· 366

DRNI_IFEVENT_DR_GLOBALUP· 366

DRNI_IFEVENT_DR_MAC_CHANGE· 366

DRNI_IFEVENT_DR_NOSELECTED·· 367

DRNI_IFEVENT_DR_PEER_NOSELECTED·· 367

DRNI_IFEVENT_DR_PEER_SELECTED·· 368

DRNI_IFEVENT_DR_PRIORITY_CHANGE· 368

DRNI_IFEVENT_DR_SELECTED·· 368

DRNI_IFEVENT_DR_UNBIND·· 369

DRNI_IFEVENT_IPP_BIND·· 369

DRNI_IFEVENT_IPP_DOWN· 370

DRNI_IFEVENT_IPP_UNBIND·· 370

DRNI_IFEVENT_IPP_UP· 371

DRNI_IPP_BLOCK· 371

DRNI_IPP_UNBLOCK· 371

DRNI_KEEPALIVEINTERVAL_MISMATCH· 372

DRNI_KEEPALIVELINK_DOWN· 372

DRNI_KEEPALIVELINK_UP· 372

DRNI_DEVICE_MADDOWN· 373

DRNI_DEVICE_MADRECOVERY· 373

DRNI_SYSEVENT_DEVICEROLE_CHANGE· 374

DRNI_SYSEVENT_MAC_CHANGE· 374

DRNI_SYSEVENT_MODE_CHANGE· 375

DRNI_SYSEVENT_NUMBER_CHANGE· 375

DRNI_SYSEVENT_PRIORITY_CHANGE· 375

DRVPLAT· 375

DRVDEBUGMOD_BSP· 376

DRVPLAT/3/DrvDebug· 376

DRVPLAT/3/DrvDebug· 376

DRVPLAT/3/DrvDebug· 376

DRVPLAT/3/DrvDebug· 377

DRVPLAT/3/DrvDebug· 377

DRVPLAT/3/DrvDebug· 377

DRVPLAT/3/DrvDebug· 378

DRVPLAT/3/DrvDebug· 378

DRVPLAT/3/DrvDebug· 378

DRVPLAT/3/DrvDebug· 379

DRVPLAT/3/DrvDebug· 379

DRVPLAT/3/DrvDebug· 379

DRVPLAT/3/DrvDebug· 380

DRVPLAT/3/DrvDebug· 380

DRVDEBUGMOD_DEVM·· 380

DRVPLAT/4/DrvDebug· 381

DRVPLAT/2/DrvDebug· 381

DRVPLAT/2/DrvDebug· 382

DRVPLAT/4/DrvDebug· 382

DRVPLAT/4/DrvDebug· 383

DRVDEBUGMOD_GOLD·· 383

DRVPLAT/4/DrvDebug· 383

DRVPLAT/4/DrvDebug· 383

DRVPLAT/4/DrvDebug· 384

DRVPLAT/2/DrvDebug· 384

DRVPLAT/2/DrvDebug· 385

DRVPLAT/2/DrvDebug· 385

DRVPLAT/4/DrvDebug· 386

DRVPLAT/2/DrvDebug· 386

DRVPLAT/2/DrvDebug· 387

DRVPLAT/2/DrvDebug· 387

DRVPLAT/4/DrvDebug· 388

DRVPLAT/4/DrvDebug· 388

DRVPLAT/4/DrvDebug· 388

DRVPLAT/4/DrvDebug· 389

DRVPLAT/4/DrvDebug· 389

DRVPLAT/4/DrvDebug· 389

DRVPLAT/4/DrvDebug· 390

DRVPLAT/4/DrvDebug· 390

DRVPLAT/4/DrvDebug· 391

DRVPLAT/4/DrvDebug· 391

DRVDEBUGMOD_PORT· 391

DRVPLAT/4/DrvDebug· 391

DRVDEBUGMOD_RXTX· 392

DRVPLAT/2/DrvDebug· 392

DRVDEBUGMOD_STACK· 392

DRVPLAT/4/DrvDebug· 392

DRVPLAT/4/DrvDebug· 393

DRVPLAT/4/DrvDebug· 393

DRVPLAT/4/DrvDebug· 393

DRVPLAT/4/DrvDebug· 393

DRVPLAT/4/DrvDebug· 394

DRVPLAT/4/DrvDebug· 395

DRVPLAT/4/DrvDebug· 395

DRVPLAT/4/DrvDebug· 395

DRVPLAT/4/DrvDebug· 396

DRVPLAT/4/DrvDebug· 396

DRVPLAT/4/DrvDebug· 397

DRVPLAT/4/DrvDebug· 397

DRVPLAT/4/DrvDebug· 398

DRVDEBUGMOD_SWFA· 398

DRVPLAT/4/DrvDebug· 398

DRVPLAT/4/DrvDebug· 399

DRVPLAT/4/DrvDebug· 399

DRVPLAT/4/DrvDebug· 400

DRVPLAT/4/DrvDebug· 400

DRVPLAT/4/DrvDebug· 401

DRVPLAT/4/DrvDebug· 401

DRVPLAT/4/DrvDebug· 401

DRVPLAT/4/DrvDebug· 402

DRVPLAT/4/DrvDebug· 402

DRVPLAT/4/DrvDebug· 402

DRVPLAT/4/DrvDebug· 403

DRVPLAT/4/DrvDebug· 403

DRVPLAT/4/DrvDebug· 403

DRVPLAT/4/DrvDebug· 403

DRVDEBUGMOD_SYSM·· 404

DRVPLAT/2/DrvDebug· 404

DRVPLAT/2/DrvDebug· 404

DRVPLAT/2/DrvDebug· 405

DRVPLAT/2/DrvDebug· 405

DRVPLAT/2/DrvDebug· 405

DRVPLAT/2/DrvDebug· 406

DRVPLAT/2/DrvDebug· 407

DRVPLAT/2/DrvDebug· 408

DRVPLAT/2/DrvDebug· 409

DRVPLAT/2/DrvDebug· 409

DRVPLAT/2/DrvDebug· 410

DRVPLAT/4/DrvDebug· 410

DRVPLAT/4/DrvDebug· 411

DRVPLAT/2/DrvDebug· 411

DRVPLAT/2/DrvDebug· 411

DRVPLAT/2/DrvDebug· 412

DRVPLAT/2/DrvDebug· 412

DRVPLAT/2/DrvDebug· 413

DRVPLAT/2/DrvDebug· 413

DRVPLAT/2/DrvDebug· 414

DRVPLAT/2/DrvDebug· 414

DRVPLAT/2/DrvDebug· 415

DRVPLAT/2/DrvDebug· 415

DRVPLAT/2/DrvDebug· 416

DRVPLAT/2/DrvDebug· 416

DRVPLAT/4/DrvDebug· 416

DRVPLAT/4/DrvDebug· 417

DRVPLAT/4/DrvDebug· 417

DRVPLAT/4/DrvDebug· 417

DRVPLAT/4/DrvDebug· 418

DRVPLAT/4/DrvDebug· 418

DRVPLAT/4/DrvDebug· 418

DRVPLAT/4/DrvDebug· 419

DRVPLAT/4/DrvDebug· 419

DRVPLAT/4/DrvDebug· 419

DRVPLAT/4/DrvDebug· 420

DRVDEBUGMOD_VXLAN· 421

DRVDEBUGMOD_QoS· 421

DrvDebug· 421

DrvDebug· 422

DrvDebug· 423

DrvDebug· 423

DrvDebug· 424

DrvDebug· 424

EDEV messages· 424

ALARM_IN_REMOVED·· 424

ALARM_IN_REPORTED·· 425

EDEV_BOOTROM_UPDATE_FAILED·· 425

EDEV_BOOTROM_UPDATE_SUCCESS· 425

EDEV_FAILOVER_GROUP_STATE_CHANGE· 426

eMDI messages· 426

EMDI_INDICATOR_OVER_THRES· 426

EMDI_INDICATOR_OVER_THRES_RESUME· 427

EMDI_INSTANCE_CONFLICT_FLOW·· 427

EMDI_INSTANCE_EXCEED·· 428

EMDI_INSTANCE_SAME_FLOW·· 428

EPON·· 428

EPON_ALARM·· 429

EPON_ALARM·· 429

EPON_ALARM·· 429

EPON_ALARM·· 430

EPA messages· 430

EPA_ENDPOINT_ONLINE· 430

EPA_ENDPOINT_OFFLINE· 431

EPA_DEVICETYPE_CHANGE· 431

ERPS messages· 431

ERPS_STATE_CHANGED·· 432

ETH messages· 432

ETH_SET_MAC_FAILED·· 432

ETHDRNI 432

ETHDRNI_MAC_INEFFECTIVE· 433

ETHOAM messages· 433

ETHOAM_CONNECTION_FAIL_DOWN· 433

ETHOAM_CONNECTION_FAIL_TIMEOUT· 434

ETHOAM_CONNECTION_FAIL_UNSATISF· 434

ETHOAM_CONNECTION_SUCCEED·· 434

ETHOAM_DISABLE· 435

ETHOAM_DISCOVERY_EXIT· 435

ETHOAM_ENABLE· 435

ETHOAM_ENTER_LOOPBACK_CTRLLED·· 436

ETHOAM_ENTER_LOOPBACK_CTRLLING·· 436

ETHOAM_LOCAL_DYING_GASP· 436

ETHOAM_LOCAL_ERROR_FRAME· 437

ETHOAM_LOCAL_ERROR_FRAME_PERIOD·· 437

ETHOAM_LOCAL_ERROR_FRAME_SECOND·· 437

ETHOAM_LOCAL_ERROR_SYMBOL· 438

ETHOAM_LOCAL_LINK_FAULT· 438

ETHOAM_LOOPBACK_EXIT· 438

ETHOAM_LOOPBACK_EXIT_ERROR_STATU· 439

ETHOAM_LOOPBACK_NO_RESOURCE· 439

ETHOAM_LOOPBACK_NOT_SUPPORT· 439

ETHOAM_QUIT_LOOPBACK_CTRLLED·· 440

ETHOAM_QUIT_LOOPBACK_CTRLLING·· 440

ETHOAM_REMOTE_CRITICAL· 440

ETHOAM_REMOTE_DYING_GASP· 441

ETHOAM_REMOTE_ERROR_FRAME· 441

ETHOAM_REMOTE_ERROR_FRAME_PERIOD·· 441

ETHOAM_REMOTE_ERROR_FRAME_SECOND·· 442

ETHOAM_REMOTE_ERROR_SYMBOL· 442

ETHOAM_REMOTE_EXIT· 442

ETHOAM_REMOTE_FAILURE_RECOVER· 443

ETHOAM_REMOTE_LINK_FAULT· 443

ETHOAM_NO_ENOUGH_RESOURCE· 443

ETHOAM_NOT_CONNECTION_TIMEOUT· 444

EVB messages· 444

EVB_AGG_FAILED·· 444

EVB_LICENSE_EXPIRE· 445

EVB_VSI_OFFLINE· 445

EVB_VSI_ONLINE· 445

EVIISIS messages· 446

EVIISIS_LICENSE_EXPIRED·· 446

EVIISIS_LICENSE_EXPIRED_TIME· 446

EVIISIS_LICENSE_UNAVAILABLE· 446

EVIISIS_NBR_CHG·· 447

FCLINK messages· 447

FCLINK_FDISC_REJECT_NORESOURCE· 447

FCLINK_FLOGI_REJECT_NORESOURCE· 448

FCOE messages· 448

FCOE_INTERFACE_NOTSUPPORT_FCOE· 448

FCOE_LAGG_BIND_ACTIVE· 449

FCOE_LAGG_BIND_DEACTIVE· 449

FCZONE messages· 449

FCZONE_DISTRIBUTE_FAILED·· 450

FCZONE_HARDZONE_DISABLED·· 450

FCZONE_HARDZONE_ENABLED·· 451

FCZONE_ISOLATE_ALLNEIGHBOR· 451

FCZONE_ISOLATE_CLEAR_VSAN· 452

FCZONE_ISOLATE_CLEAR_ALLVSAN· 452

FCZONE_ISOLATE_NEIGHBOR· 453

FGROUP messages· 453

FLOWGROUP_APPLY_FAIL· 453

FLOWGROUP_MODIFY_FAIL· 454

FIB messages· 454

FIB_FILE· 454

FILTER messages· 454

FILTER_EXECUTION_ICMP· 455

FILTER_EXECUTION_ICMPV6· 456

FILTER_IPV4_EXECUTION· 457

FILTER_IPV6_EXECUTION· 458

FIPSNG messages· 458

FIPSNG_HARD_RESOURCE_NOENOUGH· 459

FIPSNG_HARD_RESOURCE_RESTORE· 459

FS messages· 459

FS_UNFORMATTED_PARTITION· 459

FTP messages· 460

FTP_ACL_DENY· 460

FTP_REACH_SESSION_LIMIT· 460

FTPD_AUTHOR_FAILED·· 461

gRPC messages· 461

GRPC_LOGIN· 461

GRPC_LOGIN_FAILED·· 462

GRPC_LOGOUT· 462

GRPC_SERVER_FAILED·· 462

GRPC_SUBSCRIBE_EVENT_FAILED·· 463

GRPC_RECEIVE_SUBSCRIPTION· 463

HA messages· 463

HA_BATCHBACKUP_FINISHED·· 463

HA_BATCHBACKUP_STARTED·· 464

HA_STANDBY_NOT_READY· 464

HA_STANDBY_TO_MASTER· 464

HLTH messages· 464

LIPC_COMM_FAULTY· 465

LIPC_COMM_RECOVER· 465

HQOS messages· 465

HQOS_DP_SET_FAIL· 466

HQOS_FP_SET_FAIL· 466

HQOS_POLICY_APPLY_FAIL· 467

HQOS_POLICY_APPLY_FAIL· 467

HTTPD messages· 467

HTTPD_CONNECT· 468

HTTPD_CONNECT_TIMEOUT· 468

HTTPD_DISCONNECT· 468

HTTPD_FAIL_FOR_ACL· 469

HTTPD_FAIL_FOR_ACP· 469

HTTPD_REACH_CONNECT_LIMIT· 470

IFNET messages· 470

IF_BUFFER_CONGESTION_OCCURRENCE· 470

IF_BUFFER_CONGESTION_CLEAR· 471

IF_JUMBOFRAME_WARN· 471

IF_LINKFLAP_DETECTED·· 472

INTERFACE_NOTSUPPRESSED·· 472

INTERFACE_SUPPRESSED·· 472

LINK_UPDOWN· 473

PFC_WARNING·· 473

PHY_UPDOWN· 474

PROTOCOL_UPDOWN· 474

STORM_CONSTRAIN_BELOW·· 475

STORM_CONSTRAIN_CONTROLLED·· 475

STORM_CONSTRAIN_EXCEED·· 476

STORM_CONSTRAIN_NORMAL· 476

TUNNEL_LINK_UPDOWN· 477

TUNNEL_PHY_UPDOWN· 477

VLAN_MODE_CHANGE· 477

IKE messages· 478

IKE_P1_SA_ESTABLISH_FAIL· 478

IKE_P2_SA_ESTABLISH_FAIL· 479

IKE_P2_SA_TERMINATE· 479

IKE_VERIFY_CERT_FAIL· 480

IMA·· 481

IMA_ALLOCATE_FAILED·· 481

IMA_DATA_ERROR· 482

IMA_FILE_HASH_FAILED·· 482

IMA_RM_FILE_MISS· 482

IMA_RM_HASH_MISS· 483

IMA_TEMPLATE_ERROR· 483

iNQA messages· 483

INQA_BWD_LOSS_EXCEED·· 483

INQA_BWD_LOSS_RECOV· 484

INQA_DEBUG_FAIL· 484

INQA_FLAG_DIFF· 484

INQA_FLAG_FAIL· 485

INQA_FLOW_DIFF· 485

INQA_FWD_LOSS_EXCEED·· 485

INQA_FWD_LOSS_RECOV· 486

INQA_INST_FAIL· 486

INQA_INTVL_DIFF· 486

INQA_NO_RESOURCE· 487

INQA_NO_SUPPORT· 487

INQA_SMOOTH_BEGIN_FAIL· 487

INQA_SMOOTH_END_FAIL· 488

IP6ADDR·· 488

IP6ADDR_CREATEADDRESS_ERROR· 488

IP6ADDR_FUNCTION_FAIL· 489

IP6FW··· 489

IPv6_MTU_SET_DRV_NOT_SUPPORT· 489

IPADDR messages· 489

IPADDR_HA_EVENT_ERROR· 490

IPADDR_HA_STOP_EVENT· 491

IPFW··· 491

IPFW_FAILURE· 491

IPv4_MTU_SET_DRV_NOT_SUPPORT· 492

IPSEC messages· 492

IPSEC_FAILED_ADD_FLOW_TABLE· 492

IPSEC_PACKET_DISCARDED·· 493

IPSEC_SA_ESTABLISH· 493

IPSEC_SA_ESTABLISH_FAIL· 494

IPSEC_SA_INITINATION· 494

IPSEC_SA_TERMINATE· 495

IPSG messages· 495

IPSG_ADDENTRY_ERROR· 496

IPSG_ADDEXCLUDEDVLAN_ERROR· 497

IPSG_ARP_LOCALMAC_CONFLICT· 497

IPSG_ARP_REMOTEMAC_CONFLICT· 498

IPSG_DELENTRY_ERROR· 498

IPSG_DELEXCLUDEDVLAN_ERROR· 499

IPSG_MAC_CONFLICT· 499

IPSG_ND_LOCALMAC_CONFLICT· 500

IPSG_ND_REMOTEMAC_CONFLICT· 500

IPSG_IPV4_ALARMCLEAR· 501

IPSG_IPV4_ALARMEMERGE· 501

IPSG_IPV6_ALARMCLEAR· 501

IPSG_IPV6_ALARMEMERGE· 502

IRDP messages· 502

IRDP_EXCEED_ADVADDR_LIMIT· 502

IRF· 502

IRF_LINK_BLOCK· 503

IRF_LINK_DOWN· 503

IRF_LINK_UP· 503

IRF_MEMBERID_CONFLICT· 504

IRF_MERGE· 504

IRF_MERGE_NEED_REBOOT· 504

IRF_MERGE_NOT_NEED_REBOOT· 505

ISIS messages· 505

ISIS_LSP_CONFLICT· 505

ISIS_MEM_ALERT· 506

ISIS_NBR_CHG·· 507

ISSU messages· 508

ISSU_LOAD_FAILED·· 508

ISSU_LOAD_SUCCESS· 508

ISSU_PROCESSWITCHOVER· 508

ISSU_ROLLBACKCHECKNORMAL· 509

L2PT messages· 509

L2PT_SET_MULTIMAC_FAILED·· 509

L2PT_CREATE_TUNNELGROUP_FAILED·· 509

L2PT_ADD_GROUPMEMBER_FAILED·· 510

L2PT_ENABLE_DROP_FAILED·· 510

L2TPv2 messages· 510

L2TPV2_TUNNEL_EXCEED_LIMIT· 511

L2TPV2_SESSION_EXCEED_LIMIT· 511

L2VPN messages· 511

EVPN_GLOBAL_MAC_CONFLICT· 512

L2VPN_ARP_MOBILITY_SUPPRESS (public instance) 512

L2VPN_ARP_MOBILITY_SUPPRESS (VPN instance) 513

L2VPN_ARP_MOBILITY_UNSUPPRESS (public instance) 513

L2VPN_ARP_MOBILITY_UNSUPPRESS (VPN instance) 514

L2VPN_MAC_MOBILITY_SUPPRESS· 514

L2VPN_MAC_MOBILITY_UNSUPPRESS· 515

L2VPN_BGPVC_CONFLICT_LOCAL· 515

L2VPN_BGPVC_CONFLICT_REMOTE· 516

L2VPN_HARD_RESOURCE_NOENOUGH· 516

L2VPN_HARD_RESOURCE_RESTORE· 516

L2VPN_LABEL_DUPLICATE· 517

L2VPN_MLAG_AC_CONFLICT· 517

LAGG messages· 517

LAGG_ACTIVE· 518

LAGG_AUTO_AGGREGATION· 518

LAGG_INACTIVE_AICFG·· 519

LAGG_INACTIVE_BFD·· 519

LAGG_INACTIVE_CONFIGURATION· 520

LAGG_INACTIVE_DUPLEX· 520

LAGG_INACTIVE_HARDWAREVALUE· 521

LAGG_INACTIVE_IFCFG_DEFAULT· 521

LAGG_INACTIVE_IFCFG_LOOPPORT· 522

LAGG_INACTIVE_IFCFG_NONAGG·· 522

LAGG_INACTIVE_KEY_INVALID·· 523

LAGG_INACTIVE_LOWER_LIMIT· 523

LAGG_INACTIVE_NODEREMOVE· 524

LAGG_INACTIVE_OPERSTATE· 524

LAGG_INACTIVE_PARTNER· 525

LAGG_INACTIVE_PARTNER_KEY_WRONG·· 525

LAGG_INACTIVE_PARTNER_MAC_WRONG·· 526

LAGG_INACTIVE_PARTNER_NONAGG·· 526

LAGG_INACTIVE_PARTNER_RDIRHANDLE· 527

LAGG_INACTIVE_PHYSTATE· 527

LAGG_INACTIVE_PORT_DEFAULT· 528

LAGG_INACTIVE_RDIRHANDLE· 528

LAGG_INACTIVE_REDUNDANCY· 529

LAGG_INACTIVE_RESOURCE_INSUFICIE· 529

LAGG_INACTIVE_SPEED·· 530

LAGG_INACTIVE_STANDBY· 530

LAGG_INACTIVE_UPPER_LIMIT· 531

LAGG_SELECTPORT_INCONSISTENT· 531

LDP messages· 531

LDP_ADJACENCY_DOWN· 532

LDP_MPLSLSRID_CHG·· 533

LDP_SESSION_CHG·· 534

LDP_SESSION_GR· 535

LDP_SESSION_SP· 536

License messages· 536

LIC_INIT· 536

LIPC messages· 537

PORT_CHANGE· 538

LLDP messages· 538

LLDP_CREATE_NEIGHBOR· 538

LLDP_DELETE_NEIGHBOR· 539

LLDP_LESS_THAN_NEIGHBOR_LIMIT· 539

LLDP_NEIGHBOR_AGE_OUT· 540

LLDP_NEIGHBOR_PROTECTION_BLOCK· 540

LLDP_NEIGHBOR_PROTECTION_DOWN· 541

LLDP_NEIGHBOR_PROTECTION_UNBLOCK· 541

LLDP_NEIGHBOR_PROTECTION_UP· 541

LLDP_PVID_INCONSISTENT· 542

LLDP_PVID_INCONSISTENT· 542

LLDP_REACH_NEIGHBOR_LIMIT· 543

LOAD messages· 543

BOARD_LOADING·· 543

LOAD_FAILED·· 544

LOAD_FINISHED·· 544

LOGIN messages· 544

LOGIN_FAILED·· 545

LOGIN_ INVALID_USERNAME_PWD·· 545

LPDT messages· 545

LPDT_LOOPED·· 545

LPDT_RECOVERED·· 546

LPDT_VLAN_LOOPED·· 546

LPDT_VLAN_RECOVERED·· 546

LPDT_VSI_LOOPED·· 547

LPDT_VSI_RECOVERED·· 547

LPDT_VSI_BLOCKFAIL· 548

LS messages· 548

LOCALSVR_PROMPTED_CHANGE_PWD·· 549

LS_ADD_USER_TO_GROUP· 549

LS_AUTHEN_FAILURE· 550

LS_AUTHEN_SUCCESS· 550

LS_DEL_USER_FROM_GROUP· 551

LS_DELETE_PASSWORD_FAIL· 551

LS_PWD_ADDBLACKLIST· 551

LS_PWD_CHGPWD_FOR_AGEDOUT· 552

LS_PWD_CHGPWD_FOR_AGEOUT· 552

LS_PWD_CHGPWD_FOR_COMPOSITION· 552

LS_PWD_CHGPWD_FOR_FIRSTLOGIN· 553

LS_PWD_CHGPWD_FOR_LENGTH· 553

LS_PWD_FAILED2WRITEPASS2FILE· 553

LS_PWD_MODIFY_FAIL· 554

LS_PWD_MODIFY_SUCCESS· 554

LS_REAUTHEN_FAILURE· 555

LS_UPDATE_PASSWORD_FAIL· 555

LS_USER_CANCEL· 555

LS_USER_PASSWORD_EXPIRE· 556

LS_USER_ROLE_CHANGE· 556

LSPV messages· 556

LSPV_PING_STATIS_INFO·· 557

MAC messages· 557

MAC_DRIVER_ADD_ENTRY· 557

MAC_NOTIFICATION· 558

MAC_PROTOCOLPKT_NORES_GLOBAL· 559

MAC_PROTOCOLPKT_NORES_PORT· 559

MAC_PROTOCOLPKT_NORES_VLAN· 560

MAC_TABLE_FULL_GLOBAL· 560

MAC_TABLE_FULL_PORT· 560

MAC_TABLE_FULL_VLAN· 561

MAC_VLAN_LEARNLIMIT_NORESOURCE· 561

MAC_VLAN_LEARNLIMIT_NOTSUPPORT· 561

MACA messages· 562

MACA_ENABLE_NOT_EFFECTIVE· 562

MACA_LOGIN_FAILURE· 563

MACA_LOGIN_FAILURE (EAD) 564

MACA_LOGIN_SUCC· 565

MACA_LOGIN_SUCC (in open mode) 565

MACA_LOGOFF· 566

MACA_LOGOFF (in open mode) 566

MACSEC messages· 566

MACSEC_MKA_KEEPALIVE_TIMEOUT· 567

MACSEC_MKA_PRINCIPAL_ACTOR· 567

MACSEC_MKA_SAK_REFRESH· 567

MACSEC_MKA_SESSION_REAUTH· 568

MACSEC_MKA_SESSION_SECURED·· 568

MACSEC_MKA_SESSION_START· 569

MACSEC_MKA_SESSION_STOP· 569

MACSEC_MKA_SESSION_UNSECURED·· 570

MBFD messages· 570

MBFD_TRACEROUTE_FAILURE· 570

MBUF messages· 571

MBUF_DATA_BLOCK_CREATE_FAIL· 571

MDC messages· 571

MDC_CREATE_ERR· 572

MDC_CREATE· 572

MDC_DELETE· 572

MDC_KERNEL_EVENT_TOOLONG·· 573

MDC_LICENSE_EXPIRE· 573

MDC_NO_FORMAL_LICENSE· 573

MDC_NO_LICENSE_EXIT· 574

MDC_OFFLINE· 574

MDC_ONLINE· 574

MDC_STATE_CHANGE· 575

MFIB messages· 575

MFIB_MEM_ALERT· 575

MGROUP messages· 575

MGROUP_APPLY_SAMPLER_FAIL· 576

MGROUP_RESTORE_CPUCFG_FAIL· 576

MGROUP_RESTORE_GROUP_FAIL· 577

MGROUP_RESTORE_IFCFG_FAIL· 577

MGROUP_SYNC_CFG_FAIL· 578

MPLS messages· 578

MPLS_HARD_RESOURCE_NOENOUGH· 578

MPLS_HARD_RESOURCE_RESTORE· 579

MTLK messages· 579

MTLK_UPLINK_STATUS_CHANGE· 579

NAT messages· 579

NAT_ADDR_BIND_CONFLICT· 580

NAT_FAILED_ADD_FLOW_RULE· 580

NAT_FAILED_ADD_FLOW_TABLE· 581

NAT_FLOW·· 582

NAT_SERVER_INVALID·· 583

NAT_SERVICE_CARD_RECOVER_FAILURE· 584

ND messages· 584

ND_COMMONPROXY_ENABLE_FAILED·· 585

ND_CONFLICT· 585

ND_DUPADDR· 585

ND_HOST_IP_CONFLICT· 586

ND_LOCALPROXY_ENABLE_FAILED·· 586

ND_MAC_CHECK· 587

ND_NETWORKROUTE_DUPLICATE· 587

ND_RAGUARD_DROP· 588

ND_RATE_EXCEEDED·· 588

ND_RATELIMIT_NOTSUPPORT· 589

ND_SET_PORT_TRUST_NORESOURCE· 589

ND_SET_VLAN_REDIRECT_NORESOURCE· 589

ND_SNOOPING_LEARN_ALARM·· 590

ND_SNOOPING_LEARN_ALARM_RECOVER· 590

ND_USER_DUPLICATE_IPV6ADDR· 591

ND_USER_MOVE· 592

ND_USER_OFFLINE· 592

ND_USER_ONLINE· 593

NETCONF messages· 593

CLI 593

EDIT-CONFIG·· 594

NETCONF_MSG_DEL· 595

THREAD·· 595

NQA messages· 595

NQA_ENTRY_PROBE_RESULT· 596

NQA_LOG_UNREACHABLE· 596

NQA_START_FAILURE· 597

NQA_TWAMP_LIGHT_PACKET_INVALID·· 597

NQA_TWAMP_LIGHT_REACTION· 598

NQA_TWAMP_LIGHT_START_FAILURE· 598

NSS messages· 599

NSS_ENABLE_FAIL· 599

NSS_SESSION_TIMEOUT_FAIL· 599

NTP messages· 599

NTP_CLOCK_CHANGE· 600

NTP_LEAP_CHANGE· 600

NTP_SOURCE_CHANGE· 601

NTP_SOURCE_LOST· 601

NTP_STRATUM_CHANGE· 601

OAP messages· 602

OAP_CLIENT_DEREG·· 602

OAP_CLIENT_TIMEOUT· 602

OBJP messages· 602

OBJP_ACCELERATE_NO_RES· 603

OBJP_ACCELERATE_NOT_SUPPORT· 603

OBJP_ACCELERATE_UNK_ERR· 603

OFP messages· 604

OFP_ACTIVE· 604

OFP_ACTIVE_FAILED·· 604

OFP_CONNECT· 604

OFP_FAIL_OPEN· 605

OFP_FLOW_ADD·· 605

OFP_FLOW_ADD_ARP_FAILED·· 606

OFP_FLOW_ADD_BUSY· 606

OFP_FLOW_ADD_BUSY_RECOVER· 606

OFP_FLOW_ADD_DUP· 607

OFP_FLOW_ADD_FAILED·· 607

OFP_FLOW_ADD_FAILED·· 608

OFP_FLOW_ADD_ND_FAILED·· 608

OFP_FLOW_ADD_TABLE_MISS· 609

OFP_FLOW_ADD_TABLE_MISS_FAILED·· 609

OFP_FLOW_DEL· 610

OFP_FLOW_DEL_L2VPN_DISABLE· 610

OFP_FLOW_DEL_TABLE_MISS· 611

OFP_FLOW_DEL_TABLE_MISS_FAILED·· 611

OFP_FLOW_DEL_VXLAN_DEL· 612

OFP_FLOW_MOD·· 612

OFP_FLOW_MOD_FAILED·· 613

OFP_FLOW_MOD_TABLE_MISS· 613

OFP_FLOW_MOD_TABLE_MISS_FAILED·· 614

OFP_FLOW_RMV_GROUP· 614

OFP_FLOW_RMV_HARDTIME· 614

OFP_FLOW_RMV_IDLETIME· 615

OFP_FLOW_RMV_METER· 615

OFP_FLOW_UPDATE_FAILED·· 616

OFP_GROUP_ADD·· 616

OFP_GROUP_ADD_FAILED·· 617

OFP_GROUP_DEL· 617

OFP_GROUP_MOD·· 618

OFP_GROUP_MOD_FAILED·· 618

OFP_GROUP_REFRESH_FAILED·· 619

OFP_GROUP_ROLLBACK_FAILED·· 619

OFP_METER_ADD·· 620

OFP_METER_ADD_FAILED·· 620

OFP_METER_DEL· 621

OFP_METER_MOD·· 621

OFP_METER_MOD_FAILED·· 622

OFP_MISS_RMV_GROUP· 622

OFP_MISS_RMV_HARDTIME· 622

OFP_MISS_RMV_IDLETIME· 623

OFP_MISS_RMV_METER· 623

OFP_RADARDETECTION· 623

PORT_MOD·· 624

OPENSRC (FreeRADIUS) messages· 625

HUP event 625

Process restart event 626

Process start event 626

User authentication· 627

OPTMOD messages· 629

BIAS_HIGH· 630

BIAS_LOW·· 630

BIAS_NORMAL· 630

CFG_ERR· 631

CHKSUM_ERR· 631

FIBER_SFP MODULE_INVALID·· 631

FIBER_SFPMODULE_NOWINVALID·· 632

IO_ERR· 632

MOD_ALM_OFF· 632

MOD_ALM_ON· 633

MODULE_IN· 633

MODULE_OUT· 633

PHONY_MODULE· 634

RX_ALM_OFF· 634

RX_ALM_ON· 634

RX_POW_HIGH· 635

RX_POW_LOW·· 635

RX_POW_NORMAL· 635

TEMP_HIGH· 636

TEMP_LOW·· 636

TEMP_NORMAL· 636

TX_ALM_OFF· 637

TX_ALM_ON· 637

TX_POW_HIGH· 637

TX_POW_LOW·· 638

TX_POW_NORMAL· 638

TYPE_ERR· 638

VOLT_HIGH· 639

VOLT_LOW·· 639

VOLT_NORMAL· 639

OSPF messages· 640

OSPF_DUP_RTRID_NBR· 640

OSPF_IP_CONFLICT_INTRA· 640

OSPF_LAST_NBR_DOWN· 641

OSPF_MEM_ALERT· 641

OSPF_NBR_CHG·· 642

OSPF_NBR_CHG_REASON· 643

OSPF_RT_LMT· 644

OSPF_RTRID_CHG·· 644

OSPF_RTRID_CONFLICT_INTER· 644

OSPF_RTRID_CONFLICT_INTRA· 645

OSPF_VLINKID_CHG·· 645

OSPFV3 messages· 645

OSPFV3_LAST_NBR_DOWN· 646

OSPFV3_MEM_ALERT· 646

OSPFV3_NBR_CHG·· 647

OSPFV3_RT_LMT· 647

PBB messages· 647

PBB_JOINAGG_WARNING·· 648

PBR messages· 648

PBR_HARDWARE_ERROR· 648

PCE messages· 648

PCE_PCEP_SESSION_CHG·· 649

PEX messages (IRF 3) 649

PEX_ASSOCIATEID_MISMATCHING·· 650

PEX_CONFIG_ERROR· 650

PEX_CONNECTION_ERROR· 651

PEX_FORBID_STACK· 651

PEX_LINK_BLOCK· 652

PEX_LINK_DOWN· 653

PEX_LINK_FORWARD·· 653

PEX_REG_JOININ· 654

PEX_REG_LEAVE· 654

PEX_REG_REQUEST· 655

PEX_STACKCONNECTION_ERROR· 655

PEX messages (IRF 3.1) 1

PEX_AUTOCONFIG_BAGG_ASSIGNMEMBER· 1

PEX_AUTOCONFIG_BAGG_CREATE· 1

PEX_AUTOCONFIG_BAGG_NORESOURCE· 2

PEX_AUTOCONFIG_BAGG_REMOVEMEMBER· 3

PEX_AUTOCONFIG_CAPABILITY_ENABLE· 3

PEX_AUTOCONFIG_CASCADELIMIT· 3

PEX_AUTOCONFIG_CONNECTION_ERROR· 4

PEX_AUTOCONFIG_DIFFGROUPNUMBER· 4

PEX_AUTOCONFIG_DYNAMICBAGG_STP· 5

PEX_AUTOCONFIG_GROUP_CREATE· 5

PEX_AUTOCONFIG_NONUMBERRESOURCE· 5

PEX_AUTOCONFIG_NOT_CASCADEPORT· 6

PEX_AUTOCONFIG_NUMBER_ASSIGN· 6

PEX_LLDP_DISCOVER· 7

PEX_MEMBERID_EXCEED·· 7

PEX_PECSP_OPEN_RCVD·· 7

PEX_PECSP_OPEN_SEND·· 8

PEX_PECSP_TIMEOUT· 8

PFILTER messages· 8

PFILTER_GLB_IPV4_DACT_NO_RES· 9

PFILTER_GLB_IPV4_DACT_UNK_ERR· 9

PFILTER_GLB_IPV6_DACT_NO_RES· 10

PFILTER_GLB_IPV6_DACT_UNK_ERR· 10

PFILTER_GLB_MAC_DACT_NO_RES· 11

PFILTER_GLB_MAC_DACT_UNK_ERR· 11

PFILTER_GLB_NO_RES· 12

PFILTER_GLB_NOT_SUPPORT· 12

PFILTER_GLB_ RES_CONFLICT· 13

PFILTER_GLB_UNK_ERR· 13

PFILTER_IF_IPV4_DACT_NO_RES· 14

PFILTER_IF_IPV4_DACT_UNK_ERR· 14

PFILTER_IF_IPV6_DACT_NO_RES· 15

PFILTER_IF_IPV6_DACT_UNK_ERR· 15

PFILTER_IF_MAC_DACT_NO_RES· 16

PFILTER_IF_MAC_DACT_UNK_ERR· 16

PFILTER_IF_NO_RES· 17

PFILTER_IF_NOT_SUPPORT· 17

PFILTER_IF_RES_CONFLICT· 18

PFILTER_IF_UNK_ERR· 18

PFILTER_IPV4_FLOW_INFO·· 19

PFILTER_IPV4_FLOW_STATIS· 19

PFILTER_IPV6_FLOW_INFO·· 20

PFILTER_IPV6_FLOW_STATIS· 20

PFILTER_IPV6_STATIS_INFO·· 21

PFILTER_MAC_FLOW_INFO·· 21

PFILTER_STATIS_INFO·· 22

PFILTER_VLAN_IPV4_DACT_NO_RES· 22

PFILTER_VLAN_IPV4_DACT_UNK_ERR· 23

PFILTER_VLAN_IPV6_DACT_NO_RES· 23

PFILTER_VLAN_IPV6_DACT_UNK_ERR· 24

PFILTER_VLAN_MAC_DACT_NO_RES· 24

PFILTER_VLAN_MAC_DACT_UNK_ERR· 25

PFILTER_VLAN_NO_RES· 25

PFILTER_VLAN_NOT_SUPPORT· 26

PFILTER_VLAN_RES_CONFLICT· 26

PFILTER_VLAN_UNK_ERR· 27

PIM messages· 27

PIM_NBR_DOWN· 27

PIM_NBR_UP· 28

PING messages· 28

PING_STATISTICS· 28

PING_VPN_STATISTICS· 29

PKG messages· 29

PKG_BOOTLOADER_FILE_FAILED·· 29

PKG_BOOTLOADER_FILE_SUCCESS· 30

PKG_INSTALL_ACTIVATE_FAILED·· 30

PKG_INSTALL_ACTIVATE_SUCCESS· 30

PKI messages· 31

GET_CERT_FROM_CA_SERVER_FAIL· 31

IMPORT_CERT_FAIL· 32

REQUEST_CERT_FAIL· 33

REQUEST_CERT_SUCCESS· 34

RETRIEVE_CRL_FAIL· 35

VALIDATE_CERT_FAIL· 36

PKT2CPU messages· 37

PKT2CPU_NO_RESOURCE· 38

PKTCPT· 38

PKTCPT_AP_OFFLINE· 38

PKTCPT_AREADY_EXIT· 39

PKTCPT_CONN_FAIL· 39

PKTCPT_INVALID_FILTER· 40

PKTCPT_LOGIN_DENIED·· 40

PKTCPT_MEMORY_ALERT· 40

PKTCPT_OPEN_FAIL· 41

PKTCPT_OPERATION_TIMEOUT· 41

PKTCPT_SERVICE_FAIL· 42

PKTCPT_UNKNOWN_ERROR· 42

PKTCPT_UPLOAD_ERROR· 43

PKTCPT_WRITE_FAIL· 43

PoE messages· 43

POE_AI_CLEAR· 44

POE_AI_DETECTIONMODE_NONE· 44

POE_AI_DETECTIONMODE_SIMPLE· 45

POE_AI_DISCONNECT_AC· 45

POE_AI_DISCONNECT_DELAY· 45

POE_AI_FORCE_PoE· 46

POE_AI_HIGH_INRUSH· 46

POE_AI_LEGACY· 46

POE_AI_MAXPOWER· 47

POE_AI_RESTART· 47

Portal messages· 47

PORTAL_RULE_FAILED·· 48

PORTSEC messages· 48

PORTSEC_ACL_FAILURE· 49

PORTSEC_CAR_FAILURE· 49

PORTSEC_CREATEAC_FAILURE· 50

PORTSEC_LEARNED_MACADDR· 50

PORTSEC_NTK_NOT_EFFECTIVE· 51

PORTSEC_PORTMODE_NOT_EFFECTIVE· 51

PORTSEC_PROFILE_FAILURE· 51

PORTSEC_URL_FAILURE· 52

PORTSEC_VIOLATION· 52

PORTSEC_VLANMACLIMIT· 53

PPP messages· 53

IPPOOL_ADDRESS_EXHAUSTED·· 53

PPP_USER_LOGON_SUCCESS· 54

PPP_USER_LOGON_FAILED·· 54

PPP_USER_LOGOFF· 55

PTP messages· 56

PTP_MASTER_CLOCK_CHANGE· 56

PTP_PKTLOST· 57

PTP_PKTLOST_RECOVER· 58

PTP_PORT_BMCINFO_CHANGE· 58

PTP_PORT_STATE_CHANGE· 59

PTP_SRC_CHANGE· 60

PTP_SRC_SWITCH· 61

PTP_TIME_LOCK· 61

PTP_TIME_NOT_LOCK· 62

PTS·· 62

PTS_AK_AUTH_FAILED·· 62

PTS_AK_INVALID·· 63

PTS_AK_NO_CERT· 63

PTS_AK_NO_EXIST· 63

PTS_AK_NO_LOAD·· 64

PTS_BTW_PCR_FAILED·· 64

PTS_CHECK_RM_VERSION_FAILED·· 64

PTS_CREATE_AGED_TIMER_FAILED·· 65

PTS_CREATE_CHECK_TIMER_FAILED·· 65

PTS_CREATE_CONTEXT_FAILED·· 65

PTS_CREATE_EPOLL_FAILED·· 66

PTS_CREATE_HASH_FAILED·· 66

PTS_CREATE_SELFVERIFY_COUNTER_FAILED·· 66

PTS_CREATE_SELFVERIFY_TIMER_FAILED·· 67

PTS_CREATE_SOCKET_FAILED·· 67

PTS_CREATE_TIMER_FAILED·· 67

PTS_FILE_HASH_FAILED·· 68

PTS_LOAD_KEY_FAILED·· 68

PTS_PARSE_IML_FAILED·· 68

PTS_PKG_PCR_FAILED·· 69

PTS_READ_PCR_FAILED·· 69

PTS_RM_FILE_FAILED·· 69

PTS_RUNTIME_PCR_FAILED·· 70

PTS_SELFVERIFY_FAILED·· 70

PTS_SELFVERIFY_START_FAILED·· 70

PTS_TEMPLATE_HASH_FAILED·· 71

PWDCTL messages· 71

PWDCTL_ADD_BLACKLIST· 71

PWDCTL_CHANGE_PASSWORD·· 72

PWDCTL_FAILED_TO_WRITEPWD·· 72

PWDCTL_FAILED_TO_OPENFILE· 72

PWDCTL_NOENOUGHSPACE· 73

PWDCTL_NOTFOUNDUSER· 73

PWDCTL_UPDATETIME· 73

QOS messages· 73

MIRROR_SYNC_CFG_FAIL· 74

QOS_CAR_APPLYUSER_FAIL· 74

QOS_CBWFQ_REMOVED·· 75

QOS_GTS_APPLYUSER_FAIL· 75

QOS_IFA_CONFIG_FAIL· 76

QOS_IFA_REFRESH_FAIL· 76

QOS_LR_APPLYIF_FAIL· 76

QOS_NOT_ENOUGH_BANDWIDTH· 77

QOS_NOT_ENOUGH_NNIBANDWIDTH· 77

QOS_POLICY_APPLYCOPP_CBFAIL· 78

QOS_POLICY_APPLYCOPP_FAIL· 78

QOS_POLICY_APPLYGLOBAL_CBFAIL· 79

QOS_POLICY_APPLYGLOBAL_FAIL· 79

QOS_POLICY_APPLYIF_CBFAIL· 80

QOS_POLICY_APPLYIF_FAIL· 80

QOS_POLICY_APPLYUSER_FAIL· 81

QOS_POLICY_APPLYVLAN_CBFAIL· 81

QOS_POLICY_APPLYVLAN_FAIL· 82

QOS_QMPROFILE_APPLYIF_FAIL· 82

QOS_QMPROFILE_APPLYUSER_FAIL· 83

QOS_QMPROFILE_MODIFYQUEUE_FAIL· 83

QOS_QUEUE_APPLYIF_FAIL· 84

QOS_UNI_RESTORE_FAIL· 84

WRED_TABLE_CFG_FAIL· 85

RADIUS messages· 85

RADIUS_ACCT_SERVER_DOWN· 85

RADIUS_ACCT_SERVER_UP· 86

RADIUS_AUTH_FAILURE· 86

RADIUS_AUTH_SERVER_DOWN· 87

RADIUS_AUTH_SERVER_UP· 87

RADIUS_AUTH_SUCCESS· 88

RADIUS_REMOVE_SERVER_FAIL· 88

RDDC messages· 88

RDDC_ACTIVENODE_CHANGE· 89

RESMON·· 89

RESMON_MINOR· 89

RESMON_MINOR_RECOVERY· 90

RESMON_SEVERE· 90

RESMON_SEVERE_RECOVERY· 91

RESMON_USEDUP· 91

RESMON_USEDUP_RECOVERY· 92

RIP messages· 92

RIP_MEM_ALERT· 92

RIP_RT_LMT· 93

RIPNG messages· 93

RIPNG_MEM_ALERT· 93

RIPNG_RT_LMT· 93

RM messages· 93

RM_ACRT_REACH_LIMIT· 94

RM_ACRT_REACH_THRESVALUE· 94

RM_THRESHLD_VALUE_REACH· 95

RM_TOTAL_THRESHLD_VALUE_REACH· 95

RPR messages· 95

RPR_EXCEED_MAX_SEC_MAC· 96

RPR_EXCEED_MAX_SEC_MAC_OVER· 96

RPR_EXCEED_MAX_STATION· 96

RPR_EXCEED_MAX_STATION_OVER· 97

RPR_EXCEED_RESERVED_RATE· 97

RPR_EXCEED_RESERVED_RATE_OVER· 97

RPR_IP_DUPLICATE· 98

RPR_IP_DUPLICATE_OVER· 98

RPR_JUMBO_INCONSISTENT· 98

RPR_JUMBO_INCONSISTENT_OVER· 99

RPR_LAGGCONFIG_INCONSISTENT· 99

RPR_LAGGCONFIG_INCONSISTENT_OVER· 99

RPR_MISCABLING·· 100

RPR_MISCABLING_OVER· 100

RPR_PROTECTION_INCONSISTENT· 100

RPR_PROTECTION_INCONSISTENT_OVER· 101

RPR_SEC_MAC_DUPLICATE· 101

RPR_SEC_MAC_DUPLICATE_OVER· 101

RPR_TOPOLOGY_INCONSISTENT· 102

RPR_TOPOLOGY_INCONSISTENT_OVER· 102

RPR_TOPOLOGY_INSTABILITY· 102

RPR_TOPOLOGY_INSTABILITY_OVER· 103

RPR_TOPOLOGY_INVALID·· 103

RPR_TOPOLOGY_INVALID_OVER· 103

RRPP messages· 103

RRPP_RING_FAIL· 104

RRPP_RING_RESTORE· 104

RTM messages· 104

RTM_ENVIRONMENT· 104

RTM_TCL_LOAD_FAILED·· 105

RTM_TCL_MODIFY· 105

RTM_TCL_NOT_EXIST· 105

SAVA messages· 105

SAVA_SET_DRV_FAILED·· 106

SAVA_SPOOFING_DETECTED·· 106

SAVI messages· 106

SAVI_FILTER_ENTRY_ADD·· 107

SAVI_FILTER_ENTRY_DEL· 107

SAVI_SPOOFING_DETECTED·· 108

SCMD messages· 108

PROCESS_ABNORMAL· 109

PROCESS_ACTIVEFAILED·· 109

PROCESS_CORERECORD·· 110

SCM_ABNORMAL_REBOOT· 110

SCM_ABNORMAL_REBOOTMDC· 111

SCM_ABORT_RESTORE· 111

SCM_PROCESS_HEALTHY· 112

SCM_PROCESS_UNHEALTHY· 112

SCM_INSMOD_ADDON_TOOLONG·· 112

SCM_KERNEL_INIT_TOOLONG·· 113

SCM_KILL_PROCESS· 113

SCM_PROCESS_STARTING_TOOLONG·· 114

SCM_PROCESS_STILL_STARTING·· 115

SCM_SKIP_PROCESS· 115

SCRLSP messages· 116

SCRLSP_LABEL_DUPLICATE· 116

SESSION messages· 116

SESSION_IPV4_FLOW·· 117

SESSION_IPV6_FLOW·· 118

SFLOW messages· 119

SFLOW_HARDWARE_ERROR· 119

SHELL messages· 119

SHELL_CMD·· 119

SHELL_CMD_CONFIRM·· 120

SHELL_CMD_EXECUTEFAIL· 120

SHELL_CMD_INPUT· 120

SHELL_CMD_INPUT_TIMEOUT· 121

SHELL_CMD_INVALID_CHARACTER· 121

SHELL_CMD_MATCHFAIL· 121

SHELL_CMDDENY· 122

SHELL_CMDFAIL· 122

SHELL_COMMIT· 122

SHELL_COMMIT_DELAY· 123

SHELL_COMMIT_REDELAY· 123

SHELL_COMMIT_ROLLBACK· 123

SHELL_COMMIT_ROLLBACKDONE· 124

SHELL_COMMIT_WILLROLLBACK· 124

SHELL_CRITICAL_CMDFAIL· 124

SHELL_LOGIN· 125

SHELL_LOGOUT· 125

SLSP messages· 125

SLSP_LABEL_DUPLICATE· 126

SMARTMC messages· 126

ERROR· 126

SMLK messages· 126

SMLK_LINK_SWITCH· 127

SMLK_LINK_SWITCH· 127

SNMP messages· 127

SNMP_ACL_RESTRICTION· 128

SNMP_AUTHENTICATION_FAILURE· 128

SNMP_GET· 128

SNMP_INFORM_LOST· 129

SNMP_NOTIFY· 130

SNMP_SET· 131

SNMP_USM_NOTINTIMEWINDOW·· 131

SSHC messages· 131

SSHC_ALGORITHM_MISMATCH· 132

SSHC_AUTH_PASSWORD_FAIL· 132

SSHC_AUTH_PUBLICKEY_FAIL· 132

SSHC_CERT_VERIFY_FAIL· 133

SSHC_CONNECT_FAIL· 134

SSHC_DECRYPT_FAIL· 134

SSHC_DISCONNECT· 135

SSHC_ENCRYPT_FAIL· 135

SSHC_HOST_NAME_ERROR· 135

SSHC_KEY_EXCHANGE_FAIL· 136

SSHC_MAC_ERROR· 136

SSHC_PUBLICKEY_NOT_EXIST· 136

SSHC_VERSION_MISMATCH· 137

SSHS messages· 137

SSHS_ACL_DENY· 137

SSHS_ALGORITHM_MISMATCH· 138

SSHS_AUTH_EXCEED_RETRY_TIMES· 138

SSHS_AUTH_FAIL· 139

SSHS_AUTH_KBDINT_FAIL· 139

SSHS_AUTH_PWD_FAIL· 140

SSHS_AUTH_TIMEOUT· 140

SSHS_AUTH_SUCCESS· 140

SSHS_AUTHOR_FAIL· 141

SSHS_CERT_VERIFY_FAIL· 142

SSHS_CONNECT· 143

SSHS_DECRYPT_FAIL· 143

SSHS_DISCONNECT· 144

SSHS_ENCRYPT_FAIL· 144

SSHS_LOG·· 145

SSHS_MAC_ERROR· 145

SSHS_REACH_SESSION_LIMIT· 146

SSHS_REACH_USER_LIMIT· 146

SSHS_SCP_OPER· 146

SSHS_SFTP_OPER· 147

SSHS_SRV_UNAVAILABLE· 147

SSHS_VERSION_MISMATCH· 148

STAMGR messages· 148

STAMGR_ADD_FAILVLAN· 148

STAMGR_ADDBAC_INFO·· 148

STAMGR_ADDSTA_INFO·· 149

STAMGR_AUTHORACL_FAILURE· 149

STAMGR_AUTHORUSERPROFILE_FAILURE· 150

STAMGR_CLIENT_OFFLINE· 150

STAMGR_CLIENT_ONLINE· 151

STAMGR_DELBAC_INFO·· 151

STAMGR_DELSTA_INFO·· 151

STAMGR_DOT1X_LOGIN_FAILURE· 152

STAMGR_DOT1X_LOGIN_SUCC· 152

STAMGR_DOT1X_LOGOFF· 153

STAMGR_MACA_LOGIN_FAILURE· 153

STAMGR_MACA_LOGIN_SUCC· 154

STAMGR_MACA_LOGOFF· 154

STAMGR_STAIPCHANGE_INFO·· 155

STAMGR_TRIGGER_IP· 155

STM messages· 155

STM_AUTO_UPDATE_FAILED·· 156

STM_AUTO_UPDATE_FINISHED·· 157

STM_AUTO_UPDATING·· 157

STM_HELLOPKT_NOTSEND·· 158

STM_HELLOPKT_NOTRCV· 158

STM_LINK_DOWN· 158

STM_LINK_TIMEOUT· 159

STM_LINK_UP· 159

STM_MERGE· 159

STM_MERGE_NEED_REBOOT· 160

STM_MERGE_NOT_NEED_REBOOT· 160

STM_SAMEMAC· 160

STM_SOMER_CHECK· 161

STP messages· 161

STP_BPDU_PROTECTION· 161

STP_BPDU_RECEIVE_EXPIRY· 162

STP_CONSISTENCY_CHECK· 162

STP_CONSISTENCY_RESTORATION· 162

STP_DETECTED_TC· 163

STP_DISABLE· 163

STP_DISCARDING·· 163

STP_DISPUTE· 164

STP_DISPUTE_RESTORATION· 164

STP_EDGEPORT_INACTIVE· 165

STP_ENABLE· 165

STP_FORWARDING·· 165

STP_LOOP_PROTECTION· 166

STP_LOOPBACK_PROTECTION· 166

STP_NOT_ROOT· 166

STP_NOTIFIED_TC· 167

STP_PORT_TYPE_INCONSISTENCY· 167

STP_PVID_INCONSISTENCY· 167

STP_PVST_BPDU_PROTECTION· 168

STP_ROOT_PROTECTION· 168

STP_STG_NUM_DETECTION· 168

SYSM·· 169

Port 169

SYSLOG messages· 169

SYSLOG_DISABLE· 169

SYSLOG_ENABLE· 170

SYSLOG_LOGBUFFER_FAILURE· 170

SYSLOG_LOGFILE_CREATE· 170

SYSLOG_LOGFILE_FULL· 171

SYSLOG_LOGFILE_OVERWRITE· 171

SYSLOG_NO_SPACE· 171

SYSLOG_RESTART· 172

SYSLOG_RTM_EVENT_BUFFER_FULL· 172

SYSLOG_START· 173

TACACS messages· 173

TACACS_ACCT_SERVER_DOWN· 173

TACACS_ACCT_SERVER_UP· 174

TACACS_AUTH_FAILURE· 174

TACACS_AUTH_SERVER_DOWN· 175

TACACS_AUTH_SERVER_UP· 175

TACACS_AUTH_SUCCESS· 176

TACACS_AUTHOR_SERVER_DOWN· 176

TACACS_AUTHOR_SERVER_UP· 177

TACACS_REMOVE_SERVER_FAIL· 177

TCSM·· 177

TCSM_CERT_BROKEN· 178

TCSM_KEY_BROKEN· 178

TCSM_KEY_HIERARCHY_BROKEN· 178

TCSM_TSS_SVC_DOWN· 179

TCSM_TSS_SVC_UP· 179

TELNETD messages· 179

TELNETD_ACL_DENY· 179

TELNETD_REACH_SESSION_LIMIT· 180

TRACK messages· 180

TRACK_STATE_CHANGE· 181

TRILL messages· 181

TRILL_DUP_SYSTEMID·· 182

TRILL_INTF_CAPABILITY· 182

TRILL_LICENSE_EXPIRED·· 182

TRILL_LICENSE_EXPIRED_TIME· 183

TRILL_LICENSE_UNAVAILABLE· 183

TRILL_MEM_ALERT· 183

TRILL_NBR_CHG·· 184

VCF messages· 184

VCF_AGGR_CREAT· 184

VCF_AGGR_DELETE· 185

VCF_AGGR_FAILED·· 185

VCF_AUTO_ANALYZE_USERDEF· 185

VCF_AUTO_NO_USERDEF· 186

VCF_AUTO_START· 186

VCF_AUTO_STATIC_CMD·· 187

VCF_BGP· 188

VCF_DOWN_LINK· 189

VCF_DRIVER_INIT· 189

VCF_FAILED_ADD_IRFPORT· 190

VCF_GET_IMAGE· 190

VCF_GET_TEMPLATE· 191

VCF_INSTALL_IMAGE· 191

VCF_IRF_FINISH· 192

VCF_IRF_FOUND·· 192

VCF_IRF_START· 193

VCF_LOOPBACK_START· 193

VCF_LOOPBACK_START_FAILED·· 194

VCF_LOOPBACK_ALLOC· 194

VCF_LOOPBACK_NO_FREE_IP· 195

VCF_LOOPBACK_RECLAIM·· 195

VCF_REBOOT· 196

VCF_SKIP_INSTALL· 196

VCF_STATIC_CMD_ERROR· 197

VCF_UP_LINK· 197

VCF_WHITE_LIST_CHECK· 198

VLAN messages· 198

VLAN_CREATEFAIL· 198

VLAN_FAILED·· 199

VLAN_QINQETHTYPE_FAILED·· 199

VLAN_VLANMAPPING_FAILED·· 199

VLAN_VLANTRANSPARENT_FAILED·· 200

VRRP messages· 200

VRRP_STATUS_CHANGE· 201

VRRP_VF_STATUS_CHANGE· 202

VRRP_VMAC_INEFFECTIVE· 202

VSRP messages· 202

VSRP_BIND_FAILED·· 203

VXLAN messages· 203

VXLAN_LICENSE_UNAVAILABLE· 203

WEB messages· 203

LOGIN· 204

LOGIN_FAILED·· 204

LOGOUT· 204

WIPS messages· 204

APFLOOD·· 205

AP_CHANNEL_CHANGE· 205

ASSOCIATEOVERFLOW·· 205

HONEYPOT· 206

HTGREENMODE· 206

MAN_IN_MIDDLE· 206

WIPS_DOS· 207

WIPS_FLOOD·· 207

WIPS_MALF· 208

WIPS_SPOOF· 209

WIPS_WEAKIV· 209

WIRELESSBRIDGE· 210

 


Introduction

This document includes the following system messages:

·     Messages specific to Release 60xx of the switch.

·     Messages for the Comware 7 software platform version based on which Release xxx was produced. Some platform system messages might not be available on the switch.

This document is intended only for managing S6550XE-HI switches. Do not use this document for any other device models.

This document assumes that the readers are familiar with data communications technologies and H3C networking products.

System log message format

By default, the system log messages use one of the following formats depending on the output destination:

·     Log host:

<PRI>TIMESTAMP Sysname %%vendorMODULE/severity/MNEMONIC: location; CONTENT

·     Destinations except for the log host:

Prefix TIMESTAMP Sysname MODULE/severity/MNEMONIC: CONTENT

 

 

NOTE:

Log message examples in this document use the format for destinations except the log host. They do not contain elements available only for the log host, including the location element.

 

Table 1 System log message elements

Element

Description

<PRI>

Priority identifier. This element is contained only in messages sent to the log host.

It is calculated by using the following formula:

Priority identifier=facilityx8+severity

Where:

·     Facility is specified by using the info-center loghost command. A log host uses this parameter to identify log sources and filter log messages.

·     Severity represents the importance of the message. For more information about severity levels, see Table 2.

Prefix

Message type identifier. This element is contained in the system log messages sent to non-log-host destinations.

The element uses the following symbols to indicate message severity:

·     Percentage sign (%)—Informational and higher levels.

·     Asterisk (*)—Debug level.

TIMESTAMP

Date and time when the event occurred.

The following are commands for configuring the timestamp format:

·     Log host—Use the info-center timestamp loghost command.

·     Non-log-host destinations—Use the info-center timestamp command.

Sysname

Name or IP address of the device that generated the message.

%%vendor

Manufacturer flag. This element is %%10 for H3C.

This element is only available in messages sent to the log host.

MODULE

Name of the module that produced the message.

severity

Severity level of the message. (For more information about severity levels, see Table 2.)

MNEMONIC

Text string that uniquely identifies the system message. The maximum length is 32 characters.

location

Optional. This element identifies where the message occurred. This element is contained only in messages sent to the log host.

This element presents location information for the message in the following format:

-attribute1=x-attribute2=y…-attributeN=z

The following are examples of location attributes:

·     -MDC=XX, which represents the MDC on which the message occurred.

·     -DevIp=XXX.XXX.XXX.XXX, which represents the source IP of the message.

·     -Slot=XX, which represents the slot on which the message occurred.

·     -Chassis=XX-Slot=XX, which represents the chassis and slot on which the message occurred.

This element is separated from the message description by using a semicolon (;).

CONTENT

Text string that contains detailed information about the event or error.

For variable fields in this element, this document uses the representations in Table 3.

 

System log messages are classified into eight severity levels from 0 to 7. The lower the number, the higher the severity, as shown in Table 2.

Table 2 System log message severity levels

Level

Severity

Description

0

Emergency

The system is unusable. For example, the system authorization has expired.

1

Alert

Action must be taken immediately. For example, traffic on an interface exceeds the upper limit.

2

Critical

Critical condition. For example, the device temperature exceeds the upper limit, the power module fails, or the fan tray fails.

3

Error

Error condition. For example, the link state changes or a storage card is unplugged.

4

Warning

Warning condition. For example, an interface is disconnected, or the memory resources are used up.

5

Notification

Normal but significant condition. For example, a terminal logs in to the device, or the device reboots.

6

Informational

Informational message. For example, a command or a ping operation is executed.

7

Debug

Debugging message.

 

For variable fields in the message text, this document uses the representations in Table 3. The values are case insensitive, even though the representations are uppercase letters.

Table 3 Variable field representations

Representation

Information type

INT16

Signed 16-bit decimal number.

UINT16

Unsigned 16-bit decimal number.

INT32

Signed 32-bit decimal number.

UINT32

Unsigned 32-bit decimal number.

INT64

Signed 64-bit decimal number.

UINT64

Unsigned 64-bit decimal number.

DOUBLE

Two dot-separated signed 32-bit decimal numbers. The format is [INTEGER].[INTEGER].

HEX

Hexadecimal number.

CHAR

Single character.

STRING

Character string.

IPADDR

IP address.

MAC

MAC address.

DATE

Date.

TIME

Time.

 

Managing and obtaining system log messages

You can manage system log messages by using the information center.

By default, the information center is enabled. Log messages can be output to the console, monitor terminal, log buffer, log host, and log file.

To filter log messages, use the info-center source command to specify log output rules. A log output rule specifies the source modules and the lowest severity level of log messages that can be output to a destination. A log message is output if its severity level is higher than or equal to the specified level. For example, if you specify a severity level of 6 (informational), log messages that have a severity level from 0 to 6 are output.

For more information about using the information center, see the network management and monitoring configuration guide for the product.

Obtaining log messages from the console terminal

Access the device through the console port. Real-time log messages are displayed on the console terminal.

Obtaining log messages from a monitor terminal

Monitor terminals refer to terminals that access the device through the AUX, VTY, or TTY lines (for example, Telnet). To obtain log messages from a monitor terminal, use the following guidelines:

·     To display log messages on the monitor terminal, you must configure the terminal monitor command.

·     For monitor terminals, the lowest level of log messages that can be displayed is determined by both the terminal logging level and info-center source commands.

 

 

NOTE:

Settings for the terminal monitor and terminal logging level commands take effect only on the current login session. The default settings for the commands restore at a relogin.

 

Obtaining log messages from the log buffer

Use the display logbuffer command to display history log messages in the log buffer.

Obtaining log messages from the log file

By default, the log file feature automatically saves logs from the log file buffer to the log file every 24 hours. You can use the info-center logfile frequency command to change the automatic saving internal.

To manually save logs to the log file, use the logfile save command. The log file buffer is cleared each time a save operation is performed.

By default, you can obtain the log file from the cfa0:/logfile/ path if the CF card is not partitioned. If the CF card is partitioned, the file path is cfa1:/logfile/.

To view the contents of the log file on the device, use the more command.

Obtaining log messages from a log host

Use the info-center loghost command to specify the service port number and IP address of a log host. To specify multiple log hosts, repeat the command.

For a successful log message transmission, make sure the specified port number is the same as the port number used on the log host. The default service port number is 514.

Software module list

Table 4 lists all software modules that might produce system log messages. This document uses "OPENSRC" to represent all open source modules.

Table 4 Software module list

Module name representation

Module name expansion

AAA

Authentication, Authorization and Accounting

ACL

Access Control List

ANCP

Access Node Control Protocol

APMGR

Access Point Management

ARP

Address Resolution Protocol

ATK

Attack Detection and Prevention

ATM

Asynchronous Transfer Mode

BFD

Bidirectional Forwarding Detection

BGP

Border Gateway Protocol

BLS

Blacklist

CFD

Connectivity Fault Detection

CFGMAN

Configuration Management

CONNLMT

Connection Limit

DEV

Device Management

DHCP

Dynamic Host Configuration Protocol

DHCPR

IPv4 DHCP Relay

DHCPS

DHCP Server

DHCPS6

DHCPv6 Server

DHCPSP4

DHCP Snooping

DHCPSP6

DHCPv6 Snooping

DIAG

Diagnosis

DLDP

Device Link Detection Protocol

DOT1X

802.1X

DRNI

Distributed Resilient Network Interconnect

EDEV

Extended-Device Management

EPA

Endpoint Analysis

ERPS

Ethernet Ring Protection Switching

ETH

Ethernet

ETHDRNI

Ethernet Distributed Resilient Network Interconnect

ETHOAM

Ethernet Operation, Administration and Maintenance

EVB

Edge Virtual Bridging

EVIISIS

Ethernet Virtual Interconnect Intermediate System-to-Intermediate System

FCOE

Fibre Channel Over Ethernet

FCLINK

Fibre Channel Link

FCZONE

Fibre Channel Zone

FIB

Forwarding Information Base

FILTER

Filter

FIPSNG

FIP Snooping

FS

File System

FTP

File Transfer Protocol

gRPC

Google Remote Procedure Call

HA

High Availability

HLTH

Health

HQOS

Hierarchical QoS

HTTPD

Hypertext Transfer Protocol Daemon

IFNET

Interface Net Management

IKE

Internet Key Exchange

IMA

Integrity Measurements Architecture

iNQA

Intelligent Network Quality Analyzer

IP6ADDR

IPv6 Addressing

IP6FW

IPv6 Forwarding

IPADDR

IP Addressing

IPFW

IP Forwarding

IPSEC

IP Security

IPSG

IP Source Guard

IRDP

ICMP Router Discovery Protocol

IRF

Intelligent Resilient Framework

ISIS

Intermediate System-to-Intermediate System

ISSU

In-Service Software Upgrade

L2PT

Layer 2 Protocol Tunneling

L2TPV2

Layer 2 Tunneling Protocol Version 2

L2VPN

Layer 2 VPN

LAGG

Link Aggregation

LDP

Label Distribution Protocol

LIPC

Leopard Inter-process Communication

LLDP

Link Layer Discovery Protocol

LOAD

Load Management

LOGIN

Login

LPDT

Loopback Detection

LS

Local Server

LSPV

LSP Verification

MAC

Media Access Control

MACA

MAC Authentication

MACSEC

MAC Security

MBFD

MPLS BFD

MBUF

Memory buffer

MDC

Multitenant Device Context

MFIB

Multicast Forwarding Information Base

MGROUP

Mirroring group

MPLS

Multiprotocol Label Switching

MTLK

Monitor Link

NAT

Network Address Translation

NETCONF

Network Configuration Protocol

ND

Neighbor Discovery

NQA

Network Quality Analyzer

NSS

Session-based NetStream

NTP

Network Time Protocol

OAP

Open Application Platform

OPENSRC (FreeRADIUS)

Open Source

OBJP

Object Policy

OFP

OpenFlow Protocol

OPTMOD

Optical Module

OSPF

Open Shortest Path First

OSPFV3

Open Shortest Path First Version 3

PFILTER

Packet Filter

PBB

Provider Backbone Bridge

PBR

Policy-Based Routing

PCE

Path Computation Element

PEX

Port Extender

PIM

Protocol Independent Multicast

PING

Packet Internet Groper

PKG

Package

PKI

Public Key Infrastructure

PKT2CPU

Packet to CPU

PKTCPT

Packet Capture

PoE

Power over Ethernet

PORTAL

Portal

PORTSEC

Port Security

PPP

Point to Point Protocol

PTP

Precision Time Protocol

PTS

Platform Trust Services

PWDCTL

Password Control

QOS

Quality of Service

RADIUS

Remote Authentication Dial In User Service

RESMON

Resource Monitor

RDDC

Redundancy

RIP

Routing Information Protocol

RIPNG

Routing Information Protocol Next Generation

RM

Routing Management

RPR

Resilient Packet Ring

RRPP

Rapid Ring Protection Protocol

RTM

Real-Time Event Manager

SCMD

Service Control Manager Daemon

SCRLSP

Static CRLSP

SESSION

Session

SFLOW

Sampler Flow

SHELL

Shell

SLSP

Static LSP

SMARTMC

Smart Management Center

SMLK

Smart Link

SNMP

Simple Network Management Protocol

SQA

Service Quality Analysis

SSHC

Secure Shell Client

SSHS

Secure Shell Server

STAMGR

Station Management

STM

Stack Topology Management

STP

Spanning Tree Protocol

SYSEVENT

System Event

SYSLOG

System Log

TACACS

Terminal Access Controller Access Control System

TCSM

Trusted Computing Services Management

TELNETD

Telnet Daemon

TRILL

Transparent Interconnect of Lots of Links

VCF

Vertical Converged Framework

VLAN

Virtual Local Area Network

VRRP

Virtual Router Redundancy Protocol

VSRP

Virtual Service Redundancy Protocol

VXLAN

Virtual eXtensible LAN

WEB

Web

WIPS

Wireless Intrusion Prevention System

 

Using this document

This document categorizes system log messages by software module. The modules are ordered alphabetically. Except for OPENSRC, the system log messages for each module are listed in alphabetic order of their mnemonic names. The OPENSRC messages are unordered because they use the same mnemonic name (SYSLOG). For each OPENSRC message, the section title uses a short description instead of the mnemonic name.

This document explains messages in tables. Table 5 describes information provided in these tables.

Table 5 Message explanation table contents

Item

Content

Example

Message text

Presents the message description.

ACL [UINT32] [STRING] [UINT64] packet(s).

Variable fields

Briefly describes the variable fields in the order that they appear in the message text.

The variable fields are numbered in the "$Number" form to help you identify their location in the message text.

$1: ACL number.

$2: ID and content of an ACL rule.

$3: Number of packets that matched the rule.

Severity level

Provides the severity level of the message.

6

Example

Provides a real message example. The examples do not include the "<PRI>TIMESTAMP Sysname %%vendor" part or the "Prefix TIMESTAMP Sysname" part, because information in this part varies with system settings.

ACL/6/ACL_STATIS_INFO: ACL 2000 rule 0 permit source 1.1.1.1 0 logging 10000 packet(s).

Explanation

Explains the message, including the event or error cause.

Number of packets that matched an ACL rule. This message is sent when the packet counter changes.

Recommended action

Provides recommended actions. For informational messages, no action is required.

No action is required.

 

 

AAA messages

This section contains AAA messages.

AAA_FAILURE

Message text

-AAAType=[STRING]-AAADomain=[STRING]-Service=[STRING]-UserName=[STRING]; AAA failed.

Variable fields

$1: AAA type.

$2: AAA scheme.

$3: Service.

$4: Username.

Severity level

5

Example

AAA/5/AAA_FAILURE: -AAAType=AUTHOR-AAADomain=domain1-Service=login-UserName=cwf@system; AAA failed.

Explanation

An AAA request was rejected.

The following are the common reasons:

·     No response was received from the server.

·     The username or password was incorrect.

·     The service type that the user applied for was incorrect.

Recommended action

1.     Verify that the device is correctly connected to the server.

2.     Enter the correct username and password.

3.     Verify that the server settings are the same as the settings on the device.

4.     If the problem persists, contact H3C Support.

 

AAA_LAUNCH

Message text

-AAAType=[STRING]-AAADomain=[STRING]-Service=[STRING]-UserName=[STRING]; AAA launched.

Variable fields

$1: AAA type.

$2: AAA scheme.

$3: Service.

$4: Username.

Severity level

6

Example

AAA/6/AAA_LAUNCH: -AAAType=AUTHEN-AAADomain=domain1-Service=login-UserName=cwf@system; AAA launched.

Explanation

An AAA request was received.

Recommended action

No action is required.

 

AAA_SUCCESS

Message text

-AAAType=[STRING]-AAADomain=[STRING]-Service=[STRING]-UserName=[STRING]; AAA succeeded.

Variable fields

$1: AAA type.

$2: AAA scheme.

$3: Service.

$4: Username.

Severity level

6

Example

AAA/6/AAA_SUCCESS: -AAAType=AUTHOR-AAADomain=domain1-Service=login-UserName=cwf@system; AAA succeeded.

Explanation

An AAA request was accepted.

Recommended action

No action is required.

 

ACL messages

This section contains ACL messages.

ACL_ACCELERATE_NO_RES

Message text

Failed to accelerate [STRING] ACL [UINT32]. The resources are insufficient.

Variable fields

$1: ACL type.

$2: ACL number.

Severity level

4

Example

ACL/4/ACL_ACCELERATE_NO_RES: Failed to accelerate IPv6 ACL 2001. The resources are insufficient.

Explanation

Hardware resources were insufficient for accelerating an ACL.

Recommended action

Delete some rules or disabled ACL acceleration for other ACLs to release hardware resources.

 

ACL_ACCELERATE_NONCONTIGUOUSMASK

Message text

Failed to accelerate ACL [UINT32]. ACL acceleration supports only contiguous wildcard masks.

Variable fields

$1: ACL number.

Severity level

4

Example

ACL/4/ACL_ACCELERATE_NONCONTIGUOUSMASK: Failed to accelerate ACL 2001. ACL acceleration supports only contiguous wildcard masks.

Explanation

ACL acceleration failed because rules containing noncontiguous wildcard masks exist in the ACL.

Recommended action

Check the ACL rules and delete the unsupported configuration.

 

ACL_ACCELERATE_NOT_SUPPORT

Message text

Failed to accelerate [STRING] ACL [UINT32]. The operation is not supported.

Variable fields

$1: ACL type.

$2: ACL number.

Severity level

4

Example

ACL/4/ACL_ACCELERATE_NOT_SUPPORT: Failed to accelerate IPv6 ACL 2001. The operation is not supported.

Explanation

ACL acceleration failed because the system does not support ACL acceleration.

Recommended action

No action is required.

 

ACL_ACCELERATE_NOT_SUPPORTHOPBYHOP

Message text

Failed to accelerate IPv6 ACL [UINT32]. ACL acceleration does not support the rules that contain the hop-by-hop keywords.

Variable fields

$1: ACL number.

Severity level

4

Example

ACL/4/ACL_ACCELERATE_NOT_SUPPORTHOPBYHOP: Failed to accelerate IPv6 ACL 2001. ACL acceleration does not support the rules that contain the hop-by-hop keywords.

Explanation

ACL acceleration failed for the IPv6 ACL because rules containing the hop-by-hop keyword exist in the ACL.

Recommended action

Check the ACL rules and delete the unsupported configuration.

 

ACL_ACCELERATE_NOT_SUPPORTMULTITCPFLAG

Message text

Failed to accelerate IPv6 ACL [UINT32]. ACL acceleration does not support specifying multiple TCP flags in one rule.

Variable fields

$1: ACL number.

Severity level

4

Example

ACL/4/ACL_ACCELERATE_NOT_SUPPORTMULTITCPFLAG: Failed to accelerate IPv6 ACL 2001. ACL acceleration does not support specifying multiple TCP flags in one rule.

Explanation

ACL acceleration failed for the IPv6 ACL because rules containing multiple TCP flags exist in the ACL.

Recommended action

Check the ACL rules and delete the unsupported configuration.

 

ACL_ACCELERATE_UNK_ERR

Message text

Failed to accelerate [STRING] ACL [UINT32].

Variable fields

$1: ACL type.

$2: ACL number.

Severity level

4

Example

ACL/4/ACL_ACCELERATE_UNK_ERR: Failed to accelerate IPv6 ACL 2001.

Explanation

ACL acceleration failed because of an unknown error.

Recommended action

No action is required.

 

ACL_IPV6_STATIS_INFO

Message text

IPv6 ACL [UINT32] [STRING] [UINT64] packet(s).

Variable fields

$1: ACL number.

$2: ID and content of an IPv6 ACL rule.

$3: Number of packets that matched the rule.

Severity level

6

Example

ACL/6/ACL_IPV6_STATIS_INFO: IPv6 ACL 2000 rule 0 permit source 1:1::/64 logging 1000 packet(s).

Explanation

The number of packets matching the IPv6 ACL rule changed.

Recommended action

No action is required.

 

ACL_NO_MEM

Message text

Failed to configure [STRING] ACL [UINT] due to lack of memory.

Variable fields

$1: ACL type.

$2: ACL number.

Severity level

3

Example

ACL/3/ACL_NO_MEM: Failed to configure ACL 2001 due to lack of memory.

Explanation

Configuring the ACL failed because memory is insufficient.

Recommended action

Use the display memory-threshold command to check the memory usage.

 

ACL_STATIS_INFO

Message text

ACL [UINT32] [STRING] [UINT64] packet(s).

Variable fields

$1: ACL number.

$2: ID and content of an IPv4 ACL rule.

$3: Number of packets that matched the rule.

Severity level

6

Example

ACL/6/ACL_STATIS_INFO: ACL 2000 rule 0 permit source 1.1.1.1 0 logging 10000 packet(s).

Explanation

The number of packets matching the IPv4 ACL rule changed.

Recommended action

No action is required.

 

 

ANCP messages

This section contains ANCP messages.

ANCP_INVALID_PACKET

Message text

-NeighborName=[STRING]-State=[STRING]-MessageType=[STRING]; The [STRING] value [STRING] is wrong, and the value [STRING] is expected.

Variable fields

$1: ANCP neighbor name.

$2: Neighbor state.

$3: Message type.

$4: Field.

$5: Wrong value of the field.

$6: Expected value of the field.

Severity level

6

Example

ANCP/6/ANCP_INVALID_PACKET: -NeighborName=Dslam-State=SYNSENT-MessageType=SYNACK; The Sender Instance value 0 is wrong, and the value 1 is expected.

Explanation

The system received an adjacency message that had a field with a wrong value.

Recommended action

No action is required.

 

 

APMGR messages

This section contains access point management messages.

APMGR_AC_MEM_ALERT

Message text

The memory utilization has reached the threshold.

Variable fields

N/A

Severity level

4

Example

APMGR/4/APMGR_AC_MEM_ALERT: The memory utilization has reached the threshold.

Explanation

The AP failed to come online because the memory utilization exceeded the limit.

Recommended action

Stop creating manual APs and prevent APs from coming online.

 

APMGR_ADD_AP_FAIL

Message text

AP [STRING] failed to come online using serial ID [STRING]: MAC address [STRING] is being used by AP [STRING].

Variable fields

$1: AP name.

$2: Serial ID.

$3: MAC address.

$4: AP name.

Severity level

4

Example

APMGR/4/ APMGR_ADD_AP_FAIL: AP ap1 failed to come online using serial ID 01247ef96: MAC address 0023-7961-5201 is being used by AP ap2.

Explanation

The AP failed to come online because a manual AP that has the same MAC address already exists on the AC.

Recommended action

Delete either the manual AP that has the MAC address or the serial ID.

 

APMGR_ADDBAC_INFO

Message text

Add BAS AC [STRING].

Variable fields

$1: MAC address of the BAS AC.

Severity level

6

Example

APMGR/6/APMGR_ADDBAC_INFO: Add BAS AC 3ce5-a616-28cd.

Explanation

The BAS AC was connected to the master AC.

Recommended action

No action is required.

 

APMGR_AP_OFFLINE

Message text

AP [STRING] went offline. State changed to Idle.

Variable fields

$1: AP name.

Severity level

6

Example

APMGR/6/APMGR_AP_OFFLINE: AP ap1 went offline. State changed to Idle.

Explanation

The AP went offline. The state of the AP changed to Idle.

Recommended action

If the AP went offline abnormally, check the debugging information to locate the issue and resolve it.

 

APMGR_AP_ONLINE

Message text

AP [STRING] went online. State changed to Run.

Variable fields

$1: AP name.

Severity level

6

Example

APMGR/6/APMGR_AP_ONLINE: AP ap1 went online. State changed to Run.

Explanation

The AP came online. The state of the AP changed to Run.

Recommended action

No action is required.

 

APMGR_CWC_IMG_DOWNLOAD_COMPLETE

Message text

System software image file [STRING] downloading through the CAPWAP tunnel to AC [STRING] completed.

Variable fields

$1: Image file name.

$2: AC IP address.

Severity level

6

Example

APMGR/6/APMGR_CWC_IMG_DOWNLOAD_COMPLETE: System software image file 5800.ipe downloading through the CAPWAP tunnel to AC 192.168.10.1 completed.

Explanation

The AP downloaded the image file from the AC successfully.

Recommended action

No action is required.

 

APMGR_CWC_IMG_DOWNLOAD_START

Message text

Started to download the system software image file [STRING] through the CAPWAP tunnel to AC [STRING].

Variable fields

$1: Image file name.

$2: AC IP address.

Severity level

6

Example

APMGR/6/APMGR_CWC_IMG_DOWNLOAD_START: Started to download the system software image file 5800.ipe through the CAPWAP tunnel to AC 192.168.10.1.

Explanation

The AP started to download the image file from the AC.

Recommended action

Make sure the AP is correctly connected to the AC.

 

APMGR_CWC_IMG_NO_ENOUGH_SPACE

Message text

Insufficient flash memory space for downloading system software image file [STRING].

Variable fields

$1: Image file name.

Severity level

6

Example

APMGR/6/APMGR_CWC_IMG_NO_ENOUGH_SPACE: Insufficient flash memory space for downloading system software image file 5800.ipe.

Explanation

The AP failed to download the image file from the AC because of insufficient flash memory.

Recommended action

Delete files not in use from the AP.

 

APMGR_CWC_LOCAL_AC_DOWN

Message text

CAPWAP tunnel to Central AC [STRING] went down. Reason: [STRING].

Variable fields

$1: IP address of the central AC.

$2: Reason:

·     Added local AC IP address.

·     Deleted local AC IP address.

·     Local AC interface used for CAPWAP tunnel went down.

·     Local AC config changed.

·     N/A

Severity level

4

Example

APMGR/4/APMGR_CWC_LOCAL_AC_DOWN: CAPWAP tunnel to Central AC 2.2.2.1 went down. Reason: Added local AC IP address.

Explanation

The CAPWAP tunnel between the central AC and the local AC was terminated for a specific reason.

Recommended action

To resolve the issue:

1.     Examine the network connection between the central AC and the local AC.

2.     Verify that the central AC is correctly configured.

3.     Verify that the local AC is correctly configured.

4.     If the issue persists, contact H3C Support.

 

APMGR_CWC_LOCAL_AC_UP

Message text

CAPWAP tunnel to Central AC [STRING] went up.

Variable fields

$1: IP address of the central AC.

Severity level

6

Example

APMGR/6/APMGR_CWC_LOCAL_AC_UP: CAPWAP tunnel to Central AC 2.2.2.1 went up.

Explanation

The central AC has established a CAPWAP tunnel with the local AC.

Recommended action

No action is required.

 

APMGR_CWC_REBOOT

Message text

AP in state [STRING] is rebooting. Reason: [STRING]

Variable fields

$1: AP state.

$2: Reason:

·     AP was reset.

·     Image was downloaded successfully.

·     AP stayed in idle state for a long time.

Severity level

6

Example

APMGR/6/APMGR_CWC_REBOOT: AP in State Run is rebooting. Reason: AP was reset.

Explanation

The AP rebooted for a specific reason.

Recommended action

No action is required.

 

APMGR_CWC_RUN_DOWNLOAD_COMPLETE

Message text

File [STRING] successfully downloaded through the CAPWAP tunnel to AC [STRING].

Variable fields

$1: File name.

$2: AC IP address.

Severity level

6

Example

APMGR/6/APMGR_CWC_RUN_DOWNLOAD_COMPLETE: File ac.cfg successfully downloaded through the CAPWAP tunnel to AC 192.168.10.1.

Explanation

The AP downloaded the file from the AC successfully.

Recommended action

No action is required.

 

APMGR_CWC_RUN_DOWNLOAD_START

Message text

Started to download the file [STRING] through the CAPWAP tunnel to AC [STRING].

Variable fields

$1: File name.

$2: AC IP address.

Severity level

6

Example

APMGR/6/APMGR_CWC_RUN_DOWNLOAD_START: Started to download the file ac.cfg through the CAPWAP tunnel to AC 192.168.10.1.

Explanation

The AP started to download the file from the AC.

Recommended action

Make sure the AP is correctly connected to the AC.

 

APMGR_CWC_RUN_NO_ENOUGH_SPACE

Message text

Insufficient flash memory space for downloading file [STRING].

Variable fields

$1: File name.

Severity level

6

Example

APMGR/6/APMGR_CWC_RUN_NO_ENOUGH_SPACE: Insufficient flash memory space for downloading file ac.cfg.

Explanation

The AP failed to download the file from the AC because of insufficient flash memory.

Recommended action

Delete files not in use from the AP.

 

APMGR_CWC_TUNNEL_DOWN

Message text

CAPWAP tunnel to AC [STRING] went down. Reason: [STRING].

Variable fields

$1: AC IP address.

$2: Reason:

·     Added AP IP address.

·     Deleted AP IP address.

·     AP interface used for CAPWAP tunnel went down.

·     AP config changed.

·     AP was reset.

·     Number of echo retransmission attempts exceeded the limit.

·     Full retransmission queue.

·     Data channel timer expired.

·     Backup AC IP address changed.

·     Backup tunnel changed to master tunnel.

·     Failed to change backup tunnel to master tunnel.

·     Backup method changed.

·     N/A.

Severity level

6

Example

APMGR/6/APMGR_CWC_TUNNEL_DOWN: CAPWAP tunnel to AC 192.168.10.1 went down. Reason: AP was reset.

Explanation

The CAPWAP tunnel between the AP and the AC was terminated for a specific reason.

Recommended action

Examine the network connection between the AP and the AC.

 

APMGR_CWC_TUNNEL_UP

Message text

[STRING] CAPWAP tunnel to AC [STRING] went up.

Variable fields

$1: Tunnel type:

·     Master.

·     Backup.

$2: AC IP address.

Severity level

6

Example

APMGR/6/APMGR_CWC_TUNNEL_UP: Master CAPWAP tunnel to AC 192.168.10.1 went up.

Explanation

The AP was connected to the AC successfully and entered Run state.

Recommended action

No action is required.

 

APMGR_CWS_IMG_DOWNLOAD_COMPLETE

Message text

System software image file [STRING] downloading through the CAPWAP tunnel for AP [STRING] completed.

Variable fields

$1: Image file name.

$2: AP name.

Severity level

6

Example

APMGR/6/APMGR_ CWS_IMG_DOWNLOAD_COMPLETE: System software image file 5800.ipe downloading through the CAPWAP tunnel for AP ap2 completed.

Explanation

The AP downloaded the image file from the AC successfully.

Recommended action

No action is required.

 

APMGR_CWS_IMG_DOWNLOAD_START

Message text

AP [STRING] started to download the system software image file [STRING].

Variable fields

$1: AP name.

$2: Image file name.

Severity level

6

Example

APMGR/6/APMGR_CWS_IMG_DOWNLOAD_START: AP ap1 started to download the system software image file 5800.ipe.

Explanation

The AP started to download the image file from the AC.

Recommended action

No action is required.

 

APMGR_CWS_LOCAL_AC_DOWN

Message text

CAPWAP tunnel to local AC [STRING] went down. Reason: [STRING].

Variable fields

$1: IP address of the local AC.

$2: Reason:

·     Neighbor dead timer expired.

·     Local AC was deleted.

·     Serial number changed.

·     Processed join request in Run state.

·     Failed to retransmit message.

·     N/A

Severity level

4

Example

APMGR/4/APMGR_CWS_LOCAL_AC_DOWN: CAPWAP tunnel to local AC 1.1.1.1 went down. Reason: Serial number changed.

Explanation

The CAPWAP tunnel between the central AC and the local AC was terminated for a specific reason.

Recommended action

To resolve the issue:

5.     Examine the network connection between the central AC and the local AC.

6.     Verify that the central AC is correctly configured.

7.     Verify that the local AC is correctly configured.

8.     If the issue persists, contact H3C Support.

 

APMGR_CWS_LOCAL_AC_UP

Message text

CAPWAP tunnel to local AC [STRING] went up.

Variable fields

$1: IP address of the local AC.

Severity level

6

Example

APMGR/6/APMGR_CWS_LOCAL_AC_UP: CAPWAP tunnel to local AC 1.1.1.1 went up.

Explanation

The central AC has established a CAPWAP tunnel with the local AC.

Recommended action

No action is required.

 

APMGR_CWS_RUN_DOWNLOAD_COMPLETE

Message text

File [STRING] successfully downloaded through the CAPWAP tunnel for AP [STRING].

Variable fields

$1: File name.

$2: AP name.

Severity level

6

Example

APMGR/6/APMGR_CWS_RUN_DOWNLOAD_COMPLETE: File ac.cfg successfully downloaded through the CAPWAP tunnel for AP ap2.

Explanation

The AP downloaded the file from the AC successfully.

Recommended action

No action is required.

 

APMGR_CWS_RUN_DOWNLOAD_START

Message text

AP [STRING] started to download the file [STRING].

Variable fields

$1: AP name.

$2: File name.

Severity level

6

Example

APMGR/6/APMGR_CWS_RUN_DOWNLOAD_START: AP ap1 started to download the file ac.cfg.

Explanation

The AP started to download the file from the AC.

Recommended action

No action is required.

 

APMGR_CWS_TUNNEL_DOWN

Message text

CAPWAP tunnel to AP [STRING] went down. Reason: [STRING].

Variable fields

$1: AP name.

$2: Reason:

·     Neighbor dead timer expired.

·     AP was reset.

·     AP was deleted.

·     Serial number changed.

·     Processed join request in Run state.

·     Failed to retransmit message.

·     Received WTP tunnel down event from AP.

·     Backup AC closed the backup tunnel.

·     Tunnel switched.

·     N/A.

Severity level

6

Example

APMGR/6/APMGR_CWS_TUNNEL_DOWN: CAPWAP tunnel to AP ap1 went down. Reason: AP was reset.

Explanation

The AP went offline for a specific reason.

Recommended action

To resolve the issue:

1.     Examine the network connection between the AP and the AC.

2.     Verify that the AP is correctly configured.

3.     Verify that the AC is correctly configured.

4.     If the issue persists, contact H3C Support.

 

APMGR_CWS_TUNNEL_UP

Message text

[STRING] CAPWAP tunnel to AP [STRING] went up.

Variable fields

$1: Tunnel type:

·     Master.

·     Backup.

$2: AP name.

Severity level

6

Example

APMGR/6/APMGR_CWS_TUNNEL_UP: Backup CAPWAP tunnel to AP ap1 went up.

Explanation

The AP came online and entered Run state.

Recommended action

No action is required.

 

APMGR_DELBAC_INFO

Message text

Delete BAS AC [STRING].

Variable fields

$1: MAC address of the BAS AC.

Severity level

6

Example

APMGR/6/APMGR_DELBAC_INFO: Delete BAS AC 3ce5-a616-28cd.

Explanation

The BAS AC was disconnected from the master AC.

Recommended action

No action is required.

 

APMGR_LOCAL_AC_OFFLINE

Message text

Local AC [STRING] went offline. State changed to Idle.

Variable fields

$1: Name of the local AC.

Severity level

6

Example

APMGR/6/APMGR_LOCAL_AC_OFFLINE: Local AC ac1 went offline. State changed to Idle.

Explanation

The local AC went offline. The state of the local AC changed to Idle.

Recommended action

1.     If the local AC went offline abnormally, check the debugging information to locate the issue and resolve it.

2.     If the issue persists, contact H3C Support.

 

APMGR_LOCAL_AC_ONLINE

Message text

Local AC [STRING] went online. State changed to Run.

Variable fields

$1: Name of the local AC.

Severity level

6

Example

APMGR/6/APMGR_LOCAL_AC_ONLINE: Local AC ac1 went online. State changed to Run.

Explanation

The local AC came online. The state of the local AC changed to Run.

Recommended action

No action is required.

 

 

 

ARP messages

This section contains ARP messages.

ARP_ACTIVE_ACK_NO_REPLY

Message text

No ARP reply from IP [STRING] was received on interface [STRING].

Variable fields

$1: IP address.

$2: Interface name.

Severity level

6

Example

ARP/6/ARP_ACTIVE_ACK_NO_REPLY: No ARP reply from IP 192.168.10.1 was received on interface GigabitEthernet1/0/1.

Explanation

The ARP active acknowledgement feature did not receive an ARP reply after it sent an ARP request to the sender IP of an ARP message.

This message indicates the risk of attacks.

Recommended action

1.     Verify that the learned ARP entries on the device are consistent with the existing legal devices. When gateways and servers are on the network, check the ARP entries for these devices first.

2.     If the ARP entries are correct and the attack continues, contact H3C Support.

 

ARP_ACTIVE_ACK_NOREQUESTED_REPLY

Message text

Interface [STRING] received from IP [STRING] an ARP reply that was not requested by the device.

Variable fields

$1: Interface name.

$2: IP address.

Severity level

6

Example

ARP/6/ARP_ACTIVE_ACK_NOREQUESTED_REPLY: Interface GigabitEthernet1/0/1 received from IP 192.168.10.1 an ARP reply that was not requested by the device.

Explanation

The ARP active acknowledgement feature received an unsolicited ARP reply from a sender IP.

This message indicates the risk of attacks.

Recommended action

No action is required. The device discards the ARP reply automatically.

 

ARP_BINDRULETOHW_FAILED

Message text

Failed to download binding rule to hardware on the interface [STRING], SrcIP [IPADDR], SrcMAC [MAC], VLAN [UINT16], Gateway MAC [MAC].

Variable fields

$1: Interface name.

$2: Source IP address.

$3: Source MAC address.

$4: VLAN ID.

$5: Gateway MAC address.

Severity level

5

Example

ARP/5/ARP_BINDRULETOHW_FAILED: Failed to download binding rule to hardware on the interface GigabitEthernet1/0/1, SrcIP 1.1.1.132, SrcMAC 0015-E944-A947, VLAN 1, Gateway MAC 00A1-B812-1108.

Explanation

The system failed to set a binding rule to the hardware on an interface. The message is sent in any of the following situations:

·     The resources are not sufficient for the operation.

·     The memory is not sufficient for the operation.

·     A hardware error occurs.

Recommended action

To resolve the problem:

1.     Execute the display qos-acl resource command to check if the ACL resources for the operation are sufficient.

¡     If yes, proceed to step 2.

¡     If no, delete unnecessary configuration to release ACL resources. If no configuration can be deleted, proceed to step 2.

2.     Execute the display memory command to check if the memory for the operation is sufficient.

¡     If yes, proceed to step 3.

¡     If no, delete unnecessary configuration to release memory. If no configuration can be deleted, proceed to step 3.

3.     Delete the configuration and perform the operation again.

 

ARP_DETECTION_LOG

Message text

Detected an ARP attack on interface [STRING]: IP [STRING], MAC [STRING], VLAN [STRING]. [UINT32] packet(s) dropped.

Variable fields

$1: Interface name.

$2: IP address.

$3: MAC address.

$4: VLAN ID.

$5: Number of dropped packets.

Severity level

5

Example

ARP/5/ARP_INSPECTION: -MDC=1; Detected an ARP attack on interface GigabitEthernet1/0/1: IP 1.1.1.1, MAC 1-1-1, VLAN 100. 2 packet(s) dropped.

Explanation

An ARP attack was detected on an interface and attack packets were dropped.

Recommended action

Check the source of the ARP attack.

 

ARP_DUPLICATE_IPADDR_DETECT

Message text

Detected an IP address conflict. The device with MAC address [STRING] connected to interface [STRING] in VSI [STRING] and the device with MAC address [STRING] connected to interface [STRING] in VSI [STRING] were using the same IP address [IPADDR].

Variable fields

$1: MAC address.

$2: Interface name. (The interface can be a tunnel interface, Layer 3 interface, or Ethernet service instance.)

$3: VSI name.

$4: MAC address.

$5: Interface name. (The interface can be a tunnel interface, Layer 3 interface, or Ethernet service instance.)

$6: VSI name.

$7: Conflicting IP address.

Severity level

4

Example

ARP/4/ARP_DUPLICATE_IPADDR_DETECT: Detected an IP address conflict. The device with MAC address 00-00-01 connected to interface GigabitEthernet1/0/1 service-instance 1000 in VSI vpna and the device with MAC address 00-00-02 connected to interface tunnel 10 in VSI vpna were using the same IP address 192.168.1.1.

Explanation

This message is sent when an interface receives an ARP message in which the sender information conflicts with an existing ARP entry. The sender IP address is the same as the IP address in the entry, but the MAC addresses are different.

Recommended action

Change the IP address on either of the two devices.

 

ARP_DYNAMIC

Message text

The maximum number of dynamic ARP entries for the device reached.

Variable fields

N/A

Severity level

6

Example

ARP/6/ARP_DYNAMIC: The maximum number of dynamic ARP entries for the device reached.

Explanation

The maximum number of dynamic ARP entries for the device was reached.

Recommended action

No action is required.

 

ARP_DYNAMIC_IF

Message text

The maximum number of dynamic ARP entries for interface [STRING] reached.

Variable fields

$1: Interface name.

Severity level

6

Example

ARP/6/ARP_DYNAMIC_IF: The maximum number of dynamic ARP entries for interface GigabitEthernet1/0/1 reached.

Explanation

The maximum number of dynamic ARP entries for the specified interface was reached.

Recommended action

No action is required.

 

ARP_DYNAMIC_SLOT

Message text

Pattern 1:

The maximum number of dynamic ARP entries for slot [INT32] reached.

Pattern 2:

The maximum number of dynamic ARP entries for chassis [INT32] slot [INT32] reached.

Variable fields

Pattern 1:

$1: Slot number.

Pattern 2:

$1: Chassis number.

$2: Slot number.

Severity level

6

Example

ARP/6/ARP_DYNAMIC_SLOT: The maximum number of dynamic ARP entries for slot 2 reached.

Explanation

Pattern 1:

The maximum number of dynamic ARP entries for the slot was reached.

Pattern 2:

The maximum number of dynamic ARP entries for the slot on the chassis was reached.

Recommended action

No action is required.

 

ARP_ENTRY_CONFLICT

Message text

The software entry for [STRING] on [STRING] and the hardware entry did not have the same [STRING].

Variable fields

$1: IP address.

$2: VPN instance name. If the ARP entry belongs to the public network, this field displays the public network.

$3: Inconsistent items:

¡     MAC address.

¡     output interface.

¡     output port.

¡     outermost layer VLAN ID.

¡     second outermost layer VLAN ID.

¡     VSI index.

¡     link ID.

Severity level

6

Example

ARP/6/ARP_ENTRY_CONFLICT: The software entry for 1.1.1.1 on the VPN a and the hardware entry did not have the same MAC address, output port, VSI index, and link ID.

ARP/6/ARP_ENTRY_CONFLICT: The software entry for 1.1.1.2 on the public  network and the hardware entry did not have the same MAC address, output port, VSI index, and link ID.

Explanation

The software entry for the specified IP address is not the same as the hardware entry. For example, they do not have the same output interface.

Recommended action

No action is required. ARP automatically refreshes the hardware entries.

 

ARP_HOST_IP_CONFLICT

Message text

The host [STRING] connected to interface [STRING] cannot communicate correctly, because it uses the same IP address as the host connected to interface [STRING].

Variable fields

$1: IP address.

$2: Interface name.

$3: Interface name.

Severity level

4

Example

ARP/4/ARP_HOST_IP_CONFLICT: The host 1.1.1.1 connected to interface GigabitEthernet1/0/1 cannot communicate correctly, because it uses the same IP address as the host connected to interface GigabitEthernet1/0/2.

Explanation

The sender IP address in a received ARP message conflicted with the IP address of a host connected to another interface.

Recommended action

Check whether the hosts that send the ARP messages are legitimate. Disconnect the illegal host from the network.

 

ARP_LOCALPROXY_ENABLE_FAILED

Message text

Failed to enable local proxy ARP on interface [STRING].

Variable fields

$1: Interface name.

Severity level

4

Example

ARP/4/ARP_LOCALPROXY_ENABLE_FAILED: -MDC=1-Slot=2; Failed to enable local proxy ARP on interface VSI-interface 1.

Explanation

This message is sent when the device fails to enable local proxy ARP on an interface in a slot. If the interface resides on the MPU, the slot number is 0.

Recommended action

1.     Verify that the card supports local proxy ARP.

2.     Verify that sufficient hardware resources are available.

 

ARP_RATE_EXCEEDED

Message text

The ARP packet rate ([UINT32] pps) exceeded the rate limit ([UINT32] pps) on interface [STRING] in the last [UINT32] seconds.

Variable fields

$1: ARP packet rate.

$2: ARP limit rate.

$3: Interface name.

$4: Interval time.

Severity level

4

Example

ARP/4/ARP_RATE_EXCEEDED: The ARP packet rate (100 pps) exceeded the rate limit (80 pps) on interface GigabitEthernet1/0/1 in the last 10 seconds.

Explanation

An interface received ARP messages at a higher rate than the rate limit.

Recommended action

Verify that the hosts at the sender IP addresses are legitimate.

 

ARP_RATELIMIT_NOTSUPPORT

Message text

Pattern 1:

ARP packet rate limit is not support on slot [INT32].

Pattern 2:

ARP packet rate limit is not support on chassis [INT32] slot [INT32].

Variable fields

Pattern 1:

$1: Slot number.

Pattern 2:

$1: Chassis number.

$2: Slot number.

Severity level

6

Example

ARP/6/ARP_RATELIMIT_NOTSUPPORT: ARP packet rate limit is not support on slot 2.

Explanation

Pattern 1:

ARP packet rate limit is not supported on the slot.

Pattern 2:

ARP packet rate limit is not supported on the slot of the chassis was reached.

Recommended action

Verify that the host at the sender IP address is legitimate.

 

ARP_SENDER_IP_INVALID

Message text

Sender IP [STRING] was not on the same network as the receiving interface [STRING].

Variable fields

$1: IP address.

$2: Interface name.

Severity level

6

Example

ARP/6/ARP_SENDER_IP_INVALID: Sender IP 192.168.10.2 was not on the same network as the receiving interface GigabitEthernet1/0/1.

Explanation

The sender IP of a received ARP message was not on the same network as the receiving interface.

Recommended action

Verify that the host at the sender IP address is legitimate.

 

ARP_SENDER_MAC_INVALID

Message text

Sender MAC [STRING] was not identical to Ethernet source MAC [STRING] on interface [STRING].

Variable fields

$1: MAC address.

$2: MAC address.

$3: Interface name.

Severity level

6

Example

ARP/6/ARP_SENDER_MAC_INVALID: Sender MAC 0000-5E14-0E00 was not identical to Ethernet source MAC 0000-5C14-0E00 on interface GigabitEthernet1/0/1.

Explanation

An interface received an ARP message. The sender MAC address in the message body was not identical to the source MAC address in the Ethernet header.

Recommended action

Verify that the host at the sender MAC address is legitimate.

 

ARP_SENDER_SMACCONFLICT

Message text

Packet was discarded because its sender MAC address was the MAC address of the receiving interface.

Interface: [STRING], sender IP: [STRING], target IP: [STRING].

Variable fields

$1: Interface name.

$2: Sender IP address.

$3: Target IP address.

Severity level

6

Example

ARP/6/ ARP_SENDER_SMACCONFLICT: Packet discarded for the sender MAC address is the same as the receiving interface.

Interface: GigabitEthernet1/0/1 sender IP: 1.1.2.2 target IP: 1.1.2.1,

Explanation

The sender MAC address of a received ARP packet conflicts with the MAC address of the device.

Recommended action

No action is required.

 

ARP_SENDER_SMACCONFLICT_VSI

Message text

Packet was discarded because its sender MAC address was the MAC address of the receiving interface.

Interface: [STRING], sender IP: [STRING], target IP: [STRING],VSI index: [UINT32], link ID: [UINT32].

Variable fields

$1: Interface name.

$2: Sender IP address.

$3: Target IP address.

$4: VSI index.

$5: Link ID.

Severity level

6

Example

ARP/6/ ARP_SENDER_SMACCONFLICT_VSI: Packet discarded for the sender MAC address is the same as the receiving interface.

Interface: VSI3 sender IP: 1.1.2.2 target IP: 1.1.2.1, VSI Index: 2, Link ID: 0

Explanation

The sender MAC address of a received ARP packet conflicts with the MAC address of the device. The receiving interface is a VSI interface.

Recommended action

No action is required.

 

ARP_SRC_MAC_FOUND_ATTACK

Message text

An attack from MAC [STRING] was detected on interface [STRING].

Variable fields

$1: MAC address.

$2: Interface name.

Severity level

6

Example

ARP/6/ARP_SRC_MAC_FOUND_ATTACK: An attack from MAC 0000-5E14-0E00 was detected on interface GigabitEthernet1/0/1.

Explanation

The source MAC-based ARP attack detection feature received more ARP packets from the same MAC address within 5 seconds than the specified threshold.

This message indicates the risk of attacks.

Recommended action

Verify that the host at the source MAC address is legitimate.

 

ARP_SUP_ENABLE_FAILED

Message text

Failed to enable ARP flood suppression on VSI [STRING].

Variable fields

$1: VSI name.

Severity level

4

Example

ARP/4/ARP_SUP_ENABLE_FAILED: -MDC=1; Failed to enable ARP flood suppression on VSI vpna.

Explanation

This message is sent when the system failed to enable ARP flood suppression for a VSI. The minimum interval between two log messages is 2 seconds. To make the system send the message successfully, wait for a minimum of 2 seconds before you enable ARP flood suppression for another VSI.

Recommended action

1.     Verify that the device supports ARP flood suppression.

2.     Verify that the hardware resources are sufficient.

 

ARP_TARGET_IP_INVALID

Message text

Target IP [STRING] was not the IP of the receiving interface [STRING].

Variable fields

$1: IP address.

$2: Interface name.

Severity level

6

Example

ARP/6/ARP_TARGET_IP_INVALID: Target IP 192.168.10.2 was not the IP of the receiving interface GigabitEthernet1/0/1.

Explanation

The target IP address of a received ARP message was not the IP address of the receiving interface.

Recommended action

Verify that the host at the sender IP address is legitimate.

 

ARP_THRESHOLD_REACHED

Message text

The alarm threshold for dynamic ARP entry learning was reached on interface [STRING].

Variable fields

$1: Interface name.

Severity level

4

Example

ARP/4/ARP_THRESHOLD_REACHED: The alarm threshold for dynamic ARP entry learning was reached on interface GigabitEthernet1/0/1.

Explanation

This message is sent when the alarm threshold for dynamic ARP learning was reached on GigabitEthernet 1/0/1.

Recommended action

Verify that the number of learned dynamic ARP entries matches the actual number of devices in the network and no ARP attack sources exist in the network.

 

ARP_USER_DUPLICATE_IPADDR_DETECT

Message text

Detected a user IP address conflict. New user (MAC [STRING], SVLAN [STRING], CVLAN [STRING]) on interface [STRING] and old user (MAC [STRING], SVLAN [STRING], CVLAN [STRING]) on interface [STRING] were using the same IP address [IPADDR].

Variable fields

$1: MAC address of a new user.

$2: Outer VLAN to which the new user belongs.

$3: Inner VLAN to which the new user belongs.

$4: Name of the interface connecting to the new user.

$5: MAC address of an old user.

$6: Outer VLAN to which the old user belongs.

$7: Inner VLAN to which the old user belongs.

$8: Name of the interface connecting to the old user.

$9: IP address.

Severity level

6

Example

ARP/6/ARP_USER_DUPLICATE_IPADDR_DETECT: Detected a user IP address conflict. New user (MAC 0010-2100-01e1, SVLAN 100, CVLAN 10) on interface GigabitEthernet1/0/1 and old user (MAC 0120-1e00-0102, SVLAN 100, CVLAN 10) on interface GigabitEthernet1/0/1 were using the same IP address 192.168.1.1.

Explanation

ARP detected a user IP address conflict. The IP address of a new user is the same as the IP address of an old user.

Recommended action

Verify that all users have different IP addresses.

 

ARP_USER_MOVE_DETECT

Message text

Detected a user (IP address [IPADDR], MAC address [STRING]) moved to another interface. Before user move: interface [STRING], SVLAN [STRING], CVLAN [STRING]. After user move: interface [STRING], SVLAN [STRING], CVLAN [STRING].

Variable fields

$1: IP address of the user.

$2: MAC address of the user.

$3: Interface name before the migration.

$4: Outer VLAN to which the user belongs before the migration.

$5: Inner VLAN to which the user belongs before the migration.

$6: Interface name after the migration.

$7: Outer VLAN to which the user belongs after the migration.

$8: Inner VLAN to which the user belongs after the migration.

Severity level

6

Example

ARP/6/ARP_USER_MOVE_DETECT: Detected a user (IP address 192.168.1.1, MAC address 0010-2100-01e1) moved to another interface. Before user move: interface GigabitEthernet1/0/1, SVLAN 100, CVLAN 10. After user move: interface GigabitEthernet1/0/2, SVLAN 100, CVLAN 10.

Explanation

ARP detected a user accesses the network through another port.

Recommended action

Use the display arp user-move record command to verify that the migration is legitimate.

 

DUPIFIP

Message text

Duplicate address [STRING] on interface [STRING], sourced from [STRING].

Variable fields

$1: IP address.

$2: Interface name.

$3: MAC Address.

Severity level

6

Example

ARP/6/DUPIFIP: Duplicate address 1.1.1.1 on interface GigabitEthernet1/0/1, sourced from 0015-E944-A947.

Explanation

ARP detected a duplicate address.

The sender IP in the received ARP packet was being used by the receiving interface.

Recommended action

Modify the IP address configuration.

 

DUPIP

Message text

IP address [STRING] conflicted with global or imported IP address, sourced from [STRING].

Variable fields

$1: IP address.

$2: MAC Address.

Severity level

6

Example

ARP/6/DUPIP: IP address 30.1.1.1 conflicted with global or imported IP address, sourced from 0000-0000-0001.

Explanation

The sender IP address of the received ARP packet conflicted with the global or imported IP address.

Recommended action

Modify the IP address configuration.

 

DUPVRRPIP

Message text

IP address [STRING] conflicted with VRRP virtual IP address on interface [STRING], sourced from [STRING].

Variable fields

$1: IP address.

$2: Interface name.

$3: MAC address.

Severity level

6

Example

ARP/6/DUPVRRPIP: IP address 1.1.1.1 conflicted with VRRP virtual IP address on interface GigabitEthernet1/0/1, sourced from 0015-E944-A947.

Explanation

The sender IP address of the received ARP packet conflicted with the VRRP virtual IP address.

Recommended action

Modify the IP address configuration.

 

 

ATK messages

This section contains attack detection and prevention messages.

ATK_ICMP_ADDRMASK_REQ

Message text

IcmpType(1058)=[UINT32]; RcvIfName(1023)=[STRING]; SrcIPAddr(1003)=[IPADDR]; DSLiteTunnelPeer(1040)=[STRING]; DstIPAddr(1007)=[IPADDR]; RcvVPNInstance(1041)=[STRING]; Action(1049)=[STRING]; BeginTime_c(1011)=[STRING]; EndTime_c(1012)=[STRING]; AtkTimes(1050)=[UINT32].

Variable fields

$1: ICMP message type.

$2: Receiving interface name.

$3: Source IP address.

$4: IP address of the peer DS-Lite tunnel interface.

$5: Destination IP address.

$6: Name of the receiving VPN instance.

$7: Actions against the attack.

$8: Start time of the attack.

$9: End time of the attack.

$10: Attack times.

Severity level

5

Example

ATK/5/ATK_ICMP_ADDRMASK_REQ: IcmpType(1058)=17; RcvIfName(1023)=Ethernet0/0/2; SrcIPAddr(1003)=9.1.1.1; DSLiteTunnelPeer(1040)=--; DstIPAddr(1007)=6.1.1.1; RcvVPNInstance(1041)=--; Action(1049)=logging; BeginTime_c(1011)=20131011091319; EndTime_c(1012)=20131011091819; AtkTimes(1050)=2.

Explanation

This message is sent when ICMP address mask request logs are aggregated.

Recommended action

No action is required.

 

ATK_ICMP_ADDRMASK_REQ_RAW

Message text

IcmpType(1058)=[UINT32]; RcvIfName(1023)=[STRING]; SrcIPAddr(1003)=[IPADDR]; DSLiteTunnelPeer(1040)=[STRING]; DstIPAddr(1007)=[IPADDR]; RcvVPNInstance(1041)=[STRING]; Action(1049)=[STRING].

Variable fields

$1: ICMP message type.

$2: Receiving interface name.

$3: Source IP address.

$4: IP address of the peer DS-Lite tunnel interface.

$5: Destination IP address.

$6: Name of the receiving VPN instance.

$7: Actions against the attack.

Severity level

5

Example

ATK/5/ATK_ICMP_ADDRMASK_REQ_RAW: IcmpType(1058)=17; RcvIfName(1023)=Ethernet0/0/2; SrcIPAddr(1003)=9.1.1.1; DSLiteTunnelPeer(1040)=--; DstIPAddr(1007)=6.1.1.1; RcvVPNInstance(1041)=--; Action(1049)=logging.

Explanation

If log aggregation is enabled, for ICMP address mask requests of the same attributes, this message is sent only when the first request is received.

If log aggregation is disabled, this message is sent every time an ICMP address mask request is received.

Recommended action

No action is required.

 

ATK_ICMP_ADDRMASK_REQ_RAW_SZ

Message text

IcmpType(1058)=[UINT32]; SrcZoneName(1025)=[STRING]; SrcIPAddr(1003)=[IPADDR]; DSLiteTunnelPeer(1040)=[STRING]; DstIPAddr(1007)=[IPADDR]; RcvVPNInstance(1041)=[STRING]; Action(1049)=[STRING].

Variable fields

$1: ICMP message type.

$2: Source security zone name.

$3: Source IP address.

$4: IP address of the peer DS-Lite tunnel interface.

$5: Destination IP address.

$6: Name of the receiving VPN instance.

$7: Actions against the attack.

Severity level

5

Example

ATK/5/ATK_ICMP_ADDRMASK_REQ_RAW_SZ: IcmpType(1058)=17; SrcZoneName(1025)=Trust; SrcIPAddr(1003)=9.1.1.1; DSLiteTunnelPeer(1040)=--; DstIPAddr(1007)=6.1.1.1; RcvVPNInstance(1041)=--; Action(1049)=logging.

Explanation

If log aggregation is enabled, for ICMP address mask requests of the same attributes, this message is sent only when the first request is received.

If log aggregation is disabled, this message is sent every time an ICMP address mask request is received.

Recommended action

No action is required.

 

ATK_ICMP_ADDRMASK_REQ_SZ

Message text

IcmpType(1058)=[UINT32]; SrcZoneName(1025)=[STRING]; SrcIPAddr(1003)=[IPADDR]; DSLiteTunnelPeer(1040)=[STRING]; DstIPAddr(1007)=[IPADDR]; RcvVPNInstance(1041)=[STRING]; Action(1049)=[STRING]; BeginTime_c(1011)=[STRING]; EndTime_c(1012)=[STRING]; AtkTimes(1050)=[UINT32].

Variable fields

$1: ICMP message type.

$2: Source security zone name.

$3: Source IP address.

$4: IP address of the peer DS-Lite tunnel interface.

$5: Destination IP address.

$6: Name of the receiving VPN instance.

$7: Actions against the attack.

$8: Start time of the attack.

$9: End time of the attack.

$10: Attack times.

Severity level

5

Example

ATK/5/ATK_ICMP_ADDRMASK_REQ_SZ: IcmpType(1058)=17; SrcZoneName(1025)=Trust; SrcIPAddr(1003)=9.1.1.1; DSLiteTunnelPeer(1040)=--; DstIPAddr(1007)=6.1.1.1; RcvVPNInstance(1041)=--; Action(1049)=logging; BeginTime_c(1011)=20131011091319; EndTime_c(1012)=20131011091819; AtkTimes(1050)=2.

Explanation

This message is sent when ICMP address mask request logs are aggregated.

Recommended action

No action is required.

 

ATK_ICMP_ADDRMASK_RPL

Message text

IcmpType(1058)=[UINT32]; RcvIfName(1023)=[STRING]; SrcIPAddr(1003)=[IPADDR]; DSLiteTunnelPeer(1040)=[STRING]; DstIPAddr(1007)=[IPADDR]; RcvVPNInstance(1041)=[STRING]; Action(1049)=[STRING]; BeginTime_c(1011)=[STRING]; EndTime_c(1012)=[STRING]; AtkTimes(1050)=[UINT32].

Variable fields

$1: ICMP message type.

$2: Receiving interface name.

$3: Source IP address.

$4: IP address of the peer DS-Lite tunnel interface.

$5: Destination IP address.

$6: Name of the receiving VPN instance.

$7: Actions against the attack.

$8: Start time of the attack.

$9: End time of the attack.

$10: Attack times.

Severity level

5

Example

ATK/5/ATK_ICMP_ADDRMASK_RPL: IcmpType(1058)=18; RcvIfName(1023)=Ethernet0/0/2; SrcIPAddr(1003)=9.1.1.1; DSLiteTunnelPeer(1040)=--; DstIPAddr(1007)=6.1.1.1; RcvVPNInstance(1041)=--; Action(1049)=logging; BeginTime_c(1011)=20131011091319; EndTime_c(1012)=20131011091819; AtkTimes(1050)=2.

Explanation

This message is sent when ICMP address mask reply logs are aggregated.

Recommended action

No action is required.

 

ATK_ICMP_ADDRMASK_RPL_RAW

Message text

IcmpType(1058)=[UINT32]; RcvIfName(1023)=[STRING]; SrcIPAddr(1003)=[IPADDR]; DSLiteTunnelPeer(1040)=[STRING]; DstIPAddr(1007)=[IPADDR]; RcvVPNInstance(1041)=[STRING]; Action(1049)=[STRING].

Variable fields

$1: ICMP message type.

$2: Receiving interface name.

$3: Source IP address.

$4: IP address of the peer DS-Lite tunnel interface.

$5: Destination IP address.

$6: Name of the receiving VPN instance.

$7: Actions against the attack.

Severity level

5

Example

ATK/5/ATK_ICMP_ADDRMASK_RPL_RAW: IcmpType(1058)=18; RcvIfName(1023)=Ethernet0/0/2; SrcIPAddr(1003)=9.1.1.1; DSLiteTunnelPeer(1040)=--; DstIPAddr(1007)=6.1.1.1; RcvVPNInstance(1041)=--; Action(1049)=logging.

Explanation

If log aggregation is enabled, for ICMP address mask replies of the same attributes, this message is sent only when the first reply is received.

If log aggregation is disabled, this message is sent every time an ICMP address mask reply is received.

Recommended action

No action is required.

 

ATK_ICMP_ADDRMASK_RPL_RAW_SZ

Message text

IcmpType(1058)=[UINT32]; SrcZoneName(1025)=[STRING]; SrcIPAddr(1003)=[IPADDR]; DSLiteTunnelPeer(1040)=[STRING]; DstIPAddr(1007)=[IPADDR]; RcvVPNInstance(1041)=[STRING]; Action(1049)=[STRING].

Variable fields

$1: ICMP message type.

$2: Source security zone name.

$3: Source IP address.

$4: IP address of the peer DS-Lite tunnel interface.

$5: Destination IP address.

$6: Name of the receiving VPN instance.

$7: Actions against the attack.

Severity level

5

Example

ATK/5/ATK_ICMP_ADDRMASK_RPL_RAW_SZ: IcmpType(1058)=18; SrcZoneName(1025)=Trust; SrcIPAddr(1003)=9.1.1.1; DSLiteTunnelPeer(1040)=--; DstIPAddr(1007)=6.1.1.1; RcvVPNInstance(1041)=--; Action(1049)=logging.

Explanation

If log aggregation is enabled, for ICMP address mask replies of the same attributes, this message is sent only when the first reply is received.

If log aggregation is disabled, this message is sent every time an ICMP address mask reply is received.

Recommended action

No action is required.

 

ATK_ICMP_ADDRMASK_RPL_SZ

Message text

IcmpType(1058)=[UINT32]; SrcZoneName(1025)=[STRING]; SrcIPAddr(1003)=[IPADDR]; DSLiteTunnelPeer(1040)=[STRING]; DstIPAddr(1007)=[IPADDR]; RcvVPNInstance(1041)=[STRING]; Action(1049)=[STRING]; BeginTime_c(1011)=[STRING]; EndTime_c(1012)=[STRING]; AtkTimes(1050)=[UINT32].

Variable fields

$1: ICMP message type.

$2: Source security zone name.

$3: Source IP address.

$4: IP address of the peer DS-Lite tunnel interface.

$5: Destination IP address.

$6: Name of the receiving VPN instance.

$7: Actions against the attack.

$8: Start time of the attack.

$9: End time of the attack.

$10: Attack times.

Severity level

5

Example

ATK/5/ATK_ICMP_ADDRMASK_RPL_SZ: IcmpType(1058)=18; SrcZoneName(1025)=Trust; SrcIPAddr(1003)=9.1.1.1; DSLiteTunnelPeer(1040)=--; DstIPAddr(1007)=6.1.1.1; RcvVPNInstance(1041)=--; Action(1049)=logging; BeginTime_c(1011)=20131011091319; EndTime_c(1012)=20131011091819; AtkTimes(1050)=2.

Explanation

This message is sent when ICMP address mask reply logs are aggregated.

Recommended action

No action is required.

 

ATK_ICMP_ECHO_REQ

Message text

IcmpType(1058)=[UINT32]; RcvIfName(1023)=[STRING]; SrcIPAddr(1003)=[IPADDR]; DSLiteTunnelPeer(1040)=[STRING]; DstIPAddr(1007)=[IPADDR]; RcvVPNInstance(1041)=[STRING]; Action(1049)=[STRING]; BeginTime_c(1011)=[STRING]; EndTime_c(1012)=[STRING]; AtkTimes(1050)=[UINT32].

Variable fields

$1: ICMP message type.

$2: Receiving interface name.

$3: Source IP address.

$4: IP address of the peer DS-Lite tunnel interface.

$5: Destination IP address.

$6: Name of the receiving VPN instance.

$7: Actions against the attack.

$8: Start time of the attack.

$9: End time of the attack.

$10: Attack times.

Severity level

5

Example

ATK/5/ATK_ICMP_ECHO_REQ: IcmpType(1058)=8; RcvIfName(1023)=Ethernet0/0/2; SrcIPAddr(1003)=9.1.1.1; DSLiteTunnelPeer(1040)=--; DstIPAddr(1007)=6.1.1.1; RcvVPNInstance(1041)=--; Action(1049)=logging; BeginTime_c(1011)=20131011091319; EndTime_c(1012)=20131011091819; AtkTimes(1050)=2.

Explanation

This message is sent when ICMP echo request logs are aggregated.

Recommended action

No action is required.

 

ATK_ICMP_ECHO_REQ_RAW

Message text

IcmpType(1058)=[UINT32]; RcvIfName(1023)=[STRING]; SrcIPAddr(1003)=[IPADDR]; DSLiteTunnelPeer(1040)=[STRING]; DstIPAddr(1007)=[IPADDR]; DstPort(1004)=[UINT16]; RcvVPNInstance(1041)=[STRING]; Action(1049)=[STRING].

Variable fields

$1: ICMP message type.

$2: Receiving interface name.

$3: Source IP address.

$4: IP address of the peer DS-Lite tunnel interface.

$5: Destination IP address.

$6: Destination port number.

$7: Name of the receiving VPN instance.

$8: Actions against the attack.

Severity level

5

Example

ATK/5/ATK_ICMP_ECHO_REQ_RAW: IcmpType(1058)=8; RcvIfName(1023)=Ethernet0/0/2; SrcIPAddr(1003)=9.1.1.1; DstPort(1004)=22; DSLiteTunnelPeer(1040)=--; DstIPAddr(1007)=6.1.1.1; RcvVPNInstance(1041)=--; Action(1049)=logging.

Explanation

If log aggregation is enabled, for ICMP echo requests of the same attributes, this message is sent only when the first request is received.

If log aggregation is disabled, this message is sent every time an ICMP echo request is received.

Recommended action

No action is required.

 

ATK_ICMP_ECHO_REQ_RAW_SZ

Message text

IcmpType(1058)=[UINT32]; SrcZoneName(1025)=[STRING]; SrcIPAddr(1003)=[IPADDR]; DSLiteTunnelPeer(1040)=[STRING]; DstIPAddr(1007)=[IPADDR]; DstPort(1004)=[UINT16]; RcvVPNInstance(1041)=[STRING]; Action(1049)=[STRING].

Variable fields

$1: ICMP message type.

$2: Source security zone name.

$3: Source IP address.

$4: IP address of the peer DS-Lite tunnel interface.

$5: Destination IP address.

$6: Destination port number.

$7: Name of the receiving VPN instance.

$8: Actions against the attack.

Severity level

5

Example

ATK/5/ATK_ICMP_ECHO_REQ_RAW_SZ: IcmpType(1058)=8; SrcZoneName(1025)=Trust; SrcIPAddr(1003)=9.1.1.1; DstPort(1004)=22; DSLiteTunnelPeer(1040)=--; DstIPAddr(1007)=6.1.1.1; RcvVPNInstance(1041)=--; Action(1049)=logging.

Explanation

If log aggregation is enabled, for ICMP echo requests of the same attributes, this message is sent only when the first request is received.

If log aggregation is disabled, this message is sent every time an ICMP echo request is received.

Recommended action

No action is required.

 

ATK_ICMP_ECHO_REQ_SZ

Message text

IcmpType(1058)=[UINT32]; SrcZoneName(1025)=[STRING]; SrcIPAddr(1003)=[IPADDR]; DSLiteTunnelPeer(1040)=[STRING]; DstIPAddr(1007)=[IPADDR]; RcvVPNInstance(1041)=[STRING]; Action(1049)=[STRING]; BeginTime_c(1011)=[STRING]; EndTime_c(1012)=[STRING]; AtkTimes(1050)=[UINT32].

Variable fields

$1: ICMP message type.

$2: Source security zone name.

$3: Source IP address.

$4: IP address of the peer DS-Lite tunnel interface.

$5: Destination IP address.

$6: Name of the receiving VPN instance.

$7: Actions against the attack.

$8: Start time of the attack.

$9: End time of the attack.

$10: Attack times.

Severity level

5

Example

ATK/5/ATK_ICMP_ECHO_REQ_SZ: IcmpType(1058)=8; SrcZoneName(1025)=Trust; SrcIPAddr(1003)=9.1.1.1; DSLiteTunnelPeer(1040)=--; DstIPAddr(1007)=6.1.1.1; RcvVPNInstance(1041)=--; Action(1049)=logging; BeginTime_c(1011)=20131011091319; EndTime_c(1012)=20131011091819; AtkTimes(1050)=2.

Explanation

This message is sent when ICMP echo request logs are aggregated.

Recommended action

No action is required.

 

ATK_ICMP_ECHO_RPL

Message text

IcmpType(1058)=[UINT32]; RcvIfName(1023)=[STRING]; SrcIPAddr(1003)=[IPADDR]; DSLiteTunnelPeer(1040)=[STRING]; DstIPAddr(1007)=[IPADDR]; RcvVPNInstance(1041)=[STRING]; Action(1049)=[STRING]; BeginTime_c(1011)=[STRING]; EndTime_c(1012)=[STRING]; AtkTimes(1050)=[UINT32].

Variable fields

$1: ICMP message type.

$2: Receiving interface name.

$3: Source IP address.

$4: IP address of the peer DS-Lite tunnel interface.

$5: Destination IP address.

$6: Name of the receiving VPN instance.

$7: Actions against the attack.

$8: Start time of the attack.

$9: End time of the attack.

$10: Attack times.

Severity level

5

Example

ATK/5/ATK_ICMP_ECHO_RPL: IcmpType(1058)=0; RcvIfName(1023)=Ethernet0/0/2; SrcIPAddr(1003)=9.1.1.1; DSLiteTunnelPeer(1040)=--; DstIPAddr(1007)=6.1.1.1; RcvVPNInstance(1041)=--; Action(1049)=logging; BeginTime_c(1011)=20131011091319; EndTime_c(1012)=20131011091819; AtkTimes(1050)=2.

Explanation

This message is sent when ICMP echo reply logs are aggregated.

Recommended action

No action is required.

 

ATK_ICMP_ECHO_RPL_RAW

Message text

IcmpType(1058)=[UINT32]; RcvIfName(1023)=[STRING]; SrcIPAddr(1003)=[IPADDR]; DSLiteTunnelPeer(1040)=[STRING]; DstIPAddr(1007)=[IPADDR]; RcvVPNInstance(1041)=[STRING]; Action(1049)=[STRING].

Variable fields

$1: ICMP message type.

$2: Receiving interface name.

$3: Source IP address.

$4: IP address of the peer DS-Lite tunnel interface.

$5: Destination IP address.

$6: Name of the receiving VPN instance.

$7: Actions against the attack.

Severity level

5

Example

ATK/5/ATK_ICMP_ECHO_RPL_RAW: IcmpType(1058)=0; RcvIfName(1023)=Ethernet0/0/2; SrcIPAddr(1003)=9.1.1.1; DSLiteTunnelPeer(1040)=--; DstIPAddr(1007)=6.1.1.1; RcvVPNInstance(1041)=--; Action(1049)=logging.

Explanation

If log aggregation is enabled, for ICMP echo replies of the same attributes, this message is sent only when the first reply is received.

If log aggregation is disabled, this message is sent every time an ICMP echo reply is received.

Recommended action

No action is required.

 

ATK_ICMP_ECHO_RPL_RAW_SZ

Message text

IcmpType(1058)=[UINT32]; SrcZoneName(1025)=[STRING]; SrcIPAddr(1003)=[IPADDR]; DSLiteTunnelPeer(1040)=[STRING]; DstIPAddr(1007)=[IPADDR]; RcvVPNInstance(1041)=[STRING]; Action(1049)=[STRING].

Variable fields

$1: ICMP message type.

$2: Source security zone name.

$3: Source IP address.

$4: IP address of the peer DS-Lite tunnel interface.

$5: Destination IP address.

$6: Name of the receiving VPN instance.

$7: Actions against the attack.

Severity level

5

Example

ATK/5/ATK_ICMP_ECHO_RPL_RAW_SZ: IcmpType(1058)=0; SrcZoneName(1025)=Trust; SrcIPAddr(1003)=9.1.1.1; DSLiteTunnelPeer(1040)=--; DstIPAddr(1007)=6.1.1.1; RcvVPNInstance(1041)=--; Action(1049)=logging.

Explanation

If log aggregation is enabled, for ICMP echo replies of the same attributes, this message is sent only when the first reply is received.

If log aggregation is disabled, this message is sent every time an ICMP echo reply is received.

Recommended action

No action is required.

 

ATK_ICMP_ECHO_RPL_SZ

Message text

IcmpType(1058)=[UINT32]; SrcZoneName(1025)=[STRING]; SrcIPAddr(1003)=[IPADDR]; DSLiteTunnelPeer(1040)=[STRING]; DstIPAddr(1007)=[IPADDR]; RcvVPNInstance(1041)=[STRING]; Action(1049)=[STRING]; BeginTime_c(1011)=[STRING]; EndTime_c(1012)=[STRING]; AtkTimes(1050)=[UINT32].

Variable fields

$1: ICMP message type.

$2: Source security zone name.

$3: Source IP address.

$4: IP address of the peer DS-Lite tunnel interface.

$5: Destination IP address.

$6: Name of the receiving VPN instance.

$7: Actions against the attack.

$8: Start time of the attack.

$9: End time of the attack.

$10: Attack times.

Severity level

5

Example

ATK/5/ATK_ICMP_ECHO_RPL_SZ: IcmpType(1058)=0; SrcZoneName(1025)=Trust; SrcIPAddr(1003)=9.1.1.1; DSLiteTunnelPeer(1040)=--; DstIPAddr(1007)=6.1.1.1; RcvVPNInstance(1041)=--; Action(1049)=logging; BeginTime_c(1011)=20131011091319; EndTime_c(1012)=20131011091819; AtkTimes(1050)=2.

Explanation

This message is sent when ICMP echo reply logs are aggregated.

Recommended action

No action is required.

 

ATK_ICMP_FLOOD

Message text

RcvIfName(1023)=[STRING]; DstIPAddr(1007)=[IPADDR]; DstPort(1008)=[UINT16]; RcvVPNInstance(1041)=[STRING]; UpperLimit(1048)=[UINT32]; Action(1049)=[STRING]; BeginTime_c(1011)=[STRING].

Variable fields

$1: Receiving interface name.

$2: Destination IP address.

$3: Destination port number.

$4: Name of the receiving VPN instance.

$5: Rate limit.

$6: Actions against the attack.

$7: Start time of the attack.

Severity level

3

Example

ATK/3/ATK_ICMP_FLOOD: RcvIfName(1023)=Ethernet0/0/2; DstIPAddr(1007)=6.1.1.5; DstPort(1008)=22; RcvVPNInstance(1041)=--; UpperLimit(1048)=10; Action(1049)=logging; BeginTime_c(1011)=20131009093351.

Explanation

This message is sent when the number of ICMP packets sent to a destination per second exceeds the rate limit.

Recommended action

No action is required.

 

ATK_ICMP_FLOOD_SZ

Message text

SrcZoneName(1025)=[STRING]; DstIPAddr(1007)=[IPADDR]; DstPort(1008)=[UINT16]; RcvVPNInstance(1041)=[STRING]; UpperLimit(1048)=[UINT32]; Action(1049)=[STRING]; BeginTime_c(1011)=[STRING].

Variable fields

$1: Source security zone name.

$2: Destination IP address.

$3: Destination port number.

$4: Name of the receiving VPN instance.

$5: Rate limit.

$6: Actions against the attack.

$7: Start time of the attack.

Severity level

3

Example

ATK/3/ATK_ICMP_FLOOD_SZ: SrcZoneName(1025)=Trust; DstIPAddr(1007)=6.1.1.5; DstPort(1008)=22; RcvVPNInstance(1041)=--; UpperLimit(1048)=10; Action(1049)=logging; BeginTime_c(1011)=20131009093351.

Explanation

This message is sent when the number of ICMP packets sent to a destination per second exceeds the rate limit.

Recommended action

No action is required.

 

ATK_ICMP_INFO_REQ

Message text

IcmpType(1058)=[UINT32]; RcvIfName(1023)=[STRING]; SrcIPAddr(1003)=[IPADDR]; DSLiteTunnelPeer(1040)=[STRING]; DstIPAddr(1007)=[IPADDR]; RcvVPNInstance(1041)=[STRING]; Action(1049)=[STRING]; BeginTime_c(1011)=[STRING]; EndTime_c(1012)=[STRING]; AtkTimes(1050)=[UINT32].

Variable fields

$1: ICMP message type.

$2: Receiving interface name.

$3: Source IP address.

$4: IP address of the peer DS-Lite tunnel interface.

$5: Destination IP address.

$6: Name of the receiving VPN instance.

$7: Actions against the attack.

$8: Start time of the attack.

$9: End time of the attack.

$10: Attack times.

Severity level

5

Example

ATK/5/ATK_ICMP_INFO_REQ: IcmpType(1058)=15; RcvIfName(1023)=Ethernet0/0/2; SrcIPAddr(1003)=9.1.1.1; DSLiteTunnelPeer(1040)=--; DstIPAddr(1007)=6.1.1.1; RcvVPNInstance(1041)=--; Action(1049)=logging; BeginTime_c(1011)=20131011091319; EndTime_c(1012)=20131011091819; AtkTimes(1050)=2.

Explanation

This message is sent when ICMP information request logs are aggregated.

Recommended action

No action is required.

 

ATK_ICMP_INFO_REQ_RAW

Message text

IcmpType(1058)=[UINT32]; RcvIfName(1023)=[STRING]; SrcIPAddr(1003)=[IPADDR]; DSLiteTunnelPeer(1040)=[STRING]; DstIPAddr(1007)=[IPADDR]; RcvVPNInstance(1041)=[STRING]; Action(1049)=[STRING].

Variable fields

$1: ICMP message type.

$2: Receiving interface name.

$3: Source IP address.

$4: IP address of the peer DS-Lite tunnel interface.

$5: Destination IP address.

$6: Name of the receiving VPN instance.

$7: Actions against the attack.

Severity level

5

Example

ATK/5/ATK_ICMP_INFO_REQ_RAW: IcmpType(1058)=15; RcvIfName(1023)=Ethernet0/0/2; SrcIPAddr(1003)=9.1.1.1; DSLiteTunnelPeer(1040)=--; DstIPAddr(1007)=6.1.1.1; RcvVPNInstance(1041)=--; Action(1049)=logging.

Explanation

If log aggregation is enabled, for ICMP information requests of the same attributes, this message is sent only when the first request is received.

If log aggregation is disabled, this message is sent every time an ICMP information request is received.

Recommended action

No action is required.

 

ATK_ICMP_INFO_REQ_RAW_SZ

Message text

IcmpType(1058)=[UINT32]; SrcZoneName(1025)=[STRING]; SrcIPAddr(1003)=[IPADDR]; DSLiteTunnelPeer(1040)=[STRING]; DstIPAddr(1007)=[IPADDR]; RcvVPNInstance(1041)=[STRING]; Action(1049)=[STRING].

Variable fields

$1: ICMP message type.

$2: Source security zone name.

$3: Source IP address.

$4: IP address of the peer DS-Lite tunnel interface.

$5: Destination IP address.

$6: Name of the receiving VPN instance.

$7: Actions against the attack.

Severity level

5

Example

ATK/5/ATK_ICMP_INFO_REQ_RAW_SZ: IcmpType(1058)=15; SrcZoneName(1025)=Trust; SrcIPAddr(1003)=9.1.1.1; DSLiteTunnelPeer(1040)=--; DstIPAddr(1007)=6.1.1.1; RcvVPNInstance(1041)=--; Action(1049)=logging.

Explanation

If log aggregation is enabled, for ICMP information requests of the same attributes, this message is sent only when the first request is received.

If log aggregation is disabled, this message is sent every time an ICMP information request is received.

Recommended action

No action is required.

 

ATK_ICMP_INFO_REQ_SZ

Message text

IcmpType(1058)=[UINT32]; SrcZoneName(1025)=[STRING]; SrcIPAddr(1003)=[IPADDR]; DSLiteTunnelPeer(1040)=[STRING]; DstIPAddr(1007)=[IPADDR]; RcvVPNInstance(1041)=[STRING]; Action(1049)=[STRING]; BeginTime_c(1011)=[STRING]; EndTime_c(1012)=[STRING]; AtkTimes(1050)=[UINT32].

Variable fields

$1: ICMP message type.

$2: Source security zone name.

$3: Source IP address.

$4: IP address of the peer DS-Lite tunnel interface.

$5: Destination IP address.

$6: Name of the receiving VPN instance.

$7: Actions against the attack.

$8: Start time of the attack.

$9: End time of the attack.

$10: Attack times.

Severity level

5

Example

ATK/5/ATK_ICMP_INFO_REQ_SZ: IcmpType(1058)=15; SrcZoneName(1025)=Trust; SrcIPAddr(1003)=9.1.1.1; DSLiteTunnelPeer(1040)=--; DstIPAddr(1007)=6.1.1.1; RcvVPNInstance(1041)=--; Action(1049)=logging; BeginTime_c(1011)=20131011091319; EndTime_c(1012)=20131011091819; AtkTimes(1050)=2.

Explanation

This message is sent when ICMP information request logs are aggregated.

Recommended action

No action is required.

 

ATK_ICMP_INFO_RPL

Message text